The register function for lattice paths
|
|
- Clement Watts
- 6 years ago
- Views:
Transcription
1 Fifth Colloquium on Mathematics and Computer Science DMTCS proc. AI, 2008, The register function for lattice paths Guy Louchard and Helmut Prodinger 2 Université Libre de Bruxelles, Département d Informatique, CP 22, Boulevard du Triomphe, B-050 Bruxelles, Belgium. louchard@ulb.ac.be 2 Stellenbosch University, Department of Mathematics, 7602 Stellenbosch, South Africa. hproding@sun.ac.za The register function for binary trees is the minimal number of extra registers required to evaluate the tree. This concept is also known as Horton-Strahler numbers. We extend this definition to lattice paths, built from steps ±, without positivity restriction. Exact expressions are derived for appropriate generating functions. A procedure is presented how to get asymptotics of all moments, in an almost automatic way; this is based on an earlier paper of the authors. Keywords: Register function, Horton-Strahler numbers, Gumbel distribution, moments. Introduction The register function of binary trees was introduced by Ershov (7; the equivalent notion of (Horton-Strahler numbers was introduced earlier by hydrogeologists Horton (4 and Strahler (25. This function is recursively defined by reg( = 0, and, if a binary tree T has subtrees T and T 2, then reg(t = max{reg(t, reg(t 2 }, provided reg(t reg(t 2, otherwise it is + reg(t. Assuming all binary trees with n internal nodes to be equally likely, the average value of the register function was found independently and at the same time (2; 6; compare also (2. It is log 4 n + O(, and more precision is available and involves complicated (fluctuating terms. The concept has been extended to unary-binary trees (0. Various papers about the register function (or Horton-Strahler numbers have been written; we cite a few here (5; 7; 22; 27; 24. Auber et al. ( have introduced a generalisation to general rooted trees, see also (6. Binary trees are enumerated by Catalan numbers, and nonnegative lattice paths, with steps ±, returning to level 0, as well. We will describe such lattice paths in the popular notation of well-formed words over the alphabet {(, }, with n parantheses of each type. (Well-formed means that, when scanning the word from left to right, there are never more closing than opening brackets. There is the formal equation D = (DD + ε for the family of nonnegative paths, with ε denoting the empty word. This decomposition, according to the first return to the 0-level, can be used to encode binary trees, since binary trees satisfy essentially the same equation. Consequently, the register function can be defined on the set of nonnegative lattice paths (returning to the 0-level, by borrowing the definition from the binary trees. The following figures describe the process: This material is based upon work supported by the National Research Foundation under grant number c 2008 Discrete Mathematics and Theoretical Computer Science (DMTCS, Nancy, France
2 36 Guy Louchard and Helmut Prodinger Fig. : A path of length 28 returning to the x-axis. We will make use of known formulæ: Denote by R p (z and S p (z the generating function where the coefficient of z n is the number of trees with n nodes and register function = p resp. p. (Equivalenty, the number of paths of length 2n with these properties. Then with the substitution z = u (+u 2. R p (z = u2 u S p (z = u2 u u 2p, u 2p+ ( u 2p, u 2p (2 ( 2n comes the new contribution of this paper: we also allow the paths to go below the x-axis. There are nnow such paths of length 2n. If we denote the family of these paths by A, then our decomposition extends to A = (DA + D(A + ε, where D is just a copy of D with opening and closing parentheses exchanged, in other words, it describes nonpositive paths. These paths have a straight forward interpretation as marked binary trees: Each left edge, which has as predecessors only right edges, gets a label from {pos, neg}, indicating, whether the first excursion is strictly positive or strictly negative. For the register function, we just borrow it from this corresponding tree, ignoring the extra labels. We can formulate this directly in terms of paths: reg ( (wx = reg ( w(x = max{reg(w, reg(x}, if reg(w reg(x, otherwise + reg(w, and reg(ε = 0. In the following sections, we first derive explicit expressions for the probability that a random path of length 2n has register function p (the instance of register function = p follows from that by taking differences. We derive in particular an exact expression for the average; exact expressions for higher moments are possible, but become messy. However, we evaluate the higher moments asymptotically. First, it is shown that the asymptotic distribution in our register instance is the same as in the classical register problem for binary trees (lower order terms are
3 Register function for lattice paths 37 Fig. 2: The corresponding binary tree with 4 nodes and the first left edge labelled positive (dashed or negative (dotted. different, though. Thus, the asymptotic analysis of moments applies to both, the classical instance, and the one presented in this paper. The machinery to achieve an almost automatic computation of the moments was presented in our earlier paper (20. The analysis of the register instance was not included, because of the restriction on the length of this paper. Now we feel that it is a good opportunity that this treatment can go into print. There are some related parameters, like the size of the maximal complete subtree in a binary tree. Our methods apply here as well, but we do not include that here, as it would lead us a bit far apart. Some technical considerations that are in (20 are not repeated here, to allow for a smooth reading. 2 Generating functions Let I p (z and J p (z be the generating function of paths (unrestricted, with register function = p resp. p. The register random variable related to a path of length 2n is denoted by X n : P{X n = p} = [z n ]I p (z/ ( 2n n. This will later be denoted by P(p. We will find a recursion for J p (z. Of course, the coefficient of z n refers to paths of length 2n, and J 0 (z = A(z = 4z, the generating function of all paths. The following recursion is known (23: where S p = zs 2 p + z(d S p S p + zs p (D S p, (3 D = D(z = 4z (4 2z is the generating function of binary trees (and of nonnegative lattice paths. This recursion is an immediate translation of the definition of the register function. The same type of reasoning leads to the following recursion, which we state as a proposition. Proposition 2. J p = 2zS p J p + 2z(D S p J p + 2z(A J p S p. (5
4 38 Guy Louchard and Helmut Prodinger Fig. 3: The corresponding binary tree with 4 nodes without the labelling of the edges and the register function attached to the nodes. The register function of the tree is the number 3 attached to the root. The solution is stated as a theorem, with the standard substitution z = u/( + u 2 : Theorem 2.2 J p = ( + u2 u 2 p u 2p ( u 2p u u 2p. (6 u u 2p Proof: Once the formula is known, the verification is routine, and can be done by a computer. In order to find it, however, one has to solve the first-order recursion by iteration. Doing this, the following sum appears: p k=0 which, quite amazingly, has the explicit evaluation ( u 2k 2 2 k, 2( u u2p 2 p. In order to study the average value of the register function, we must consider E(z = p J p. Note that p u 2p = u 2p p, u k2p = n v 2 (nu n, where v 2 (n is the number of trailing zeroes in the binary representation of n. Similarly, p 2 p u 2p ( u 2p 2 = p, k2 p u k2p = n nv 2 (nu n.
