Rank Modulation for Flash Memories

Size: px
Start display at page:

Download "Rank Modulation for Flash Memories"

Transcription

1 ISIT 008, Toroto, Caada, July 6 -, 008 Rak Modulatio for Flash Memories Axiao (Adrew) Jiag Robert Mateescu Moshe Schwartz Jehoshua Bruck Departmet of Computer Sciece Califoria Istitute of Techology Electrical ad Computer Egieerig Texas A&M Uiversity 00 E Califoria Blvd, Mail Code 6-9 Be-Gurio Uiversity College Statio, TX 778, USA Pasadea, CA 95, USA Beer Sheva 805, Israel ajiag@cstamuedu {mateescu,bruck}@paradisecaltechedu schwartz@eebguacil Abstract We explore a ovel data represetatio scheme for multi-level flash memory cells, i which a set of cells stores iformatio i the permutatio iduced by the differet charge levels of the idividual cells The oly allowed charge-placemet mechaism is a push-to-the-top operatio which takes a sigle cell of the set ad makes it the top-charged cell The resultig scheme elimiates the eed for discrete cell levels, as well as overshoot errors, whe programmig cells We preset urestricted Gray codes spaig all possible -cell states ad usig oly push-to-the-top operatios, ad also costruct balaced Gray codes We also ivestigate optimal rewritig schemes for traslatig arbitrary iput alphabet ito -cell states which miimize the umber of programmig operatios I INTRODUCTION Flash memory is a o-volatile memory techology that is both electrically programmable ad electrically erasable Its reliability, high storage desity, ad relatively low cost have made flash memory a domiao-volatile memory techology ad a promiet cadidate to replace the wellestablished magetic recordig techology i the ear future The most cospicuous property of flash storage is its iheret asymmetry betwee cell programmig (charge placemet) ad cell erasig (charge removal) While addig charge to a sigle cell is a fast ad simple operatio, removig charge from a sigle cell is very difficult I fact, curret flash memories do ot allow a sigle cell to be erased but rather oly a large block of cells Thus, a sigle-cell erase operatio requires the cumbersome process of copyig a etire block to a temporary locatio, erasig it, ad the programmig all the cells except for the sigle cell to be erased To keep up with the ever-growig demad for deser storage, the multi-level flash cell cocept is used to icrease the umber of stored bits i a cell [] Istead of the usual sigle-bit flash memories, where each cell is i oe of two states (erased/programmed), each multi-level flash cell stores oe of q levels ad ca be regarded as a symbol over a discrete alphabet of size q This is doe by desigig a appropriate set of threshold levels which are used to quatize the charge level readigs to symbols from the discrete alphabet Fast ad accurate programmig schemes for multi-level flash memories are a topic of sigificat research ad desig efforts [9], [5], [] All these ad other works share the attempt to iteratively program a cell to a exact prescribed charge level i a miimal umber of programmig cycles As metioed This work was supported i part by the Caltech Lee Ceter for Advaced Networkig above, flash memory techology does ot support charge removal from idividual cells As a result, the programmig cycle sequece is desiged to cautiously approach the target charge level from below so as to avoid udesired global erases i case of overshoots Cosequetly, these attempts still require may programmig cycles, ad they work oly up to a moderate umber of levels per cell I additio to the eed for accurate programmig, the move to multi-level flash cells also aggravates reliability The same reliability aspects that have bee successfully hadled i sigle-level flash memories may become more proouced ad traslate ito higher error rates i stored data Oe such relevat example is errors that origiate from low memory edurace [], by which a drift of threshold levels i agig devices may cause programmig ad read errors We therefore propose the rak modulatio scheme, whose aim is to elimiate both the problem of overshootig while programmig cells, ad the problem of memory edurace i agig devices I this scheme, a ordered set of multi-level cells stores the iformatio i the permutatio iduced by the charge levels of the cells I this way, o discrete levels are eeded (ie, o eed for threshold levels) ad oly a basic charge-comparig operatio (which is easy to implemet) is required to read the permutatio If we further assume that the oly programmig operatio allowed is raisig the charge level of oe of the cells above the curret highest oe (pushto-the-top), the the overshoot problem is o loger relevat Additioally, the techology may allow i the ear future the decrease of all the charge levels i a block of cells by a costat amout smaller tha the lowest charge level (block deflatio), which would maitai their relative values, ad thus leave the iformatio uchaged This ca elimiate a desigated erase step, by deflatig the etire block wheever the memory is ot i use Oce a ew data represetatio is defied, several tools are required to make it useful I this paper we preset Gray codes that exploit the full represetatioal power of rak modulatio, ad data rewritig schemes Error-correctig codes for rak modulatio are preseted i a compaio paper [8] The origial Gray code [] has bee geeralized i coutless ways, ad has bee used i a wide rage of applicatios Some of the Gray code costructios we describe iduce a simple algorithm for geeratig the list of permutatios Efficiet geeratio of permutatios has bee the subject of much research as described i the geeral survey [0], ad the more /08/$ IEEE 7

2 ISIT 008, Toroto, Caada, July 6 -, 008 specific [] (ad refereces therei) I [] the trasitios we use i this paper are called ested cyclig ad the algorithms cited there produce lists which are ot Gray codes sice some of the permutatios repeat, which makes the algorithms iefficiet We preset a balaced costructio, which is a ew permutatio geeratio algorithm, that optimizes the trasitio step size ad is suitable for block deflatio We also ivestigate rewritig schemes for rak modulatio Sice erasig/reprogrammig cells is expesive, it is very importat to maximize the umber of times data ca be rewritte betwee two erasure operatios [6] For rak modulatio, the key is to miimize the highest charge level of cells We preset two rewritig schemes that are, respectively, optimized for the worst-case ad average-case performace II DEFINITIONS AND BASIC CONSTRUCTION Let S be a state space, ad let T be a set of trasitio fuctios, where every t T is a fuctio t : S S AGray code is a ordered list s, s,,s m of distict elemets from S such that for every i m, s i+ = t(s i ) for some t T Ifs = t(s m ) for some t T, the the code is cyclic If the code spas the etire space S we call it complete Let [] deote the set of itegers {,,, } A ordered set of flash memory cells amed,,,, each cotaiig a distict charge level, iduces a permutatio of [] by writig the cell ames i descedig charge level [a, a,,a ], ie, the cell a has the highest charge level while a has the lowest The state space for the rak modulatio scheme is therefore the set of all permutatios over [], deoted by S We cosider the basic miimal-cost operatio o a give state to be a push-to-the-top, by which a sigle cell has its charge level icreased to become the highest of the set Thus, the set T of miimal-cost trasitios betwee states cosists of fuctios t i, i : t i ([a,,a i, a i, a i+,,a ]) = [a i, a,,a i, a i+,,a ] Throughout this work, our state space S will be the set of permutatios over [], ad our set of trasitio fuctios will be the set T of push-to-the-top fuctios We call such codes legth Rak Modulatio Gray Codes (-RMGC) Example A example of a cyclic ad complete -RMGC is give below The permutatios are the colums beig read from left to right The sequece of trasitios is: t, t, t, t, t, t We will ow show a basic recursive costructio for - RMGCs The resultig codes are cyclic ad complete, ithe sese that they spa the etire state space Our recursio basis is the simple -RMGC: [, ], [, ] Now let us assume we have a cyclic ad complete ( )-RMGC, which we call C,defied by the sequece of trasitios t (), t (),,t (( )!) ad where t (( )!) = t, ie, a push-to-the-top operatio o the secod elemet i the permutatio We further assume that the trasitio t appears This last requiremet merely restricts us to have t used somewhere sice we ca always rotate the set of trasitios to make t be the last oe used at least twice We will ow show how to costruct C, a cyclic ad complete -RMGC with the same property We set the first permutatio of the code to be [,,,], ad the use the trasitios t (), t (),,t (( )! ) to get a list of ( )! permutatios we call the first block of the costructio By our assumptio, the permutatios i this list are all distict, ad they all share the property that their last elemet is (sice all the trasitios use just the firs elemets) Furthermore, sice t (( )!) = t, we kow that the last permutatio geerated so far is [,,,,, ] We ow use to create the first permutatio of the secod block, ad the use t (), t (),,t (( )! ) agai to create the etire secod block We repeat this process times, ie, use the sequece of trasitios t (), t (),,t (( )! ), a total of times to costruct blocks, each cotaiig ( )! permutatios The followig two simple lemmas are give without proof Lemma I ay block, the last elemet of all the permutatios is costat The list of last elemets i the blocks costructed is,,,, The elemet is ever a last elemet Lemma The secod elemet i the first permutatio i every block is Thefirst elemet i the last permutatio i every block is also Combiig the two lemmas above, the blocks costructed so far form a cyclic buot complete -RMGC, that we call C, which may be schematically described as follows (where each box represets a sigle block, ad deotes the sequece of trasitios t (),,t (( )! ) ): t It is ow obvious that C is ot complete because it is missig exactly the ( )! permutatios cotaiig as their last elemet We build a block C cotaiig these permutatios i the followig way: we start by rotatig the list of trasitios t (),,t (( )!) such that its last trasitio is t For coveiece we deote the rotated sequece by τ (),,τ ( )!, where τ ( )! = Thefirst permutatio i the block is [a, a,,a,], ad the last oe is [a,,a, a,]ic we fid a trasitio of the followig form: [a,,a,,a ] [, a,,a, a ]Sucha trasitio must surely exist sice C is cyclic, it cotais permutatios i which is ext to last ad some i which it is ot, it does ot cotai permutatios i which is last, ad so it follows that at some poit i C, the elemet is ext to last ad is the pushed by to the frot At this trasitio we split C ad isert C as follows bellow, where it is easy to see that all trasitios are valid Thus we have created C ad to complete the recursio we have to make sure t appears at least twice, but that is obvious sice the sequece The trasitio must be preset somewhere i the sequece or else the last elemet would remai costat, thus cotradictig the assumptio that the sequece geerates a cyclic ad complete ( )-RMGC 7

