RELIABILITY OF COMMUNICATION NETWORKS WITH DELAY CONSTRAINTS: COMPUTATIONAL COMPLEXITY AND COMPLETE TOPOLOGIES
|
|
- Silvia Higgins
- 6 years ago
- Views:
Transcription
1 IJMMS 2004:29, PII. S X Hindawi Publishing Cop. RELIABILITY OF COMMUNICATION NETWORKS WITH DELAY CONSTRAINTS: COMPUTATIONAL COMPLEXITY AND COMPLETE TOPOLOGIES H. CANCELA and L. PETINGI Received 22 June 2003 Let G = V,E) be a gaph with a distinguished set of teminal vetices K V. We define the K-diamete of G as the maximum distance between any pai of vetices of K. If the edges fail andomly and independently with known pobabilities vetices ae always opeational), the diamete-constained K-teminal eliability of G, R K G,D), is defined as the pobability that suviving edges span a subgaph whose K-diamete does not exceed D. In geneal, the computational complexity of evaluating R K G,D) is NP-had, as this measue subsumes the classical K-teminal eliability R K G), known to belong to this complexity class. In this note, we show that even though fo two teminal vetices s and t and D = 2, R {s,t} G,D) can be detemined in polynomial time, the poblem of calculating R {s,t} G,D) fofixedvaluesofd, D 3, is NP-had. We also genealize this esult fo any fixed numbe of teminal vetices. Although it is vey unlikely that geneal efficient algoithms exist, we pesent a ecusive fomulation fo the calculation of R {s,t} G,D) that yields a polynomial time evaluation algoithm in the case of complete topologies whee the edge set can be patitioned into at most fou equi-eliable classes Mathematics Subject Classification: 05C99, 90B Intoduction. The components of a communication netwok e.g., nodes, communication links) may be subject to andom failues. Failues may aise fom natual catastophes e.g., huicanes), component weaout, o action of intentional enemies. A communication netwok can be modelled by a gaph G = V,E), whee V and E ae the sets of vetices and edges, espectively, of G. Moeove, the pobabilities of failue of the netwok components can be epesented by assigning pobabilities of failue to the vetices and/o edges of its undelying gaph. A widely used pobabilistic model is the one whee the edges fail andomly and independently with known pobabilities, and whee the vetices ae always opeational. Let G = V,E) be a gaph with a distinguished set K V. We define the K-diamete of G as the maximum distance between any pai of vetices of K. If the edges fail andomly and independently with known pobabilities, in [2, 8], the diamete-constained K-teminal eliability of G, R K G,D), is defined as the pobability that suviving edges span a subgaph whose K-diamete does not exceed D, o equivalently, as the pobability that fo each pai of vetices {u,v} K, thee exists an opeating path between u and v of at most D edges. One paticula application of this measue is when tansmissions between evey two nodes of a teminal set K of a netwok modelled by a gaph G = V,E)) ae equied
2 1552 H. CANCELA AND L. PETINGI to expeience a maximum delay DT, whee T is the delay expeienced at a single node o edge. The pobability that afte andom failues of the communication links the suviving netwok meets the delay DT is R K G,D). As eal netwoks ae subject to failues, the diamete-constained eliability can be useful in diffeent contexts. Fo example, this measue gives an indicato of the suitability of an existing netwok topology to suppot good-quality voice ove IP applications between a pai of teminals. In the case of a videoconfeence, we take K to be the set of the paticipating nodes, and the diamete-constained eliability gives the pobability that we can find shot enough paths between all of them. Anothe potential case of inteest is a numbe of potocols which, in ode to avoid congestion by looping data, assign a timeout date o a maximum numbe of hops to each data packet, to contol infomation; that is, the case fo some pee-to-pee P2P) netwoks, such as Feenet, Gnutella, o othes [3, 7], in which a fixed maximum numbe of hops ae allowed fo communication between nodes. In these cases, the diamete-constained uneliability i.e., one minus the eliability) gives the pobability that, due to failed links, thee ae some nodes of the netwok, which ae not mutually eachable using these potocols. In Section 2, we intoduce some basic notation and definitions that will be used in the following sections, and we pesent R K G,D) as a genealization of the classical eliability measue R K G), allowing us to conclude that, in geneal, the complexity of evaluating R K G,D) is NP-had. In Section 3, we show that even though R K G,D), fo K =2andD = 2, can be calculated efficiently, this poblem is NP-had fo fixed values of D, D 3. In Section 4, we genealize this esult fo any fixed numbe of teminal vetices. In Section 5, we pesent a ecusive fomulation fo the calculation of R {s,t} G,D) that yields a polynomial-time evaluation algoithm fo the case of complete topologies, whose edge set can be patitioned into at most fou equi-eliable classes. Finally, in Section 6, we pesent some open poblems and final emaks. The notation in this pape follows that of Haay [5], unless othewise noted. 2. Peliminaies. The following notation and definitions will be used in the sequel. i) Let G = V,E, E)) be a pobabilistic gaph with a distinguished set K V, K 2, and D Z +,with1 D n 1, whee n = V and whee : E [0,1] ae the opeational pobabilities of the set of edges E. Fo ease of notation, we epesent the opeational pobability of an edge e E as pe) = 1 qe) qe) is the pobability of failue). ii) Let the sample space Ω epesent the set of all possible subsets of E coesponding to sets of opeational links i.e., Ω = 2 E ). iii) Unde the assumption of independent edge failues, each H Ω has occuence pobability PH)= pe) qe). 2.1) e H e H iv) H Ω is a pathset o opeating state if H spans a subgaph whose K-diamete is at most D. v) Let D K E) ={H Ω : H is a pathset}.
3 RELIABILITY OF COMMUNICATION NETWORKS vi) An opeating state H of D K E) is called a minpath if H {e i} D K E), fo all e i H. vii) H Ω is a failue state if H spans a subgaph whose K-diamete is geate than D if H spans a subgaph whee two vetices of K belong to diffeent connected components, then its K-diamete is infinite). viii) Let D K E) ={H Ω : H is a failue state}. Fom the definition of R K G,D) and definition v), one gets R K G,D) = P D K E) ) = H D K E) e H pe) e H qe). 2.2) Similaly, 2.2) can be ewitten in tems of the failue states: R K G,D) = 1 Q K G,D) = 1 qe). 2.3) H D K E) e H pe) e H A widely used pobabilistic measue see [1, 4, 11, 12]) is the classical K-teminal eliability ofagaphg, R K G), defined on the same pobabilistic model i.e., edges fail andomly and independently with known pobabilities and the vetices ae always opeational). The measue R K G) is the pobability that fo evey pai of vetices u,v K, thee exists an opeating path between u and v. In this case, thee ae no length estictions of the paths joining the vetices of K, and by noting that the maximum length of a path joining a pai of vetices is of at most n 1 edges, whee n is the numbe of vetices of G, then R K G) = R K G,n 1). 2.4) This genealization of the classical eliability paamete allows us to eflect moe stingent pefomance objectives by esticting the maximum length of a path in a netwok. Let G = V,E) and let K be a set of teminal vetices of G. Fo the classical eliability measue, computations of the K-teminal eliability see [10]) and the specific cases when K =2see[13]) and K = V see [6, 9]) wee shown to be NP-had. Fom these esults and the fact that R K G) = R K G,n 1), R {s,t} G) = R {s,t} G,n 1), andr V G) = R V G,n 1), whee n is the numbe of vetices of the gaph G, and by esticting D = n 1, we have the following theoem. Theoem 2.1. Fo the diamete-constained eliability, the computational complexity of computing R K G,D), R {s,t} G,D), and R V G,D) is NP-had. Even though it is vey unlikely that R K G,D) can be evaluated efficiently, we cannot peclude that it is the case when fixed values of the diamete paamete D ae unde consideation. We addess this question in Sections 3 and Evaluating R K G,D) when K =2 and when D is a constant value. In this section, we establish the computational complexity of computing R K G,D) when K is composed of two teminal vetices s and t, and fo fixed values of diamete paamete D.