5 Register function for lattice paths 39 To read off coefficients, we notice the formula [z n ]f(z = [u n ]( u( + u 2n f(z(u, (7 see (4, which is obtained by Cauchy s integral formula and a change of variable. Thus we compute [z n ]E(z = [u n+ ]( u( + u 2n+ kv 2 (ku k 2[u n ]( + u 2n v 2 (ku k = kv 2 (k[u n+ k ]( u( + u 2n+ 2 v 2 (ku k [u n k ]( + u 2n = [( ( ] 2n + 2n + kv 2 (k 2 ( 2n v 2 (k. n + k n k n k Normalising, we get the following explicit result. Theorem 2.3 The average value of the register function, considering all (unrestricted lattice path of length 2n to be equally likely, is given by [ ( ( ( ] 2n + 2n + 2n v 2 (k k k 2. n + k n k n k ( 2n n Alternatively, it can be written as [ ( 2n v 2 (k k n + k ( 2n n ( ( 2n 2 k n k 2n n k ]. Note the similar formula for binary trees: n + ( 2n [( ( ( ] 2n 2n 2n v 2 (k 2 +. n + k n k n k n The asymptotic evaluation of this (and higher moments will be studied in the next sections. In particular, we will prove Theorem 2.4 The average number of registers is asymptotic to log 4 n + ln 4 (lnπ γ ln4 Γ( χ l /2ζ( χ l (χ l + e lπi log 4 n l 0 with χ l := 2lπi/ ln4. Formulæ for I p = J p J p+ and its coefficients can also be given: Note that Thus J p (z = ( + u2 u k2 p u k2p 2 + u u [z n ]J p (z = [u n 2n ( + u2 ]( u( + u u u k2p. k2 p u k2p
6 40 Guy Louchard and Helmut Prodinger [u n ]( u( + u 2n 2 + u u u k2p = k2 p [u n+ k2p ]( u( + u 2n+ 2 [u n k2p ]( + u 2n = [( ( ] 2n + 2n + k2 p n + k2 p n k2 p 2 ( 2n n k2 p. Therefore we find the following formula for the probability that a random path of length 2n has register function p: [z n ]J p (z ( 2n = ( ( 2n+ 2n+ k2 p n+ k2p n k2 ( p 2n 2 ( 2n n k2 ( p 2n. (8 n n n This can be approximated by ( 2 + k2 4 p+ e k2 4 p /n. (9 n We just give the following remark about this: The approximation of binomial coefficients viz. ( 2n n k / ( 2n n for k n 2 +ε is well known (it appears in all the earlier papers on the register function; it is just a consequence of Stirling s approximation of the factorials. Outside this range, the quantity is exponentially small. A careful error analysis of similar expressions can be found in (8. For the classical register problem, the same quantity arises, with differences only in lower order terms that are not displayed. This shows that the register function is quite immune to the input model. 3 Semi-automatic computation of moments: an outline We will use the following paradigm: to compute the asymptotics of the moments, we use the techniques described in great detail in Louchard and Prodinger (20, which are usually simpler than the ones found in the literature. We encounter extreme-value (Gumbel-like related distributions functions. The Gumbel distribution function is given by exp( exp( x. If we compare this approach with other ones that appeared previously, then we can notice the following. Traditionally, one would stay with exact enumerations as long as possible, and only at a late stage move to asymptotics. Doing this, one would, in terms of asymptotics, carry many unimportant contributions around, which makes the computations quite heavy, especially when it comes to higher moments. Here, however, approximations are carried out as early as possible, and this allows for streamlined (and often automatic computations of the higher moments. Note that the distributions that we can handle do not converge in the weak sense, they do however converge along subsequences n m for which the fractional part of log n m is constant (the logarithm is to a base that will be specified. Here are the main steps of our approach. We set p(j := P{X n = j}, P(j := P{X n j}. (Note that P(j = [z n ]S j+ (z/ ( 2n n. We write log n for log Q n; the base Q will be given later. Setting η = j log n, we will first compute f and F such that p(j f(η, P(j F(η, n, η = O(,
7 Register function for lattice paths 4 f(η = F(η F(η. (That is why we do not use/need the dependency on n in the notation of p(j and P(j just introduced; F(z is of the Gumbel type. Of course, p(j and f(η 0 when j or, and η or. But the rate of convergence is considered later on. Asymptotically, the distribution will be a periodic function of the fractional part of log n. Next, we are going to show that E ( Xn k = j k p(j (η + log n k [F(η F(η ]. (0 j j by computing a suitable rate of convergence (in particular for large and small values of η. This is related to a uniform integrability condition (see Loève (8, Section.4. So, once we gain enough knowledge about the function F(x, we know the moments. This will be achieved essentially by using the Mellin transform technique. For F(x that are related to the Gumbel distribution (details are in the following lemma, the desired asymptotic moments come out as the coefficients of a certain generating function, and they can be computed by Maple. Finally we will use the following result from Hitczenko and Louchard (3, Louchard and Prodinger (20, related to the dominant part of the moments (the sign is related to the moments of the integer-valued random variable X n. Lemma 3. Let a (integer-valued random variable X n be such that P{X n log n η} F(η, where F(η is the distribution function of a continuous random variable Z with mean m, second moment m 2, variance σ 2 and centered moments µ k. Assume that F(η is either an extreme-value distribution function or a convergent series of such and that (0 is satisfied. Let say, with ϕ(α = E(e αz = + k= λ(α = + α2 2 σ2 + α k k! m k = e αm λ(α, k=3 α k k! µ k. Let w, κ s (with or without subscripts denote periodic functions of log n, with period and with usually small mean and amplitude. Actually, these functions depend on the fractional part of log n, denoted by {log n}, as usual. Then the corresponding moments of X n are given by E(X n log n + x[f(x F(x ]dx + w = m + w, with m = m + 2, Var(X n E(X n (log n + m + w 2 + x 2 [F(x F(x ]dx m 2 + κ 2 = m 2 + m + 3 m 2 + κ 2 = σ 2 + κ 2, with σ 2 = σ
8 42 Guy Louchard and Helmut Prodinger More generally, the centered moments of X n are asymptotically given by µ i + κ i, where α k Θ(α := + k! µ k = 2 α sinh( α λ(α. 2 k=2 The neglected part is of order /n β with 0 < β <. For instance, we derive µ 2 = σ 2 = µ 2 + 2, µ 3 = µ 3, µ 4 = µ 4 + σ , µ 5 = µ µ 3. The moments of X n log n are asymptotically given by m i +w i, where the generating function of m i is given by φ(α := e αη α i f(ηdη = + i! m i = ϕ(α eα α. ( The convergence domain for α will be studied in Section 4. This leads to m = m + 2, i= m 2 = m 2 + m + 3, m 3 = m 3 + 3m m + 4 ; w i and κ i will be analyzed in the next section. Note that Θ(α = φ(αe α m ; from this we can compute the centered moments: µ 2 = m 2 m 2, µ 3 = m m 3 3 m 2 m. Now we turn to the fluctuating components that appear invariably in the asymptotic expansions. We analyze the periodic component w i to be added to the moments m i. Recall formula (0: E(X n log n E ( ( (n = F(j log n F(j log n (j log n. (3 Set y = Q x and G(y = F(x. Equation (3 becomes a harmonic sum j= (2 E ( (n := j ( G(n/Q j G(n/Q j+ ( log(n/q j, the Mellin transform of which is (for a good reference on Mellin transforms, see Flajolet et al. (9 or Szpankowski (26 Q s Q sυ (s, (4
9 Register function for lattice paths 43 and Υ (s = From this we see that (we use L = lnq = 0 y s (G(y G(y/Q( log ydy Q sx (F(x F(x xldx. Υ (s = Lφ (α α= Ls. (5 The fundamental strip of (4 is usually of the form s C, 0, C > 0. This will be detailed in Section 4. Set also Υ 0(s = Lφ(α α= Ls, Υ 0(0 = L. Q We assume now that all poles of s Q Υ s (s are simple, which will be the case here, and given by s = χ l, with χ l := 2lπi/L, l Z; usually one has to distinguish the case l = 0 from the others. Using Mellin s inversion formula viz. E ( (n = C2+i Q s 2πi C 2 i Q sυ (sn s ds, C < C 2 < 0, the asymptotic expression of E ( (n is obtained by moving the line of integration to the right, for instance to the line R = C 4 > 0, taking residues into account (with a negative sign. This gives [ E ( (n = Res The residue at s = 0 gives of course The other residues lead to More generally, with and Q s Q sυ (sn s] s=0 l 0 [ Res m = Υ (0/L = φ (0. Q s Q sυ (sn s] s=χl + O(n C4. (6 w = Υ L (χ l e 2lπi log n. (7 l 0 E(X n log n k m k + w k, w k = Υ k L (χ l e 2lπi log n, (8 l 0 Υ k(s = Lφ (k (α α= Ls. To compute the periodic component κ i to be added to the centered moments µ i, we first set The variance of X n log n is asymptotically given by m := m + w. E[(X n log n m 2 ] m 2 + w 2 m 2 = µ 2 + κ 2.
