Key words. free Boolean algebra, measure, Bonferroni-type inquality, exclusion-inclusion, missing
|
|
- Giles Nelson
- 6 years ago
- Views:
Transcription
1 AN INCLUSION-EXCLUSION RESULT FOR BOOLEAN POLYNOMIALS AND ITS APPLICATIONS IN DATA MINING SZYMON JAROSZEWICZ, DAN A. SIMOVICI, AND IVO ROSENBERG Abstract. We characterize measures on free Boolean algebras and we examine the relationships that exists between measures and binary tables in relational databases. It is shown that these measures are completely defined by their values on positive conjunctions, and a formula that obtains this value is given by using the method of indicators. We also obtain Bonferroni-type inequalities that allow approximative evaluations of there measures. Finally we present a measure extending the notion of support that is well suited for tables with missing values. Key words. free Boolean algebra, measure, Bonferroni-type inquality, exclusion-inclusion, missing values 1. Introduction. The focus of this paper is a study of measures on free Boolean algebras with a finite number of generators (abbreviated as MFBAs) who tae their values in the set N of natural numbers. As we shall see, these measures play an important role in query optimization in relational databases, and also, in the study of frequent sets in data mining. We obtain general Bonferroni-type inequalities for sizes of arbitrary Boolean queries. The origin of our investigation resides in a series of seminal papers by H. Mannila et al. ([3, 2, 5]) in which the idea of using supports of attribute sets discovered with a data mining algorithm to obtain the size of a database query was introduced. Let B = (B, 0, 1,,, ) be a Boolean algebra, where 0, 1 B are two distinguished elements of B, is a unary operation, and, are two binary associative, commutative, and idempotent operation that satisfy the usual axioms of Boolean algebras (see, for example [7]). Here 0 and 1 are the least and the largest element of the algebra, respectively. We define x b x if b = 1 = x if b = 0, for x B and b 0, 1}. It is a well-nown fact that a Boolean algebra B = (B, 0, 1,,, ) defines a Boolean ring structure, B = (B, 0, 1,, ), where plays the role of the multiplication, and the role of addition, where x y = (x ȳ) ( x y) for x, y B. This ring is unitary, commutative, and has characteristic 2 (since x x = 0 for every x). Also, 1 x = x. Let A = a 1,..., a n } be a set of n variables. The set pol(a) of Boolean polynomials of the n variables in A is defined inductively by: 1. 0, 1, and each a i belong to pol(a) for 1 i n; 2. if p, q belong to pol(a), then p, (p q), and (p q) belong to pol(a). University of Massachusetts at Boston, Department of Computer Science, Boston, Massachusetts 02125, USA Université de Montréal, C.P. 6128, succ. A, Montréal, P.Q. H3C 3J7, Canada 1
2 If p, q pol(a), then we denote by (p q) the polynomial ((p q) ( p q)). A Boolean polynomial ( ((p 1 ωp 2 )ωp 3 )ω ωp n ) is denoted by (p 1 ωp 2 ω ωp n ), where ω,, }. Also, we denote by var(p) the set of variables that occur in the polynomial p. Let B = (B, 0, 1,,, ) be a Boolean algebra and let A = a 1,..., a n } be a set of n attributes. The n-ary function f p : B n B generated by a polynomial p pol(a) is defined in the usual way. We write p = q for p, q pol(a) if f p = f q. Let b = (b 1,..., b n ) be a sequence of elements of the set 1, 0}. An A-minterm is a Boolean polynomial p b = a b1 1 abn n, The set of A-minterms is denoted by mint(a). Any Boolean polynomial in pol(a) can be uniquely written as a disjunction of some subset of A-minterms (up to the order of the disjuncts). This observation implies that the Boolean algebra pol(a) is isomorphic to the Boolean algebra of collections of subsets of the set A; thus, pol(a) has 2 2n elements. For a set of polynomials M = p 1,..., p n } and J = j 1,..., j m } 1,..., n} we denote by p J the conjunction p j1 p jm. For the special case, when J = we write p J = 1. A measure on a Boolean algebra B = (B, 0, 1,,, ) is a non-negative, realvalued function µ : B R such that µ(x y) = µ(x) + µ(y) for every x, y B such that x y = A Representation Result for MFBAs. Let A = a 1,..., a n } be a set of variables. In this context, we find convenient to use the relational database terminology and we refer to the the members of A as attributes. We attach a set Dom(a i ) to each attribute a i such that Dom(a i ) 2. The set Dom(a i ) is the domain of a i. A table is a triple τ = (T, A, ρ), where T is the name of the table, A = a 1,..., a n } is the heading of the table and ρ = t 1,..., t m } is a finite set of functions of the form t i : A a A Dom(a) such that t i(a) Dom(a) for every a A. Following the relational database terminology we shall refer to these functions as A-tuples, or simpler, as tuples. If Dom(a i ) = 0, 1} for 1 i n, then τ is a binary table. Let τ = (T, A, ρ) be a binary table. A query on the table τ is a Boolean polynomial in pol(a). This definition of queries is a formalization of the usual notion of query in databases. Example 2.1. To retrieve in SQL all tuples t of τ such that at least two of t(a 1 ), t(a 2 ) and t(a 3 ) equal 1 we write the query as select * from T where (a 1 = 1 and a 2 = 1) or (a 2 = 1 and a 3 = 1) or (a 1 = 1 and a 3 = 1); The condition specified in this select corresponds to the polynomial (a 1 a 2 ) (a 2 a 3 ) (a 1 a 3 ). A query p defines a table Q(p, τ) = (T p, A, ρ p ), where ρ p is defined inductively as follows: 1. ρ 0 = and ρ 1 = ρ; 2. if p = a i, then ρ p = t ρ t(a i ) = 1}; 3. if p = q, then ρ p = ρ ρ q ; 4. if p = (q 1 q 2 ), then ρ p = ρ p1 ρ p2 and, 5. if p = (q 1 q 2 ), then ρ p = ρ p1 ρ p2. 2