4 1554 H. CANCELA AND L. PETINGI In [8], an efficient fomulation was given fo the evaluation of diamete-constained two-teminal eliability of a netwok when teminals s and t should be connected by opeating paths of at most two edges i.e., D = 2). Theoem 3.1. Let G = V,E) be a simple gaph whee each edge u,v) E opeates independently with pobability p u,v), and let {s,t} ={u 1,u 2,...,u l } be the common neighbohood of teminal nodes s and t; then whee 1 R :s,t) E, R {s,t} G,2) = 1 ) 1 p s,t) R :s,t) E, R = l i=1 3.1) ) 1 ps,ui )p ui,t). 3.2) Even though R {s,t} G,2) can be computed in time linealy on the numbe of nodes of G, we next show that the complexity of evaluating R {s,t} G,D), fo fixed values of D, is NP-had. Fo ease of notation, instead of epesenting a state opeational o failue) as a set of edges of a gaph G, we epesent it as a subgaph of G spanned by this set. Theoem 3.2. Evaluating R {s,t} G,D), fo fixed D 3, is NP-had. Poof. We show that counting the numbe of vetex coves of a bipatite gaph is polynomial-time Tuing educible to counting the numbe of failue states of an undiected gaph with teminal vetices s and t and fixed diamete paamete D 3. An instance of the bipatite vetex cove consists of a bipatite gaph G = V,E); let X and Y be the classes in the bipatition of V. A vetex cove is a set of vetices C = C X C Y, C X X, and C Y Y such that evey edge of E has at least one endpoint in C. The poblem of counting the numbe of vetex coves of a bipatite gaph was shown to be # -complete by Povan and Ball [9]. Let D = 3 + d and let P = V P),EP)) be a path on d + 1 vetices, whee VP) = {s,s 1,...,s d } and EP) ={s,s 1 ),s 1,s 2 ),...,s d 1,s d )} it is undestood that if d = 0, P is composed of an isolated vetex s d = s). We constuct a pobabilistic gaph G = V,E, E )) fom G. The vetex set V consists of V, VP), and t. The edge set E consists of E, EP), the edge sets E X ={s d,x) : x X} and E Y ={t,y) : y Y } see Figue 3.1). The edges opeational pobabilities ae pe) = 1ife E, pe) = 1if e EP), and pe) = 1/2 othewise. The teminal set is K ={s,t}. It is clea that this tansfomation is polynomial on the size of the input of the bipatite gaph, since D is a constant value. Fom this constuction, a state H of G consists of the bipatite gaph G, thepathp, the vetex s d, possibly joined to some vetices of X, and the vetex t, possibly joined to some vetices of Y of the bipatite gaph G. We then constuct a one-to-one coespondence Z : W D {s,t}e ) fom the set of vetex coves W of the bipatite gaph to the failue states of G as follows: if w = S T) W, whee S X and T Y, is a vetex cove of the bipatite gaph, then
5 RELIABILITY OF COMMUNICATION NETWORKS s s 1 s d t Path on d + 1 vetices Bipatite gaph Figue 3.1. Gaph G constucted fom bipatite G and constant d. s s d t Bipatite Figue 3.2. Failue state constucted fom a vetex cove of bipatite gaph black vetices epesent a vetex cove). Zw) = V,E EP) {s d,x): x X S} {t,y) : y Y T }) is a failue state of G see Figue 3.2). To show that this is a one-to-one coespondence, let w = S T) be a vetex cove of the bipatite gaph G, and suppose x X S and y Y T. Clealy, x,y) is not an edge in Zw), othewise if x,y) is an edge, this edge is not coveed by w. Thus, thee ae no paths of length D joining s and t in Zw). Theefoe, Zw) is a failue state of G. Convesely, conside a failue state H which, as emaked peviously, must include all the edges of path P, all the edges of set E, and possibly some edges joining vetex s d to vetices in X and joining vetex t to some vetices in Y.AsH is a failue state, the vetices of X and Y adjacent to s d and t must fom an independence set if that was not the case, thee would exist a path of length D joining s and t). Theefoe, the emaining vetices of the bipatite gaph fom a vetex cove which is Z 1 H). Fom 2.3), we obtain R {s,t} G,D ) X + Y = 1 = 1 i=0 F i G,{s,t},D ) 1 2 X + Y i=0 F i G,{s,t},D ) 2 X + Y, ) i ) 1 X + Y i 1) E + EP) 2 3.3)
6 1556 H. CANCELA AND L. PETINGI whee F i G,{s,t},D) is the numbe of failue states of G with E + EP) +i edges. But F i G,{s,t},D) is equal to the numbe of vetex coves of the bipatite gaph G, thus the esult follows. In the next section, we genealize this esult fo any fixed numbe of teminal vetices. 4. Evaluating R K G,D) fo any fixed numbe of teminal vetices K and when D is a constant value, D 3. In this section, we show that complexity of calculating R K G,D) is NP-had when any fixed numbe of teminal vetices ae unde consideation and when D is a constant value, D 3. Theoem 4.1. Evaluating R K G,D) fo a fixed numbe of teminal vetices and fo fixed D, D 3, is NP-had. Poof. Let k = K with k>2, and D = 3 + d. We constuct a pobabilistic G = V,E, E )) obtained fom the pobabilistic gaph G = V,E, E )) mentioned in the poof of Theoem 3.2 as follows: a) fo each j, 1 j k 2, let P j = V j ={u j 1,uj 2,...,uj D}, E j ={u j 1,uj 2 ),...,uj D 1, u j D )}) be a path on D vetices; b) let the set of edges E s ={s,u j 1 ) :1 j k 2} i.e., we make the teminal vetex s adjacent to each vetex u j 1 of P j,1 j k 2); c) let the set of edges E t ={t,u j D ) :1 j k 2} i.e., we make the teminal vetex t adjacent to each vetex u j D of P j,1 j k 2); d) let G = V k 2 j=1 V j ),E k 2 E s Et j=1 E j ), E )) see Figue 4.1). Fo the opeational pobabilities of G,ife is an edge in which one of the endpoints is s d o t and the othe endpoint is a vetex of the bipatite gaph G, thenpe) = 1/2, othewise let pe) = 1. Let also the teminal set K ={s,t} k 2 j=1{u j 1 }). This constuction is also polynomial on the size of the input of the bipatite G, since both K and D ae constant values. If s and t ought to be connected by a path of at most D edges, then this path must compise the path P of G see the poof of Theoem 3.2). In a failue state H of G, evey pai of teminal vetices is connected by paths of at most D edges, with the exception of s and t; thus H = V H),EH) ) is a failue state of G H = VH) k 2 k 2 V j,eh) Es Et E j is a failue state of G. j=1 j=1 4.1) Also, it follows fom 4.1) that the occuence pobability see Section 2, definition iii)) of the edge set EH ) of a failue state H of G is equal to the occuence pobability oftheedgeseteh) of its coesponding failue state H of G as P E H )) = P EH) ) 1 Es 1 E t 1 k 2 j=1 E j = P EH) ). 4.2)