10 44 Guy Louchard and Helmut Prodinger The third centered moment is asymptotically given by E[(X n log n m 3 ] m 3 + w 3 3( m 2 + w 2 m + 3m 3 m3 = µ 3 + κ 3. More generally, we start from We replace m k by m k + w k, leading to φ(α := + k= φ p (α = φ(α + α k k! m k = ϕ(α eα α. k= α k k! w k. But since φ(2lπi = 0 for all l Z, we have φ( Lχ l e 2lπi log n = 0, so we obtain l 0 φ p (α = φ(α + = φ(α + l 0 φ (k (α e α= Lχl k=0 l 0 2lπi log n φ(α Lχ l e 2lπi log n αk k! (9 = l Z φ(α Lχ l e 2lπi log n. Finally, we compute Θ p (α = φ p (αe αm = + k=2 α k k! ( µ k + κ k = Θ(α + leading to the (exponential generating function of κ k. The first few instances are κ 2 = w 2 w 2 2 m w, k=2 κ 3 = 6 m 2 w + 6 m w 2 + 2w 3 3 m 2 w 3 m w 2 3w w 2 + w 3. α k k! κ k, (20 All algebraic manipulations in this context are mechanically performed by Maple. We give explicit expressions for µ 2, κ 2, µ 3 and κ 3 for illustration. It will appear that Υ k (s are analytic functions (in some domain, depending on classical functions such as Γ, ζ. The justification of (6 is by contour integration, see (20 for details. It is not always evident that the limiting function F(η is indeed a distribution function. But here we can use the following lemma from Janson (5. Assume that Y n is a sequence of integer-valued random variables that is monotone. If, for every sequence of integers k n, P{Y n k n } = F(k n a n + o(, n, for a right-continuous function F with lim x F(x = 0, lim x F(x = and a sequence a n such that a n and a n+ a n 0 as n, then F is a distribution function. These conditions are satisfied in our case. We apply the presented machinery in the next section to the number of registers. (2
11 Register function for lattice paths 45 4 The moments for the number of registers From Flajolet (8, Flajolet and Prodinger (0, Louchard (9 and Section 2 we have P(j + 2 ( 2k 2 4 j+ /ne k2 4 j+ /n, Let η = j log 4 n; this leads to p(j 2 k= k odd >0 (2k 2 4 j /n e k2 4 j /n. F(η = + 2 ( 8k 2 4 η e 4k2 4 η, f(η = 2 k= k odd >0 (2k 2 4 η e k2 4 η, (22 where we recognize the Gumbel distribution (Compare also (2; 6. We have no rate of convergence problem here: the convergence of moments has been proved in Flajolet (8. It is easier in this case to start from f(η given by (22 and to compute φ(α = + Setting y = 2 η and using Mellin transforms, this gives e αη f(ηdη. φ(α = Γ(ξ/2(ξ ζ(ξ( 2 ξ /L ξ=α/l, < R(α <, as shown in Louchard (9; compare also Biane and Yor (3 and Biane, Pitman and Yor (2. It is easy to check that there is no singularity at α = 0, α = L, α = 2kL, k > 0. The fundamental strip for (4 is R(s, 0. Let us first analyze Xn := X n log 4 n. After all computations (we must be careful about the presence of log 4, and setting [ n (ln i k ] γ k := lim (lnnk+, n i k + i= also called the Stieltjes constants, we derive m = L (ln π γ 2 + 2, m 2 = L 2 ( 2 lnπ γ lnπ + γ + 8 π2 3 4 γ2 + ln 2 π 2γ + L (lnπ γ 2 + 3, m 3 = ( L π γ2 3 6 π2 γ ζ(3 5 8 γ3 3γ γ + 6γ 3γ 2 3 ln 2 π 3 2 γ ln2 π + 3γ lnπ 9 4 γ2 lnπ 6γ lnπ π2 lnπ + ln 3 π + ( L γ γ 3 lnπ ln2 π 3γ π2 3 2 γ lnπ
12 46 Guy Louchard and Helmut Prodinger + L (ln π γ 2 + 4, µ 2 = L 2 ( + 8 π2 γ 2 2γ + 2, µ 3 = L 3 ( 2 3γ 2 6γ γ 2γ ζ(3. m was computed in Flajolet and Prodinger (0, m 2 was computed in Louchard (9. Let us now turn to the fluctuating components. First of all, (5 and (7 lead to w = Γ( χ L l /2ζ( χ l (χ l + e lπi log n. l 0 Note that, in the exponent of the Fourier component, we have now lπi logn. Equations (9 and (20 lead to κ 2 = 2w w 2 + L w ( 2 lnπ + γ L 2 Γ( χ l /2 (2ζ ( χ l (χ l + + ζ( χ l ψ( χ l /2(χ l + + 2ζ( χ l χ l e lπi log n, l 0 κ 3 = 3 ( 8L 2w 6 + 0γ 2 8γ lnπ + 8 lnπ 2 8γL 6L + 6L lnπ + 8γ 6 lnπ + 8L 2 π 2 + 6γ + 3 L w2 (2 lnπ γ 2 + 2L + 2w 3 + ( L 3 Γ( χ l /2 3 4 ζ( χ l ψ( χ l /22 (χ l + 3ζ ( χ l ψ( χ l /2(χ l + l 0 + 3ζ( χ l ψ( χ l / ζ( χ l ψ( χ l /2(χ l + (2Lw γ 2 + 2L + 2 lnπ 3 4 ζ( χ l ψ(, χ l /2(χ l + 3ζ( χ l (2 lnπ γ 2 + 2L + 2Lw + ζ ( χ l [6 + 3(2 lnπ + 2Lw γ + 2L 2(χ l + ] 3ζ ( χ l (χ l + e lπi log n. The expression for w is identical to the expressions given in Flajolet and Prodinger (0. References [] D. Auber, J.-P. Domenger, M. Delest, P. Duchon, and J.-M. Fédou. New Strahler numbers for rooted plane trees. In Mathematics and Computer Science III, pages Birkäuser, Basel, [2] P. Biane, J. Pitman, and M. Yor. Probability laws related to the Jacobi theta and Riemann zeta functions, and the Brownian excursions. Bulletin (New series of the American Mathematical Society, 38(4: , 200. [3] P. Biane and M. Yor. Valeurs principales associées aux temps locaux browniens. Bulletin de la Société Mathématique de France, 2e série,:23 0, 987. [4] N. G. De Bruijn, D. E. Knuth, and S. O. Rice. The average height of planted plane trees. In R. C. Read, editor, Graph Theory and Computing, pages Academic Press, 972.
