RELIABILITY OF COMMUNICATION NETWORKS WITH DELAY CONSTRAINTS: COMPUTATIONAL COMPLEXITY AND COMPLETE TOPOLOGIES

Size: px
Start display at page:

Download "RELIABILITY OF COMMUNICATION NETWORKS WITH DELAY CONSTRAINTS: COMPUTATIONAL COMPLEXITY AND COMPLETE TOPOLOGIES"

Transcription

1 IJMMS 2004:29, PII. S X Hindawi Publishing Cop. RELIABILITY OF COMMUNICATION NETWORKS WITH DELAY CONSTRAINTS: COMPUTATIONAL COMPLEXITY AND COMPLETE TOPOLOGIES H. CANCELA and L. PETINGI Received 22 June 2003 Let G = V,E) be a gaph with a distinguished set of teminal vetices K V. We define the K-diamete of G as the maximum distance between any pai of vetices of K. If the edges fail andomly and independently with known pobabilities vetices ae always opeational), the diamete-constained K-teminal eliability of G, R K G,D), is defined as the pobability that suviving edges span a subgaph whose K-diamete does not exceed D. In geneal, the computational complexity of evaluating R K G,D) is NP-had, as this measue subsumes the classical K-teminal eliability R K G), known to belong to this complexity class. In this note, we show that even though fo two teminal vetices s and t and D = 2, R {s,t} G,D) can be detemined in polynomial time, the poblem of calculating R {s,t} G,D) fofixedvaluesofd, D 3, is NP-had. We also genealize this esult fo any fixed numbe of teminal vetices. Although it is vey unlikely that geneal efficient algoithms exist, we pesent a ecusive fomulation fo the calculation of R {s,t} G,D) that yields a polynomial time evaluation algoithm in the case of complete topologies whee the edge set can be patitioned into at most fou equi-eliable classes Mathematics Subject Classification: 05C99, 90B Intoduction. The components of a communication netwok e.g., nodes, communication links) may be subject to andom failues. Failues may aise fom natual catastophes e.g., huicanes), component weaout, o action of intentional enemies. A communication netwok can be modelled by a gaph G = V,E), whee V and E ae the sets of vetices and edges, espectively, of G. Moeove, the pobabilities of failue of the netwok components can be epesented by assigning pobabilities of failue to the vetices and/o edges of its undelying gaph. A widely used pobabilistic model is the one whee the edges fail andomly and independently with known pobabilities, and whee the vetices ae always opeational. Let G = V,E) be a gaph with a distinguished set K V. We define the K-diamete of G as the maximum distance between any pai of vetices of K. If the edges fail andomly and independently with known pobabilities, in [2, 8], the diamete-constained K-teminal eliability of G, R K G,D), is defined as the pobability that suviving edges span a subgaph whose K-diamete does not exceed D, o equivalently, as the pobability that fo each pai of vetices {u,v} K, thee exists an opeating path between u and v of at most D edges. One paticula application of this measue is when tansmissions between evey two nodes of a teminal set K of a netwok modelled by a gaph G = V,E)) ae equied

2 1552 H. CANCELA AND L. PETINGI to expeience a maximum delay DT, whee T is the delay expeienced at a single node o edge. The pobability that afte andom failues of the communication links the suviving netwok meets the delay DT is R K G,D). As eal netwoks ae subject to failues, the diamete-constained eliability can be useful in diffeent contexts. Fo example, this measue gives an indicato of the suitability of an existing netwok topology to suppot good-quality voice ove IP applications between a pai of teminals. In the case of a videoconfeence, we take K to be the set of the paticipating nodes, and the diamete-constained eliability gives the pobability that we can find shot enough paths between all of them. Anothe potential case of inteest is a numbe of potocols which, in ode to avoid congestion by looping data, assign a timeout date o a maximum numbe of hops to each data packet, to contol infomation; that is, the case fo some pee-to-pee P2P) netwoks, such as Feenet, Gnutella, o othes [3, 7], in which a fixed maximum numbe of hops ae allowed fo communication between nodes. In these cases, the diamete-constained uneliability i.e., one minus the eliability) gives the pobability that, due to failed links, thee ae some nodes of the netwok, which ae not mutually eachable using these potocols. In Section 2, we intoduce some basic notation and definitions that will be used in the following sections, and we pesent R K G,D) as a genealization of the classical eliability measue R K G), allowing us to conclude that, in geneal, the complexity of evaluating R K G,D) is NP-had. In Section 3, we show that even though R K G,D), fo K =2andD = 2, can be calculated efficiently, this poblem is NP-had fo fixed values of D, D 3. In Section 4, we genealize this esult fo any fixed numbe of teminal vetices. In Section 5, we pesent a ecusive fomulation fo the calculation of R {s,t} G,D) that yields a polynomial-time evaluation algoithm fo the case of complete topologies, whose edge set can be patitioned into at most fou equi-eliable classes. Finally, in Section 6, we pesent some open poblems and final emaks. The notation in this pape follows that of Haay [5], unless othewise noted. 2. Peliminaies. The following notation and definitions will be used in the sequel. i) Let G = V,E, E)) be a pobabilistic gaph with a distinguished set K V, K 2, and D Z +,with1 D n 1, whee n = V and whee : E [0,1] ae the opeational pobabilities of the set of edges E. Fo ease of notation, we epesent the opeational pobability of an edge e E as pe) = 1 qe) qe) is the pobability of failue). ii) Let the sample space Ω epesent the set of all possible subsets of E coesponding to sets of opeational links i.e., Ω = 2 E ). iii) Unde the assumption of independent edge failues, each H Ω has occuence pobability PH)= pe) qe). 2.1) e H e H iv) H Ω is a pathset o opeating state if H spans a subgaph whose K-diamete is at most D. v) Let D K E) ={H Ω : H is a pathset}.

3 RELIABILITY OF COMMUNICATION NETWORKS vi) An opeating state H of D K E) is called a minpath if H {e i} D K E), fo all e i H. vii) H Ω is a failue state if H spans a subgaph whose K-diamete is geate than D if H spans a subgaph whee two vetices of K belong to diffeent connected components, then its K-diamete is infinite). viii) Let D K E) ={H Ω : H is a failue state}. Fom the definition of R K G,D) and definition v), one gets R K G,D) = P D K E) ) = H D K E) e H pe) e H qe). 2.2) Similaly, 2.2) can be ewitten in tems of the failue states: R K G,D) = 1 Q K G,D) = 1 qe). 2.3) H D K E) e H pe) e H A widely used pobabilistic measue see [1, 4, 11, 12]) is the classical K-teminal eliability ofagaphg, R K G), defined on the same pobabilistic model i.e., edges fail andomly and independently with known pobabilities and the vetices ae always opeational). The measue R K G) is the pobability that fo evey pai of vetices u,v K, thee exists an opeating path between u and v. In this case, thee ae no length estictions of the paths joining the vetices of K, and by noting that the maximum length of a path joining a pai of vetices is of at most n 1 edges, whee n is the numbe of vetices of G, then R K G) = R K G,n 1). 2.4) This genealization of the classical eliability paamete allows us to eflect moe stingent pefomance objectives by esticting the maximum length of a path in a netwok. Let G = V,E) and let K be a set of teminal vetices of G. Fo the classical eliability measue, computations of the K-teminal eliability see [10]) and the specific cases when K =2see[13]) and K = V see [6, 9]) wee shown to be NP-had. Fom these esults and the fact that R K G) = R K G,n 1), R {s,t} G) = R {s,t} G,n 1), andr V G) = R V G,n 1), whee n is the numbe of vetices of the gaph G, and by esticting D = n 1, we have the following theoem. Theoem 2.1. Fo the diamete-constained eliability, the computational complexity of computing R K G,D), R {s,t} G,D), and R V G,D) is NP-had. Even though it is vey unlikely that R K G,D) can be evaluated efficiently, we cannot peclude that it is the case when fixed values of the diamete paamete D ae unde consideation. We addess this question in Sections 3 and Evaluating R K G,D) when K =2 and when D is a constant value. In this section, we establish the computational complexity of computing R K G,D) when K is composed of two teminal vetices s and t, and fo fixed values of diamete paamete D.