7 RELIABILITY OF COMMUNICATION NETWORKS u 1 1 s s 1 s d t u k 2 1 Bipatite gaph Path of length D Figue 4.1. Gaph G constucted fom bipatite gaph G. Theefoe, it follows fom 2.3), 3.3), 4.1), and 4.2) that R K G,D ) = R {s,t} G,D ) = 1 X + Y i=0 F i G,{s,t},D ) 2 X + Y. 4.3) But, as was shown in the poof of Theoem 3.2, F i G,{s,t},D) is equal to the numbe of vetex coves of the bipatite gaph G, thus the esult follows. 5. Two-teminal eliability of complete topologies with at most fou edge eliability values. In this section, we define a class of complete gaphs, whose edges can be patitioned into fou elementay eliability values. We will denote these gaphs by G A n,q st,q s,q t,q), whee n is the numbe of intemediate nodes between the teminals s and t, q st = 1 st is the uneliability of the edge connecting s and t, q s = 1 s is the uneliability of the edges connecting s to the othe n intemediate nodes, q t = 1 t is the uneliability of the edges connecting t to the n intemediate nodes, and q = 1 is the uneliability of the edges whose endpoints ae intemediate nodes see Figue 5.1a)). The eliability fo this netwok, R {s,t} G A n,q st,q s,q t,q),d), is a multinomial in q st, q s, q t, q. We will expess the eliability of netwok G A by taking into account the independence between the edge s,t) and the othe paths, and by conditioning on the numbe of opeational edges between s and the intemediate nodes exploiting the symmety between those nodes). If D = 1, the only feasible path is the edge s,t); then tivially R {s,t} G A n,q st,q s,q t,q),1) = 1 q st. We can now look at the case whee D>1. As a fist step, we use the fact that s,t) is a feasible path and that it is independent fom all othe simple paths fom s to t. Thenwecanwite R {s,t} GA n,qst,q s,q t,q ),D ) = 1 q st ) +qst R {s,t} G A n,qs,q t,q ),D ), 5.1)
8 1558 H. CANCELA AND L. PETINGI st s t s t s t s t s t s t K n K n a) G A b) G A Figue 5.1. G A n,q st,q s,q t,q) and G A n,q s,q t,q) netwoks. whee G A n,q s,q t,q) is the pobabilistic netwok obtained fom G A n,q st,q s,q t,q),by deleting the edge s, t) see Figue 5.1b)). As this netwok is completely symmetic with espect to the edges between s and the intemediate nodes all nodes except s and t), we will define a patition of the pobability state space fo the netwok based on the numbe of those edges that fail o ae opeational. We define A k to be the event whee k edges fom s to intemediate nodes fail and the emaining n k ae opeating; its pobability is P { A k } = n k) qs ) k 1 qs ) n k. 5.2) The set {A k :0 k n} is a patition of the pobability space, as the events ae paiwise-disjoint and thei union has pobability one. Applying the total pobability theoem, we then have R {s,t} G A n,qs,q t,q ),D ) = P { opeational path of length D fom s to t in G A } n = P { 5.3) opeational path of length D fom s to t in G A } { } Ai P Ai. i=0 We must now find an expession fo the geneal tem with k n. The leftmost netwok shown in Figue 5.2 coesponds to this event, whee k edges between s and intemediate nodes fail i.e., can be emoved fom the netwok) and the emaining n k ae opeational, which ae pesented with a bolde tace. Finding an opeational path of length less than o equal to D in this netwok coesponds to finding a path of length less than o equal to D 1 in the netwok shown at the cente of Figue 5.2, which is obtained by identifying s and the intemediate nodes to which it is unconditionally
9 RELIABILITY OF COMMUNICATION NETWORKS K n k t t 1 1 t ) n k s t t t t s t t t t s 1 1 ) n k t t 1 1 ) n k t K k K k K k Figue 5.2. G A n,q s,q t,q) when n k edges between s and intemediate nodes wok and the est fail. connected into one node. In addition, as edges fail independently, the opeational pobability of a bank of paallel edges is the complement to one) of the poducts of thei failue pobabilities. Thus, the set of paallel edges between s and t shown at the cente of Figue 5.2 can be eplaced by a single edge with eliability 1 qt n k. Similaly, the set of paallel edges between s and an intemediate node of K k can be eplaced by a single edge with eliability 1 q n k. The netwok esulting fom this last opeation is shown at the ight of Figue 5.2, and coesponds to a topology, whee the opeational paths must have length at most D 1. Fom 5.1), 5.2), and 5.3) and the latest fact, we can expess the eliability of the oiginal netwok G A by the following fomula: R {s,t} GA n,qst,q s,q t,q ),D ) = ) n ) n 1 qs ) n kq k 1 q st +qst s R {s,t} GA k,q n k t,q n k,q t,q ),D 1 ) 5.4). k k=0 The ecusive application of this fomula gives a multinomial on q st, q s, q t, q. It can be obseved that the diect application of the ecusive fomula leads to evaluating the multinomial many times fo values of k n and d<d, but with diffeent values to be substituted fo the paametes q st, q s, q t, and q. This obsevation leads us to the following altenative fomulation. We define a subclass of the class of netwoks G A. These netwoks will be denoted by G B m,h,q t,q),withg B m,h,q t,q) = G A m,q h t,q h,q t,q). This means that these netwoks have the same complete gaph topology, but that the eliabilities of the fou-edge classes ae defined by only two intege and two eal paametes. It is tivial to obseve that R {s,t} GB m,h,qt,q ),D ) = R {s,t} GA m,q h t,q h,q t,q ),D ). 5.5) Substituting in 5.4), we have that R {s,t} GA n,qst,q s,q t,q ),D ) = 1 q st ) +qst n k=0 ) n 1 qs ) n kq k s R {s,t} GB k,n k,qt,q ),D 1 ) 5.6) k
10 1560 H. CANCELA AND L. PETINGI and that if D>1, R {s,t} GB m,h,qt,q ),D ) = 1 qt h ) m +q h t k=0 ) m 1 q h ) m k q hk R {s,t} GB k,m k,qt,q ),D 1 ). k 5.7) If D = 1, then R st GB m,h,qt,q ),D ) = 1 q h t. 5.8) Moeove, it is also noted that the last tem i.e., k=m)of5.7) is null since G B m,0,q t,q) epesents a netwok with m + 2 nodes in which the edges fom s to the intemediate nodes fail, and whee s is adjacent to the teminal node t by an edge whose eliability is 0 i.e., 1 q 0 t ). The next theoem states the space and time complexity of evaluating R {s,t} G A n,q st, q s,q t,q),d). Theoem 5.1. Evaluating R {s,t} G A n,q st,q s,q t,q),d) takes On 3 ) and ODn 3 ) space and time complexity, espectively. Poof. We fist stat with the standad assumption that the edges eliabilities ae ational numbes p/q, whee both p and q ae of length On), and that aithmetic opeations on such ational numbes take constant time i.e., O1)) see[4, page 4]). We next note, fom the ight-hand side of 5.7), that evaluation of R {s,t} G B m,h,q t, q),d) fo specific values of m and h depends on powes of the edges uneliabilities q t and q. Since the possible values fo m and h ae in [0,n], we fist poceed to evaluate and stoe the values qt i,fo0 i n, and qi,fo0 i n. This pocedue equies On 2 ) space complexity n values to be stoed, each having length On)) andon 2 ) time complexity. We then calculate and stoe all possible values q ij,fo0 i,j n.this can be accomplished by utilizing an n n two-dimensional aay and values aleady stoed fo powes of q. This pocedue takes On 3 ) space and time complexity. Values fo 1 q i ) j ae stoed in a simila fashion. Finally, we poceed to evaluate R {s,t} G B m,h,q t,q),d) fo specific values of m, h, and d. In ode to execute this last step, we note, fom 5.7), that an evaluation of R {s,t} G B m,h,q t,q),d) equies at most n values i.e., n tems in the summation) of R {s,t} G B m,h,q t,q),d 1). An efficient evaluation is, fo example, to fist evaluate and stoe R {s,t} G B m,h,q t,q),d),fod = 1, and fo all values of m with 0 m n) and h with 0 h n) i.e.,on 3 ) space and On 2 ) time complexity). Next we detemine and stoe the values of R {s,t} G B m,h,q t,q),d) fo d = 2 and fo each pai m,h), by utilizing aleady stoed values; by the pevious assumptions, this step will take On) execution time. We sequentially epeat this last pocedue fo all possible values of d, 1 d<d, yielding an ODn 3 ) space and time complexity. We can also impove the stoage to On 3 ) by noting that to evaluate R {s,t} G B m,h,q t,q),d), it is only necessay to stoe values fo d 1.