13 Register function for lattice paths 47 [5] L. Devroye and P. Kruszewski. On the Horton-Strahler number for random tries. RAIRO Inform. Théor. Appl., 30(5: , 996. [6] M. Drmota and H. Prodinger. The register function for t-ary trees. ACM Trans. Algorithms, 2(3:38 334, [7] A. P. Ershov. On programming of arithmetic operations. Communications of the ACM, :3 6, 958. [8] P. Flajolet. Analyse d algorithmes de manipulation d arbres et de fichiers. Université Pierre et Marie Curie, Paris, 98. [9] P. Flajolet, X. Gourdon, and P. Dumas. Mellin transforms and asymptotics: Harmonic sums. Theoretical Computer Science, 44:3 58, 995. [0] P. Flajolet and H. Prodinger. Register allocation for unary-binary trees. SIAM J. Comput., 5: , 986. [] P. Flajolet and H. Prodinger. Register allocation for unary-binary tress. SIAM Journal on Computing, 5(3: , 986. [2] P. Flajolet, J.-C. Raoult, and J. Vuillemin. The number of registers required for evaluating arithmetic expressions. Theoret. Comput. Sci., 9(:99 25, 979. [3] P. Hitczenko and G. Louchard. Distinctness of compositions of an integer: a probabilistic analysis. Random Structures and Algorithms, 9(3,4: , 200. [4] R. E. Horton. Erosioned development of systems and their drainage basins. Bulletin geological society of America, 56: , 945. [5] S. Janson. Rounding of continuous random variables and oscillatory asymptotics. Annals of Probability, 34:5: , [6] R. Kemp. The average number of registers needed to evaluate a binary tree optimally. Acta Inform., (4: , 978/79. [7] P. Kruszewski. A note on the Horton-Strahler number for random binary search trees. Inform. Process. Lett., 69(:47 5, 999. [8] M. Loève. Probability Theory. D. Van Nostrand, 963. [9] G. Louchard. Brownian motion and algorithm complexity. BIT, 26:7 34, 986. [20] G. Louchard and H. Prodinger. Asymptotics of the moments of extreme-value related distribution functions. Algorithmica, 46:43 467, Long version: [2] A. Meir, J. W. Moon, and J. R. Pounder. On the order of random channel networks. SIAM J. Algebraic Discrete Methods, (:25 33, 980. [22] M. Nebel. A unified approach to the analysis of Horton-Strahler parameters of binary tree structures. Random Structures Algorithms, 2(3-4: , [23] H. Prodinger. Some analytic techniques for the investigation of the asymptotic behaviour of tree parameters. EATCS Bulletin, 47:80 99, 992.
14 48 Guy Louchard and Helmut Prodinger [24] H. Prodinger. On a problem of Yekutieli and Mandelbrot about the bifurcation ratio of binary trees. Theoretical Computer Science, 8:8 94, 997. [25] A. N. Strahler. Hypsomic analysis of erosional topography. Bulletin geological society of America, 63:7 42, 952. [26] W. Szpankowski. Average Case Analysis of Algorithms on Sequences. Wiley, New York, 200. [27] I. Yekutieli and B. Mandelbrot. Horton-Strahler ordering of random binary trees. J. Phys. A, 27(2: , 994.
Asymptotic results for silent elimination
Discrete Mathematics and Theoretical Computer Science DMTCS vol. subm., by the authors, 1 1 Asymptotic results for silent elimination Guy Louchard 1 and Helmut Prodinger 2 1 Université Libre de Bruxelles,
More informationROSENA R.X. DU AND HELMUT PRODINGER. Dedicated to Philippe Flajolet ( )
ON PROTECTED NODES IN DIGITAL SEARCH TREES ROSENA R.X. DU AND HELMUT PRODINGER Dedicated to Philippe Flajolet (98 2) Abstract. Recently, 2-protected nodes were studied in the context of ordered trees and
More informationThe Largest Missing Value in a Composition of an Integer and Some Allouche-Shallit-Type Identities
1 3 47 6 3 11 Journal of Integer Sequences, Vol. 16 13, Article 13.. The Largest Missing Value in a Composition of an Integer and Some Allouche-Shallit-Type Identities Guy Louchard Université Libre de
More informationThe number of inversions in permutations: A saddle point approach
The number of inversions in permutations: A saddle point approach Guy Louchard and Helmut Prodinger November 4, 22 Abstract Using the saddle point method, we obtain from the generating function of the
More informationThe Number of Inversions in Permutations: A Saddle Point Approach
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 6 (23), Article 3.2.8 The Number of Inversions in Permutations: A Saddle Point Approach Guy Louchard Département d Informatique CP 212, Boulevard du
More informationCounting Palindromes According to r-runs of Ones Using Generating Functions
Counting Palindromes According to r-runs of Ones Using Generating Functions Helmut Prodinger Department of Mathematics Stellenbosch University 7602 Stellenbosch South Africa hproding@sun.ac.za Abstract
More informationCounting Palindromes According to r-runs of Ones Using Generating Functions
3 47 6 3 Journal of Integer Sequences, Vol. 7 (04), Article 4.6. Counting Palindromes According to r-runs of Ones Using Generating Functions Helmut Prodinger Department of Mathematics Stellenbosch University
More informationk-protected VERTICES IN BINARY SEARCH TREES
k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from
More informationForty years of tree enumeration
October 24, 206 Canada John Moon (Alberta) Counting labelled trees Canadian mathematical monographs What is our subject? Asymptotic enumeration or Probabilistic combinatorics? What is our subject? Asymptotic
More informationAsymptotics of the Eulerian numbers revisited: a large deviation analysis
Asymptotics of the Eulerian numbers revisited: a large deviation analysis Guy Louchard November 204 Abstract Using the Saddle point method and multiseries expansions we obtain from the generating function
More informationAsymptotic and Exact Poissonized Variance in the Analysis of Random Digital Trees (joint with Hsien-Kuei Hwang and Vytas Zacharovas)
Asymptotic and Exact Poissonized Variance in the Analysis of Random Digital Trees (joint with Hsien-Kuei Hwang and Vytas Zacharovas) Michael Fuchs Institute of Applied Mathematics National Chiao Tung University