3 ISIT 008, Toroto, Caada, July 6 -, 008 a a a a a a a a a a a a a a a a t (),,t (( )! ) cotais at least oe occurrece of t,ad is replicated times, Therefore, we coclude that: Corollary For every there exists a cyclic ad complete -RMGC The -RMGC show i Example is the result of this costructio for = III BALANCED -RMGCS It is sometimes the case that due to precisio costraits i the charge placemet mechaism, the actual possible charge levels i flash memory cells are discrete Thus, we defie the fuctio c i : N N, where c i (p) is the charge level of the i-th cell after the p-th programmig cycle It follows that if we use trasitio t j i the p-th programmig cycle ad the i-th cell is, at the time, j-th from the top, the c i (p) > max k {c k (p )}, ad for k = i, c k (p) =c k (p ) I a optimal settig with o overshoots, c i (p) =max k {c k (p )} + The jump i the p-th roud is defied as c i (p) c i (p ), assumig the i-th cell was the affected oe It is desirable, whe programmig cells, to make the jumps as small as possible We defie the jump cost of a -RMGC as the maximal jump durig the trasitios dictated by the code It is easy to see that the lowest possible jump cost i a complete -RMGC is at leas +, for We call a -RMGC with jump cos + a balaced - RMGC A balaced code is especially suitable if block deflatio is possible (Sectio I) We show a costructio that turs ay ( )-RMGC ito a balaced -RMGC while retaiig properties such as beig cyclic or complete The resultig recursive scheme is a ew permutatio geeratio algorithm, that obeys the geometric costraits of flash memories Theorem 5 Give a cyclic ad complete ( )-RMGC C,defied by the trasitios t i,,t i( )!, the the followig trasitios defie a -RMGC, deoted by C, that is cyclic, complete ad balaced: { t i k/ For k {,,}, t k = +, if k (mod ), otherwise Proof: Let us defie the abstract trasitio t i, i, that pushes to the bottom the i-th elemet from the bottom: ti ([a,,a i, a i+, a i+,,a ]) = [a,,a i, a i+,,a, a i+ ] Because C is cyclic ad complete, usig t i,, t i( )! startig with [a,,a ] produces a complete cycle through S, ad usig them startig with [a,,a ] creates a cycle through all the ( )! permutatios of [] where a is fixed o the first positio Figure Recursive costructio of the balaced -RMGC The ( )! permutatios of [] produced by ti,, t i( )! are also represetatives of the ( )! distict orbits of the permutatios of [] uder the operatio This meas that there are o two permutatios which are cyclic shifts of each other, sice represets a simple cyclic shift whe operated o a permutatio of [] Takig a permutatio of [], the usig the trasitio i+ oce, i, followed by times usig, is equivalet to usig t i Every trasitio of the form i+, i =, moves us to a differet orbit, while the cosecutive executios of geerate all the elemets of the orbit It follows that the resultig permutatios are distict Schematically, the costructio of C based o C is: times times times {}}{{}}{{}}{ i +,,,, i +,,,,, i( )!+,,, }{{}}{{}}{{} ti ti t i( )! The code C is balaced, because i every block of trasitios startig with a i+, i, wehave: the trasitio i+ has a jump of i + ; the followig i trasitios have a jump of +, ad the rest a jump of I additio, because C is cyclic ad complete, it follows that C is also cyclic ad complete We ca use Theorem 5 to recursively costruct all the supportig j-rmgcs, j {,,}, with the basis of the recursio beig the -RMGC: [, ], [, ] Corollary 6 For ay, there exists a cyclic, complete ad balaced -RMGC Example 7 Fig shows the recursive balaced -RMGC The permutatios are represeted as a by ( )! matrix Each row is a orbit geerated by Each colum has the last elemet fixed The trasitios betwee rows occur whe is the top (leftmost) elemet These trasitios are defied recursively, by a balaced -RMGC over the set {,, } (where the top elemet is ow the rightmost oe): [,,],[,,],[,,],[,,],[,,],[,,] They are t, t, t, t, t, t This is the cycle from Example, with relabeled cells, ad startig with the third colum The recursive balaced -RMGC of Theorem 5 is optimal with respect to the followig asymptotic measure I practice, it is importat to optimize the cost of decidig the trasitio that geerates the ext permutatio We defie a step to be a sigle query of the form what is the i-th highest charged 7