4 1554 H. CANCELA AND L. PETINGI In [8], an efficient fomulation was given fo the evaluation of diamete-constained two-teminal eliability of a netwok when teminals s and t should be connected by opeating paths of at most two edges i.e., D = 2). Theoem 3.1. Let G = V,E) be a simple gaph whee each edge u,v) E opeates independently with pobability p u,v), and let {s,t} ={u 1,u 2,...,u l } be the common neighbohood of teminal nodes s and t; then whee 1 R :s,t) E, R {s,t} G,2) = 1 ) 1 p s,t) R :s,t) E, R = l i=1 3.1) ) 1 ps,ui )p ui,t). 3.2) Even though R {s,t} G,2) can be computed in time linealy on the numbe of nodes of G, we next show that the complexity of evaluating R {s,t} G,D), fo fixed values of D, is NP-had. Fo ease of notation, instead of epesenting a state opeational o failue) as a set of edges of a gaph G, we epesent it as a subgaph of G spanned by this set. Theoem 3.2. Evaluating R {s,t} G,D), fo fixed D 3, is NP-had. Poof. We show that counting the numbe of vetex coves of a bipatite gaph is polynomial-time Tuing educible to counting the numbe of failue states of an undiected gaph with teminal vetices s and t and fixed diamete paamete D 3. An instance of the bipatite vetex cove consists of a bipatite gaph G = V,E); let X and Y be the classes in the bipatition of V. A vetex cove is a set of vetices C = C X C Y, C X X, and C Y Y such that evey edge of E has at least one endpoint in C. The poblem of counting the numbe of vetex coves of a bipatite gaph was shown to be # -complete by Povan and Ball [9]. Let D = 3 + d and let P = V P),EP)) be a path on d + 1 vetices, whee VP) = {s,s 1,...,s d } and EP) ={s,s 1 ),s 1,s 2 ),...,s d 1,s d )} it is undestood that if d = 0, P is composed of an isolated vetex s d = s). We constuct a pobabilistic gaph G = V,E, E )) fom G. The vetex set V consists of V, VP), and t. The edge set E consists of E, EP), the edge sets E X ={s d,x) : x X} and E Y ={t,y) : y Y } see Figue 3.1). The edges opeational pobabilities ae pe) = 1ife E, pe) = 1if e EP), and pe) = 1/2 othewise. The teminal set is K ={s,t}. It is clea that this tansfomation is polynomial on the size of the input of the bipatite gaph, since D is a constant value. Fom this constuction, a state H of G consists of the bipatite gaph G, thepathp, the vetex s d, possibly joined to some vetices of X, and the vetex t, possibly joined to some vetices of Y of the bipatite gaph G. We then constuct a one-to-one coespondence Z : W D {s,t}e ) fom the set of vetex coves W of the bipatite gaph to the failue states of G as follows: if w = S T) W, whee S X and T Y, is a vetex cove of the bipatite gaph, then

5 RELIABILITY OF COMMUNICATION NETWORKS s s 1 s d t Path on d + 1 vetices Bipatite gaph Figue 3.1. Gaph G constucted fom bipatite G and constant d. s s d t Bipatite Figue 3.2. Failue state constucted fom a vetex cove of bipatite gaph black vetices epesent a vetex cove). Zw) = V,E EP) {s d,x): x X S} {t,y) : y Y T }) is a failue state of G see Figue 3.2). To show that this is a one-to-one coespondence, let w = S T) be a vetex cove of the bipatite gaph G, and suppose x X S and y Y T. Clealy, x,y) is not an edge in Zw), othewise if x,y) is an edge, this edge is not coveed by w. Thus, thee ae no paths of length D joining s and t in Zw). Theefoe, Zw) is a failue state of G. Convesely, conside a failue state H which, as emaked peviously, must include all the edges of path P, all the edges of set E, and possibly some edges joining vetex s d to vetices in X and joining vetex t to some vetices in Y.AsH is a failue state, the vetices of X and Y adjacent to s d and t must fom an independence set if that was not the case, thee would exist a path of length D joining s and t). Theefoe, the emaining vetices of the bipatite gaph fom a vetex cove which is Z 1 H). Fom 2.3), we obtain R {s,t} G,D ) X + Y = 1 = 1 i=0 F i G,{s,t},D ) 1 2 X + Y i=0 F i G,{s,t},D ) 2 X + Y, ) i ) 1 X + Y i 1) E + EP) 2 3.3)

6 1556 H. CANCELA AND L. PETINGI whee F i G,{s,t},D) is the numbe of failue states of G with E + EP) +i edges. But F i G,{s,t},D) is equal to the numbe of vetex coves of the bipatite gaph G, thus the esult follows. In the next section, we genealize this esult fo any fixed numbe of teminal vetices. 4. Evaluating R K G,D) fo any fixed numbe of teminal vetices K and when D is a constant value, D 3. In this section, we show that complexity of calculating R K G,D) is NP-had when any fixed numbe of teminal vetices ae unde consideation and when D is a constant value, D 3. Theoem 4.1. Evaluating R K G,D) fo a fixed numbe of teminal vetices and fo fixed D, D 3, is NP-had. Poof. Let k = K with k>2, and D = 3 + d. We constuct a pobabilistic G = V,E, E )) obtained fom the pobabilistic gaph G = V,E, E )) mentioned in the poof of Theoem 3.2 as follows: a) fo each j, 1 j k 2, let P j = V j ={u j 1,uj 2,...,uj D}, E j ={u j 1,uj 2 ),...,uj D 1, u j D )}) be a path on D vetices; b) let the set of edges E s ={s,u j 1 ) :1 j k 2} i.e., we make the teminal vetex s adjacent to each vetex u j 1 of P j,1 j k 2); c) let the set of edges E t ={t,u j D ) :1 j k 2} i.e., we make the teminal vetex t adjacent to each vetex u j D of P j,1 j k 2); d) let G = V k 2 j=1 V j ),E k 2 E s Et j=1 E j ), E )) see Figue 4.1). Fo the opeational pobabilities of G,ife is an edge in which one of the endpoints is s d o t and the othe endpoint is a vetex of the bipatite gaph G, thenpe) = 1/2, othewise let pe) = 1. Let also the teminal set K ={s,t} k 2 j=1{u j 1 }). This constuction is also polynomial on the size of the input of the bipatite G, since both K and D ae constant values. If s and t ought to be connected by a path of at most D edges, then this path must compise the path P of G see the poof of Theoem 3.2). In a failue state H of G, evey pai of teminal vetices is connected by paths of at most D edges, with the exception of s and t; thus H = V H),EH) ) is a failue state of G H = VH) k 2 k 2 V j,eh) Es Et E j is a failue state of G. j=1 j=1 4.1) Also, it follows fom 4.1) that the occuence pobability see Section 2, definition iii)) of the edge set EH ) of a failue state H of G is equal to the occuence pobability oftheedgeseteh) of its coesponding failue state H of G as P E H )) = P EH) ) 1 Es 1 E t 1 k 2 j=1 E j = P EH) ). 4.2)

7 RELIABILITY OF COMMUNICATION NETWORKS u 1 1 s s 1 s d t u k 2 1 Bipatite gaph Path of length D Figue 4.1. Gaph G constucted fom bipatite gaph G. Theefoe, it follows fom 2.3), 3.3), 4.1), and 4.2) that R K G,D ) = R {s,t} G,D ) = 1 X + Y i=0 F i G,{s,t},D ) 2 X + Y. 4.3) But, as was shown in the poof of Theoem 3.2, F i G,{s,t},D) is equal to the numbe of vetex coves of the bipatite gaph G, thus the esult follows. 5. Two-teminal eliability of complete topologies with at most fou edge eliability values. In this section, we define a class of complete gaphs, whose edges can be patitioned into fou elementay eliability values. We will denote these gaphs by G A n,q st,q s,q t,q), whee n is the numbe of intemediate nodes between the teminals s and t, q st = 1 st is the uneliability of the edge connecting s and t, q s = 1 s is the uneliability of the edges connecting s to the othe n intemediate nodes, q t = 1 t is the uneliability of the edges connecting t to the n intemediate nodes, and q = 1 is the uneliability of the edges whose endpoints ae intemediate nodes see Figue 5.1a)). The eliability fo this netwok, R {s,t} G A n,q st,q s,q t,q),d), is a multinomial in q st, q s, q t, q. We will expess the eliability of netwok G A by taking into account the independence between the edge s,t) and the othe paths, and by conditioning on the numbe of opeational edges between s and the intemediate nodes exploiting the symmety between those nodes). If D = 1, the only feasible path is the edge s,t); then tivially R {s,t} G A n,q st,q s,q t,q),1) = 1 q st. We can now look at the case whee D>1. As a fist step, we use the fact that s,t) is a feasible path and that it is independent fom all othe simple paths fom s to t. Thenwecanwite R {s,t} GA n,qst,q s,q t,q ),D ) = 1 q st ) +qst R {s,t} G A n,qs,q t,q ),D ), 5.1)