3 It is easy to see that for a conjunction p = a b1 i 1 a bm i m, where b i 0, 1} for 1 i m, the set ρ p consists of those tuples t such that t(a il ) = b l for 1 l m. Theorem 2.1. A function µ : pol(a) N is a measure if and only if there exists a binary table τ = (T, A, ρ) such that µ(p) = ρ p for all p pol(a). Proof. Suppose that τ = (T, A, ρ) is a table. Define the mapping µ τ : pol(a) R by µ(p) = ρ p for every p pol(a). Let p, q be two polynomials such that (p q) = 0. Then, µ τ (p q) = ρ p q = ρ p ρ q. Since p q = 0 we have ρ p ρ q =, so µ τ (p q) = µ τ (p) + µ τ (q). Thus, µ τ is a measure on pol(a). Conversely, let µ be a measure on pol(a), where A = a 1,..., a n }. If b = (b 1,..., b n ) 0, 1} n, p b = a b1 1 abn n is a minterm and µ(p b ) = consider a set σ p b of tuples t 1 b,..., t b, where t j (a i ) = b i for every i, j, 1 j, and 1 i n. b Define the table τ µ = (T, A, ρ µ ), where ρ = σ p b p b mint(a)}. We claim that µ(p) = ρ p for every polynomial p pol(a). Suppose that p can be expressed as a disjunction of minterms p = p b1 p b, where b 1,..., b 0, 1} n. Then, µ(p) = j=1 µ(p bj ), because p bl p bh = 0 when l h. On the other hand, ρ p = j=1 ρ p bj = j=1 ρ p bj, so µ(p) = ρ p. We shall refer to µ τ as the measure induced by the table τ on pol(a). In the next section we regard the set of minterms mint(a) as a sample space and each polynomial p pol(a) as an event on this sample space. The event p occurs in p b if p b p. Thus, if µ is a measure on pol(a), then the mapping P µ : pol(a) R given by P µ (p) = µ(p) µ(1) is a probability on pol(a). 3. An Exclusion-Inclusion Principle for MFBAs. Let p be a polynomial in pol(a). It is nown that p can be uniquely written as p = (i 1,...,i m) c (i1,...,i m) a i1 a im, where the summation involves the exclusive or operation and is extended to all subsets i 1,..., i m } of 1,..., n}. The coefficients c (i1,...,i m) belong to the set 0, 1}. Thus, for a measure µ on pol(a) it is interesting to evaluate µ(p 1 p 2 p m ), where p 1,..., p m are polynomials in pol(a). The indicator random variable of a polynomial p is the variable I p defined by 1 if p b p I p (p b ) = 0 otherwise. for p b mint(a). If M = p 1,..., p n } and J = j 1,..., j m } 1,..., n}, then p J = p j1... p jm, and I pj = I pj1 I pjm. Note that the expected value E[I p ] of I p equals P µ (p). For a set of polynomials M denote by S µ M, the probability that exactly events in M hold: S µ M, = P µ (p K ) K = }. 3
4 The number of -subsets K of M such that p K holds is given by the random variable IpK K = }. By the previous observation S µ M, = [ ] E(I pk ) K = } = E IpK K = }. Let ν M be the random variable on mint(a) such that ν M (p b ) = p i M p b p i }. Note that ( ν M gives ) the number of events in M that hold and, therefore, the random νm variable gives the number of -subsets Q of M such that p Q holds, which νm means that = I pk K = }, and S µ M, = E [( νm )]. (3.1) The equality (3.1) is the basis of the method of indicators, that is a method of proving probabilistic identities by taing expectations of their non-probabilistic counterparts, see [1] for details. Theorem 3.1. Let µ : pol(a) N be a measure on the free Boolean algebra pol(a), where A = a 1,..., a n }. If P = p 1,..., p m } is a set of m polynomials of pol(a), then µ(p 1 p m ) = m ( 2) 1 µ(p K ) K 1,..., m}, K = }. (3.2) =1 Proof. Let a N, note that ( 1) a = a a =0 ( 2), which yields, after elementary transformations: a ( 2) 1 a = ( 1) a 0 if a is even 1 = 1 if a is odd. This implies =1 ν M =1 ( 2) 1 ( νm ) M ( = ( 2) 1 νm =1 ) = 0, if νn is even 1, if ν n is odd. By taing expectations of both sides, and using equality (3.1) we get M E ( 2) 1 νm =1 M [] M = ( 2) 1 νm E = ( 2) 1 S µ M, = P µ(ν m is odd) = P µ (p 1... p m ). =1 =1 Since S µ M, = µ(pk ) K 1,..., m}, K = }, µ(1) 4
5 we obtain the desired equality. Corollary 3.2. Let µ, µ : pol(a) N be two measures on the free Boolean algebra pol(a), where A = a 1,..., a n }. If µ(p) = µ (p) for every conjunction p of the form p = a i1 a im, then µ = µ. Proof. The result follows immediately from Theorem 3.1. Example 3.1. Consider the majority polynomial p maj = (a 1 a 2 ) (a 2 a 3 ) (a 1 a 3 ). For f pmaj we have f pmaj (x 1, x 2, x 3 ) = 1 if and only if at least two of its arguments are equal to 1. Note that Theorem 3.1 allows us to write p maj = (a 1 a 2 ) (a 2 a 3 ) (a 1 a 3 ). µ(p maj ) = µ(a 1 a 2 ) + µ(a 2 a 3 ) + µ(a 1 a 3 ) 2µ((a 1 a 2 ) (a 2 a 3 )) 2µ((a 1 a 2 ) (a 1 a 3 )) 2µ((a 2 a 3 ) (a 1 a 3 )) + 4µ((a 1 a 2 ) (a 2 a 3 ) (a 1 a 2 )) = µ(a 1 a 2 ) + µ(a 2 a 3 ) + µ(a 1 a 3 ) 2µ(a 1 a 2 a 3 ). Corollary 3.2 shows that the values of a measure on pol(a) is completely determined by its values on positive conjunctions of the form a I for I 1,..., n}. Note that the contribution of every tuple of a table τ = (T, A, ρ) of the form (b 1,..., b n ) to the value of µ τ (I) equals 1 for every set I such that I i 1,... n} b i = 1}. Next, we obtain Bonferroni type inequalities [1] that give bounds on the value of µ(p 1... p m ). To this end we need the following technical result: Define Wb a for a, b N and b a as a Wb a = ( 2) 1 a Alternatively, Wb a can be written as a Wb a = ( 2) b 1 ( 2) b a a b = ( 2) b 1 ( 2) l a. b + l =b =b Lemma 3.3. The signs of the members of the sequence (W a b, W a b+1,..., W a a ) are alternating. Theorem 3.4. For any r, s N we have: 2r 2s+1 µ(1) ( 2) 1 S µ µ(p 1... p m ) µ(1) ( 2) 1 S µ. =1 Proof. By equality (3.1) and Lemma 3.3 we get that for any r, s N implying 2r =1 2r =1 ( 2) 1 a =1 l=0 =1 =1 a 2s+1 ( 2) 1 a ( 2) 1 a, M ( 2) 1 νm 2s+1 ( 2) 1 νm ( ( 2) 1 νm =1 5 =1 ).