11 RELIABILITY OF COMMUNICATION NETWORKS Table 5.1. Execution times fo evaluating complete gaph eliability. n D Execution time CPUs) Iteative method Recusive method 10 2 < < < < < < < > > > > > We implemented this iteative pocedue as well as the ecusive method which is obtained by diectly applying 5.4). Table 5.1 shows the execution times obtained on an Intel Celeon PC) fo both the iteative and the ecusive methods, fo diffeent values of n and D. Some enties ae maked > 36000, coesponding to uns which exceeded 10 CPU hous seconds) and wee aboted. It is easy to see that the iteative method has a much bette behavio than the ecusive fomulation, leading to smalle execution times especially fo high values of D). 6. Conclusions and futue wok. In this pape, we investigated the computational complexity of the diamete-constained K-teminal eliability. In paticula, this measue subsumes the classical K-teminal eliability measue when thee is no estiction on the length of the paths connecting the teminal vetices. This equivalence between these two eliability measues allows us to conclude that, in geneal, the computational complexity of the diamete-constained K-teminal eliability is NP-had. Nevetheless, the poblem of detemining the computational complexity of R K G,D), fo specific cases of K and D, was open. We showed that even though fo two teminal vetices s and t and D = 2, R {s,t} G,D) can be detemined in polynomial time, the poblem of calculating R {s,t} G,D) fo fixed values of D, D 3, is NP-had. Moeove, we genealized this esult fo any abitay numbe of teminal vetices. As a consequence, this esult justifies the implementation of appoximation methods fo the evaluation, and the detemination of bounds fo R K G,D). Anothe elevant open poblem is to detemine subclasses of gaphs fo which polynomial-time evaluation algoithms exist. In this pape, we showed that fo the case of complete topologies whee the edge set can be patitioned into at most fou equi-eliable classes, R {s,t} G,D) can be computed efficiently.
12 1562 H. CANCELA AND L. PETINGI Refeences [1] F. T. Boesch, X. Li, and C. Suffel, On the existence of unifomly optimally eliable netwoks, Netwoks ), no. 2, [2] H. Cancela and L. Petingi, Diamete constained netwok eliability: exact evaluation by factoization and bounds, Poceedings of the Intenational Confeence on Industial Logistics Japan), 2001, pp [3] I. Clake, O. Sandbeg, B. Wiley, and T. W. Hong, Feenet: a distibuted anonymous infomation stoage and etieval system, Intenational Wokshop on Design Issues in Anonymity and Unobsevability, The Intenational Compute Science Institute, Califonia, 2000, pp [4] C. J. Colboun, The Combinatoics of Netwok Reliability, Intenational Seies of Monogaphs on Compute Science, The Claendon Pess, Oxfod Univesity Pess, New Yok, [5] F. Haay, Gaph Theoy, Addison-Wesley, Massachusetts, [6] M. Jeum, On the complexity of evaluating multivaiate polynomials, Ph.D. thesis, Depatment of Compute Science, Univesity of Edinbugh, Edinbugh, [7] G. Panduangan, P. Raghavan, and E. Upfal, Building low-diamete P2P netwoks, 42nd IEEE Symposium on Foundations of Compute Science Las Vegas, Nev, 2001), IEEE Compute Society, Califonia, 2001, pp [8] L. Petingi and J. Rodiguez, Reliability of netwoks with delay constaints, Cong. Nume ), [9] J. S. Povan and M. O. Ball, The complexity of counting cuts and of computing the pobability that a gaph is connected, SIAMJ. Comput ), no. 4, [10] A. Rosenthal, A compute scientist looks at eliability computations, Reliability and Fault Tee Analysis Conf., Univ. Califonia, Bekeley, Calif, 1974), Society fo Industeial and Applied Mathematics, Pennsylvania, 1975, pp [11] A. Satyanaayana and J. N. Hagstom, A new algoithm fo the eliability analysis of multiteminal netwoks, IEEE Tans. Reliab ), [12] D. R. Shie, Netwok Reliability and Algebaic Stuctues, Oxfod Science Publications, The Claendon Pess, Oxfod Univesity Pess, New Yok, [13] L. G. Valiant, The complexity of enumeation and eliability poblems, SIAMJ. Comput ), no. 3, H. Cancela: Instituto de Computación, Facultad de Ingenieía, Univesidad de la República, J. Heea y Reissig 565, Montevideo, Uuguay addess: cancela@fing.edu.uy L. Petingi: Compute Science Depatment, College of Staten Island, City Univesity of New Yok, 2800 Victoy Boulevad, Staten Island, NY 10314, USA addess: petingi@postbox.csi.cuny.edu
13 Advances in Opeations Reseach Advances in Decision Sciences Jounal of Applied Mathematics Algeba Jounal of Pobability and Statistics The Scientific Wold Jounal Intenational Jounal of Diffeential Equations Submit you manuscipts at Intenational Jounal of Advances in Combinatoics Mathematical Physics Jounal of Complex Analysis Intenational Jounal of Mathematics and Mathematical Sciences Mathematical Poblems in Engineeing Jounal of Mathematics Discete Mathematics Jounal of Discete Dynamics in Natue and Society Jounal of Function Spaces Abstact and Applied Analysis Intenational Jounal of Jounal of Stochastic Analysis Optimization
arxiv: v1 [math.co] 4 May 2017
On The Numbe Of Unlabeled Bipatite Gaphs Abdullah Atmaca and A Yavuz Ouç axiv:7050800v [mathco] 4 May 207 Abstact This pape solves a poblem that was stated by M A Haison in 973 [] This poblem, that has
More informationSUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER
Discussiones Mathematicae Gaph Theoy 39 (019) 567 573 doi:10.7151/dmgt.096 SUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER Lutz Volkmann
More informationON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi
Opuscula Math. 37, no. 3 (017), 447 456 http://dx.doi.og/10.7494/opmath.017.37.3.447 Opuscula Mathematica ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS D.A. Mojdeh and B. Samadi Communicated
More informationOn the ratio of maximum and minimum degree in maximal intersecting families
On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Septembe 5, 011 Abstact To study how balanced o unbalanced a maximal intesecting
More informationON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0},
ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION E. J. IONASCU and A. A. STANCU Abstact. We ae inteested in constucting concete independent events in puely atomic pobability
More informationOn the ratio of maximum and minimum degree in maximal intersecting families
On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Mach 6, 013 Abstact To study how balanced o unbalanced a maximal intesecting