8 1558 H. CANCELA AND L. PETINGI st s t s t s t s t s t s t K n K n a) G A b) G A Figue 5.1. G A n,q st,q s,q t,q) and G A n,q s,q t,q) netwoks. whee G A n,q s,q t,q) is the pobabilistic netwok obtained fom G A n,q st,q s,q t,q),by deleting the edge s, t) see Figue 5.1b)). As this netwok is completely symmetic with espect to the edges between s and the intemediate nodes all nodes except s and t), we will define a patition of the pobability state space fo the netwok based on the numbe of those edges that fail o ae opeational. We define A k to be the event whee k edges fom s to intemediate nodes fail and the emaining n k ae opeating; its pobability is P { A k } = n k) qs ) k 1 qs ) n k. 5.2) The set {A k :0 k n} is a patition of the pobability space, as the events ae paiwise-disjoint and thei union has pobability one. Applying the total pobability theoem, we then have R {s,t} G A n,qs,q t,q ),D ) = P { opeational path of length D fom s to t in G A } n = P { 5.3) opeational path of length D fom s to t in G A } { } Ai P Ai. i=0 We must now find an expession fo the geneal tem with k n. The leftmost netwok shown in Figue 5.2 coesponds to this event, whee k edges between s and intemediate nodes fail i.e., can be emoved fom the netwok) and the emaining n k ae opeational, which ae pesented with a bolde tace. Finding an opeational path of length less than o equal to D in this netwok coesponds to finding a path of length less than o equal to D 1 in the netwok shown at the cente of Figue 5.2, which is obtained by identifying s and the intemediate nodes to which it is unconditionally

9 RELIABILITY OF COMMUNICATION NETWORKS K n k t t 1 1 t ) n k s t t t t s t t t t s 1 1 ) n k t t 1 1 ) n k t K k K k K k Figue 5.2. G A n,q s,q t,q) when n k edges between s and intemediate nodes wok and the est fail. connected into one node. In addition, as edges fail independently, the opeational pobability of a bank of paallel edges is the complement to one) of the poducts of thei failue pobabilities. Thus, the set of paallel edges between s and t shown at the cente of Figue 5.2 can be eplaced by a single edge with eliability 1 qt n k. Similaly, the set of paallel edges between s and an intemediate node of K k can be eplaced by a single edge with eliability 1 q n k. The netwok esulting fom this last opeation is shown at the ight of Figue 5.2, and coesponds to a topology, whee the opeational paths must have length at most D 1. Fom 5.1), 5.2), and 5.3) and the latest fact, we can expess the eliability of the oiginal netwok G A by the following fomula: R {s,t} GA n,qst,q s,q t,q ),D ) = ) n ) n 1 qs ) n kq k 1 q st +qst s R {s,t} GA k,q n k t,q n k,q t,q ),D 1 ) 5.4). k k=0 The ecusive application of this fomula gives a multinomial on q st, q s, q t, q. It can be obseved that the diect application of the ecusive fomula leads to evaluating the multinomial many times fo values of k n and d<d, but with diffeent values to be substituted fo the paametes q st, q s, q t, and q. This obsevation leads us to the following altenative fomulation. We define a subclass of the class of netwoks G A. These netwoks will be denoted by G B m,h,q t,q),withg B m,h,q t,q) = G A m,q h t,q h,q t,q). This means that these netwoks have the same complete gaph topology, but that the eliabilities of the fou-edge classes ae defined by only two intege and two eal paametes. It is tivial to obseve that R {s,t} GB m,h,qt,q ),D ) = R {s,t} GA m,q h t,q h,q t,q ),D ). 5.5) Substituting in 5.4), we have that R {s,t} GA n,qst,q s,q t,q ),D ) = 1 q st ) +qst n k=0 ) n 1 qs ) n kq k s R {s,t} GB k,n k,qt,q ),D 1 ) 5.6) k

10 1560 H. CANCELA AND L. PETINGI and that if D>1, R {s,t} GB m,h,qt,q ),D ) = 1 qt h ) m +q h t k=0 ) m 1 q h ) m k q hk R {s,t} GB k,m k,qt,q ),D 1 ). k 5.7) If D = 1, then R st GB m,h,qt,q ),D ) = 1 q h t. 5.8) Moeove, it is also noted that the last tem i.e., k=m)of5.7) is null since G B m,0,q t,q) epesents a netwok with m + 2 nodes in which the edges fom s to the intemediate nodes fail, and whee s is adjacent to the teminal node t by an edge whose eliability is 0 i.e., 1 q 0 t ). The next theoem states the space and time complexity of evaluating R {s,t} G A n,q st, q s,q t,q),d). Theoem 5.1. Evaluating R {s,t} G A n,q st,q s,q t,q),d) takes On 3 ) and ODn 3 ) space and time complexity, espectively. Poof. We fist stat with the standad assumption that the edges eliabilities ae ational numbes p/q, whee both p and q ae of length On), and that aithmetic opeations on such ational numbes take constant time i.e., O1)) see[4, page 4]). We next note, fom the ight-hand side of 5.7), that evaluation of R {s,t} G B m,h,q t, q),d) fo specific values of m and h depends on powes of the edges uneliabilities q t and q. Since the possible values fo m and h ae in [0,n], we fist poceed to evaluate and stoe the values qt i,fo0 i n, and qi,fo0 i n. This pocedue equies On 2 ) space complexity n values to be stoed, each having length On)) andon 2 ) time complexity. We then calculate and stoe all possible values q ij,fo0 i,j n.this can be accomplished by utilizing an n n two-dimensional aay and values aleady stoed fo powes of q. This pocedue takes On 3 ) space and time complexity. Values fo 1 q i ) j ae stoed in a simila fashion. Finally, we poceed to evaluate R {s,t} G B m,h,q t,q),d) fo specific values of m, h, and d. In ode to execute this last step, we note, fom 5.7), that an evaluation of R {s,t} G B m,h,q t,q),d) equies at most n values i.e., n tems in the summation) of R {s,t} G B m,h,q t,q),d 1). An efficient evaluation is, fo example, to fist evaluate and stoe R {s,t} G B m,h,q t,q),d),fod = 1, and fo all values of m with 0 m n) and h with 0 h n) i.e.,on 3 ) space and On 2 ) time complexity). Next we detemine and stoe the values of R {s,t} G B m,h,q t,q),d) fo d = 2 and fo each pai m,h), by utilizing aleady stoed values; by the pevious assumptions, this step will take On) execution time. We sequentially epeat this last pocedue fo all possible values of d, 1 d<d, yielding an ODn 3 ) space and time complexity. We can also impove the stoage to On 3 ) by noting that to evaluate R {s,t} G B m,h,q t,q),d), it is only necessay to stoe values fo d 1.