6 By applying expectations and using equality (3.1) we get the desired result. Example 3.2. Consider a table τ given below a 1 a 2 a and the majority polynomial p maj from Example 3.1. We have µ(a 1 a 2 ) = 4, µ(a 1 a 3 ) = 3, µ(a 2 a 3 ) = 3, giving µ(p maj ) 10. Also µ((a 1 a 2 ) (a 1 a 3 )) = µ((a 1 a 2 ) (a 2 a 3 )) = µ((a 1 a 3 ) (a 2 a 3 )) = 1 giving µ(p maj ) 4. The true value of µ(p maj ) is 8. Let V : 0, 1} 0, 1} be the bijection defined by V(0) = 0 and V(1) = 1, where 0, 1 R. Note that V(a b) = V(a) + V(b) V(a)V(b), (3.3) V(a b) = V(a)V(b), (3.4) V(ā) = 1 V(a), (3.5) for every a, b 0, 1}. For a Boolean function f : 0, 1} n φ f : 0, 1} n 0, 1} by 0, 1} define the real-valued function φ f (ξ 1,..., ξ n ) = V(f(V 1 (ξ 1 ),..., V 1 (ξ n ))) for every ξ 1,..., ξ n 0, 1}. Example 3.3. It is easy to verify that if p is the majority polynomial considered in Example 3.1, then for the numerical function φ fp we can write: φ fp (ξ 1, ξ 2, ξ 3 ) = ξ 1 ξ 2 + ξ 2 ξ 3 + ξ 1 ξ 3 2ξ 1 ξ 2 ξ 3 for every ξ 1, ξ 2, ξ 3 0, 1}. Note that the coefficients are the same as the ones in Example 3.1. The remar contained in the above Example is not a coincidence. Next, we prove that for every polynomial p, the numerical function φ fp can be expressed as a sum of monomials multiplied by the coefficients that occur in the expansion of µ(p) given in Theorem 3.1. Theorem 3.5. Let A = a 1,..., a n } and p pol(a). Suppose that µ(p) = I I c I µ(a I ), where I is a family of subsets of 1,..., n}. Then, we have: φ fp (ξ 1,..., ξ n ) = I I c I ξ I, where ξ I is the monomial ξ I = ξ i1 ξ im. 6
7 Proof. Let p, q, r pol(a) such that r = (p q). We have: φ fr (ξ 1,..., ξ n ) = V(f r (V 1 (ξ 1,..., ξ n ))) = V(f p (V 1 (ξ 1,..., ξ n )) f q (V 1 (ξ 1,..., ξ n )) = V(f p (V 1 (ξ 1,..., ξ n )) + f q (V 1 (ξ 1,..., ξ n )) for (x 1,..., x n ) 0, 1} n, by equality( 3.3). Thus, V(f p (V 1 (ξ 1,..., ξ n ))) V(f q (V 1 (ξ 1,..., ξ n ))), φ fr (ξ 1,..., ξ n ) = φ fp (ξ 1,..., ξ n ) + φ fq (ξ 1,..., ξ n ) φ fp (ξ 1,..., ξ n )φ fq (ξ 1,..., ξ n ) for (ξ 1,..., ξ n ) 0, 1} n. Since φ fp q (ξ 1,..., ξ n ) = φ fp (ξ 1,..., ξ n )φ fq (ξ 1,..., ξ n ), p q = 0 implies φ fr (ξ 1,..., ξ n ) = φ fp (ξ 1,..., ξ n ) + φ fq (ξ 1,..., ξ n ) for every (ξ 1,..., ξ n ) 0, 1} n. This shows that for a every ξ = (ξ 1,..., ξ n ), the mapping µ : pol(a) R defined by µ ξ (p) = φ fp (ξ) is a measure on pol(a), so Theorem 3.1 is applicable and we can write: φ fp (ξ 1,..., ξ n ) = I I c I ξ I, for every (ξ 1,..., ξ n ) 0, 1} n. 4. Applications in Data Mining and Database Query Optimization Accuracy of Inclusion-Exclusion Principle. In database query optimization and in data mining, it is often necessary to estimate the number of rows in a database table satisfying a given query. Unfortunately, in most cases, the exact number of rows satisfying a query cannot be computed exactly and has to be estimated (usually using the assumption of statistical independence between attributes). Let τ = (T, A, ρ) be a binary table and let K be a set of attributes, K A. The support of the set K relative to the table τ is defined as the number: supp τ (K) = t ρ t(a) = 1 for all a K}. Thus, supp τ (K) = µ τ (a 1... a m ), where K = a 1,..., a m }. In other words, the support of an attribute set K in the table τ can we viewed as the value of the measure induced by the table on the Boolean polynomial that describes the attribute set. By extension, we can regard the number µ τ (q) as the support of the query q and we denote this number by supp(q). Indeed, if q pol(a) is a query involving a table τ = (T, A, ρ) such that q can be written as q = c a I, where c 0, 1} and I is a collection of subsets of 1,..., n}, then supp(q) can be obtained from Theorem 3.1 using the numbers supp τ (a I ). Methods that obtain approximative estimations of query sizes been proposed [2], including the use of Maximum Entropy Principle. An open problem raised was estimating the quality of such an approximation. 7 I I
8 The computation of the size of the query using Theorem 3.1 can be often simplified if there is a nown maximal number of 1 components in the tuples of the table. For example, in a store that sells 1000 items (corresponding to 1000 attributes in a table that contains the records of purchases) it is often the case that we can use an empirical limit of, say, 8 items per tuple. In this case, conjunctions that contain more than 8 conjuncts can be discarded and the estimation is considerably simplified. Even, if such an upper bound cannot be imposed apriori, it is often the case that we can discard large conjunctions (which have low support). However, there are some riss when approximations of this nature are performed due to the the large values of coefficients that multiply the supports for large conjunctions. Indeed, consider the tables τ n odd = (T o, A, ρ odd ), τ n even = (T e, A, ρ even ), where ρ odd = t Dom(A) : n 1 (t) is odd}, ρ even = t Dom(A) : n 1 (t) is even}, where n 1 (t) denotes the number of attributes equal to 1 in tuple t and A = n. Note that for proper subset K of A, we have supp τodd (K) = supp τeven (K), while supp τ n odd (A) = 1 if n is odd 0 otherwise, and supp τ n even (A) = 1 if n is even 0 otherwise. Thus, from the point of view of the supports of any proper subset of the attribute set the tables τ n odd and τ n even are indiscernible. However, the support of certain queries can be vastly different on these tables. For example, consider the polynomial p = a 1 a 2... a n. We have µ τ n odd (p) = ρ odd = 2 n 1 and µ τ n even (p) = ρ even = 0. So, ignoring the term that corresponds to the support for a single attribute set (note that this is also the attribute set with the smallest possible support) has a huge impact on µ(p). Note that the result is consistent with Theorem (3.1) which gives the set of attributes A a coefficient 2 n 1. We stress however that the negative result above does not rule out practical applicability of approximating the values of µ τ since the parity function query used above is by no means a typical database query Support in tables with missing values. Many real world datasets contain missing values, and it is important to adequately address this issue. Here we present a generalization of the notion of support which taes missing values into account. The idea is related to the hot dec imputation of missing values where each missing value is replaced by a value randomly drawn from some distribution. Suppose that τ = (T, A, ρ) is a table such that A = a 1,..., a n } and Dom(a i ) = 0, u, 1} for 1 i n. The symbol u represents null values, that is, values that are missing or undefined. With every attribute a i A we associate a real number α i [0, 1]. Intuitively, this number corresponds to the probability of a i = 1, and can be obtained using the non-missing values for the attribute or based on bacground nowledge. Let µ u : pol(a) R be defined as follows. For a minterm a b abn n let µ u (a b1 1 abn = n i=1 n ) α bi,ci i n supp τ (a j = b (cj) (c 1,..., c n ) 0, 1} n, j=1 8 j )