4 ISIT 008, Toroto, Caada, July 6 -, 008 cell? If we start with [a,,a ], the a fractio of of the trasitios are, ad they occur wheever the cell a is ot the highest charged oe Of the cases where a is highest charged, by recursio, a fractio of the trasitios are determied by just oe more query, ad so o At the basis of the recursio, permutatios over two elemets require zero additioal queries Thus, the total umber of queries is i= i! i= Sice lim i! =, the asymptotic average umber of steps to geerate the ext permutatio is just IV REWRITING WITH RANK MODULATION CODES I this sectio, we study rewritig data usig the rak modulatio scheme The objective is to miimize the expesive cell erasure operatios, which, i tur, requires us to maximize the umber of times the data ca be modified before a cell erasure becomes ecessary (ie, whe the highest cell charge level reaches the highest allowed value) We firseed to defie a decodig scheme It is ofte the case that the alphabet size used by the user to iput data ad read stored iformatio differs from the iteral represetatio alphabet size I our case, data is stored iterally i oe of differet permutatios Let us assume the user alphabet is Q = {,,, q} A decodig scheme is a fuctio D : S Q mappig iteral states to symbols from the user alphabet Suppose the curret iteral state is s S ad the user iputs a ew symbol α Q Arewritig operatio for α is ow defied as movig from state s S to state s S such that D(s )=α It should be oted that if D(s )=α the s may be equal to s, ie, the rewritig operatio is degeerate ad does othig The cost of the rewritig operatio is the miimal umber of atomic trasitios from T (ie, the umber of push-to-the-top operatios) required to move from state s to state s I the followig sectios, we first preset a decodig scheme that strictly optimizes the rewritig cost for the worst case The, we exted the costructio to optimize the average rewritig cost with costat approximatio ratios A Optimal Decodig Scheme for Rewritig We start by presetig a lower boud o the cost of a sigle rewritig operatio First, we defie a few terms Defie the trasitio graph G =(V, E) as a directed graph with V = S, ie, with vertices represetig the permutatios i S There is a directed edge u v if v = t(u) for some t T, ie, we ca obtai v from u by a sigle push-to-the-top operatio We ca see that G is a regular digraph: every vertex has icomig edges ad outgoig edges For two vertices u, v V, defie the directed distace d(u, v) as the umber of edges i the shortest directed path from u to v Clearly, 0 d(u, v) Give a vertex u V ad a iteger r (here 0 r ), we defie the ball B r (u) as B r (u) ={v V d(u, v) r}, ad defie the sphere S r (u) as S r (u) ={v V d(u, v) =r} Clearly, B r (u) = 0 i r S r (u) We skip the proof of Lemma 8 due to space costrait Iterested readers please see [7] Lemma 8 u V ad 0 r, B r (u) = ( r)! For r, S r (u) = ( r)! ( r+)! Let ρ deote the smallest iteger such that B ρ (u) q Note that ρ is idepedet of u The followig lemma presets a boud o the rewritig cost (Please see [7] for proof) Lemma 9 For ay decodig scheme ad ay curret cell state, there exists α Q such that the cost of a rewritig operatio for α is at least ρ(ρ is as defied above) Next, we preset a optimal code costructio Costructio 0 Divide the states S ito sets, ( ρ)! where two states are i the same set if ad oly if their ρ top-charged cells are the same Amog the sets, choose q sets ad map them to the q symbols of Q arbitrarily The other q sets eed ot represet ay symbol ( ρ)! Example Le = ad q = Sice B (u) =, ρ = Wedividethe = 6 states ito = sets ( ρ)! which iduce the decodig fuctio: {[,,], [,, ]}, {[,, ], [,, ]}, ad{[,, ], [,, ]} The two states i the set are decoded to the same symbol from Q The cost of ay rewrite operatio is at most Sice the top ρ cells of a state uiquely determie the decoded symbol, ay rewritig operatio costs at most ρ trasitios to replace the top ρ cells Thus we have: Theorem The codig scheme i Costructio 0 is optimal i terms of miimizig the worst-case rewritig cost B Optimizig the Average Cost of Rewritig If the probabilities with which the iput symbol takes values from its alphabet are kow, it is also importat to study schemes that optimize the average cost of rewritig Let us assume that for each rewrite, the iput symbol is draw iid from Q = {,,,q} with probability p i to get symbol i Q We study decodig schemes that optimize the average cost of rewritig Depedig o the probabilities {p i },the optimal code may be quite complex we preset below a prefix code that is optimal i terms of its ow desig objective Furthermore, we will prove that whe q /, the prefix code is a -approximatio of ay optimal rak-modulatio solutio We will also show that whe ad q /6, the prefix code is a -approximatio The prefix code cosists of q codewords of variable legths, which represet the q values i Q Each codeword is a prefix of a permutatio from S No codeword is allowed to be the prefix of aother codeword Let a =[a, a,,a i ] be a geeric codeword that represets the value α Q For a state s S,ifa is a prefix ofs the we set D(s) =α Due to the prefix-free property, the decodig fuctio is well-defied A prefix code ca be represeted by a tree First, let us defie a full permutatio tree T where the labels o the paths from its root to leaves are all the permutatios A example is show i Fig (a) The vertices are i layers, with the root i layer 0 ad leaves i layer A prefix code correspods to a subtree C of T (see Fig (b) for a example) Every codeword is mapped to a leaf, ad the codeword is the same as the labels o the path from the root to the leaf 7

5 ISIT 008, Toroto, Caada, July 6 -, 008 (a) (b) () () (,) (,) (,) (,) (,) (,,) (,,) Figure Prefix rak modulatio code for = ad q = 9 (a) The full permutatio tree T (b) A prefix code represeted by a subtree C of T The leaves represet the codewords, which are the labels beside the leaves For i Q, letc i deote the codeword represetig i, ad let c i deote its legth (The codewords i Fig (b) have miimumlegth of admaximum legth of ) Our objective is to miimize the average codeword legth, q i= p i c i, which upper bouds the expected cost of each rewrite The optimal prefix code caot be costructed with a greedy algorithm like the Huffma code ad its extesios, because the vertex degrees i the code tree C are ukow iitially We preset a dyamic programmig algorithm of time complexity O(q ) to costruct the optimal code The algorithm computes a set of fuctios opt i (l, m), for i =,,,, l = 0,,, q, ad m = 0,,,mi{q, /( i)!} We iterpret the meaig of opt i (l, m) as follows We take a subtree of T that cotais the root The subtree has exactly l leaves i the layers i, i +,, Italsohasatmostm vertices i the layer i We let the l leaves represet the l iput values from Q with the lowest probabilities p j : the further the leaf is from the root, the lower the correspodig probability is Those leaves are also l codewords, ad we call their weighted average legth (where the probabilities p j are weights) the value of the subtree The miimum value of such a subtree (amog all such subtrees) is defied to be opt i (l, m) Clearly, the miimum average codeword legth of a prefix code equals opt (q, ) Without loss of geerality, let us assume that p p p q It is easily see that the followig recursio holds: () op (l, m) = ( ) l k= p k for m l > 0; () opt i (0, m) = 0 for i > ; () opt i (l, m) = mi 0 j mi{l,m} {opt i+ (l j, mi{q, (m j)( i)})+ l k=l j+ ip k} for i <, l > 0, m > 0 The last recursio holds because a subtree with l leaves i layers i, i +,, ad at most m vertices i layer i ca have 0,,,mi{l, m} leaves i layer i The algorithm computes op (l, m), op (l, m),, opt (q, ) usig the above recursios Give their values, it is straightforward to determie i the optimal code, how may codewords are i each layer, ad therefore determie the optimal code itself For rewritig based o the code, to chage the stored value to i Q, we simply push the c i cells i its codeword c i to the top sequetially Theorem Whe q /, for every rewrite, the expected rewritig cost of a optimal prefix code is at most three times that of ay rak modulatio code Whe ad q /6, this ratio is at most two Proof: We preset the sketch of the proof for the case q / (The case ad q /6 ca be aalyzed similarly) For the detailed proof, please refer to [7] Let i Q (resp, s i S ) deote the stored data (resp, cell state) at a give momet Let s,, s i, s i+,, s q deote the q cell states whose distace from s i i the trasitio graph, d(s i, s j ), are the smallest oes WLOG, assume that p p i p i+ p q, ad that d(s i, s ) d(s i, s i ) d(s i, s i+ ) d(s i, s q ) To miimize the expected rewritig cost, the ideal solutio is a code that decodes s j as j for j Q Deote by α the expected rewritig cost of this ideal solutio Next, we desig a prefix code B with this property: j Q, ifj = i, its correspodig codeword legth, y j, is at most d(s i, s j ); if j = i, the y j = It ca be proved that such a prefix code B exists Next, let A be a optimal prefix code, ad for j Q, letx j deote the correspodig codeword legth Let β deote the expected rewritig cost of A Bydefiitio, j q p j x j j q p j y j Sicex i = y i, β j q, j =i p j x j j q, j =i p j y j j q, j =i p j d(s i, s j ) = α So the expected rewritig cost of a optimal prefix code is at most three times that of a ideal rak modulatio code V CONCLUSION I this paper, we preset a ovel data storage scheme, rak modulatio, for flash memories We preset several Gray code costructios for rak modulatio, as well as its data rewritig schemes The preseted codig schemes are optimized for cell programmig cost i several differet aspects REFERENCES [] A Badyopadhyay, G J Serrao, ad P Hasler, Programmig aalog computatioal memory elemets to 0% accuracy over 5 decades usig a predictive method, i Proceedigs of the IEEE Iteratioal Symposium o Circuits ad Systems, 005, pp 8 5 [] P Cappelletti ad A Modelli, Flash memory reliability, i Flash Memories, P Cappelletti, C Golla, P Olivo, ad E Zaoi, Eds Kluwer, 999, pp 99 [] B Eita ad A Roy, Biary ad multilevel flash cells, i Flash Memories, P Cappelletti, C Golla, P Olivo, ad E Zaoi, Eds Kluwer, 999, pp 9 5 [] F Gray, Pulse code commuicatio, US Patet 6058, March 95 [5] M Grossi, M Lazoi, ad B Riccò, Program schemes for multilevel flash memories, Proceedigs of the IEEE, vol 9, o, pp 59 60, 00 [6] A Jiag, V Bohossia, ad J Bruck, Floatig codes for joit iformatio storage i write asymmetric memories, i Proc IEEE ISIT, 007, pp [7] A Jiag, R Mateescu, M Schwartz, ad J Bruck, Rak modulatio for flash memories, Califoria Istitute of Techology, Tech Rep, 008 [Olie] Available: [8] A Jiag, M Schwartz, ad J Bruck, Error-correctig codes for rak modulatio, i Proc IEEE ISIT, 008 [9] H Nobukata et al, A -Mb, eight-level NAND flash memory with optimized pulsewidth programmig, IEEE J Solid-State Circuits, vol 5, o 5, pp , 000 [0] C D Savage, A survey of combiatorial Gray codes, SIAM Rev, vol 9, o, pp , 997 [] R Sedgewick, Permutatio geeratio methods, Computig Surveys, vol 9, o, pp 7 6,