More informationNew Multiple Harmonic Sum Identities
New Multiple Harmonic Sum Identities Helmut Prodinger Department of Mathematics University of Stellenbosch 760 Stellenbosch, South Africa hproding@sun.ac.za Roberto Tauraso Dipartimento di Matematica Università
More informationASYMPTOTICS OF THE EULERIAN NUMBERS REVISITED: A LARGE DEVIATION ANALYSIS
ASYMPTOTICS OF THE EULERIAN NUMBERS REVISITED: A LARGE DEVIATION ANALYSIS GUY LOUCHARD ABSTRACT Using the Saddle point method and multiseries expansions we obtain from the generating function of the Eulerian
More informationAdditive irreducibles in α-expansions
Publ. Math. Debrecen Manuscript Additive irreducibles in α-expansions By Peter J. Grabner and Helmut Prodinger * Abstract. The Bergman number system uses the base α = + 5 2, the digits 0 and, and the condition
More informationThe Moments of the Profile in Random Binary Digital Trees
Journal of mathematics and computer science 6(2013)176-190 The Moments of the Profile in Random Binary Digital Trees Ramin Kazemi and Saeid Delavar Department of Statistics, Imam Khomeini International
More informationDigital Trees and Memoryless Sources: from Arithmetics to Analysis
Digital Trees and Memoryless Sources: from Arithmetics to Analysis Philippe Flajolet, Mathieu Roux, Brigitte Vallée AofA 2010, Wien 1 What is a digital tree, aka TRIE? = a data structure for dynamic dictionaries
More informationCompositions and samples of geometric random variables with constrained multiplicities
FPSAC 2010, San Francisco, USA DMTCS proc. AN, 2010, 317 328 Compositions and samples of geometric random variables with constrained multiplicities Margaret Archibald 1 and Arnold Knopfmacher 2 and Toufik
More informationGrowing and Destroying Catalan Stanley Trees
Discrete Mathematics and Theoretical Computer Science DMTCS vol. 20:1, 2018, #11 Growing and Destroying Catalan Stanley Trees Benjamin Hackl 1 Helmut Prodinger 2 arxiv:1704.03734v3 [math.co] 26 Feb 2018
More informationA REMARK ON THE BOROS-MOLL SEQUENCE
#A49 INTEGERS 11 (2011) A REMARK ON THE BOROS-MOLL SEQUENCE J.-P. Allouche CNRS, Institut de Math., Équipe Combinatoire et Optimisation Université Pierre et Marie Curie, Paris, France allouche@math.jussieu.fr
More informationNotes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.
Lecture: Hélène Barcelo Analytic Combinatorics ECCO 202, Bogotá Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.. Tuesday, June 2, 202 Combinatorics is the study of finite structures that
More informationAlgorithmica 2001 Springer-Verlag New York Inc.
Algorithmica (001 1: 61 77 DOI: 10.1007/s0045-001-0056-0 Algorithmica 001 Springer-Verlag New York Inc. Analytic Variations on the Airy Distribution 1 P. Flajolet and G. Louchard Abstract. The Airy distribution
More informationA Master Theorem for Discrete Divide and Conquer Recurrences. Dedicated to PHILIPPE FLAJOLET
A Master Theorem for Discrete Divide and Conquer Recurrences Wojciech Szpankowski Department of Computer Science Purdue University U.S.A. September 6, 2012 Uniwersytet Jagieloński, Kraków, 2012 Dedicated
More informationare the q-versions of n, n! and . The falling factorial is (x) k = x(x 1)(x 2)... (x k + 1).
Lecture A jacques@ucsd.edu Notation: N, R, Z, F, C naturals, reals, integers, a field, complex numbers. p(n), S n,, b(n), s n, partition numbers, Stirling of the second ind, Bell numbers, Stirling of the
More informationMod-φ convergence I: examples and probabilistic estimates
Mod-φ convergence I: examples and probabilistic estimates Valentin Féray (joint work with Pierre-Loïc Méliot and Ashkan Nikeghbali) Institut für Mathematik, Universität Zürich Summer school in Villa Volpi,
More informationThe Subtree Size Profile of Plane-oriented Recursive Trees
The Subtree Size Profile of Plane-oriented Recursive Trees Michael Fuchs Department of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan ANALCO11, January 22nd, 2011 Michael Fuchs (NCTU)
More informationThe Subtree Size Profile of Bucket Recursive Trees
Iranian Journal of Mathematical Sciences and Informatics Vol., No. (206, pp - DOI: 0.7508/ijmsi.206.0.00 The Subtree Size Profile of Bucket Recursive Trees Ramin Kazemi Department of Statistics, Imam Khomeini
More informationRENEWAL THEORY IN ANALYSIS OF TRIES AND STRINGS: EXTENDED ABSTRACT
RENEWAL THEORY IN ANALYSIS OF TRIES AND STRINGS: EXTENDED ABSTRACT SVANTE JANSON Abstract. We give a survey of a number of simple applications of renewal theory to problems on random strings, in particular
More informationAlmost all trees have an even number of independent sets
Almost all trees have an even number of independent sets Stephan G. Wagner Department of Mathematical Sciences Stellenbosch University Private Bag X1, Matieland 7602, South Africa swagner@sun.ac.za Submitted:
More informationMOMENTS OF HYPERGEOMETRIC HURWITZ ZETA FUNCTIONS
MOMENTS OF HYPERGEOMETRIC HURWITZ ZETA FUNCTIONS ABDUL HASSEN AND HIEU D. NGUYEN Abstract. This paper investigates a generalization the classical Hurwitz zeta function. It is shown that many of the properties
More informationRandom trees and branching processes
Random trees and branching processes Svante Janson IMS Medallion Lecture 12 th Vilnius Conference and 2018 IMS Annual Meeting Vilnius, 5 July, 2018 Part I. Galton Watson trees Let ξ be a random variable
More informationProbabilistic analysis of the asymmetric digital search trees
Int. J. Nonlinear Anal. Appl. 6 2015 No. 2, 161-173 ISSN: 2008-6822 electronic http://dx.doi.org/10.22075/ijnaa.2015.266 Probabilistic analysis of the asymmetric digital search trees R. Kazemi a,, M. Q.
More informationA Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence
A Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence Dedicated to Philippe Flajolet 1948-2011 July 4, 2013 Philippe Jacquet Charles Knessl 1 Wojciech Szpankowski 2 Bell Labs Dept. Math.