9 where α, if b = 1 and c = 0 α b,c = 1 α, if b = 0 and c = 0 1, if c = 1, b (c) = b, if c = 1 u, if c = 0, where b 1, 0}, and c 0, 1}. For an arbitrary boolean polynomial p define µ u (p) = p d mint p µ u (p d ) where mint p is the set of minterm implicants of p. Theorem 4.1. µ u is a measure on pol(a). Proof. Since µ u is clearly non-negative, it remains to be shown that µ u (p 1 p 2 ) = µ u (p 1 )+µ u (p 2 ) for every p 1, p 2 pol(a) such that p 1 p 2 = 0. Note that if p 1 p 2 = 0 then mint p1 mint p2 =, and µ u (p 1 p 2 ) = µ u (p d ) + µ u (p d ) = µ u (p 1 ) + µ u (p 2 ). p d mint p1 p d mint p2 Example 4.1. Let n = 2, we have µ u (a 1 a 2 ) = µ u (ā 1 a 2 ) + µ u (a 1 ā 2 ) = supp τ (a 1 = 0 a 2 = 1) + (1 α 1 )supp τ (a 1 = u a 2 = 1) + α 2 supp τ (a 1 = 0 a 2 = u) + (1 α 1 )α 2 supp τ (a 1 = a 2 = u) + supp τ (a 1 = 1 a 2 = 0) + α 1 supp τ (a 1 = u a 2 = 0) + (1 α 2 )supp τ (a 1 = 1 a 2 = u) + α 1 (1 α 2 )supp τ (a 1 = a 2 = u). The benefit of using arbitrary measures instead of probabilities or supports in previous sections is that results on inclusion-exclusion principle automatically apply to µ u. Also, the fact that µ u is a measure mae the proof of the following theorem straightforward. Theorem 4.2. For every table τ = (T, A, ρ) such that A = a 1,..., a n } and Dom(a i ) = 0, u, 1} for 1 i n, and every collection of sets of attributes A = a I1,..., a Ir I j 1,..., n}} there is a probability distribution P over A such that for every a Ir A, P j I r (a j = 1)} = µ u ( j I r (a j = 1))/ ρ. Proof. We will prove the theorem by showing that µ u / ρ is a probability distribution. Since µ u is a measure, it suffices to show that µ u (1) = ρ. For any a i A we have µ u (1) = µ u (a i ā i ) = µ u (a i ) + µ u (ā i ) = supp τ (a i = 1) + α i supp τ (a i = u) +supp τ (a i = 0) + (1 α i )supp τ (a i = u) = supp τ (a i = 1) + supp τ (a i = 0) + supp τ (a i = u) = ρ. 9
10 The importance of the above theorem is that if we use some datamining algorithm (e.g. Apriori) to find µ u for a collection of sets of attributes, then their values of µ u are probabilistically consistent. The previous approaches to frequent itemset mining can be found in [6, 4]. However, both these approaches can produce probabilistically inconsistent results. Specifically, the technique used in [6] is to count the support of an itemset only on the portion of the table where it is valid. For example, consider the table a 1 a u 0 u 0 u Using the method from [6] the support of attribute a 2 is counted only in the first row, giving supp(a 2 ) = 100%. Similarly supp(a 1 ) = 50%, and supp(a 1 a 2 ) = 100%, but this means supp(a 1 a 2 ) > supp(a 1 ), which is impossible. In the method proposed in [4] the probability for each attribute is estimated from the part of the data where the attribute is defined. When computing how much support does a row with a missing value contribute for an itemset, this probabilities are summed for each attribute (see [4] for details). In the table above this will give supp(a 1 ) = 50%, supp(a 1 ) = 100%, and supp(a 1 a 2 ) = [( ) + ( ) + 2( )]/4 = 75%, and supp(a 1 a 2 ) > supp(a 2 ). Using our µ u measure gives consistent values of supp(a 1 ) = 100%, supp(a 2 ) = 50%, and supp(a 1 a 2 ) = 50%. 5. Conclusions and Open Problems. We studied properties of measures defined on free Boolean algebras arising naturally in the evaluation of sizes of queries applied to binary tables in relational databases. We intend to investigate Bonferronitype inequalities for these measure which will allow evaluations of these measures when information on supports is available only for certain families of itemsets. Another open problem is to ameliorate the bounds already obtained. REFERENCES [1] J. Galambos and I. Simonelli, Bonferroni-type Inequalities with Applications, Springer, [2] H. Manilla, Combining discrete algorithms and probabilistic approaches in data mining, in Principles of Data Mining and Knowledge Discovery, L. DeRaedt and A. Siebes, eds., vol of Lecture Notes in Artificial Intelligence, Springer-Verlag, Berlin, 2001, p [3] H. Mannila and H. Toivonen, Multiple uses of frequent sets and condensed representations, in Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining (KDD 96), Portland, Oregon, 1996, pp [4] J. R. Naya and D. J. Coo, Approximate association rule mining, in Proceedings of the Florida Artificial Intelligence Research Symposium, [5] D. Pavlov, H. Manilla, and P. Smyth, Beyond independence: Probabilistic models for query approximation on binary transaction data, ICS TR-01-09, University of California, Irvine, [6] A. Ragel and B. Crémilleux, Treatment of missing values for association rules, in Proceedings of the 2nd Pacific-Asia Conference on Research and Development in Knowledge Discovery and Data Mining (PAKDD-98), X. Wu, R. Kotagiri, and K. B. Korb, eds., vol of LNAI, Berlin, Apr , Springer, pp [7] S. Rudeanu, Boolean Functions and Equations, North-Holland, Amsterdam,
Mining Approximative Descriptions of Sets Using Rough Sets
Mining Approximative Descriptions of Sets Using Rough Sets Dan A. Simovici University of Massachusetts Boston, Dept. of Computer Science, 100 Morrissey Blvd. Boston, Massachusetts, 02125 USA dsim@cs.umb.edu
More informationA Logical Formulation of the Granular Data Model
2008 IEEE International Conference on Data Mining Workshops A Logical Formulation of the Granular Data Model Tuan-Fang Fan Department of Computer Science and Information Engineering National Penghu University
More informationEarlier this week we defined Boolean atom: A Boolean atom a is a nonzero element of a Boolean algebra, such that ax = a or ax = 0 for all x.