More informationA Bijective Approach to the Permutational Power of a Priority Queue
A Bijective Appoach to the Pemutational Powe of a Pioity Queue Ia M. Gessel Kuang-Yeh Wang Depatment of Mathematics Bandeis Univesity Waltham, MA 02254-9110 Abstact A pioity queue tansfoms an input pemutation
More informationMULTILAYER PERCEPTRONS
Last updated: Nov 26, 2012 MULTILAYER PERCEPTRONS Outline 2 Combining Linea Classifies Leaning Paametes Outline 3 Combining Linea Classifies Leaning Paametes Implementing Logical Relations 4 AND and OR
More information6 PROBABILITY GENERATING FUNCTIONS
6 PROBABILITY GENERATING FUNCTIONS Cetain deivations pesented in this couse have been somewhat heavy on algeba. Fo example, detemining the expectation of the Binomial distibution (page 5.1 tuned out to
More informationANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE
THE p-adic VALUATION OF STIRLING NUMBERS ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE Abstact. Let p > 2 be a pime. The p-adic valuation of Stiling numbes of the
More informationResearch Article On Alzer and Qiu s Conjecture for Complete Elliptic Integral and Inverse Hyperbolic Tangent Function
Abstact and Applied Analysis Volume 011, Aticle ID 697547, 7 pages doi:10.1155/011/697547 Reseach Aticle On Alze and Qiu s Conjectue fo Complete Elliptic Integal and Invese Hypebolic Tangent Function Yu-Ming
More informationCentral Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution
Statistics Reseach Lettes Vol. Iss., Novembe Cental Coveage Bayes Pediction Intevals fo the Genealized Paeto Distibution Gyan Pakash Depatment of Community Medicine S. N. Medical College, Aga, U. P., India
More informationgr0 GRAPHS Hanan Samet
g0 GRPHS Hanan Samet ompute Science epatment and ente fo utomation Reseach and Institute fo dvanced ompute Studies Univesity of Mayland ollege Pak, Mayland 074 e-mail: hjs@umiacs.umd.edu opyight 1997 Hanan
More informationOn decompositions of complete multipartite graphs into the union of two even cycles
On decompositions of complete multipatite gaphs into the union of two even cycles A. Su, J. Buchanan, R. C. Bunge, S. I. El-Zanati, E. Pelttai, G. Rasmuson, E. Spaks, S. Tagais Depatment of Mathematics
More informationThe Congestion of n-cube Layout on a Rectangular Grid S.L. Bezrukov J.D. Chavez y L.H. Harper z M. Rottger U.-P. Schroeder Abstract We consider the pr
The Congestion of n-cube Layout on a Rectangula Gid S.L. Bezukov J.D. Chavez y L.H. Hape z M. Rottge U.-P. Schoede Abstact We conside the poblem of embedding the n-dimensional cube into a ectangula gid
More informationUsing Laplace Transform to Evaluate Improper Integrals Chii-Huei Yu
Available at https://edupediapublicationsog/jounals Volume 3 Issue 4 Febuay 216 Using Laplace Tansfom to Evaluate Impope Integals Chii-Huei Yu Depatment of Infomation Technology, Nan Jeon Univesity of
More informationThe Chromatic Villainy of Complete Multipartite Graphs
Rocheste Institute of Technology RIT Schola Wos Theses Thesis/Dissetation Collections 8--08 The Chomatic Villainy of Complete Multipatite Gaphs Anna Raleigh an9@it.edu Follow this and additional wos at:
More informationPearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms
Peason s Chi-Squae Test Modifications fo Compaison of Unweighted and Weighted Histogams and Two Weighted Histogams Univesity of Akueyi, Bogi, v/noduslód, IS-6 Akueyi, Iceland E-mail: nikolai@unak.is Two
More informationNew problems in universal algebraic geometry illustrated by boolean equations
New poblems in univesal algebaic geomety illustated by boolean equations axiv:1611.00152v2 [math.ra] 25 Nov 2016 Atem N. Shevlyakov Novembe 28, 2016 Abstact We discuss new poblems in univesal algebaic
More informationFunctions Defined on Fuzzy Real Numbers According to Zadeh s Extension
Intenational Mathematical Foum, 3, 2008, no. 16, 763-776 Functions Defined on Fuzzy Real Numbes Accoding to Zadeh s Extension Oma A. AbuAaqob, Nabil T. Shawagfeh and Oma A. AbuGhneim 1 Mathematics Depatment,
More informationFractional Zero Forcing via Three-color Forcing Games
Factional Zeo Focing via Thee-colo Focing Games Leslie Hogben Kevin F. Palmowski David E. Robeson Michael Young May 13, 2015 Abstact An -fold analogue of the positive semidefinite zeo focing pocess that
More informationFall 2014 Randomized Algorithms Oct 8, Lecture 3
Fall 204 Randomized Algoithms Oct 8, 204 Lectue 3 Pof. Fiedich Eisenband Scibes: Floian Tamè In this lectue we will be concened with linea pogamming, in paticula Clakson s Las Vegas algoithm []. The main
More informationLecture 18: Graph Isomorphisms
INFR11102: Computational Complexity 22/11/2018 Lectue: Heng Guo Lectue 18: Gaph Isomophisms 1 An Athu-Melin potocol fo GNI Last time we gave a simple inteactive potocol fo GNI with pivate coins. We will
More informationRELIABILITY is an important concept in the design
Poceedings of the Wold Congess on Engineeing 0 Vol I WCE 0, July -, 0, London, U.K. Reliability Measues in Ciculant Netwok *Inda Rajasingh, Bhaati Rajan, and R. Sundaa Rajan Abstact Reliability and efficiency
More informationMath 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs
Math 30: The Edős-Stone-Simonovitz Theoem and Extemal Numbes fo Bipatite Gaphs May Radcliffe The Edős-Stone-Simonovitz Theoem Recall, in class we poved Tuán s Gaph Theoem, namely Theoem Tuán s Theoem Let
More informationMultiple Criteria Secretary Problem: A New Approach
J. Stat. Appl. Po. 3, o., 9-38 (04 9 Jounal of Statistics Applications & Pobability An Intenational Jounal http://dx.doi.og/0.785/jsap/0303 Multiple Citeia Secetay Poblem: A ew Appoach Alaka Padhye, and
More informationStanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012
Stanfod Univesity CS59Q: Quantum Computing Handout 8 Luca Tevisan Octobe 8, 0 Lectue 8 In which we use the quantum Fouie tansfom to solve the peiod-finding poblem. The Peiod Finding Poblem Let f : {0,...,
More information3.1 Random variables
3 Chapte III Random Vaiables 3 Random vaiables A sample space S may be difficult to descibe if the elements of S ae not numbes discuss how we can use a ule by which an element s of S may be associated
More informationDuality between Statical and Kinematical Engineering Systems
Pape 00, Civil-Comp Ltd., Stiling, Scotland Poceedings of the Sixth Intenational Confeence on Computational Stuctues Technology, B.H.V. Topping and Z. Bittna (Editos), Civil-Comp Pess, Stiling, Scotland.