More informationApproximate Counting via the Poisson-Laplace-Mellin Method (joint with Chung-Kuei Lee and Helmut Prodinger)
Approximate Counting via the Poisson-Laplace-Mellin Method (joint with Chung-Kuei Lee and Helmut Prodinger) Michael Fuchs Department of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan
More informationThe Adaptive sampling revisited
The Adaptive sampling revisited Guy ouchard * Yvik Swan January 207 Abstract The problem of estimating the number n of distinct keys of a large collection of N data is well known in computer science A
More information7 Asymptotics for Meromorphic Functions
Lecture G jacques@ucsd.edu 7 Asymptotics for Meromorphic Functions Hadamard s Theorem gives a broad description of the exponential growth of coefficients in power series, but the notion of exponential
More informationLattice paths with catastrophes
Lattice paths with catastrophes Lattice paths with catastrophes SLC 77, Strobl 12.09.2016 Cyril Banderier and Michael Wallner Laboratoire d Informatique de Paris Nord, Université Paris Nord, France Institute
More informationSome Fun with Divergent Series
Some Fun with Divergent Series 1. Preliminary Results We begin by examining the (divergent) infinite series S 1 = 1 + 2 + 3 + 4 + 5 + 6 + = k=1 k S 2 = 1 2 + 2 2 + 3 2 + 4 2 + 5 2 + 6 2 + = k=1 k 2 (i)
More informationThe range of tree-indexed random walk
The range of tree-indexed random walk Jean-François Le Gall, Shen Lin Institut universitaire de France et Université Paris-Sud Orsay Erdös Centennial Conference July 2013 Jean-François Le Gall (Université
More informationConnexions and the Gumbel Distribution
Connexions and the Gumbel Distribution Myron Hlynka Department of Mathematics and Statistics University of Windsor Windsor, ON, Canada. October, 2016 Myron Hlynka (University of Windsor) Connexions and
More informationOn the number of matchings of a tree.
On the number of matchings of a tree. Stephan G. Wagner Department of Mathematics, Graz University of Technology, Steyrergasse 30, A-800 Graz, Austria Abstract In a paper of Klazar, several counting examples
More information5. Analytic Combinatorics
ANALYTIC COMBINATORICS P A R T O N E 5. Analytic Combinatorics http://aofa.cs.princeton.edu Analytic combinatorics is a calculus for the quantitative study of large combinatorial structures. Features:
More informationPhilippe Flajolet and Symbolic Computation
Philippe Flajolet and Symbolic Computation Bruno Salvy 1. Combinatorics and Analysis of Algorithms 4 2. Complex Analysis 5 3. Symbolic Computation 7 While Philippe Flajolet did not publish many articles
More informationThe expansion of random regular graphs
The expansion of random regular graphs David Ellis Introduction Our aim is now to show that for any d 3, almost all d-regular graphs on {1, 2,..., n} have edge-expansion ratio at least c d d (if nd is
More informationEverything You Always Wanted to Know about Quicksort, but Were Afraid to Ask. Marianne Durand
Algorithms Seminar 200 2002, F. Chyzak (ed., INRIA, (2003, pp. 57 62. Available online at the URL http://algo.inria.fr/seminars/. Everything You Always Wanted to Know about Quicksort, but Were Afraid to
More informationLECTURE-13 : GENERALIZED CAUCHY S THEOREM
LECTURE-3 : GENERALIZED CAUCHY S THEOREM VED V. DATAR The aim of this lecture to prove a general form of Cauchy s theorem applicable to multiply connected domains. We end with computations of some real
More informationMath 259: Introduction to Analytic Number Theory More about the Gamma function
Math 59: Introduction to Analytic Number Theory More about the Gamma function We collect some more facts about Γs as a function of a complex variable that will figure in our treatment of ζs and Ls, χ.
More informationRECENT RESULTS ON STIELTJES CONSTANTS ADDENDUM TO HIGHER DERIVATIVES OF THE HURWITZ ZETA FUNCTION. 1. Introduction
RECENT RESULTS ON STIELTJES CONSTANTS ADDENDUM TO HIGHER DERIVATIVES OF THE HURWITZ ZETA FUNCTION DOMINIC LANPHIER. Introduction Much recent significant wor on the arithmetic and analytic properties of
More informationLIMITING DISTRIBUTIONS FOR THE NUMBER OF INVERSIONS IN LABELLED TREE FAMILIES
LIMITING DISTRIBUTIONS FOR THE NUMBER OF INVERSIONS IN LABELLED TREE FAMILIES ALOIS PANHOLZER AND GEORG SEITZ Abstract. We consider so-called simple families of labelled trees, which contain, e.g., ordered,
More informationAdditive tree functionals with small toll functions and subtrees of random trees
Additive tree functionals with small toll functions and subtrees of random trees Stephan Wagner To cite this version: Stephan Wagner. Additive tree functionals with small toll functions and subtrees of
More informationarxiv: v1 [math.pr] 12 Jan 2017
Central limit theorem for the Horton-Strahler bifurcation ratio of general branch order Ken Yamamoto Department of Physics and arth Sciences, Faculty of Science, University of the Ryukyus, 1 Sembaru, Nishihara,
More informationarxiv: v1 [math.co] 1 Aug 2018
REDUCING SIMPLY GENERATED TREES BY ITERATIVE LEAF CUTTING BENJAMIN HACKL, CLEMENS HEUBERGER, AND STEPHAN WAGNER arxiv:1808.00363v1 [math.co] 1 Aug 2018 ABSTRACT. We consider a procedure to reduce simply
More informationREGISTER ALLOCATION FOR UNARY-BINARY TREES*
SIAM J. COMPUT. Vol. IS, NO. 3. August 1986 @ 1986 Society for Industrial and Applied Mathematics 001. REGISTER ALLOCATION FOR UNARY-BINARY TREES* P. FLAJOLETI' AND H. PRODINGER$ Abstract. We study the
More informationAlmost sure asymptotics for the random binary search tree
AofA 10 DMTCS proc. AM, 2010, 565 576 Almost sure asymptotics for the rom binary search tree Matthew I. Roberts Laboratoire de Probabilités et Modèles Aléatoires, Université Paris VI Case courrier 188,
More informationAutomata on linear orderings
Automata on linear orderings Véronique Bruyère Institut d Informatique Université de Mons-Hainaut Olivier Carton LIAFA Université Paris 7 September 25, 2006 Abstract We consider words indexed by linear
More informationd-regular SET PARTITIONS AND ROOK PLACEMENTS
Séminaire Lotharingien de Combinatoire 62 (2009), Article B62a d-egula SET PATITIONS AND OOK PLACEMENTS ANISSE KASAOUI Université de Lyon; Université Claude Bernard Lyon 1 Institut Camille Jordan CNS UM
More informationTHE SUM OF DIGITS OF n AND n 2
THE SUM OF DIGITS OF n AND n 2 KEVIN G. HARE, SHANTA LAISHRAM, AND THOMAS STOLL Abstract. Let s q (n) denote the sum of the digits in the q-ary expansion of an integer n. In 2005, Melfi examined the structure
More informationPerhaps the simplest way of modeling two (discrete) random variables is by means of a joint PMF, defined as follows.