Rank Modulation with Multiplicity

Rank Modulation with Multiplicity Rak Modulatio with Multiplicity Axiao (Adrew) Jiag Computer Sciece ad Eg. Dept. Texas A&M Uiversity College Statio, TX 778 ajiag@cse.tamu.edu Abstract Rak modulatio is a scheme that uses the relative order

More information

w (1) ˆx w (1) x (1) /ρ and w (2) ˆx w (2) x (2) /ρ.

w (1) ˆx w (1) x (1) /ρ and w (2) ˆx w (2) x (2) /ρ. 2 5. Weighted umber of late jobs 5.1. Release dates ad due dates: maximimizig the weight of o-time jobs Oce we add release dates, miimizig the umber of late jobs becomes a sigificatly harder problem. For

More information

OPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES

OPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES OPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES Peter M. Maurer Why Hashig is θ(). As i biary search, hashig assumes that keys are stored i a array which is idexed by a iteger. However, hashig attempts to bypass

More information

4.3 Growth Rates of Solutions to Recurrences

4.3 Growth Rates of Solutions to Recurrences 4.3. GROWTH RATES OF SOLUTIONS TO RECURRENCES 81 4.3 Growth Rates of Solutios to Recurreces 4.3.1 Divide ad Coquer Algorithms Oe of the most basic ad powerful algorithmic techiques is divide ad coquer.

More information

Lecture 1: Basic problems of coding theory

Lecture 1: Basic problems of coding theory Lecture 1: Basic problems of codig theory Error-Correctig Codes (Sprig 016) Rutgers Uiversity Swastik Kopparty Scribes: Abhishek Bhrushudi & Aditya Potukuchi Admiistrivia was discussed at the begiig of

More information

Recursive Algorithm for Generating Partitions of an Integer. 1 Preliminary

Recursive Algorithm for Generating Partitions of an Integer. 1 Preliminary Recursive Algorithm for Geeratig Partitios of a Iteger Sug-Hyuk Cha Computer Sciece Departmet, Pace Uiversity 1 Pace Plaza, New York, NY 10038 USA scha@pace.edu Abstract. This article first reviews the

More information

Optimization Methods: Linear Programming Applications Assignment Problem 1. Module 4 Lecture Notes 3. Assignment Problem

Optimization Methods: Linear Programming Applications Assignment Problem 1. Module 4 Lecture Notes 3. Assignment Problem Optimizatio Methods: Liear Programmig Applicatios Assigmet Problem Itroductio Module 4 Lecture Notes 3 Assigmet Problem I the previous lecture, we discussed about oe of the bech mark problems called trasportatio

More information

62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 +

62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + 62. Power series Defiitio 16. (Power series) Give a sequece {c }, the series c x = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + is called a power series i the variable x. The umbers c are called the coefficiets of

More information

De Bruijn Sequences for the Binary Strings with Maximum Specified Density

De Bruijn Sequences for the Binary Strings with Maximum Specified Density De Bruij Sequeces for the Biary Strigs with Maximum Specified Desity Joe Sawada 1, Brett Steves 2, ad Aaro Williams 2 1 jsawada@uoguelph.ca School of Computer Sciece, Uiversity of Guelph, CANADA 2 brett@math.carleto.ca

More information

Sequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence

Sequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece 1, 1, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet

More information

Infinite Sequences and Series

Infinite Sequences and Series Chapter 6 Ifiite Sequeces ad Series 6.1 Ifiite Sequeces 6.1.1 Elemetary Cocepts Simply speakig, a sequece is a ordered list of umbers writte: {a 1, a 2, a 3,...a, a +1,...} where the elemets a i represet

More information

De Bruijn Sequences for the Binary Strings with Maximum Density

De Bruijn Sequences for the Binary Strings with Maximum Density De Bruij Sequeces for the Biary Strigs with Maximum Desity Joe Sawada 1, Brett Steves 2, ad Aaro Williams 2 1 jsawada@uoguelph.ca School of Computer Sciece, Uiversity of Guelph, CANADA 2 brett@math.carleto.ca

More information

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170 UC Berkeley CS 170: Efficiet Algorithms ad Itractable Problems Hadout 17 Lecturer: David Wager April 3, 2003 Notes 17 for CS 170 1 The Lempel-Ziv algorithm There is a sese i which the Huffma codig was

More information

A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence

A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece,, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet as

More information

Optimization Methods MIT 2.098/6.255/ Final exam

Optimization Methods MIT 2.098/6.255/ Final exam Optimizatio Methods MIT 2.098/6.255/15.093 Fial exam Date Give: December 19th, 2006 P1. [30 pts] Classify the followig statemets as true or false. All aswers must be well-justified, either through a short