11 RELIABILITY OF COMMUNICATION NETWORKS Table 5.1. Execution times fo evaluating complete gaph eliability. n D Execution time CPUs) Iteative method Recusive method 10 2 < < < < < < < > > > > > We implemented this iteative pocedue as well as the ecusive method which is obtained by diectly applying 5.4). Table 5.1 shows the execution times obtained on an Intel Celeon PC) fo both the iteative and the ecusive methods, fo diffeent values of n and D. Some enties ae maked > 36000, coesponding to uns which exceeded 10 CPU hous seconds) and wee aboted. It is easy to see that the iteative method has a much bette behavio than the ecusive fomulation, leading to smalle execution times especially fo high values of D). 6. Conclusions and futue wok. In this pape, we investigated the computational complexity of the diamete-constained K-teminal eliability. In paticula, this measue subsumes the classical K-teminal eliability measue when thee is no estiction on the length of the paths connecting the teminal vetices. This equivalence between these two eliability measues allows us to conclude that, in geneal, the computational complexity of the diamete-constained K-teminal eliability is NP-had. Nevetheless, the poblem of detemining the computational complexity of R K G,D), fo specific cases of K and D, was open. We showed that even though fo two teminal vetices s and t and D = 2, R {s,t} G,D) can be detemined in polynomial time, the poblem of calculating R {s,t} G,D) fo fixed values of D, D 3, is NP-had. Moeove, we genealized this esult fo any abitay numbe of teminal vetices. As a consequence, this esult justifies the implementation of appoximation methods fo the evaluation, and the detemination of bounds fo R K G,D). Anothe elevant open poblem is to detemine subclasses of gaphs fo which polynomial-time evaluation algoithms exist. In this pape, we showed that fo the case of complete topologies whee the edge set can be patitioned into at most fou equi-eliable classes, R {s,t} G,D) can be computed efficiently.

12 1562 H. CANCELA AND L. PETINGI Refeences [1] F. T. Boesch, X. Li, and C. Suffel, On the existence of unifomly optimally eliable netwoks, Netwoks ), no. 2, [2] H. Cancela and L. Petingi, Diamete constained netwok eliability: exact evaluation by factoization and bounds, Poceedings of the Intenational Confeence on Industial Logistics Japan), 2001, pp [3] I. Clake, O. Sandbeg, B. Wiley, and T. W. Hong, Feenet: a distibuted anonymous infomation stoage and etieval system, Intenational Wokshop on Design Issues in Anonymity and Unobsevability, The Intenational Compute Science Institute, Califonia, 2000, pp [4] C. J. Colboun, The Combinatoics of Netwok Reliability, Intenational Seies of Monogaphs on Compute Science, The Claendon Pess, Oxfod Univesity Pess, New Yok, [5] F. Haay, Gaph Theoy, Addison-Wesley, Massachusetts, [6] M. Jeum, On the complexity of evaluating multivaiate polynomials, Ph.D. thesis, Depatment of Compute Science, Univesity of Edinbugh, Edinbugh, [7] G. Panduangan, P. Raghavan, and E. Upfal, Building low-diamete P2P netwoks, 42nd IEEE Symposium on Foundations of Compute Science Las Vegas, Nev, 2001), IEEE Compute Society, Califonia, 2001, pp [8] L. Petingi and J. Rodiguez, Reliability of netwoks with delay constaints, Cong. Nume ), [9] J. S. Povan and M. O. Ball, The complexity of counting cuts and of computing the pobability that a gaph is connected, SIAMJ. Comput ), no. 4, [10] A. Rosenthal, A compute scientist looks at eliability computations, Reliability and Fault Tee Analysis Conf., Univ. Califonia, Bekeley, Calif, 1974), Society fo Industeial and Applied Mathematics, Pennsylvania, 1975, pp [11] A. Satyanaayana and J. N. Hagstom, A new algoithm fo the eliability analysis of multiteminal netwoks, IEEE Tans. Reliab ), [12] D. R. Shie, Netwok Reliability and Algebaic Stuctues, Oxfod Science Publications, The Claendon Pess, Oxfod Univesity Pess, New Yok, [13] L. G. Valiant, The complexity of enumeation and eliability poblems, SIAMJ. Comput ), no. 3, H. Cancela: Instituto de Computación, Facultad de Ingenieía, Univesidad de la República, J. Heea y Reissig 565, Montevideo, Uuguay addess: cancela@fing.edu.uy L. Petingi: Compute Science Depatment, College of Staten Island, City Univesity of New Yok, 2800 Victoy Boulevad, Staten Island, NY 10314, USA addess: petingi@postbox.csi.cuny.edu

13 Advances in Opeations Reseach Advances in Decision Sciences Jounal of Applied Mathematics Algeba Jounal of Pobability and Statistics The Scientific Wold Jounal Intenational Jounal of Diffeential Equations Submit you manuscipts at Intenational Jounal of Advances in Combinatoics Mathematical Physics Jounal of Complex Analysis Intenational Jounal of Mathematics and Mathematical Sciences Mathematical Poblems in Engineeing Jounal of Mathematics Discete Mathematics Jounal of Discete Dynamics in Natue and Society Jounal of Function Spaces Abstact and Applied Analysis Intenational Jounal of Jounal of Stochastic Analysis Optimization

arxiv: v1 [math.co] 4 May 2017

arxiv: v1 [math.co] 4 May 2017 On The Numbe Of Unlabeled Bipatite Gaphs Abdullah Atmaca and A Yavuz Ouç axiv:7050800v [mathco] 4 May 207 Abstact This pape solves a poblem that was stated by M A Haison in 973 [] This poblem, that has

More information

SUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER

SUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER Discussiones Mathematicae Gaph Theoy 39 (019) 567 573 doi:10.7151/dmgt.096 SUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER Lutz Volkmann

More information

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi Opuscula Math. 37, no. 3 (017), 447 456 http://dx.doi.og/10.7494/opmath.017.37.3.447 Opuscula Mathematica ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS D.A. Mojdeh and B. Samadi Communicated

More information

On the ratio of maximum and minimum degree in maximal intersecting families

On the ratio of maximum and minimum degree in maximal intersecting families On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Septembe 5, 011 Abstact To study how balanced o unbalanced a maximal intesecting

More information

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0},

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0}, ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION E. J. IONASCU and A. A. STANCU Abstact. We ae inteested in constucting concete independent events in puely atomic pobability

More information

On the ratio of maximum and minimum degree in maximal intersecting families

On the ratio of maximum and minimum degree in maximal intersecting families On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Mach 6, 013 Abstact To study how balanced o unbalanced a maximal intesecting

More information

A Bijective Approach to the Permutational Power of a Priority Queue

A Bijective Approach to the Permutational Power of a Priority Queue A Bijective Appoach to the Pemutational Powe of a Pioity Queue Ia M. Gessel Kuang-Yeh Wang Depatment of Mathematics Bandeis Univesity Waltham, MA 02254-9110 Abstact A pioity queue tansfoms an input pemutation

More information

MULTILAYER PERCEPTRONS

MULTILAYER PERCEPTRONS Last updated: Nov 26, 2012 MULTILAYER PERCEPTRONS Outline 2 Combining Linea Classifies Leaning Paametes Outline 3 Combining Linea Classifies Leaning Paametes Implementing Logical Relations 4 AND and OR

More information

6 PROBABILITY GENERATING FUNCTIONS

6 PROBABILITY GENERATING FUNCTIONS 6 PROBABILITY GENERATING FUNCTIONS Cetain deivations pesented in this couse have been somewhat heavy on algeba. Fo example, detemining the expectation of the Binomial distibution (page 5.1 tuned out to

More information

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE THE p-adic VALUATION OF STIRLING NUMBERS ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE Abstact. Let p > 2 be a pime. The p-adic valuation of Stiling numbes of the

More information

Research Article On Alzer and Qiu s Conjecture for Complete Elliptic Integral and Inverse Hyperbolic Tangent Function

Research Article On Alzer and Qiu s Conjecture for Complete Elliptic Integral and Inverse Hyperbolic Tangent Function Abstact and Applied Analysis Volume 011, Aticle ID 697547, 7 pages doi:10.1155/011/697547 Reseach Aticle On Alze and Qiu s Conjectue fo Complete Elliptic Integal and Invese Hypebolic Tangent Function Yu-Ming

More information

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution Statistics Reseach Lettes Vol. Iss., Novembe Cental Coveage Bayes Pediction Intevals fo the Genealized Paeto Distibution Gyan Pakash Depatment of Community Medicine S. N. Medical College, Aga, U. P., India

More information

gr0 GRAPHS Hanan Samet

gr0 GRAPHS Hanan Samet g0 GRPHS Hanan Samet ompute Science epatment and ente fo utomation Reseach and Institute fo dvanced ompute Studies Univesity of Mayland ollege Pak, Mayland 074 e-mail: hjs@umiacs.umd.edu opyight 1997 Hanan

More information

On decompositions of complete multipartite graphs into the union of two even cycles