Chapter 5 Two Random Variables In a practical engineering problem, there is almost always causal relationship between different events. Some relationships are determined by physical laws, e.g., voltage
More informationAVERAGE-CASE ANALYSIS OF COUSINS IN m-ary TRIES
J. Appl. Prob. 45, 888 9 (28) Printed in England Applied Probability Trust 28 AVERAGE-CASE ANALYSIS OF COUSINS IN m-ary TRIES HOSAM M. MAHMOUD, The George Washington University MARK DANIEL WARD, Purdue
More informationOn the Sequence A and Its Combinatorial Interpretations
1 2 47 6 2 11 Journal of Integer Sequences, Vol. 9 (2006), Article 06..1 On the Sequence A079500 and Its Combinatorial Interpretations A. Frosini and S. Rinaldi Università di Siena Dipartimento di Scienze
More informationHamming Weight of the Non-Adjacent-Form under Various Input Statistics. Clemens Heuberger and Helmut Prodinger
FoSP Algorithmen & mathematische Modellierung FoSP Forschungsschwerpunkt Algorithmen und mathematische Modellierung Hamming Weight of the Non-Adjacent-Form under Various Input Statistics Clemens Heuberger
More informationCombinatorial/probabilistic analysis of a class of search-tree functionals
Combinatorial/probabilistic analysis of a class of search-tree functionals Jim Fill jimfill@jhu.edu http://www.mts.jhu.edu/ fill/ Mathematical Sciences The Johns Hopkins University Joint Statistical Meetings;
More informationThe variance for partial match retrievals in k-dimensional bucket digital trees
The variance for partial match retrievals in k-dimensional ucket digital trees Michael FUCHS Department of Applied Mathematics National Chiao Tung University January 12, 21 Astract The variance of partial
More information1 Discussion on multi-valued functions
Week 3 notes, Math 7651 1 Discussion on multi-valued functions Log function : Note that if z is written in its polar representation: z = r e iθ, where r = z and θ = arg z, then log z log r + i θ + 2inπ
More informationCombinatorial Enumeration. Jason Z. Gao Carleton University, Ottawa, Canada
Combinatorial Enumeration Jason Z. Gao Carleton University, Ottawa, Canada Counting Combinatorial Structures We are interested in counting combinatorial (discrete) structures of a given size. For example,
More informationPROTECTED NODES AND FRINGE SUBTREES IN SOME RANDOM TREES
PROTECTED NODES AND FRINGE SUBTREES IN SOME RANDOM TREES LUC DEVROYE AND SVANTE JANSON Abstract. We study protected nodes in various classes of random rooted trees by putting them in the general context
More informationApplications of Analytic Combinatorics in Mathematical Biology (joint with H. Chang, M. Drmota, E. Y. Jin, and Y.-W. Lee)
Applications of Analytic Combinatorics in Mathematical Biology (joint with H. Chang, M. Drmota, E. Y. Jin, and Y.-W. Lee) Michael Fuchs Department of Applied Mathematics National Chiao Tung University
More informationDigital search trees JASS
Digital search trees Analysis of different digital trees with Rice s integrals. JASS Nicolai v. Hoyningen-Huene 28.3.2004 28.3.2004 JASS 04 - Digital search trees 1 content Tree Digital search tree: Definition
More informationOn the parity of the Wiener index
On the parity of the Wiener index Stephan Wagner Department of Mathematical Sciences, Stellenbosch University, Stellenbosch 7602, South Africa Hua Wang Department of Mathematics, University of Florida,
More informationPROBABILISTIC BEHAVIOR OF ASYMMETRIC LEVEL COMPRESSED TRIES
PROBABILISTIC BEAVIOR OF ASYMMETRIC LEVEL COMPRESSED TRIES Luc Devroye Wojcieh Szpankowski School of Computer Science Department of Computer Sciences McGill University Purdue University 3450 University
More informationPartial match queries in random quadtrees
Partial match queries in random quadtrees Nicolas Broutin nicolas.broutin@inria.fr Projet Algorithms INRIA Rocquencourt 78153 Le Chesnay France Ralph Neininger and Henning Sulzbach {neiningr, sulzbach}@math.uni-frankfurt.de
More informationResearch Article Some Monotonicity Properties of Gamma and q-gamma Functions
International Scholarly Research Network ISRN Mathematical Analysis Volume 11, Article ID 375715, 15 pages doi:1.54/11/375715 Research Article Some Monotonicity Properties of Gamma and q-gamma Functions
More informationarxiv: v1 [math.co] 12 Sep 2018
ON THE NUMBER OF INCREASING TREES WITH LABEL REPETITIONS arxiv:809.0434v [math.co] Sep 08 OLIVIER BODINI, ANTOINE GENITRINI, AND BERNHARD GITTENBERGER Abstract. In this paper we study a special subclass
More informationA Master Theorem for Discrete Divide and Conquer Recurrences
A Master Theorem for Discrete Divide and Conquer Recurrences Wojciech Szpankowski Department of Computer Science Purdue University W. Lafayette, IN 47907 January 20, 2011 NSF CSoI SODA, 2011 Research supported
More informationStructured Numbers. Properties of a hierarchy of operations on binary trees.
Structured Numbers. Properties of a hierarchy of operations on binary trees. Vincent D. Blondel February 4, 997 Abstract We introduce a hierarchy of operations on (nite and innite) binary trees. The operations
More informationOn The Weights of Binary Irreducible Cyclic Codes
On The Weights of Binary Irreducible Cyclic Codes Yves Aubry and Philippe Langevin Université du Sud Toulon-Var, Laboratoire GRIM F-83270 La Garde, France, {langevin,yaubry}@univ-tln.fr, WWW home page:
More informationMATH 311: COMPLEX ANALYSIS CONTOUR INTEGRALS LECTURE
MATH 3: COMPLEX ANALYSIS CONTOUR INTEGRALS LECTURE Recall the Residue Theorem: Let be a simple closed loop, traversed counterclockwise. Let f be a function that is analytic on and meromorphic inside. Then
More informationConformal maps. Lent 2019 COMPLEX METHODS G. Taylor. A star means optional and not necessarily harder.
Lent 29 COMPLEX METHODS G. Taylor A star means optional and not necessarily harder. Conformal maps. (i) Let f(z) = az + b, with ad bc. Where in C is f conformal? cz + d (ii) Let f(z) = z +. What are the
More informationA class of trees and its Wiener index.