More information

Fortgeschrittene Datenstrukturen Vorlesung 11

Fortgeschrittene Datenstrukturen Vorlesung 11 Fortgeschrittee Datestruture Vorlesug 11 Schriftführer: Marti Weider 19.01.2012 1 Succict Data Structures (ctd.) 1.1 Select-Queries A slightly differet approach, compared to ra, is used for select. B represets

More information

CS284A: Representations and Algorithms in Molecular Biology

CS284A: Representations and Algorithms in Molecular Biology CS284A: Represetatios ad Algorithms i Molecular Biology Scribe Notes o Lectures 3 & 4: Motif Discovery via Eumeratio & Motif Represetatio Usig Positio Weight Matrix Joshua Gervi Based o presetatios by

More information

Number Representation

Number Representation Number Represetatio 1 Number System :: The Basics We are accustomed to usig the so-called decimal umber system Te digits :: 0,1,2,3,4,5,6,7,8,9 Every digit positio has a weight which is a power of 10 Base

More information

6.3 Testing Series With Positive Terms

6.3 Testing Series With Positive Terms 6.3. TESTING SERIES WITH POSITIVE TERMS 307 6.3 Testig Series With Positive Terms 6.3. Review of what is kow up to ow I theory, testig a series a i for covergece amouts to fidig the i= sequece of partial

More information

Analysis of Algorithms. Introduction. Contents

Analysis of Algorithms. Introduction. Contents Itroductio The focus of this module is mathematical aspects of algorithms. Our mai focus is aalysis of algorithms, which meas evaluatig efficiecy of algorithms by aalytical ad mathematical methods. We

More information

Chapter 9 - CD companion 1. A Generic Implementation; The Common-Merge Amplifier. 1 τ is. ω ch. τ io

Chapter 9 - CD companion 1. A Generic Implementation; The Common-Merge Amplifier. 1 τ is. ω ch. τ io Chapter 9 - CD compaio CHAPTER NINE CD-9.2 CD-9.2. Stages With Voltage ad Curret Gai A Geeric Implemetatio; The Commo-Merge Amplifier The advaced method preseted i the text for approximatig cutoff frequecies

More information

Axioms of Measure Theory

Axioms of Measure Theory MATH 532 Axioms of Measure Theory Dr. Neal, WKU I. The Space Throughout the course, we shall let X deote a geeric o-empty set. I geeral, we shall ot assume that ay algebraic structure exists o X so that

More information

A representation approach to the tower of Hanoi problem

A representation approach to the tower of Hanoi problem Uiversity of Wollogog Research Olie Departmet of Computig Sciece Workig Paper Series Faculty of Egieerig ad Iformatio Scieces 98 A represetatio approach to the tower of Haoi problem M. C. Er Uiversity

More information

Optimally Sparse SVMs

Optimally Sparse SVMs A. Proof of Lemma 3. We here prove a lower boud o the umber of support vectors to achieve geeralizatio bouds of the form which we cosider. Importatly, this result holds ot oly for liear classifiers, but

More information

LONG SNAKES IN POWERS OF THE COMPLETE GRAPH WITH AN ODD NUMBER OF VERTICES

LONG SNAKES IN POWERS OF THE COMPLETE GRAPH WITH AN ODD NUMBER OF VERTICES J Lodo Math Soc (2 50, (1994, 465 476 LONG SNAKES IN POWERS OF THE COMPLETE GRAPH WITH AN ODD NUMBER OF VERTICES Jerzy Wojciechowski Abstract I [5] Abbott ad Katchalski ask if there exists a costat c >

More information

How to Maximize a Function without Really Trying

How to Maximize a Function without Really Trying How to Maximize a Fuctio without Really Tryig MARK FLANAGAN School of Electrical, Electroic ad Commuicatios Egieerig Uiversity College Dubli We will prove a famous elemetary iequality called The Rearragemet

More information

Section 5.1 The Basics of Counting

Section 5.1 The Basics of Counting 1 Sectio 5.1 The Basics of Coutig Combiatorics, the study of arragemets of objects, is a importat part of discrete mathematics. I this chapter, we will lear basic techiques of coutig which has a lot of

More information

Beurling Integers: Part 2

Beurling Integers: Part 2 Beurlig Itegers: Part 2 Isomorphisms Devi Platt July 11, 2015 1 Prime Factorizatio Sequeces I the last article we itroduced the Beurlig geeralized itegers, which ca be represeted as a sequece of real umbers

More information

Problem Set 2 Solutions

Problem Set 2 Solutions CS271 Radomess & Computatio, Sprig 2018 Problem Set 2 Solutios Poit totals are i the margi; the maximum total umber of poits was 52. 1. Probabilistic method for domiatig sets 6pts Pick a radom subset S

More information

Disjoint set (Union-Find)

Disjoint set (Union-Find) CS124 Lecture 7 Fall 2018 Disjoit set (Uio-Fid) For Kruskal s algorithm for the miimum spaig tree problem, we foud that we eeded a data structure for maitaiig a collectio of disjoit sets. That is, we eed

More information

subcaptionfont+=small,labelformat=parens,labelsep=space,skip=6pt,list=0,hypcap=0 subcaption ALGEBRAIC COMBINATORICS LECTURE 8 TUESDAY, 2/16/2016

subcaptionfont+=small,labelformat=parens,labelsep=space,skip=6pt,list=0,hypcap=0 subcaption ALGEBRAIC COMBINATORICS LECTURE 8 TUESDAY, 2/16/2016 subcaptiofot+=small,labelformat=pares,labelsep=space,skip=6pt,list=0,hypcap=0 subcaptio ALGEBRAIC COMBINATORICS LECTURE 8 TUESDAY, /6/06. Self-cojugate Partitios Recall that, give a partitio λ, we may

More information

INEQUALITIES BJORN POONEN

INEQUALITIES BJORN POONEN INEQUALITIES BJORN POONEN 1 The AM-GM iequality The most basic arithmetic mea-geometric mea (AM-GM) iequality states simply that if x ad y are oegative real umbers, the (x + y)/2 xy, with equality if ad

More information

The Boolean Ring of Intervals

The Boolean Ring of Intervals MATH 532 Lebesgue Measure Dr. Neal, WKU We ow shall apply the results obtaied about outer measure to the legth measure o the real lie. Throughout, our space X will be the set of real umbers R. Whe ecessary,

More information

IP Reference guide for integer programming formulations.

IP Reference guide for integer programming formulations. IP Referece guide for iteger programmig formulatios. by James B. Orli for 15.053 ad 15.058 This documet is iteded as a compact (or relatively compact) guide to the formulatio of iteger programs. For more

More information

Hoggatt and King [lo] defined a complete sequence of natural numbers

Hoggatt and King [lo] defined a complete sequence of natural numbers REPRESENTATIONS OF N AS A SUM OF DISTINCT ELEMENTS FROM SPECIAL SEQUENCES DAVID A. KLARNER, Uiversity of Alberta, Edmoto, Caada 1. INTRODUCTION Let a, I deote a sequece of atural umbers which satisfies

More information

NICK DUFRESNE. 1 1 p(x). To determine some formulas for the generating function of the Schröder numbers, r(x) = a(x) =

NICK DUFRESNE. 1 1 p(x). To determine some formulas for the generating function of the Schröder numbers, r(x) = a(x) = AN INTRODUCTION TO SCHRÖDER AND UNKNOWN NUMBERS NICK DUFRESNE Abstract. I this article we will itroduce two types of lattice paths, Schröder paths ad Ukow paths. We will examie differet properties of each,

More information

An Introduction to Randomized Algorithms

An Introduction to Randomized Algorithms A Itroductio to Radomized Algorithms The focus of this lecture is to study a radomized algorithm for quick sort, aalyze it usig probabilistic recurrece relatios, ad also provide more geeral tools for aalysis