On decompositions of complete multipartite graphs into the union of two even cycles On decompositions of complete multipatite gaphs into the union of two even cycles A. Su, J. Buchanan, R. C. Bunge, S. I. El-Zanati, E. Pelttai, G. Rasmuson, E. Spaks, S. Tagais Depatment of Mathematics

More information

The Congestion of n-cube Layout on a Rectangular Grid S.L. Bezrukov J.D. Chavez y L.H. Harper z M. Rottger U.-P. Schroeder Abstract We consider the pr

The Congestion of n-cube Layout on a Rectangular Grid S.L. Bezrukov J.D. Chavez y L.H. Harper z M. Rottger U.-P. Schroeder Abstract We consider the pr The Congestion of n-cube Layout on a Rectangula Gid S.L. Bezukov J.D. Chavez y L.H. Hape z M. Rottge U.-P. Schoede Abstact We conside the poblem of embedding the n-dimensional cube into a ectangula gid

More information

Using Laplace Transform to Evaluate Improper Integrals Chii-Huei Yu

Using Laplace Transform to Evaluate Improper Integrals Chii-Huei Yu Available at https://edupediapublicationsog/jounals Volume 3 Issue 4 Febuay 216 Using Laplace Tansfom to Evaluate Impope Integals Chii-Huei Yu Depatment of Infomation Technology, Nan Jeon Univesity of

More information

The Chromatic Villainy of Complete Multipartite Graphs

The Chromatic Villainy of Complete Multipartite Graphs Rocheste Institute of Technology RIT Schola Wos Theses Thesis/Dissetation Collections 8--08 The Chomatic Villainy of Complete Multipatite Gaphs Anna Raleigh an9@it.edu Follow this and additional wos at:

More information

Pearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms

Pearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms Peason s Chi-Squae Test Modifications fo Compaison of Unweighted and Weighted Histogams and Two Weighted Histogams Univesity of Akueyi, Bogi, v/noduslód, IS-6 Akueyi, Iceland E-mail: nikolai@unak.is Two

More information

New problems in universal algebraic geometry illustrated by boolean equations

New problems in universal algebraic geometry illustrated by boolean equations New poblems in univesal algebaic geomety illustated by boolean equations axiv:1611.00152v2 [math.ra] 25 Nov 2016 Atem N. Shevlyakov Novembe 28, 2016 Abstact We discuss new poblems in univesal algebaic

More information

Functions Defined on Fuzzy Real Numbers According to Zadeh s Extension

Functions Defined on Fuzzy Real Numbers According to Zadeh s Extension Intenational Mathematical Foum, 3, 2008, no. 16, 763-776 Functions Defined on Fuzzy Real Numbes Accoding to Zadeh s Extension Oma A. AbuAaqob, Nabil T. Shawagfeh and Oma A. AbuGhneim 1 Mathematics Depatment,

More information

Fractional Zero Forcing via Three-color Forcing Games

Fractional Zero Forcing via Three-color Forcing Games Factional Zeo Focing via Thee-colo Focing Games Leslie Hogben Kevin F. Palmowski David E. Robeson Michael Young May 13, 2015 Abstact An -fold analogue of the positive semidefinite zeo focing pocess that

More information

Fall 2014 Randomized Algorithms Oct 8, Lecture 3

Fall 2014 Randomized Algorithms Oct 8, Lecture 3 Fall 204 Randomized Algoithms Oct 8, 204 Lectue 3 Pof. Fiedich Eisenband Scibes: Floian Tamè In this lectue we will be concened with linea pogamming, in paticula Clakson s Las Vegas algoithm []. The main

More information

Lecture 18: Graph Isomorphisms

Lecture 18: Graph Isomorphisms INFR11102: Computational Complexity 22/11/2018 Lectue: Heng Guo Lectue 18: Gaph Isomophisms 1 An Athu-Melin potocol fo GNI Last time we gave a simple inteactive potocol fo GNI with pivate coins. We will

More information

RELIABILITY is an important concept in the design

RELIABILITY is an important concept in the design Poceedings of the Wold Congess on Engineeing 0 Vol I WCE 0, July -, 0, London, U.K. Reliability Measues in Ciculant Netwok *Inda Rajasingh, Bhaati Rajan, and R. Sundaa Rajan Abstact Reliability and efficiency

More information

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs Math 30: The Edős-Stone-Simonovitz Theoem and Extemal Numbes fo Bipatite Gaphs May Radcliffe The Edős-Stone-Simonovitz Theoem Recall, in class we poved Tuán s Gaph Theoem, namely Theoem Tuán s Theoem Let

More information

Multiple Criteria Secretary Problem: A New Approach

Multiple Criteria Secretary Problem: A New Approach J. Stat. Appl. Po. 3, o., 9-38 (04 9 Jounal of Statistics Applications & Pobability An Intenational Jounal http://dx.doi.og/0.785/jsap/0303 Multiple Citeia Secetay Poblem: A ew Appoach Alaka Padhye, and

More information

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012 Stanfod Univesity CS59Q: Quantum Computing Handout 8 Luca Tevisan Octobe 8, 0 Lectue 8 In which we use the quantum Fouie tansfom to solve the peiod-finding poblem. The Peiod Finding Poblem Let f : {0,...,

More information

3.1 Random variables

3.1 Random variables 3 Chapte III Random Vaiables 3 Random vaiables A sample space S may be difficult to descibe if the elements of S ae not numbes discuss how we can use a ule by which an element s of S may be associated

More information

Duality between Statical and Kinematical Engineering Systems

Duality between Statical and Kinematical Engineering Systems Pape 00, Civil-Comp Ltd., Stiling, Scotland Poceedings of the Sixth Intenational Confeence on Computational Stuctues Technology, B.H.V. Topping and Z. Bittna (Editos), Civil-Comp Pess, Stiling, Scotland.

More information

Relating Branching Program Size and. Formula Size over the Full Binary Basis. FB Informatik, LS II, Univ. Dortmund, Dortmund, Germany

Relating Branching Program Size and. Formula Size over the Full Binary Basis. FB Informatik, LS II, Univ. Dortmund, Dortmund, Germany Relating Banching Pogam Size and omula Size ove the ull Binay Basis Matin Saueho y Ingo Wegene y Ralph Wechne z y B Infomatik, LS II, Univ. Dotmund, 44 Dotmund, Gemany z ankfut, Gemany sauehof/wegene@ls.cs.uni-dotmund.de

More information

Analytical Solutions for Confined Aquifers with non constant Pumping using Computer Algebra

Analytical Solutions for Confined Aquifers with non constant Pumping using Computer Algebra Poceedings of the 006 IASME/SEAS Int. Conf. on ate Resouces, Hydaulics & Hydology, Chalkida, Geece, May -3, 006 (pp7-) Analytical Solutions fo Confined Aquifes with non constant Pumping using Compute Algeba

More information

An intersection theorem for four sets

An intersection theorem for four sets An intesection theoem fo fou sets Dhuv Mubayi Novembe 22, 2006 Abstact Fix integes n, 4 and let F denote a family of -sets of an n-element set Suppose that fo evey fou distinct A, B, C, D F with A B C

More information

Syntactical content of nite approximations of partial algebras 1 Wiktor Bartol Inst. Matematyki, Uniw. Warszawski, Warszawa (Poland)

Syntactical content of nite approximations of partial algebras 1 Wiktor Bartol Inst. Matematyki, Uniw. Warszawski, Warszawa (Poland) Syntactical content of nite appoximations of patial algebas 1 Wikto Batol Inst. Matematyki, Uniw. Waszawski, 02-097 Waszawa (Poland) batol@mimuw.edu.pl Xavie Caicedo Dep. Matematicas, Univ. de los Andes,

More information

Quasi-Randomness and the Distribution of Copies of a Fixed Graph

Quasi-Randomness and the Distribution of Copies of a Fixed Graph Quasi-Randomness and the Distibution of Copies of a Fixed Gaph Asaf Shapia Abstact We show that if a gaph G has the popety that all subsets of vetices of size n/4 contain the coect numbe of tiangles one

More information

On the Locality of Codeword Symbols

On the Locality of Codeword Symbols On the Locality of Codewod Symbols Paikshit Gopalan Micosoft Reseach paik@micosoft.com Cheng Huang Micosoft Reseach chengh@micosoft.com Segey Yekhanin Micosoft Reseach yekhanin@micosoft.com Huseyin Simitci

More information

C/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22

C/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22 C/CS/Phys C9 Sho s ode (peiod) finding algoithm and factoing /2/4 Fall 204 Lectue 22 With a fast algoithm fo the uantum Fouie Tansfom in hand, it is clea that many useful applications should be possible.