Friday, April 20 Today we will continue in Course Notes 3.3: Abstract Boolean Algebras. Earlier this week we defined Boolean atom: A Boolean atom a is a nonzero element of a Boolean algebra, such that
More informationLecture 4: Probability and Discrete Random Variables
Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 2007) Lecture 4: Probability and Discrete Random Variables Wednesday, January 21, 2009 Lecturer: Atri Rudra Scribe: Anonymous 1
More informationRandom Reals à la Chaitin with or without prefix-freeness
Random Reals à la Chaitin with or without prefix-freeness Verónica Becher Departamento de Computación, FCEyN Universidad de Buenos Aires - CONICET Argentina vbecher@dc.uba.ar Serge Grigorieff LIAFA, Université
More informationPositive Borders or Negative Borders: How to Make Lossless Generator Based Representations Concise
Positive Borders or Negative Borders: How to Make Lossless Generator Based Representations Concise Guimei Liu 1,2 Jinyan Li 1 Limsoon Wong 2 Wynne Hsu 2 1 Institute for Infocomm Research, Singapore 2 School
More informationFUZZY ASSOCIATION RULES: A TWO-SIDED APPROACH
FUZZY ASSOCIATION RULES: A TWO-SIDED APPROACH M. De Cock C. Cornelis E. E. Kerre Dept. of Applied Mathematics and Computer Science Ghent University, Krijgslaan 281 (S9), B-9000 Gent, Belgium phone: +32
More informationFree-sets : a Condensed Representation of Boolean Data for the Approximation of Frequency Queries
Free-sets : a Condensed Representation of Boolean Data for the Approximation of Frequency Queries To appear in Data Mining and Knowledge Discovery, an International Journal c Kluwer Academic Publishers
More informationRINGS IN POST ALGEBRAS. 1. Introduction
Acta Math. Univ. Comenianae Vol. LXXVI, 2(2007), pp. 263 272 263 RINGS IN POST ALGEBRAS S. RUDEANU Abstract. Serfati [7] defined a ring structure on every Post algebra. In this paper we determine all the
More informationRELATIONS PROPERTIES COMPATIBILITY
RELATIONS PROPERTIES COMPATIBILITY Misha Mikhaylov E-mail address: misha59mikhaylov@gmail.com ABSTRACT. Thoughts expressed in previous paper [3] were developed. There was shown formally that collection
More information2. Introduction to commutative rings (continued)
2. Introduction to commutative rings (continued) 2.1. New examples of commutative rings. Recall that in the first lecture we defined the notions of commutative rings and field and gave some examples of
More informationGENERATING SETS AND DECOMPOSITIONS FOR IDEMPOTENT TREE LANGUAGES
Atlantic Electronic http://aejm.ca Journal of Mathematics http://aejm.ca/rema Volume 6, Number 1, Summer 2014 pp. 26-37 GENERATING SETS AND DECOMPOSITIONS FOR IDEMPOTENT TREE ANGUAGES MARK THOM AND SHEY
More informationBoolean Algebra CHAPTER 15
CHAPTER 15 Boolean Algebra 15.1 INTRODUCTION Both sets and propositions satisfy similar laws, which are listed in Tables 1-1 and 4-1 (in Chapters 1 and 4, respectively). These laws are used to define an
More informationFree-Sets: A Condensed Representation of Boolean Data for the Approximation of Frequency Queries
Data Mining and Knowledge Discovery, 7, 5 22, 2003 c 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Free-Sets: A Condensed Representation of Boolean Data for the Approximation of Frequency
More informationSize-Depth Tradeoffs for Boolean Formulae
Size-Depth Tradeoffs for Boolean Formulae Maria Luisa Bonet Department of Mathematics Univ. of Pennsylvania, Philadelphia Samuel R. Buss Department of Mathematics Univ. of California, San Diego July 3,
More informationHow many units can a commutative ring have?
How many units can a commutative ring have? Sunil K. Chebolu and Keir Locridge Abstract. László Fuchs posed the following problem in 960, which remains open: classify the abelian groups occurring as the
More informationHypersequent Calculi for some Intermediate Logics with Bounded Kripke Models
Hypersequent Calculi for some Intermediate Logics with Bounded Kripke Models Agata Ciabattoni Mauro Ferrari Abstract In this paper we define cut-free hypersequent calculi for some intermediate logics semantically
More informationPolynomials as Generators of Minimal Clones
Polynomials as Generators of Minimal Clones Hajime Machida Michael Pinser Abstract A minimal clone is an atom of the lattice of clones. A minimal function is a function which generates a minimal clone.
More informationNotes on ordinals and cardinals
Notes on ordinals and cardinals Reed Solomon 1 Background Terminology We will use the following notation for the common number systems: N = {0, 1, 2,...} = the natural numbers Z = {..., 2, 1, 0, 1, 2,...}
More informationA strongly rigid binary relation
A strongly rigid binary relation Anne Fearnley 8 November 1994 Abstract A binary relation ρ on a set U is strongly rigid if every universal algebra on U such that ρ is a subuniverse of its square is trivial.