More information

Weakly Connected Closed Geodetic Numbers of Graphs

Weakly Connected Closed Geodetic Numbers of Graphs Iteratioal Joural of Mathematical Aalysis Vol 10, 016, o 6, 57-70 HIKARI Ltd, wwwm-hikaricom http://dxdoiorg/101988/ijma01651193 Weakly Coected Closed Geodetic Numbers of Graphs Rachel M Pataga 1, Imelda

More information

Induction: Solutions

Induction: Solutions Writig Proofs Misha Lavrov Iductio: Solutios Wester PA ARML Practice March 6, 206. Prove that a 2 2 chessboard with ay oe square removed ca always be covered by shaped tiles. Solutio : We iduct o. For

More information

1 Hash tables. 1.1 Implementation

1 Hash tables. 1.1 Implementation Lecture 8 Hash Tables, Uiversal Hash Fuctios, Balls ad Bis Scribes: Luke Johsto, Moses Charikar, G. Valiat Date: Oct 18, 2017 Adapted From Virgiia Williams lecture otes 1 Hash tables A hash table is a

More information

Binary codes from graphs on triples and permutation decoding

Binary codes from graphs on triples and permutation decoding Biary codes from graphs o triples ad permutatio decodig J. D. Key Departmet of Mathematical Scieces Clemso Uiversity Clemso SC 29634 U.S.A. J. Moori ad B. G. Rodrigues School of Mathematics Statistics

More information

TEACHER CERTIFICATION STUDY GUIDE

TEACHER CERTIFICATION STUDY GUIDE COMPETENCY 1. ALGEBRA SKILL 1.1 1.1a. ALGEBRAIC STRUCTURES Kow why the real ad complex umbers are each a field, ad that particular rigs are ot fields (e.g., itegers, polyomial rigs, matrix rigs) Algebra

More information

Lecture 14: Graph Entropy

Lecture 14: Graph Entropy 15-859: Iformatio Theory ad Applicatios i TCS Sprig 2013 Lecture 14: Graph Etropy March 19, 2013 Lecturer: Mahdi Cheraghchi Scribe: Euiwoog Lee 1 Recap Bergma s boud o the permaet Shearer s Lemma Number

More information

Scheduling under Uncertainty using MILP Sensitivity Analysis

Scheduling under Uncertainty using MILP Sensitivity Analysis Schedulig uder Ucertaity usig MILP Sesitivity Aalysis M. Ierapetritou ad Zheya Jia Departmet of Chemical & Biochemical Egieerig Rutgers, the State Uiversity of New Jersey Piscataway, NJ Abstract The aim

More information

ECEN 655: Advanced Channel Coding Spring Lecture 7 02/04/14. Belief propagation is exact on tree-structured factor graphs.

ECEN 655: Advanced Channel Coding Spring Lecture 7 02/04/14. Belief propagation is exact on tree-structured factor graphs. ECEN 655: Advaced Chael Codig Sprig 014 Prof. Hery Pfister Lecture 7 0/04/14 Scribe: Megke Lia 1 4-Cycles i Gallager s Esemble What we already kow: Belief propagatio is exact o tree-structured factor graphs.

More information

1 of 7 7/16/2009 6:06 AM Virtual Laboratories > 6. Radom Samples > 1 2 3 4 5 6 7 6. Order Statistics Defiitios Suppose agai that we have a basic radom experimet, ad that X is a real-valued radom variable

More information

End-of-Year Contest. ERHS Math Club. May 5, 2009

End-of-Year Contest. ERHS Math Club. May 5, 2009 Ed-of-Year Cotest ERHS Math Club May 5, 009 Problem 1: There are 9 cois. Oe is fake ad weighs a little less tha the others. Fid the fake coi by weighigs. Solutio: Separate the 9 cois ito 3 groups (A, B,

More information

7. Modern Techniques. Data Encryption Standard (DES)

7. Modern Techniques. Data Encryption Standard (DES) 7. Moder Techiques. Data Ecryptio Stadard (DES) The objective of this chapter is to illustrate the priciples of moder covetioal ecryptio. For this purpose, we focus o the most widely used covetioal ecryptio

More information

CSE 4095/5095 Topics in Big Data Analytics Spring 2017; Homework 1 Solutions

CSE 4095/5095 Topics in Big Data Analytics Spring 2017; Homework 1 Solutions CSE 09/09 Topics i ig Data Aalytics Sprig 2017; Homework 1 Solutios Note: Solutios to problems,, ad 6 are due to Marius Nicolae. 1. Cosider the followig algorithm: for i := 1 to α log e do Pick a radom

More information

CSE 202 Homework 1 Matthias Springer, A Yes, there does always exist a perfect matching without a strong instability.

CSE 202 Homework 1 Matthias Springer, A Yes, there does always exist a perfect matching without a strong instability. CSE 0 Homework 1 Matthias Spriger, A9950078 1 Problem 1 Notatio a b meas that a is matched to b. a < b c meas that b likes c more tha a. Equality idicates a tie. Strog istability Yes, there does always

More information

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes The Maximum-Lielihood Decodig Performace of Error-Correctig Codes Hery D. Pfister ECE Departmet Texas A&M Uiversity August 27th, 2007 (rev. 0) November 2st, 203 (rev. ) Performace of Codes. Notatio X,

More information

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound Lecture 7 Ageda for the lecture Gaussia chael with average power costraits Capacity of additive Gaussia oise chael ad the sphere packig boud 7. Additive Gaussia oise chael Up to this poit, we have bee

More information

Randomized Algorithms I, Spring 2018, Department of Computer Science, University of Helsinki Homework 1: Solutions (Discussed January 25, 2018)

Randomized Algorithms I, Spring 2018, Department of Computer Science, University of Helsinki Homework 1: Solutions (Discussed January 25, 2018) Radomized Algorithms I, Sprig 08, Departmet of Computer Sciece, Uiversity of Helsiki Homework : Solutios Discussed Jauary 5, 08). Exercise.: Cosider the followig balls-ad-bi game. We start with oe black

More information

Efficient GMM LECTURE 12 GMM II

Efficient GMM LECTURE 12 GMM II DECEMBER 1 010 LECTURE 1 II Efficiet The estimator depeds o the choice of the weight matrix A. The efficiet estimator is the oe that has the smallest asymptotic variace amog all estimators defied by differet

More information

Parallel Vector Algorithms David A. Padua

Parallel Vector Algorithms David A. Padua Parallel Vector Algorithms 1 of 32 Itroductio Next, we study several algorithms where parallelism ca be easily expressed i terms of array operatios. We will use Fortra 90 to represet these algorithms.

More information

Product measures, Tonelli s and Fubini s theorems For use in MAT3400/4400, autumn 2014 Nadia S. Larsen. Version of 13 October 2014.