More information

ST 501 Course: Fundamentals of Statistical Inference I. Sujit K. Ghosh.

ST 501 Course: Fundamentals of Statistical Inference I. Sujit K. Ghosh. ST 501 Couse: Fundamentals of Statistical Infeence I Sujit K. Ghosh sujit.ghosh@ncsu.edu Pesented at: 2229 SAS Hall, Depatment of Statistics, NC State Univesity http://www.stat.ncsu.edu/people/ghosh/couses/st501/

More information

On the Poisson Approximation to the Negative Hypergeometric Distribution

On the Poisson Approximation to the Negative Hypergeometric Distribution BULLETIN of the Malaysian Mathematical Sciences Society http://mathusmmy/bulletin Bull Malays Math Sci Soc (2) 34(2) (2011), 331 336 On the Poisson Appoximation to the Negative Hypegeometic Distibution

More information

HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS?

HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS? 6th INTERNATIONAL MULTIDISCIPLINARY CONFERENCE HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS? Cecília Sitkuné Göömbei College of Nyíegyháza Hungay Abstact: The

More information

A Converse to Low-Rank Matrix Completion

A Converse to Low-Rank Matrix Completion A Convese to Low-Rank Matix Completion Daniel L. Pimentel-Alacón, Robet D. Nowak Univesity of Wisconsin-Madison Abstact In many pactical applications, one is given a subset Ω of the enties in a d N data

More information

Compactly Supported Radial Basis Functions

Compactly Supported Radial Basis Functions Chapte 4 Compactly Suppoted Radial Basis Functions As we saw ealie, compactly suppoted functions Φ that ae tuly stictly conditionally positive definite of ode m > do not exist The compact suppot automatically

More information

Probablistically Checkable Proofs

Probablistically Checkable Proofs Lectue 12 Pobablistically Checkable Poofs May 13, 2004 Lectue: Paul Beame Notes: Chis Re 12.1 Pobablisitically Checkable Poofs Oveview We know that IP = PSPACE. This means thee is an inteactive potocol

More information

Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matrix

Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matrix Jounal of Sciences, Islamic Republic of Ian (): - () Univesity of Tehan, ISSN - http://sciencesutaci Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matix H Ahsani

More information

Information Retrieval Advanced IR models. Luca Bondi

Information Retrieval Advanced IR models. Luca Bondi Advanced IR models Luca Bondi Advanced IR models 2 (LSI) Pobabilistic Latent Semantic Analysis (plsa) Vecto Space Model 3 Stating point: Vecto Space Model Documents and queies epesented as vectos in the

More information

arxiv: v1 [math.co] 6 Mar 2008

arxiv: v1 [math.co] 6 Mar 2008 An uppe bound fo the numbe of pefect matchings in gaphs Shmuel Fiedland axiv:0803.0864v [math.co] 6 Ma 2008 Depatment of Mathematics, Statistics, and Compute Science, Univesity of Illinois at Chicago Chicago,

More information

A generalization of the Bernstein polynomials

A generalization of the Bernstein polynomials A genealization of the Benstein polynomials Halil Ouç and Geoge M Phillips Mathematical Institute, Univesity of St Andews, Noth Haugh, St Andews, Fife KY16 9SS, Scotland Dedicated to Philip J Davis This

More information

Euclidean Figures and Solids without Incircles or Inspheres

Euclidean Figures and Solids without Incircles or Inspheres Foum Geometicoum Volume 16 (2016) 291 298. FOUM GEOM ISSN 1534-1178 Euclidean Figues and Solids without Incicles o Insphees Dimitis M. Chistodoulou bstact. ll classical convex plana Euclidean figues that

More information

Supplementary information Efficient Enumeration of Monocyclic Chemical Graphs with Given Path Frequencies

Supplementary information Efficient Enumeration of Monocyclic Chemical Graphs with Given Path Frequencies Supplementay infomation Efficient Enumeation of Monocyclic Chemical Gaphs with Given Path Fequencies Masaki Suzuki, Hioshi Nagamochi Gaduate School of Infomatics, Kyoto Univesity {m suzuki,nag}@amp.i.kyoto-u.ac.jp

More information

QIP Course 10: Quantum Factorization Algorithm (Part 3)

QIP Course 10: Quantum Factorization Algorithm (Part 3) QIP Couse 10: Quantum Factoization Algoithm (Pat 3 Ryutaoh Matsumoto Nagoya Univesity, Japan Send you comments to yutaoh.matsumoto@nagoya-u.jp Septembe 2018 @ Tokyo Tech. Matsumoto (Nagoya U. QIP Couse

More information

Web-based Supplementary Materials for. Controlling False Discoveries in Multidimensional Directional Decisions, with

Web-based Supplementary Materials for. Controlling False Discoveries in Multidimensional Directional Decisions, with Web-based Supplementay Mateials fo Contolling False Discoveies in Multidimensional Diectional Decisions, with Applications to Gene Expession Data on Odeed Categoies Wenge Guo Biostatistics Banch, National

More information

A Multivariate Normal Law for Turing s Formulae

A Multivariate Normal Law for Turing s Formulae A Multivaiate Nomal Law fo Tuing s Fomulae Zhiyi Zhang Depatment of Mathematics and Statistics Univesity of Noth Caolina at Chalotte Chalotte, NC 28223 Abstact This pape establishes a sufficient condition

More information

1 Explicit Explore or Exploit (E 3 ) Algorithm

1 Explicit Explore or Exploit (E 3 ) Algorithm 2.997 Decision-Making in Lage-Scale Systems Mach 3 MIT, Sping 2004 Handout #2 Lectue Note 9 Explicit Exploe o Exploit (E 3 ) Algoithm Last lectue, we studied the Q-leaning algoithm: [ ] Q t+ (x t, a t

More information

NOTE. Some New Bounds for Cover-Free Families

NOTE. Some New Bounds for Cover-Free Families Jounal of Combinatoial Theoy, Seies A 90, 224234 (2000) doi:10.1006jcta.1999.3036, available online at http:.idealibay.com on NOTE Some Ne Bounds fo Cove-Fee Families D. R. Stinson 1 and R. Wei Depatment

More information

Graphs of Sine and Cosine Functions

Graphs of Sine and Cosine Functions Gaphs of Sine and Cosine Functions In pevious sections, we defined the tigonometic o cicula functions in tems of the movement of a point aound the cicumfeence of a unit cicle, o the angle fomed by the

More information

Absorption Rate into a Small Sphere for a Diffusing Particle Confined in a Large Sphere

Absorption Rate into a Small Sphere for a Diffusing Particle Confined in a Large Sphere Applied Mathematics, 06, 7, 709-70 Published Online Apil 06 in SciRes. http://www.scip.og/jounal/am http://dx.doi.og/0.46/am.06.77065 Absoption Rate into a Small Sphee fo a Diffusing Paticle Confined in

More information

The Substring Search Problem

The Substring Search Problem The Substing Seach Poblem One algoithm which is used in a vaiety of applications is the family of substing seach algoithms. These algoithms allow a use to detemine if, given two chaacte stings, one is

More information

Failure Probability of 2-within-Consecutive-(2, 2)-out-of-(n, m): F System for Special Values of m

Failure Probability of 2-within-Consecutive-(2, 2)-out-of-(n, m): F System for Special Values of m Jounal of Mathematics and Statistics 5 (): 0-4, 009 ISSN 549-3644 009 Science Publications Failue Pobability of -within-consecutive-(, )-out-of-(n, m): F System fo Special Values of m E.M.E.. Sayed Depatment

More information

The Archimedean Circles of Schoch and Woo

The Archimedean Circles of Schoch and Woo Foum Geometicoum Volume 4 (2004) 27 34. FRUM GEM ISSN 1534-1178 The Achimedean Cicles of Schoch and Woo Hioshi kumua and Masayuki Watanabe Abstact. We genealize the Achimedean cicles in an abelos (shoemake

More information

CERFACS 42 av. Gaspard Coriolis, Toulouse, Cedex 1, France. Available at Date: April 2, 2008.