More informationRelating Branching Program Size and. Formula Size over the Full Binary Basis. FB Informatik, LS II, Univ. Dortmund, Dortmund, Germany
Relating Banching Pogam Size and omula Size ove the ull Binay Basis Matin Saueho y Ingo Wegene y Ralph Wechne z y B Infomatik, LS II, Univ. Dotmund, 44 Dotmund, Gemany z ankfut, Gemany sauehof/wegene@ls.cs.uni-dotmund.de
More informationAnalytical Solutions for Confined Aquifers with non constant Pumping using Computer Algebra
Poceedings of the 006 IASME/SEAS Int. Conf. on ate Resouces, Hydaulics & Hydology, Chalkida, Geece, May -3, 006 (pp7-) Analytical Solutions fo Confined Aquifes with non constant Pumping using Compute Algeba
More informationAn intersection theorem for four sets
An intesection theoem fo fou sets Dhuv Mubayi Novembe 22, 2006 Abstact Fix integes n, 4 and let F denote a family of -sets of an n-element set Suppose that fo evey fou distinct A, B, C, D F with A B C
More informationSyntactical content of nite approximations of partial algebras 1 Wiktor Bartol Inst. Matematyki, Uniw. Warszawski, Warszawa (Poland)
Syntactical content of nite appoximations of patial algebas 1 Wikto Batol Inst. Matematyki, Uniw. Waszawski, 02-097 Waszawa (Poland) batol@mimuw.edu.pl Xavie Caicedo Dep. Matematicas, Univ. de los Andes,
More informationQuasi-Randomness and the Distribution of Copies of a Fixed Graph
Quasi-Randomness and the Distibution of Copies of a Fixed Gaph Asaf Shapia Abstact We show that if a gaph G has the popety that all subsets of vetices of size n/4 contain the coect numbe of tiangles one
More informationOn the Locality of Codeword Symbols
On the Locality of Codewod Symbols Paikshit Gopalan Micosoft Reseach paik@micosoft.com Cheng Huang Micosoft Reseach chengh@micosoft.com Segey Yekhanin Micosoft Reseach yekhanin@micosoft.com Huseyin Simitci
More informationC/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22
C/CS/Phys C9 Sho s ode (peiod) finding algoithm and factoing /2/4 Fall 204 Lectue 22 With a fast algoithm fo the uantum Fouie Tansfom in hand, it is clea that many useful applications should be possible.
More informationST 501 Course: Fundamentals of Statistical Inference I. Sujit K. Ghosh.
ST 501 Couse: Fundamentals of Statistical Infeence I Sujit K. Ghosh sujit.ghosh@ncsu.edu Pesented at: 2229 SAS Hall, Depatment of Statistics, NC State Univesity http://www.stat.ncsu.edu/people/ghosh/couses/st501/
More informationOn the Poisson Approximation to the Negative Hypergeometric Distribution
BULLETIN of the Malaysian Mathematical Sciences Society http://mathusmmy/bulletin Bull Malays Math Sci Soc (2) 34(2) (2011), 331 336 On the Poisson Appoximation to the Negative Hypegeometic Distibution
More informationHOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS?
6th INTERNATIONAL MULTIDISCIPLINARY CONFERENCE HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS? Cecília Sitkuné Göömbei College of Nyíegyháza Hungay Abstact: The
More informationA Converse to Low-Rank Matrix Completion
A Convese to Low-Rank Matix Completion Daniel L. Pimentel-Alacón, Robet D. Nowak Univesity of Wisconsin-Madison Abstact In many pactical applications, one is given a subset Ω of the enties in a d N data
More informationCompactly Supported Radial Basis Functions
Chapte 4 Compactly Suppoted Radial Basis Functions As we saw ealie, compactly suppoted functions Φ that ae tuly stictly conditionally positive definite of ode m > do not exist The compact suppot automatically
More informationProbablistically Checkable Proofs
Lectue 12 Pobablistically Checkable Poofs May 13, 2004 Lectue: Paul Beame Notes: Chis Re 12.1 Pobablisitically Checkable Poofs Oveview We know that IP = PSPACE. This means thee is an inteactive potocol
More informationLocalization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matrix
Jounal of Sciences, Islamic Republic of Ian (): - () Univesity of Tehan, ISSN - http://sciencesutaci Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matix H Ahsani
More informationInformation Retrieval Advanced IR models. Luca Bondi
Advanced IR models Luca Bondi Advanced IR models 2 (LSI) Pobabilistic Latent Semantic Analysis (plsa) Vecto Space Model 3 Stating point: Vecto Space Model Documents and queies epesented as vectos in the
More informationarxiv: v1 [math.co] 6 Mar 2008
An uppe bound fo the numbe of pefect matchings in gaphs Shmuel Fiedland axiv:0803.0864v [math.co] 6 Ma 2008 Depatment of Mathematics, Statistics, and Compute Science, Univesity of Illinois at Chicago Chicago,
More informationA generalization of the Bernstein polynomials
A genealization of the Benstein polynomials Halil Ouç and Geoge M Phillips Mathematical Institute, Univesity of St Andews, Noth Haugh, St Andews, Fife KY16 9SS, Scotland Dedicated to Philip J Davis This
More informationEuclidean Figures and Solids without Incircles or Inspheres
Foum Geometicoum Volume 16 (2016) 291 298. FOUM GEOM ISSN 1534-1178 Euclidean Figues and Solids without Incicles o Insphees Dimitis M. Chistodoulou bstact. ll classical convex plana Euclidean figues that
More informationSupplementary information Efficient Enumeration of Monocyclic Chemical Graphs with Given Path Frequencies
Supplementay infomation Efficient Enumeation of Monocyclic Chemical Gaphs with Given Path Fequencies Masaki Suzuki, Hioshi Nagamochi Gaduate School of Infomatics, Kyoto Univesity {m suzuki,nag}@amp.i.kyoto-u.ac.jp
More informationQIP Course 10: Quantum Factorization Algorithm (Part 3)
QIP Couse 10: Quantum Factoization Algoithm (Pat 3 Ryutaoh Matsumoto Nagoya Univesity, Japan Send you comments to yutaoh.matsumoto@nagoya-u.jp Septembe 2018 @ Tokyo Tech. Matsumoto (Nagoya U. QIP Couse
More informationWeb-based Supplementary Materials for. Controlling False Discoveries in Multidimensional Directional Decisions, with
Web-based Supplementay Mateials fo Contolling False Discoveies in Multidimensional Diectional Decisions, with Applications to Gene Expession Data on Odeed Categoies Wenge Guo Biostatistics Banch, National
More informationA Multivariate Normal Law for Turing s Formulae
A Multivaiate Nomal Law fo Tuing s Fomulae Zhiyi Zhang Depatment of Mathematics and Statistics Univesity of Noth Caolina at Chalotte Chalotte, NC 28223 Abstact This pape establishes a sufficient condition
More information1 Explicit Explore or Exploit (E 3 ) Algorithm
2.997 Decision-Making in Lage-Scale Systems Mach 3 MIT, Sping 2004 Handout #2 Lectue Note 9 Explicit Exploe o Exploit (E 3 ) Algoithm Last lectue, we studied the Q-leaning algoithm: [ ] Q t+ (x t, a t
More informationNOTE. Some New Bounds for Cover-Free Families
Jounal of Combinatoial Theoy, Seies A 90, 224234 (2000) doi:10.1006jcta.1999.3036, available online at http:.idealibay.com on NOTE Some Ne Bounds fo Cove-Fee Families D. R. Stinson 1 and R. Wei Depatment
More informationGraphs of Sine and Cosine Functions
Gaphs of Sine and Cosine Functions In pevious sections, we defined the tigonometic o cicula functions in tems of the movement of a point aound the cicumfeence of a unit cicle, o the angle fomed by the
More informationAbsorption Rate into a Small Sphere for a Diffusing Particle Confined in a Large Sphere
Applied Mathematics, 06, 7, 709-70 Published Online Apil 06 in SciRes. http://www.scip.og/jounal/am http://dx.doi.og/0.46/am.06.77065 Absoption Rate into a Small Sphee fo a Diffusing Paticle Confined in
More informationThe Substring Search Problem
The Substing Seach Poblem One algoithm which is used in a vaiety of applications is the family of substing seach algoithms. These algoithms allow a use to detemine if, given two chaacte stings, one is
More informationFailure Probability of 2-within-Consecutive-(2, 2)-out-of-(n, m): F System for Special Values of m
Jounal of Mathematics and Statistics 5 (): 0-4, 009 ISSN 549-3644 009 Science Publications Failue Pobability of -within-consecutive-(, )-out-of-(n, m): F System fo Special Values of m E.M.E.. Sayed Depatment
More informationThe Archimedean Circles of Schoch and Woo
Foum Geometicoum Volume 4 (2004) 27 34. FRUM GEM ISSN 1534-1178 The Achimedean Cicles of Schoch and Woo Hioshi kumua and Masayuki Watanabe Abstact. We genealize the Achimedean cicles in an abelos (shoemake
More informationCERFACS 42 av. Gaspard Coriolis, Toulouse, Cedex 1, France. Available at Date: April 2, 2008.