More informationA Complete Proof of the Robbins Conjecture
A Complete Proof of the Robbins Conjecture Allen L. Mann May 25, 2003 1 Boolean algebra The language of Boolean algebra consists of two binary function symbols and, one unary function symbol, and two constants
More informationJónsson posets and unary Jónsson algebras
Jónsson posets and unary Jónsson algebras Keith A. Kearnes and Greg Oman Abstract. We show that if P is an infinite poset whose proper order ideals have cardinality strictly less than P, and κ is a cardinal
More informationEncyclopedia of Machine Learning Chapter Number Book CopyRight - Year 2010 Frequent Pattern. Given Name Hannu Family Name Toivonen
Book Title Encyclopedia of Machine Learning Chapter Number 00403 Book CopyRight - Year 2010 Title Frequent Pattern Author Particle Given Name Hannu Family Name Toivonen Suffix Email hannu.toivonen@cs.helsinki.fi
More informationWith Question/Answer Animations. Chapter 2
With Question/Answer Animations Chapter 2 Chapter Summary Sets The Language of Sets Set Operations Set Identities Functions Types of Functions Operations on Functions Sequences and Summations Types of
More informationR u t c o r Research R e p o r t. Relations of Threshold and k-interval Boolean Functions. David Kronus a. RRR , April 2008
R u t c o r Research R e p o r t Relations of Threshold and k-interval Boolean Functions David Kronus a RRR 04-2008, April 2008 RUTCOR Rutgers Center for Operations Research Rutgers University 640 Bartholomew
More informationWinter School on Galois Theory Luxembourg, February INTRODUCTION TO PROFINITE GROUPS Luis Ribes Carleton University, Ottawa, Canada
Winter School on alois Theory Luxembourg, 15-24 February 2012 INTRODUCTION TO PROFINITE ROUPS Luis Ribes Carleton University, Ottawa, Canada LECTURE 2 2.1 ENERATORS OF A PROFINITE ROUP 2.2 FREE PRO-C ROUPS
More informationOn Submodular and Supermodular Functions on Lattices and Related Structures
On Submodular and Supermodular Functions on Lattices and Related Structures Dan A. Simovici University of Massachusetts Boston Department of Computer Science Boston, USA dsim@cs.umb.edu Abstract We give
More informationCriteria for existence of semigroup homomorphisms and projective rank functions. George M. Bergman
Criteria for existence of semigroup homomorphisms and projective rank functions George M. Bergman Suppose A, S, and T are semigroups, e: A S and f: A T semigroup homomorphisms, and X a generating set for
More informationchapter 11 ALGEBRAIC SYSTEMS GOALS
chapter 11 ALGEBRAIC SYSTEMS GOALS The primary goal of this chapter is to make the reader aware of what an algebraic system is and how algebraic systems can be studied at different levels of abstraction.
More informationFinite Automata and Regular Languages (part III)
Finite Automata and Regular Languages (part III) Prof. Dan A. Simovici UMB 1 / 1 Outline 2 / 1 Nondeterministic finite automata can be further generalized by allowing transitions between states without
More informationFinite Simple Abelian Algebras are Strictly Simple
Finite Simple Abelian Algebras are Strictly Simple Matthew A. Valeriote Abstract A finite universal algebra is called strictly simple if it is simple and has no nontrivial subalgebras. An algebra is said
More informationClosure operators on sets and algebraic lattices
Closure operators on sets and algebraic lattices Sergiu Rudeanu University of Bucharest Romania Closure operators are abundant in mathematics; here are a few examples. Given an algebraic structure, such
More informationGuaranteeing the Accuracy of Association Rules by Statistical Significance
Guaranteeing the Accuracy of Association Rules by Statistical Significance W. Hämäläinen Department of Computer Science, University of Helsinki, Finland Abstract. Association rules are a popular knowledge
More informationΠ 0 1-presentations of algebras
Π 0 1-presentations of algebras Bakhadyr Khoussainov Department of Computer Science, the University of Auckland, New Zealand bmk@cs.auckland.ac.nz Theodore Slaman Department of Mathematics, The University
More informationNested Epistemic Logic Programs
Nested Epistemic Logic Programs Kewen Wang 1 and Yan Zhang 2 1 Griffith University, Australia k.wang@griffith.edu.au 2 University of Western Sydney yan@cit.uws.edu.au Abstract. Nested logic programs and
More informationBoolean Algebras. Chapter 2
Chapter 2 Boolean Algebras Let X be an arbitrary set and let P(X) be the class of all subsets of X (the power set of X). Three natural set-theoretic operations on P(X) are the binary operations of union
More informationModel Complexity of Pseudo-independent Models
Model Complexity of Pseudo-independent Models Jae-Hyuck Lee and Yang Xiang Department of Computing and Information Science University of Guelph, Guelph, Canada {jaehyuck, yxiang}@cis.uoguelph,ca Abstract
More informationClassification Based on Logical Concept Analysis
Classification Based on Logical Concept Analysis Yan Zhao and Yiyu Yao Department of Computer Science, University of Regina, Regina, Saskatchewan, Canada S4S 0A2 E-mail: {yanzhao, yyao}@cs.uregina.ca Abstract.
More information5 Measure theory II. (or. lim. Prove the proposition. 5. For fixed F A and φ M define the restriction of φ on F by writing.