CERFACS 42 av. Gaspard Coriolis, Toulouse, Cedex 1, France. Available at   Date: April 2, 2008. ON THE BLOCK TRIANGULAR FORM OF SYMMETRIC MATRICES IAIN S. DUFF and BORA UÇAR Technical Repot: No: TR/PA/08/26 CERFACS 42 av. Gaspad Coiolis, 31057 Toulouse, Cedex 1, Fance. Available at http://www.cefacs.f/algo/epots/

More information

Do Managers Do Good With Other People s Money? Online Appendix

Do Managers Do Good With Other People s Money? Online Appendix Do Manages Do Good With Othe People s Money? Online Appendix Ing-Haw Cheng Haison Hong Kelly Shue Abstact This is the Online Appendix fo Cheng, Hong and Shue 2013) containing details of the model. Datmouth

More information

Surveillance Points in High Dimensional Spaces

Surveillance Points in High Dimensional Spaces Société de Calcul Mathématique SA Tools fo decision help since 995 Suveillance Points in High Dimensional Spaces by Benad Beauzamy Januay 06 Abstact Let us conside any compute softwae, elying upon a lage

More information

gr0 GRAPHS Hanan Samet

gr0 GRAPHS Hanan Samet g0 GRPHS Hanan Samet ompute Science epatment and ente fo utomation Reseach and Institute fo dvanced ompute Studies Univesity of Mayland ollege Pak, Mayland 0 e-mail: hjs@umiacs.umd.edu opyight 199 Hanan

More information

Upper Bounds for Tura n Numbers. Alexander Sidorenko

Upper Bounds for Tura n Numbers. Alexander Sidorenko jounal of combinatoial theoy, Seies A 77, 134147 (1997) aticle no. TA962739 Uppe Bounds fo Tua n Numbes Alexande Sidoenko Couant Institute of Mathematical Sciences, New Yok Univesity, 251 Mece Steet, New

More information

An upper bound on the number of high-dimensional permutations

An upper bound on the number of high-dimensional permutations An uppe bound on the numbe of high-dimensional pemutations Nathan Linial Zu Luia Abstact What is the highe-dimensional analog of a pemutation? If we think of a pemutation as given by a pemutation matix,

More information

Encapsulation theory: the transformation equations of absolute information hiding.

Encapsulation theory: the transformation equations of absolute information hiding. 1 Encapsulation theoy: the tansfomation equations of absolute infomation hiding. Edmund Kiwan * www.edmundkiwan.com Abstact This pape descibes how the potential coupling of a set vaies as the set is tansfomed,

More information

Construction Schemes for Fault-Tolerant Hamiltonian Graphs

Construction Schemes for Fault-Tolerant Hamiltonian Graphs Constuction Schemes fo Fault-Toleant Hamiltonian Gaphs Jeng-Jung Wang Depatment of Compute and Infomation Science, National Chiao Tung Univesity, Hsinchu, Taiwan 30050, Republic of China Chun-Nan Hung

More information

AQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013

AQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013 AQI: Advanced Quantum Infomation Lectue 2 (Module 4): Ode finding and factoing algoithms Febuay 20, 203 Lectue: D. Mak Tame (email: m.tame@impeial.ac.uk) Intoduction In the last lectue we looked at the

More information

ASTR415: Problem Set #6

ASTR415: Problem Set #6 ASTR45: Poblem Set #6 Cuan D. Muhlbege Univesity of Mayland (Dated: May 7, 27) Using existing implementations of the leapfog and Runge-Kutta methods fo solving coupled odinay diffeential equations, seveal

More information

Turán Numbers of Vertex-disjoint Cliques in r- Partite Graphs

Turán Numbers of Vertex-disjoint Cliques in r- Partite Graphs Univesity of Wyoming Wyoming Scholas Repositoy Honos Theses AY 16/17 Undegaduate Honos Theses Sping 5-1-017 Tuán Numbes of Vetex-disjoint Cliques in - Patite Gaphs Anna Schenfisch Univesity of Wyoming,

More information

Bounds on the performance of back-to-front airplane boarding policies

Bounds on the performance of back-to-front airplane boarding policies Bounds on the pefomance of bac-to-font aiplane boading policies Eitan Bachmat Michael Elin Abstact We povide bounds on the pefomance of bac-to-font aiplane boading policies. In paticula, we show that no

More information

Goodness-of-fit for composite hypotheses.

Goodness-of-fit for composite hypotheses. Section 11 Goodness-of-fit fo composite hypotheses. Example. Let us conside a Matlab example. Let us geneate 50 obsevations fom N(1, 2): X=nomnd(1,2,50,1); Then, unning a chi-squaed goodness-of-fit test

More information

Application of Parseval s Theorem on Evaluating Some Definite Integrals

Application of Parseval s Theorem on Evaluating Some Definite Integrals Tukish Jounal of Analysis and Numbe Theoy, 4, Vol., No., -5 Available online at http://pubs.sciepub.com/tjant/// Science and Education Publishing DOI:.69/tjant--- Application of Paseval s Theoem on Evaluating

More information

To Feel a Force Chapter 7 Static equilibrium - torque and friction

To Feel a Force Chapter 7 Static equilibrium - torque and friction To eel a oce Chapte 7 Chapte 7: Static fiction, toque and static equilibium A. Review of foce vectos Between the eath and a small mass, gavitational foces of equal magnitude and opposite diection act on

More information

A Short Combinatorial Proof of Derangement Identity arxiv: v1 [math.co] 13 Nov Introduction

A Short Combinatorial Proof of Derangement Identity arxiv: v1 [math.co] 13 Nov Introduction A Shot Combinatoial Poof of Deangement Identity axiv:1711.04537v1 [math.co] 13 Nov 2017 Ivica Matinjak Faculty of Science, Univesity of Zageb Bijenička cesta 32, HR-10000 Zageb, Coatia and Dajana Stanić

More information

ONE-POINT CODES USING PLACES OF HIGHER DEGREE

ONE-POINT CODES USING PLACES OF HIGHER DEGREE ONE-POINT CODES USING PLACES OF HIGHER DEGREE GRETCHEN L. MATTHEWS AND TODD W. MICHEL DEPARTMENT OF MATHEMATICAL SCIENCES CLEMSON UNIVERSITY CLEMSON, SC 29634-0975 U.S.A. E-MAIL: GMATTHE@CLEMSON.EDU, TMICHEL@CLEMSON.EDU

More information

Matrix Colorings of P 4 -sparse Graphs

Matrix Colorings of P 4 -sparse Graphs Diplomabeit Matix Coloings of P 4 -spase Gaphs Chistoph Hannnebaue Januay 23, 2010 Beteue: Pof. D. Winfied Hochstättle FenUnivesität in Hagen Fakultät fü Mathematik und Infomatik Contents Intoduction iii

More information

Modified Linear Programming and Class 0 Bounds for Graph Pebbling

Modified Linear Programming and Class 0 Bounds for Graph Pebbling Modified Linea Pogamming and Class 0 Bounds fo Gaph Pebbling Daniel W. Canston Luke Postle Chenxiao Xue Cal Yege August 8, 05 Abstact Given a configuation of pebbles on the vetices of a connected gaph

More information

Journal of Inequalities in Pure and Applied Mathematics

Journal of Inequalities in Pure and Applied Mathematics Jounal of Inequalities in Pue and Applied Mathematics COEFFICIENT INEQUALITY FOR A FUNCTION WHOSE DERIVATIVE HAS A POSITIVE REAL PART S. ABRAMOVICH, M. KLARIČIĆ BAKULA AND S. BANIĆ Depatment of Mathematics

More information

Approximation Algorithms and Hardness of the k-route Cut Problem

Approximation Algorithms and Hardness of the k-route Cut Problem Appoximation Algoithms and Hadness of the k-route Cut Poblem Julia Chuzhoy Yuy Makaychev Aavindan Vijayaaghavan Yuan Zhou July 10, 2011 Abstact We study the k-oute cut poblem: given an undiected edge-weighted