Product measures, Tonelli s and Fubini s theorems For use in MAT3400/4400, autumn 2014 Nadia S. Larsen. Version of 13 October 2014. Product measures, Toelli s ad Fubii s theorems For use i MAT3400/4400, autum 2014 Nadia S. Larse Versio of 13 October 2014. 1. Costructio of the product measure The purpose of these otes is to preset the

More information

PROPERTIES OF AN EULER SQUARE

PROPERTIES OF AN EULER SQUARE PROPERTIES OF N EULER SQURE bout 0 the mathematicia Leoard Euler discussed the properties a x array of letters or itegers ow kow as a Euler or Graeco-Lati Square Such squares have the property that every

More information

A Block Cipher Using Linear Congruences

A Block Cipher Using Linear Congruences Joural of Computer Sciece 3 (7): 556-560, 2007 ISSN 1549-3636 2007 Sciece Publicatios A Block Cipher Usig Liear Cogrueces 1 V.U.K. Sastry ad 2 V. Jaaki 1 Academic Affairs, Sreeidhi Istitute of Sciece &

More information

Seunghee Ye Ma 8: Week 5 Oct 28

Seunghee Ye Ma 8: Week 5 Oct 28 Week 5 Summary I Sectio, we go over the Mea Value Theorem ad its applicatios. I Sectio 2, we will recap what we have covered so far this term. Topics Page Mea Value Theorem. Applicatios of the Mea Value

More information

Universal source coding for complementary delivery

Universal source coding for complementary delivery SITA2006 i Hakodate 2005.2. p. Uiversal source codig for complemetary delivery Akisato Kimura, 2, Tomohiko Uyematsu 2, Shigeaki Kuzuoka 2 Media Iformatio Laboratory, NTT Commuicatio Sciece Laboratories,

More information

Upper bound for ropelength of pretzel knots

Upper bound for ropelength of pretzel knots Upper boud for ropelegth of pretzel kots Safiya Mora August 25, 2006 Abstract A model of the pretzel kot is described. A method for predictig the ropelegth of pretzel kots is give. A upper boud for the

More information

The multiplicative structure of finite field and a construction of LRC

The multiplicative structure of finite field and a construction of LRC IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio

More information

Time-Domain Representations of LTI Systems

Time-Domain Representations of LTI Systems 2.1 Itroductio Objectives: 1. Impulse resposes of LTI systems 2. Liear costat-coefficiets differetial or differece equatios of LTI systems 3. Bloc diagram represetatios of LTI systems 4. State-variable

More information

Recursive Algorithms. Recurrences. Recursive Algorithms Analysis

Recursive Algorithms. Recurrences. Recursive Algorithms Analysis Recursive Algorithms Recurreces Computer Sciece & Egieerig 35: Discrete Mathematics Christopher M Bourke cbourke@cseuledu A recursive algorithm is oe i which objects are defied i terms of other objects

More information

CS 270 Algorithms. Oliver Kullmann. Growth of Functions. Divide-and- Conquer Min-Max- Problem. Tutorial. Reading from CLRS for week 2

CS 270 Algorithms. Oliver Kullmann. Growth of Functions. Divide-and- Conquer Min-Max- Problem. Tutorial. Reading from CLRS for week 2 Geeral remarks Week 2 1 Divide ad First we cosider a importat tool for the aalysis of algorithms: Big-Oh. The we itroduce a importat algorithmic paradigm:. We coclude by presetig ad aalysig two examples.

More information

Generalized Semi- Markov Processes (GSMP)

Generalized Semi- Markov Processes (GSMP) Geeralized Semi- Markov Processes (GSMP) Summary Some Defiitios Markov ad Semi-Markov Processes The Poisso Process Properties of the Poisso Process Iterarrival times Memoryless property ad the residual

More information

Skip Lists. Presentation for use with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 S 3 S S 1

Skip Lists. Presentation for use with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 S 3 S S 1 Presetatio for use with the textbook, Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Skip Lists S 3 15 15 23 10 15 23 36 Skip Lists 1 What is a Skip List A skip list for

More information

Lecture Notes for Analysis Class

Lecture Notes for Analysis Class Lecture Notes for Aalysis Class Topological Spaces A topology for a set X is a collectio T of subsets of X such that: (a) X ad the empty set are i T (b) Uios of elemets of T are i T (c) Fiite itersectios

More information

Recurrence Relations

Recurrence Relations Recurrece Relatios Aalysis of recursive algorithms, such as: it factorial (it ) { if (==0) retur ; else retur ( * factorial(-)); } Let t be the umber of multiplicatios eeded to calculate factorial(). The

More information

subject to A 1 x + A 2 y b x j 0, j = 1,,n 1 y j = 0 or 1, j = 1,,n 2

subject to A 1 x + A 2 y b x j 0, j = 1,,n 1 y j = 0 or 1, j = 1,,n 2 Additioal Brach ad Boud Algorithms 0-1 Mixed-Iteger Liear Programmig The brach ad boud algorithm described i the previous sectios ca be used to solve virtually all optimizatio problems cotaiig iteger variables,

More information

Lecture 10: Universal coding and prediction

Lecture 10: Universal coding and prediction 0-704: Iformatio Processig ad Learig Sprig 0 Lecture 0: Uiversal codig ad predictio Lecturer: Aarti Sigh Scribes: Georg M. Goerg Disclaimer: These otes have ot bee subjected to the usual scrutiy reserved

More information

Comparison Study of Series Approximation. and Convergence between Chebyshev. and Legendre Series

Comparison Study of Series Approximation. and Convergence between Chebyshev. and Legendre Series Applied Mathematical Scieces, Vol. 7, 03, o. 6, 3-337 HIKARI Ltd, www.m-hikari.com http://d.doi.org/0.988/ams.03.3430 Compariso Study of Series Approimatio ad Covergece betwee Chebyshev ad Legedre Series

More information

Math 155 (Lecture 3)

Math 155 (Lecture 3) Math 55 (Lecture 3) September 8, I this lecture, we ll cosider the aswer to oe of the most basic coutig problems i combiatorics Questio How may ways are there to choose a -elemet subset of the set {,,,

More information

Solutions for the Exam 9 January 2012

Solutions for the Exam 9 January 2012 Mastermath ad LNMB Course: Discrete Optimizatio Solutios for the Exam 9 Jauary 2012 Utrecht Uiversity, Educatorium, 15:15 18:15 The examiatio lasts 3 hours. Gradig will be doe before Jauary 23, 2012. Studets

More information

The Discrete Fourier Transform

The Discrete Fourier Transform The Discrete Fourier Trasform Complex Fourier Series Represetatio Recall that a Fourier series has the form a 0 + a k cos(kt) + k=1 b k si(kt) This represetatio seems a bit awkward, sice it ivolves two

More information

Quantum Computing Lecture 7. Quantum Factoring

Quantum Computing Lecture 7. Quantum Factoring Quatum Computig Lecture 7 Quatum Factorig Maris Ozols Quatum factorig A polyomial time quatum algorithm for factorig umbers was published by Peter Shor i 1994. Polyomial time meas that the umber of gates

More information

The picture in figure 1.1 helps us to see that the area represents the distance traveled. Figure 1: Area represents distance travelled

The picture in figure 1.1 helps us to see that the area represents the distance traveled. Figure 1: Area represents distance travelled 1 Lecture : Area Area ad distace traveled Approximatig area by rectagles Summatio The area uder a parabola 1.1 Area ad distace Suppose we have the followig iformatio about the velocity of a particle, how

More information

Lecture 9: Hierarchy Theorems

Lecture 9: Hierarchy Theorems IAS/PCMI Summer Sessio 2000 Clay Mathematics Udergraduate Program Basic Course o Computatioal Complexity Lecture 9: Hierarchy Theorems David Mix Barrigto ad Alexis Maciel July 27, 2000 Most of this lecture

More information

Real Variables II Homework Set #5

Real Variables II Homework Set #5 Real Variables II Homework Set #5 Name: Due Friday /0 by 4pm (at GOS-4) Istructios: () Attach this page to the frot of your homework assigmet you tur i (or write each problem before your solutio). () Please

More information

The Random Walk For Dummies

The Random Walk For Dummies The Radom Walk For Dummies Richard A Mote Abstract We look at the priciples goverig the oe-dimesioal discrete radom walk First we review five basic cocepts of probability theory The we cosider the Beroulli