5 Measure theory II 1. Charges (signed measures). Let (Ω, A) be a σ -algebra. A map φ: A R is called a charge, (or signed measure or σ -additive set function) if φ = φ(a j ) (5.1) A j for any disjoint
More informationPropositional Logics and their Algebraic Equivalents
Propositional Logics and their Algebraic Equivalents Kyle Brooks April 18, 2012 Contents 1 Introduction 1 2 Formal Logic Systems 1 2.1 Consequence Relations......................... 2 3 Propositional Logic
More informationUniversität Augsburg
Universität Augsburg Properties of Overwriting for Updates in Typed Kleene Algebras Thorsten Ehm Report 2000-7 Dezember 2000 Institut für Informatik D-86135 Augsburg Copyright c Thorsten Ehm Institut für
More informationOn minimal models of the Region Connection Calculus
Fundamenta Informaticae 69 (2006) 1 20 1 IOS Press On minimal models of the Region Connection Calculus Lirong Xia State Key Laboratory of Intelligent Technology and Systems Department of Computer Science
More informationEstimates for probabilities of independent events and infinite series
Estimates for probabilities of independent events and infinite series Jürgen Grahl and Shahar evo September 9, 06 arxiv:609.0894v [math.pr] 8 Sep 06 Abstract This paper deals with finite or infinite sequences
More informationPROPER FORCING REMASTERED
PROPER FORCING REMASTERED BOBAN VELIČKOVIĆ AND GIORGIO VENTURI Abstract. We present the method introduced by Neeman of generalized side conditions with two types of models. We then discuss some applications:
More informationCLASSIFYING THE COMPLEXITY OF CONSTRAINTS USING FINITE ALGEBRAS
CLASSIFYING THE COMPLEXITY OF CONSTRAINTS USING FINITE ALGEBRAS ANDREI BULATOV, PETER JEAVONS, AND ANDREI KROKHIN Abstract. Many natural combinatorial problems can be expressed as constraint satisfaction
More informationChapter 1. Sets and Numbers
Chapter 1. Sets and Numbers 1. Sets A set is considered to be a collection of objects (elements). If A is a set and x is an element of the set A, we say x is a member of A or x belongs to A, and we write
More informationare the q-versions of n, n! and . The falling factorial is (x) k = x(x 1)(x 2)... (x k + 1).
Lecture A jacques@ucsd.edu Notation: N, R, Z, F, C naturals, reals, integers, a field, complex numbers. p(n), S n,, b(n), s n, partition numbers, Stirling of the second ind, Bell numbers, Stirling of the
More informationReview of Linear Algebra
Review of Linear Algebra Throughout these notes, F denotes a field (often called the scalars in this context). 1 Definition of a vector space Definition 1.1. A F -vector space or simply a vector space
More informationClassification of Voice Signals through Mining Unique Episodes in Temporal Information Systems: A Rough Set Approach
Classification of Voice Signals through Mining Unique Episodes in Temporal Information Systems: A Rough Set Approach Krzysztof Pancerz, Wies law Paja, Mariusz Wrzesień, and Jan Warcho l 1 University of
More informationAN ALGEBRAIC APPROACH TO GENERALIZED MEASURES OF INFORMATION
AN ALGEBRAIC APPROACH TO GENERALIZED MEASURES OF INFORMATION Daniel Halpern-Leistner 6/20/08 Abstract. I propose an algebraic framework in which to study measures of information. One immediate consequence
More informationUniversal Algebra for Logics
Universal Algebra for Logics Joanna GRYGIEL University of Czestochowa Poland j.grygiel@ajd.czest.pl 2005 These notes form Lecture Notes of a short course which I will give at 1st School on Universal Logic
More informationProperties of Boolean Algebras
Phillip James Swansea University December 15, 2008 Plan For Today Boolean Algebras and Order..... Brief Re-cap Order A Boolean algebra is a set A together with the distinguished elements 0 and 1, the binary
More informationFrom Constructibility and Absoluteness to Computability and Domain Independence
From Constructibility and Absoluteness to Computability and Domain Independence Arnon Avron School of Computer Science Tel Aviv University, Tel Aviv 69978, Israel aa@math.tau.ac.il Abstract. Gödel s main
More informationThe primitive root theorem
The primitive root theorem Mar Steinberger First recall that if R is a ring, then a R is a unit if there exists b R with ab = ba = 1. The collection of all units in R is denoted R and forms a group under
More informationABSOLUTE VALUES AND VALUATIONS
ABSOLUTE VALUES AND VALUATIONS YIFAN WU, wuyifan@umich.edu Abstract. We introduce the basis notions, properties and results of absolute values, valuations, discrete valuation rings and higher unit groups.
More informationz -FILTERS AND RELATED IDEALS IN C(X) Communicated by B. Davvaz
Algebraic Structures and Their Applications Vol. 2 No. 2 ( 2015 ), pp 57-66. z -FILTERS AND RELATED IDEALS IN C(X) R. MOHAMADIAN Communicated by B. Davvaz Abstract. In this article we introduce the concept
More informationCourse 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra
Course 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra D. R. Wilkins Contents 3 Topics in Commutative Algebra 2 3.1 Rings and Fields......................... 2 3.2 Ideals...............................
More informationThe Structure of Inverses in Schema Mappings
To appear: J. ACM The Structure of Inverses in Schema Mappings Ronald Fagin and Alan Nash IBM Almaden Research Center 650 Harry Road San Jose, CA 95120 Contact email: fagin@almaden.ibm.com Abstract A schema
More informationChapter 2 Unbounded Operators and Abstract Functional Calculus
Chapter 2 Unbounded Operators and Abstract Functional Calculus 2.1 Unbounded Operators We start with an introduction to unbounded operators and their spectral theory. This will be brief and cursory so
More informationBoolean Algebras, Boolean Rings and Stone s Representation Theorem
Boolean Algebras, Boolean Rings and Stone s Representation Theorem Hongtaek Jung December 27, 2017 Abstract This is a part of a supplementary note for a Logic and Set Theory course. The main goal is to
More informationEquational Logic. Chapter Syntax Terms and Term Algebras
Chapter 2 Equational Logic 2.1 Syntax 2.1.1 Terms and Term Algebras The natural logic of algebra is equational logic, whose propositions are universally quantified identities between terms built up from
More informationLöwenheim-Skolem Theorems, Countable Approximations, and L ω. David W. Kueker (Lecture Notes, Fall 2007)
Löwenheim-Skolem Theorems, Countable Approximations, and L ω 0. Introduction David W. Kueker (Lecture Notes, Fall 2007) In its simplest form the Löwenheim-Skolem Theorem for L ω1 ω states that if σ L ω1
More informationIsomorphisms between pattern classes
Journal of Combinatorics olume 0, Number 0, 1 8, 0000 Isomorphisms between pattern classes M. H. Albert, M. D. Atkinson and Anders Claesson Isomorphisms φ : A B between pattern classes are considered.