More information

Conspiracy and Information Flow in the Take-Grant Protection Model

Conspiracy and Information Flow in the Take-Grant Protection Model Conspiacy and Infomation Flow in the Take-Gant Potection Model Matt Bishop Depatment of Compute Science Univesity of Califonia at Davis Davis, CA 95616-8562 ABSTRACT The Take Gant Potection Model is a

More information

arxiv: v1 [math.co] 1 Apr 2011

arxiv: v1 [math.co] 1 Apr 2011 Weight enumeation of codes fom finite spaces Relinde Juius Octobe 23, 2018 axiv:1104.0172v1 [math.co] 1 Ap 2011 Abstact We study the genealized and extended weight enumeato of the - ay Simplex code and

More information

COMPUTATIONS OF ELECTROMAGNETIC FIELDS RADIATED FROM COMPLEX LIGHTNING CHANNELS

COMPUTATIONS OF ELECTROMAGNETIC FIELDS RADIATED FROM COMPLEX LIGHTNING CHANNELS Pogess In Electomagnetics Reseach, PIER 73, 93 105, 2007 COMPUTATIONS OF ELECTROMAGNETIC FIELDS RADIATED FROM COMPLEX LIGHTNING CHANNELS T.-X. Song, Y.-H. Liu, and J.-M. Xiong School of Mechanical Engineeing

More information

EM Boundary Value Problems

EM Boundary Value Problems EM Bounday Value Poblems 10/ 9 11/ By Ilekta chistidi & Lee, Seung-Hyun A. Geneal Desciption : Maxwell Equations & Loentz Foce We want to find the equations of motion of chaged paticles. The way to do

More information

Approximation Algorithms and Hardness of the k-route Cut Problem

Approximation Algorithms and Hardness of the k-route Cut Problem Appoximation Algoithms and Hadness of the k-route Cut Poblem Julia Chuzhoy Yuy Makaychev Aavindan Vijayaaghavan Yuan Zhou Decembe 14, 2011 Abstact We study the k-oute cut poblem: given an undiected edge-weighted

More information

Semicanonical basis generators of the cluster algebra of type A (1)

Semicanonical basis generators of the cluster algebra of type A (1) Semicanonical basis geneatos of the cluste algeba of type A (1 1 Andei Zelevinsky Depatment of Mathematics Notheasten Univesity, Boston, USA andei@neu.edu Submitted: Jul 7, 006; Accepted: Dec 3, 006; Published:

More information

A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES

A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES AGU Intenational Jounal of Science and Technology A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES Ritu Ahuja Depatment of Mathematics Khalsa College fo Women, Civil Lines, Ludhiana-141001, Punjab, (India)

More information

EQUI-PARTITIONING OF HIGHER-DIMENSIONAL HYPER-RECTANGULAR GRID GRAPHS

EQUI-PARTITIONING OF HIGHER-DIMENSIONAL HYPER-RECTANGULAR GRID GRAPHS EQUI-PARTITIONING OF HIGHER-DIMENSIONAL HYPER-RECTANGULAR GRID GRAPHS ATHULA GUNAWARDENA AND ROBERT R MEYER Abstact A d-dimensional gid gaph G is the gaph on a finite subset in the intege lattice Z d in

More information

Chapter 5 Linear Equations: Basic Theory and Practice

Chapter 5 Linear Equations: Basic Theory and Practice Chapte 5 inea Equations: Basic Theoy and actice In this chapte and the next, we ae inteested in the linea algebaic equation AX = b, (5-1) whee A is an m n matix, X is an n 1 vecto to be solved fo, and

More information

Hypothesis Test and Confidence Interval for the Negative Binomial Distribution via Coincidence: A Case for Rare Events

Hypothesis Test and Confidence Interval for the Negative Binomial Distribution via Coincidence: A Case for Rare Events Intenational Jounal of Contempoay Mathematical Sciences Vol. 12, 2017, no. 5, 243-253 HIKARI Ltd, www.m-hikai.com https://doi.og/10.12988/ijcms.2017.7728 Hypothesis Test and Confidence Inteval fo the Negative

More information

On the Quasi-inverse of a Non-square Matrix: An Infinite Solution

On the Quasi-inverse of a Non-square Matrix: An Infinite Solution Applied Mathematical Sciences, Vol 11, 2017, no 27, 1337-1351 HIKARI Ltd, wwwm-hikaicom https://doiog/1012988/ams20177273 On the Quasi-invese of a Non-squae Matix: An Infinite Solution Ruben D Codeo J

More information

Lifting Private Information Retrieval from Two to any Number of Messages

Lifting Private Information Retrieval from Two to any Number of Messages Lifting Pivate Infomation Retieval fom Two to any umbe of Messages Rafael G.L. D Oliveia, Salim El Rouayheb ECE, Rutges Univesity, Piscataway, J Emails: d746@scaletmail.utges.edu, salim.elouayheb@utges.edu

More information

1) (A B) = A B ( ) 2) A B = A. i) A A = φ i j. ii) Additional Important Properties of Sets. De Morgan s Theorems :

1) (A B) = A B ( ) 2) A B = A. i) A A = φ i j. ii) Additional Important Properties of Sets. De Morgan s Theorems : Additional Impotant Popeties of Sets De Mogan s Theoems : A A S S Φ, Φ S _ ( A ) A ) (A B) A B ( ) 2) A B A B Cadinality of A, A, is defined as the numbe of elements in the set A. {a,b,c} 3, { }, while

More information

4/18/2005. Statistical Learning Theory

4/18/2005. Statistical Learning Theory Statistical Leaning Theoy Statistical Leaning Theoy A model of supevised leaning consists of: a Envionment - Supplying a vecto x with a fixed but unknown pdf F x (x b Teache. It povides a desied esponse

More information

COLLAPSING WALLS THEOREM

COLLAPSING WALLS THEOREM COLLAPSING WALLS THEOREM IGOR PAK AND ROM PINCHASI Abstact. Let P R 3 be a pyamid with the base a convex polygon Q. We show that when othe faces ae collapsed (otated aound the edges onto the plane spanned

More information

F-IF Logistic Growth Model, Abstract Version

F-IF Logistic Growth Model, Abstract Version F-IF Logistic Gowth Model, Abstact Vesion Alignments to Content Standads: F-IFB4 Task An impotant example of a model often used in biology o ecology to model population gowth is called the logistic gowth

More information

16 Modeling a Language by a Markov Process

16 Modeling a Language by a Markov Process K. Pommeening, Language Statistics 80 16 Modeling a Language by a Makov Pocess Fo deiving theoetical esults a common model of language is the intepetation of texts as esults of Makov pocesses. This model

More information

The inverse strong non-split r-domination number of a graph

The inverse strong non-split r-domination number of a graph MultiCaft Intenational Jounal of Engineeing, Science and Technology INTERNATIONAL JOURNAL OF ENGINEERING, SCIENCE AND TECHNOLOGY www.ijest-ng.com 2010 MultiCaft Limited. All ights eseved The invese stong

More information

Likelihood vs. Information in Aligning Biopolymer Sequences. UCSD Technical Report CS Timothy L. Bailey

Likelihood vs. Information in Aligning Biopolymer Sequences. UCSD Technical Report CS Timothy L. Bailey Likelihood vs. Infomation in Aligning Biopolyme Sequences UCSD Technical Repot CS93-318 Timothy L. Bailey Depatment of Compute Science and Engineeing Univesity of Califonia, San Diego 1 Febuay, 1993 ABSTRACT:

More information

Approximation Algorithms and Hardness of the k-route Cut Problem

Approximation Algorithms and Hardness of the k-route Cut Problem Appoximation Algoithms and Hadness of the k-route Cut Poblem Julia Chuzhoy Yuy Makaychev Aavindan Vijayaaghavan Yuan Zhou Novembe 26, 2011 Abstact We study the k-oute cut poblem: given an undiected edge-weighted

More information

Physics 2A Chapter 10 - Moment of Inertia Fall 2018

Physics 2A Chapter 10 - Moment of Inertia Fall 2018 Physics Chapte 0 - oment of netia Fall 08 The moment of inetia of a otating object is a measue of its otational inetia in the same way that the mass of an object is a measue of its inetia fo linea motion.

More information