More information

6 Integers Modulo n. integer k can be written as k = qn + r, with q,r, 0 r b. So any integer.

6 Integers Modulo n. integer k can be written as k = qn + r, with q,r, 0 r b. So any integer. 6 Itegers Modulo I Example 2.3(e), we have defied the cogruece of two itegers a,b with respect to a modulus. Let us recall that a b (mod ) meas a b. We have proved that cogruece is a equivalece relatio

More information

ECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220

ECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220 ECE 564/645 - Digital Commuicatio Systems (Sprig 014) Fial Exam Friday, May d, 8:00-10:00am, Marsto 0 Overview The exam cosists of four (or five) problems for 100 (or 10) poits. The poits for each part

More information

Module 5 EMBEDDED WAVELET CODING. Version 2 ECE IIT, Kharagpur

Module 5 EMBEDDED WAVELET CODING. Version 2 ECE IIT, Kharagpur Module 5 EMBEDDED WAVELET CODING Versio ECE IIT, Kharagpur Lesso 4 SPIHT algorithm Versio ECE IIT, Kharagpur Istructioal Objectives At the ed of this lesso, the studets should be able to:. State the limitatios

More information

Definition 4.2. (a) A sequence {x n } in a Banach space X is a basis for X if. unique scalars a n (x) such that x = n. a n (x) x n. (4.

Definition 4.2. (a) A sequence {x n } in a Banach space X is a basis for X if. unique scalars a n (x) such that x = n. a n (x) x n. (4. 4. BASES I BAACH SPACES 39 4. BASES I BAACH SPACES Sice a Baach space X is a vector space, it must possess a Hamel, or vector space, basis, i.e., a subset {x γ } γ Γ whose fiite liear spa is all of X ad

More information

Vector Quantization: a Limiting Case of EM

Vector Quantization: a Limiting Case of EM . Itroductio & defiitios Assume that you are give a data set X = { x j }, j { 2,,, }, of d -dimesioal vectors. The vector quatizatio (VQ) problem requires that we fid a set of prototype vectors Z = { z

More information

EE260: Digital Design, Spring n Binary Addition. n Complement forms. n Subtraction. n Multiplication. n Inputs: A 0, B 0. n Boolean equations:

EE260: Digital Design, Spring n Binary Addition. n Complement forms. n Subtraction. n Multiplication. n Inputs: A 0, B 0. n Boolean equations: EE260: Digital Desig, Sprig 2018 EE 260: Itroductio to Digital Desig Arithmetic Biary Additio Complemet forms Subtractio Multiplicatio Overview Yao Zheg Departmet of Electrical Egieerig Uiversity of Hawaiʻi

More information

Simple Polygons of Maximum Perimeter Contained in a Unit Disk

Simple Polygons of Maximum Perimeter Contained in a Unit Disk Discrete Comput Geom (009) 1: 08 15 DOI 10.1007/s005-008-9093-7 Simple Polygos of Maximum Perimeter Cotaied i a Uit Disk Charles Audet Pierre Hase Frédéric Messie Received: 18 September 007 / Revised:

More information

Skip lists: A randomized dictionary

Skip lists: A randomized dictionary Discrete Math for Bioiformatics WS 11/12:, by A. Bocmayr/K. Reiert, 31. Otober 2011, 09:53 3001 Sip lists: A radomized dictioary The expositio is based o the followig sources, which are all recommeded

More information

Information-based Feature Selection

Information-based Feature Selection Iformatio-based Feature Selectio Farza Faria, Abbas Kazeroui, Afshi Babveyh Email: {faria,abbask,afshib}@staford.edu 1 Itroductio Feature selectio is a topic of great iterest i applicatios dealig with

More information

CS161: Algorithm Design and Analysis Handout #10 Stanford University Wednesday, 10 February 2016

CS161: Algorithm Design and Analysis Handout #10 Stanford University Wednesday, 10 February 2016 CS161: Algorithm Desig ad Aalysis Hadout #10 Staford Uiversity Wedesday, 10 February 2016 Lecture #11: Wedesday, 10 February 2016 Topics: Example midterm problems ad solutios from a log time ago Sprig

More information

NUMERICAL METHODS FOR SOLVING EQUATIONS

NUMERICAL METHODS FOR SOLVING EQUATIONS Mathematics Revisio Guides Numerical Methods for Solvig Equatios Page 1 of 11 M.K. HOME TUITION Mathematics Revisio Guides Level: GCSE Higher Tier NUMERICAL METHODS FOR SOLVING EQUATIONS Versio:. Date:

More information

Sequences, Mathematical Induction, and Recursion. CSE 2353 Discrete Computational Structures Spring 2018

Sequences, Mathematical Induction, and Recursion. CSE 2353 Discrete Computational Structures Spring 2018 CSE 353 Discrete Computatioal Structures Sprig 08 Sequeces, Mathematical Iductio, ad Recursio (Chapter 5, Epp) Note: some course slides adopted from publisher-provided material Overview May mathematical

More information

Square-Congruence Modulo n

Square-Congruence Modulo n Square-Cogruece Modulo Abstract This paper is a ivestigatio of a equivalece relatio o the itegers that was itroduced as a exercise i our Discrete Math class. Part I - Itro Defiitio Two itegers are Square-Cogruet

More information

REGRESSION WITH QUADRATIC LOSS

REGRESSION WITH QUADRATIC LOSS REGRESSION WITH QUADRATIC LOSS MAXIM RAGINSKY Regressio with quadratic loss is aother basic problem studied i statistical learig theory. We have a radom couple Z = X, Y ), where, as before, X is a R d

More information

A Note on Matrix Rigidity

A Note on Matrix Rigidity A Note o Matrix Rigidity Joel Friedma Departmet of Computer Sciece Priceto Uiversity Priceto, NJ 08544 Jue 25, 1990 Revised October 25, 1991 Abstract I this paper we give a explicit costructio of matrices

More information

# fixed points of g. Tree to string. Repeatedly select the leaf with the smallest label, write down the label of its neighbour and remove the leaf.

# fixed points of g. Tree to string. Repeatedly select the leaf with the smallest label, write down the label of its neighbour and remove the leaf. Combiatorics Graph Theory Coutig labelled ad ulabelled graphs There are 2 ( 2) labelled graphs of order. The ulabelled graphs of order correspod to orbits of the actio of S o the set of labelled graphs.

More information

Chimica Inorganica 3

Chimica Inorganica 3 himica Iorgaica Irreducible Represetatios ad haracter Tables Rather tha usig geometrical operatios, it is ofte much more coveiet to employ a ew set of group elemets which are matrices ad to make the rule

More information

Exponents. Learning Objectives. Pre-Activity

Exponents. Learning Objectives. Pre-Activity Sectio. Pre-Activity Preparatio Epoets A Chai Letter Chai letters are geerated every day. If you sed a chai letter to three frieds ad they each sed it o to three frieds, who each sed it o to three frieds,

More information

Statistics 511 Additional Materials

Statistics 511 Additional Materials Cofidece Itervals o mu Statistics 511 Additioal Materials This topic officially moves us from probability to statistics. We begi to discuss makig ifereces about the populatio. Oe way to differetiate probability

More information

10.2 Infinite Series Contemporary Calculus 1

10.2 Infinite Series Contemporary Calculus 1 10. Ifiite Series Cotemporary Calculus 1 10. INFINITE SERIES Our goal i this sectio is to add together the umbers i a sequece. Sice it would take a very log time to add together the ifiite umber of umbers,

More information