ON THE BLOCK TRIANGULAR FORM OF SYMMETRIC MATRICES IAIN S. DUFF and BORA UÇAR Technical Repot: No: TR/PA/08/26 CERFACS 42 av. Gaspad Coiolis, 31057 Toulouse, Cedex 1, Fance. Available at http://www.cefacs.f/algo/epots/
More informationDo Managers Do Good With Other People s Money? Online Appendix
Do Manages Do Good With Othe People s Money? Online Appendix Ing-Haw Cheng Haison Hong Kelly Shue Abstact This is the Online Appendix fo Cheng, Hong and Shue 2013) containing details of the model. Datmouth
More informationSurveillance Points in High Dimensional Spaces
Société de Calcul Mathématique SA Tools fo decision help since 995 Suveillance Points in High Dimensional Spaces by Benad Beauzamy Januay 06 Abstact Let us conside any compute softwae, elying upon a lage
More informationgr0 GRAPHS Hanan Samet
g0 GRPHS Hanan Samet ompute Science epatment and ente fo utomation Reseach and Institute fo dvanced ompute Studies Univesity of Mayland ollege Pak, Mayland 0 e-mail: hjs@umiacs.umd.edu opyight 199 Hanan
More informationUpper Bounds for Tura n Numbers. Alexander Sidorenko
jounal of combinatoial theoy, Seies A 77, 134147 (1997) aticle no. TA962739 Uppe Bounds fo Tua n Numbes Alexande Sidoenko Couant Institute of Mathematical Sciences, New Yok Univesity, 251 Mece Steet, New
More informationAn upper bound on the number of high-dimensional permutations
An uppe bound on the numbe of high-dimensional pemutations Nathan Linial Zu Luia Abstact What is the highe-dimensional analog of a pemutation? If we think of a pemutation as given by a pemutation matix,
More informationEncapsulation theory: the transformation equations of absolute information hiding.
1 Encapsulation theoy: the tansfomation equations of absolute infomation hiding. Edmund Kiwan * www.edmundkiwan.com Abstact This pape descibes how the potential coupling of a set vaies as the set is tansfomed,
More informationConstruction Schemes for Fault-Tolerant Hamiltonian Graphs
Constuction Schemes fo Fault-Toleant Hamiltonian Gaphs Jeng-Jung Wang Depatment of Compute and Infomation Science, National Chiao Tung Univesity, Hsinchu, Taiwan 30050, Republic of China Chun-Nan Hung
More informationAQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013
AQI: Advanced Quantum Infomation Lectue 2 (Module 4): Ode finding and factoing algoithms Febuay 20, 203 Lectue: D. Mak Tame (email: m.tame@impeial.ac.uk) Intoduction In the last lectue we looked at the
More informationASTR415: Problem Set #6
ASTR45: Poblem Set #6 Cuan D. Muhlbege Univesity of Mayland (Dated: May 7, 27) Using existing implementations of the leapfog and Runge-Kutta methods fo solving coupled odinay diffeential equations, seveal
More informationTurán Numbers of Vertex-disjoint Cliques in r- Partite Graphs
Univesity of Wyoming Wyoming Scholas Repositoy Honos Theses AY 16/17 Undegaduate Honos Theses Sping 5-1-017 Tuán Numbes of Vetex-disjoint Cliques in - Patite Gaphs Anna Schenfisch Univesity of Wyoming,
More informationBounds on the performance of back-to-front airplane boarding policies
Bounds on the pefomance of bac-to-font aiplane boading policies Eitan Bachmat Michael Elin Abstact We povide bounds on the pefomance of bac-to-font aiplane boading policies. In paticula, we show that no
More informationGoodness-of-fit for composite hypotheses.
Section 11 Goodness-of-fit fo composite hypotheses. Example. Let us conside a Matlab example. Let us geneate 50 obsevations fom N(1, 2): X=nomnd(1,2,50,1); Then, unning a chi-squaed goodness-of-fit test
More informationApplication of Parseval s Theorem on Evaluating Some Definite Integrals
Tukish Jounal of Analysis and Numbe Theoy, 4, Vol., No., -5 Available online at http://pubs.sciepub.com/tjant/// Science and Education Publishing DOI:.69/tjant--- Application of Paseval s Theoem on Evaluating
More informationTo Feel a Force Chapter 7 Static equilibrium - torque and friction
To eel a oce Chapte 7 Chapte 7: Static fiction, toque and static equilibium A. Review of foce vectos Between the eath and a small mass, gavitational foces of equal magnitude and opposite diection act on
More informationA Short Combinatorial Proof of Derangement Identity arxiv: v1 [math.co] 13 Nov Introduction
A Shot Combinatoial Poof of Deangement Identity axiv:1711.04537v1 [math.co] 13 Nov 2017 Ivica Matinjak Faculty of Science, Univesity of Zageb Bijenička cesta 32, HR-10000 Zageb, Coatia and Dajana Stanić
More informationONE-POINT CODES USING PLACES OF HIGHER DEGREE
ONE-POINT CODES USING PLACES OF HIGHER DEGREE GRETCHEN L. MATTHEWS AND TODD W. MICHEL DEPARTMENT OF MATHEMATICAL SCIENCES CLEMSON UNIVERSITY CLEMSON, SC 29634-0975 U.S.A. E-MAIL: GMATTHE@CLEMSON.EDU, TMICHEL@CLEMSON.EDU
More informationMatrix Colorings of P 4 -sparse Graphs
Diplomabeit Matix Coloings of P 4 -spase Gaphs Chistoph Hannnebaue Januay 23, 2010 Beteue: Pof. D. Winfied Hochstättle FenUnivesität in Hagen Fakultät fü Mathematik und Infomatik Contents Intoduction iii
More informationModified Linear Programming and Class 0 Bounds for Graph Pebbling
Modified Linea Pogamming and Class 0 Bounds fo Gaph Pebbling Daniel W. Canston Luke Postle Chenxiao Xue Cal Yege August 8, 05 Abstact Given a configuation of pebbles on the vetices of a connected gaph
More informationJournal of Inequalities in Pure and Applied Mathematics
Jounal of Inequalities in Pue and Applied Mathematics COEFFICIENT INEQUALITY FOR A FUNCTION WHOSE DERIVATIVE HAS A POSITIVE REAL PART S. ABRAMOVICH, M. KLARIČIĆ BAKULA AND S. BANIĆ Depatment of Mathematics
More informationApproximation Algorithms and Hardness of the k-route Cut Problem
Appoximation Algoithms and Hadness of the k-route Cut Poblem Julia Chuzhoy Yuy Makaychev Aavindan Vijayaaghavan Yuan Zhou July 10, 2011 Abstact We study the k-oute cut poblem: given an undiected edge-weighted
More informationConspiracy and Information Flow in the Take-Grant Protection Model