A class of trees and its Wiener index. Stephan G. Wagner Department of Mathematics Graz University of Technology Steyrergasse 3, A-81 Graz, Austria wagner@finanz.math.tu-graz.ac.at Abstract In this paper,
More informationCounting Markov Types
Counting Markov Types Philippe Jacquet, Charles Knessl, Wojciech Szpankowski To cite this version: Philippe Jacquet, Charles Knessl, Wojciech Szpankowski. Counting Markov Types. Drmota, Michael and Gittenberger,
More informationExponentially Accurate Semiclassical Tunneling Wave Functions in One Dimension
Exponentially Accurate Semiclassical Tunneling Wave Functions in One Dimension Vasile Gradinaru Seminar for Applied Mathematics ETH Zürich CH 8092 Zürich, Switzerland, George A. Hagedorn Department of
More informationarxiv: v1 [cs.pf] 26 May 2017
A refined and asymptotic analysis of optimal stopping problems of Bruss and Weber Guy Louchard October 19, 2017 arxiv:1705.09482v1 [cs.pf] 26 May 2017 Abstract The classical secretary problem has been
More informationAn Application of Catalan Numbers on Cayley Tree of Order 2: Single Polygon Counting
BULLETIN of the Malaysian Mathematical Sciences Society http://math.usm.my/bulletin Bull. Malays. Math. Sci. Soc. (2) 31(2) (2008), 175 183 An Application of Catalan Numbers on Cayley Tree of Order 2:
More informationAlmost giant clusters for percolation on large trees
for percolation on large trees Institut für Mathematik Universität Zürich Erdős-Rényi random graph model in supercritical regime G n = complete graph with n vertices Bond percolation with parameter p(n)
More informationIN this paper, we consider the capacity of sticky channels, a
72 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 1, JANUARY 2008 Capacity Bounds for Sticky Channels Michael Mitzenmacher, Member, IEEE Abstract The capacity of sticky channels, a subclass of insertion
More informationTHE CENTER OF MASS OF THE ISE AND THE WIENER INDEX OF TREES
Elect. Comm. in Probab. 9 (24), 78 87 ELECTRONIC COMMUNICATIONS in PROBABILITY THE CENTER OF MASS OF THE ISE AND THE WIENER INDEX OF TREES SVANTE JANSON Departement of Mathematics, Uppsala University,
More informationSORTING ALGORITHMS FOR BROADCAST COMMUNICATIONS: MATHEMATICAL ANALYSIS
SORTING ALGORITHMS FOR BROADCAST COMMUNICATIONS: MATHEMATICAL ANALYSIS PETER J. GRABNER AND HELMUT PRODINGER Abstract. Assume that n persons communicate via a channel; to each person a certain number is
More informationUsing approximate functional equations to build L functions
Using approximate functional equations to build L functions Pascal Molin Université Paris 7 Clermont-Ferrand 20 juin 2017 Example : elliptic curves Consider an elliptic curve E /Q of conductor N and root
More informationLIMITING DISTRIBUTIONS FOR ADDITIVE FUNCTIONALS ON CATALAN TREES
LIMITING DISTRIBUTIONS FOR ADDITIVE FUNCTIONALS ON CATALAN TREES JAMES ALLEN FILL AND NEVIN KAPUR Abstract. Additive tree functionals represent the cost of many divide-andconquer algorithms. We derive
More information2 Write down the range of values of α (real) or β (complex) for which the following integrals converge. (i) e z2 dz where {γ : z = se iα, < s < }
Mathematical Tripos Part II Michaelmas term 2007 Further Complex Methods, Examples sheet Dr S.T.C. Siklos Comments and corrections: e-mail to stcs@cam. Sheet with commentary available for supervisors.
More informationRIEMANN HYPOTHESIS: A NUMERICAL TREATMENT OF THE RIESZ AND HARDY-LITTLEWOOD WAVE
ALBANIAN JOURNAL OF MATHEMATICS Volume, Number, Pages 6 79 ISSN 90-5: (electronic version) RIEMANN HYPOTHESIS: A NUMERICAL TREATMENT OF THE RIESZ AND HARDY-LITTLEWOOD WAVE STEFANO BELTRAMINELLI AND DANILO
More informationOn the Lebesgue constant of barycentric rational interpolation at equidistant nodes
On the Lebesgue constant of barycentric rational interpolation at equidistant nodes by Len Bos, Stefano De Marchi, Kai Hormann and Georges Klein Report No. 0- May 0 Université de Fribourg (Suisse Département
More informationn! (k 1)!(n k)! = F (X) U(0, 1). (x, y) = n(n 1) ( F (y) F (x) ) n 2
Order statistics Ex. 4. (*. Let independent variables X,..., X n have U(0, distribution. Show that for every x (0,, we have P ( X ( < x and P ( X (n > x as n. Ex. 4.2 (**. By using induction or otherwise,
More informationPhysics 307. Mathematical Physics. Luis Anchordoqui. Wednesday, August 31, 16
Physics 307 Mathematical Physics Luis Anchordoqui 1 Bibliography L. A. Anchordoqui and T. C. Paul, ``Mathematical Models of Physics Problems (Nova Publishers, 2013) G. F. D. Duff and D. Naylor, ``Differential
More informationThe height of watermelons with wall - Extended Abstract
The height of watermelons with wall - Extended Abstract Thomas Feierl To cite this version: Thomas Feierl. The height of watermelons with wall - Extended Abstract. Jacquet, Philippe. 2007 Conference on
More informationWeak Analysis: Mathematics
Weak Analysis: Mathematics Fernando Ferreira Universidade de Lisboa Journées sur les Arithmétiques Faibles 33 University of Gothenburg June 16-18, 2014 Simple consequences of recursive comprehension A
More informationGENERALIZED STIRLING PERMUTATIONS, FAMILIES OF INCREASING TREES AND URN MODELS
GENERALIZED STIRLING PERMUTATIONS, FAMILIES OF INCREASING TREES AND URN MODELS SVANTE JANSON, MARKUS KUBA, AND ALOIS PANHOLZER ABSTRACT. Bona [6] studied the distribution of ascents, plateaux and descents
More informationA Note on the Differential Equations with Distributional Coefficients
MATEMATIKA, 24, Jilid 2, Bil. 2, hlm. 115 124 c Jabatan Matematik, UTM. A Note on the Differential Equations with Distributional Coefficients Adem Kilicman Department of Mathematics, Institute for Mathematical
More informationA BIJECTION BETWEEN WELL-LABELLED POSITIVE PATHS AND MATCHINGS
Séminaire Lotharingien de Combinatoire 63 (0), Article B63e A BJECTON BETWEEN WELL-LABELLED POSTVE PATHS AND MATCHNGS OLVER BERNARD, BERTRAND DUPLANTER, AND PHLPPE NADEAU Abstract. A well-labelled positive
More informationA Note on the Approximation of Perpetuities
Discrete Mathematics and Theoretical Computer Science (subm.), by the authors, rev A Note on the Approximation of Perpetuities Margarete Knape and Ralph Neininger Department for Mathematics and Computer
More informationarxiv: v1 [math.co] 9 Jan 2018
ASCENTS IN NON-NEGATIVE LATTICE PATHS BENJAMIN HACKL, CLEMENS HEUBERGER, AND HELMUT PRODINGER arxiv:1801.02996v1 [math.co] 9 Jan 2018 ABSTRACT. Non-negative Łukasiewicz paths are special two-dimensional
More information