Conspiacy and Infomation Flow in the Take-Gant Potection Model Matt Bishop Depatment of Compute Science Univesity of Califonia at Davis Davis, CA 95616-8562 ABSTRACT The Take Gant Potection Model is a
More informationarxiv: v1 [math.co] 1 Apr 2011
Weight enumeation of codes fom finite spaces Relinde Juius Octobe 23, 2018 axiv:1104.0172v1 [math.co] 1 Ap 2011 Abstact We study the genealized and extended weight enumeato of the - ay Simplex code and
More informationCOMPUTATIONS OF ELECTROMAGNETIC FIELDS RADIATED FROM COMPLEX LIGHTNING CHANNELS
Pogess In Electomagnetics Reseach, PIER 73, 93 105, 2007 COMPUTATIONS OF ELECTROMAGNETIC FIELDS RADIATED FROM COMPLEX LIGHTNING CHANNELS T.-X. Song, Y.-H. Liu, and J.-M. Xiong School of Mechanical Engineeing
More informationEM Boundary Value Problems
EM Bounday Value Poblems 10/ 9 11/ By Ilekta chistidi & Lee, Seung-Hyun A. Geneal Desciption : Maxwell Equations & Loentz Foce We want to find the equations of motion of chaged paticles. The way to do
More informationApproximation Algorithms and Hardness of the k-route Cut Problem
Appoximation Algoithms and Hadness of the k-route Cut Poblem Julia Chuzhoy Yuy Makaychev Aavindan Vijayaaghavan Yuan Zhou Decembe 14, 2011 Abstact We study the k-oute cut poblem: given an undiected edge-weighted
More informationSemicanonical basis generators of the cluster algebra of type A (1)
Semicanonical basis geneatos of the cluste algeba of type A (1 1 Andei Zelevinsky Depatment of Mathematics Notheasten Univesity, Boston, USA andei@neu.edu Submitted: Jul 7, 006; Accepted: Dec 3, 006; Published:
More informationA STUDY OF HAMMING CODES AS ERROR CORRECTING CODES
AGU Intenational Jounal of Science and Technology A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES Ritu Ahuja Depatment of Mathematics Khalsa College fo Women, Civil Lines, Ludhiana-141001, Punjab, (India)
More informationEQUI-PARTITIONING OF HIGHER-DIMENSIONAL HYPER-RECTANGULAR GRID GRAPHS
EQUI-PARTITIONING OF HIGHER-DIMENSIONAL HYPER-RECTANGULAR GRID GRAPHS ATHULA GUNAWARDENA AND ROBERT R MEYER Abstact A d-dimensional gid gaph G is the gaph on a finite subset in the intege lattice Z d in
More informationChapter 5 Linear Equations: Basic Theory and Practice
Chapte 5 inea Equations: Basic Theoy and actice In this chapte and the next, we ae inteested in the linea algebaic equation AX = b, (5-1) whee A is an m n matix, X is an n 1 vecto to be solved fo, and
More informationHypothesis Test and Confidence Interval for the Negative Binomial Distribution via Coincidence: A Case for Rare Events
Intenational Jounal of Contempoay Mathematical Sciences Vol. 12, 2017, no. 5, 243-253 HIKARI Ltd, www.m-hikai.com https://doi.og/10.12988/ijcms.2017.7728 Hypothesis Test and Confidence Inteval fo the Negative
More informationOn the Quasi-inverse of a Non-square Matrix: An Infinite Solution
Applied Mathematical Sciences, Vol 11, 2017, no 27, 1337-1351 HIKARI Ltd, wwwm-hikaicom https://doiog/1012988/ams20177273 On the Quasi-invese of a Non-squae Matix: An Infinite Solution Ruben D Codeo J
More informationLifting Private Information Retrieval from Two to any Number of Messages
Lifting Pivate Infomation Retieval fom Two to any umbe of Messages Rafael G.L. D Oliveia, Salim El Rouayheb ECE, Rutges Univesity, Piscataway, J Emails: d746@scaletmail.utges.edu, salim.elouayheb@utges.edu
More information1) (A B) = A B ( ) 2) A B = A. i) A A = φ i j. ii) Additional Important Properties of Sets. De Morgan s Theorems :
Additional Impotant Popeties of Sets De Mogan s Theoems : A A S S Φ, Φ S _ ( A ) A ) (A B) A B ( ) 2) A B A B Cadinality of A, A, is defined as the numbe of elements in the set A. {a,b,c} 3, { }, while
More information4/18/2005. Statistical Learning Theory
Statistical Leaning Theoy Statistical Leaning Theoy A model of supevised leaning consists of: a Envionment - Supplying a vecto x with a fixed but unknown pdf F x (x b Teache. It povides a desied esponse
More informationCOLLAPSING WALLS THEOREM
COLLAPSING WALLS THEOREM IGOR PAK AND ROM PINCHASI Abstact. Let P R 3 be a pyamid with the base a convex polygon Q. We show that when othe faces ae collapsed (otated aound the edges onto the plane spanned
More informationF-IF Logistic Growth Model, Abstract Version
F-IF Logistic Gowth Model, Abstact Vesion Alignments to Content Standads: F-IFB4 Task An impotant example of a model often used in biology o ecology to model population gowth is called the logistic gowth
More information16 Modeling a Language by a Markov Process
K. Pommeening, Language Statistics 80 16 Modeling a Language by a Makov Pocess Fo deiving theoetical esults a common model of language is the intepetation of texts as esults of Makov pocesses. This model
More informationThe inverse strong non-split r-domination number of a graph
MultiCaft Intenational Jounal of Engineeing, Science and Technology INTERNATIONAL JOURNAL OF ENGINEERING, SCIENCE AND TECHNOLOGY www.ijest-ng.com 2010 MultiCaft Limited. All ights eseved The invese stong
More informationLikelihood vs. Information in Aligning Biopolymer Sequences. UCSD Technical Report CS Timothy L. Bailey
Likelihood vs. Infomation in Aligning Biopolyme Sequences UCSD Technical Repot CS93-318 Timothy L. Bailey Depatment of Compute Science and Engineeing Univesity of Califonia, San Diego 1 Febuay, 1993 ABSTRACT:
More informationApproximation Algorithms and Hardness of the k-route Cut Problem
Appoximation Algoithms and Hadness of the k-route Cut Poblem Julia Chuzhoy Yuy Makaychev Aavindan Vijayaaghavan Yuan Zhou Novembe 26, 2011 Abstact We study the k-oute cut poblem: given an undiected edge-weighted
More informationPhysics 2A Chapter 10 - Moment of Inertia Fall 2018
Physics Chapte 0 - oment of netia Fall 08 The moment of inetia of a otating object is a measue of its otational inetia in the same way that the mass of an object is a measue of its inetia fo linea motion.
More information