More informationVAUGHT S THEOREM: THE FINITE SPECTRUM OF COMPLETE THEORIES IN ℵ 0. Contents
VAUGHT S THEOREM: THE FINITE SPECTRUM OF COMPLETE THEORIES IN ℵ 0 BENJAMIN LEDEAUX Abstract. This expository paper introduces model theory with a focus on countable models of complete theories. Vaught
More informationEvery set has a least jump enumeration
Every set has a least jump enumeration Richard J. Coles, Rod G. Downey and Theodore A. Slaman Abstract Given a computably enumerable set B, there is a Turing degree which is the least jump of any set in
More informationNumber Theory Solutions Packet
Number Theory Solutions Pacet 1 There exist two distinct positive integers, both of which are divisors of 10 10, with sum equal to 157 What are they? Solution Suppose 157 = x + y for x and y divisors of
More informationFormal power series rings, inverse limits, and I-adic completions of rings
Formal power series rings, inverse limits, and I-adic completions of rings Formal semigroup rings and formal power series rings We next want to explore the notion of a (formal) power series ring in finitely
More informationFuzzy Sets. Mirko Navara navara/fl/fset printe.pdf February 28, 2019
The notion of fuzzy set. Minimum about classical) sets Fuzzy ets Mirko Navara http://cmp.felk.cvut.cz/ navara/fl/fset printe.pdf February 8, 09 To aviod problems of the set theory, we restrict ourselves
More informationVector spaces. EE 387, Notes 8, Handout #12
Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is
More informationMeasure and integration
Chapter 5 Measure and integration In calculus you have learned how to calculate the size of different kinds of sets: the length of a curve, the area of a region or a surface, the volume or mass of a solid.
More informationLogic and Databases. Phokion G. Kolaitis. UC Santa Cruz & IBM Research Almaden. Lecture 4 Part 1
Logic and Databases Phokion G. Kolaitis UC Santa Cruz & IBM Research Almaden Lecture 4 Part 1 1 Thematic Roadmap Logic and Database Query Languages Relational Algebra and Relational Calculus Conjunctive
More informationProperties of the Integers
Properties of the Integers The set of all integers is the set and the subset of Z given by Z = {, 5, 4, 3, 2, 1, 0, 1, 2, 3, 4, 5, }, N = {0, 1, 2, 3, 4, }, is the set of nonnegative integers (also called
More informationa + b = b + a and a b = b a. (a + b) + c = a + (b + c) and (a b) c = a (b c). a (b + c) = a b + a c and (a + b) c = a c + b c.
Properties of the Integers The set of all integers is the set and the subset of Z given by Z = {, 5, 4, 3, 2, 1, 0, 1, 2, 3, 4, 5, }, N = {0, 1, 2, 3, 4, }, is the set of nonnegative integers (also called
More informationFunctional Dependencies
Chapter 7 Functional Dependencies 7.1 Introduction 7.2 Proofs and Functional Dependencies 7.3 Keys and Functional Dependencies 7.4 Covers 7.5 Tableaux 7.6 Exercises 7.7 Bibliographical Comments 7.1 Introduction
More informationMINIMAL GENERATING SETS OF GROUPS, RINGS, AND FIELDS
MINIMAL GENERATING SETS OF GROUPS, RINGS, AND FIELDS LORENZ HALBEISEN, MARTIN HAMILTON, AND PAVEL RŮŽIČKA Abstract. A subset X of a group (or a ring, or a field) is called generating, if the smallest subgroup
More informationCHAPTER 8: EXPLORING R
CHAPTER 8: EXPLORING R LECTURE NOTES FOR MATH 378 (CSUSM, SPRING 2009). WAYNE AITKEN In the previous chapter we discussed the need for a complete ordered field. The field Q is not complete, so we constructed
More informationSets with Partial Memberships A Rough Set View of Fuzzy Sets
Sets with Partial Memberships A Rough Set View of Fuzzy Sets T. Y. Lin Department of Mathematics and Computer Science San Jose State University San Jose, California 95192-0103 E-mail: tylin@cs.sjsu.edu
More informationCONSTRUCTION OF THE REAL NUMBERS.
CONSTRUCTION OF THE REAL NUMBERS. IAN KIMING 1. Motivation. It will not come as a big surprise to anyone when I say that we need the real numbers in mathematics. More to the point, we need to be able to
More informationFILTERED RINGS AND MODULES. GRADINGS AND COMPLETIONS.
FILTERED RINGS AND MODULES. GRADINGS AND COMPLETIONS. Let A be a ring, for simplicity assumed commutative. A filtering, or filtration, of an A module M means a descending sequence of submodules M = M 0
More informationFinding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms
Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms Vladimir Bayev Abstract. Low degree annihilators for Boolean functions are of great interest in cryptology because of
More informationConcept Lattices in Rough Set Theory
Concept Lattices in Rough Set Theory Y.Y. Yao Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: yyao@cs.uregina.ca URL: http://www.cs.uregina/ yyao Abstract
More information4. Noether normalisation
4. Noether normalisation We shall say that a ring R is an affine ring (or affine k-algebra) if R is isomorphic to a polynomial ring over a field k with finitely many indeterminates modulo an ideal, i.e.,
More informationLecture 4: Purifications and fidelity
CS 766/QIC 820 Theory of Quantum Information (Fall 2011) Lecture 4: Purifications and fidelity Throughout this lecture we will be discussing pairs of registers of the form (X, Y), and the relationships
More information1 Basic Combinatorics
1 Basic Combinatorics 1.1 Sets and sequences Sets. A set is an unordered collection of distinct objects. The objects are called elements of the set. We use braces to denote a set, for example, the set
More informationA MODEL-THEORETIC PROOF OF HILBERT S NULLSTELLENSATZ
A MODEL-THEORETIC PROOF OF HILBERT S NULLSTELLENSATZ NICOLAS FORD Abstract. The goal of this paper is to present a proof of the Nullstellensatz using tools from a branch of logic called model theory. In
More informationStochastic Histories. Chapter Introduction
Chapter 8 Stochastic Histories 8.1 Introduction Despite the fact that classical mechanics employs deterministic dynamical laws, random dynamical processes often arise in classical physics, as well as in
More informationCHAPTER 4. βs as a semigroup
CHAPTER 4 βs as a semigroup In this chapter, we assume that (S, ) is an arbitrary semigroup, equipped with the discrete topology. As explained in Chapter 3, we will consider S as a (dense ) subset of its
More informationArithmetic Funtions Over Rings with Zero Divisors
BULLETIN of the Bull Malaysian Math Sc Soc (Second Series) 24 (200 81-91 MALAYSIAN MATHEMATICAL SCIENCES SOCIETY Arithmetic Funtions Over Rings with Zero Divisors 1 PATTIRA RUANGSINSAP, 1 VICHIAN LAOHAKOSOL
More informationProvenance Semirings. Todd Green Grigoris Karvounarakis Val Tannen. presented by Clemens Ley
Provenance Semirings Todd Green Grigoris Karvounarakis Val Tannen presented by Clemens Ley place of origin Provenance Semirings Todd Green Grigoris Karvounarakis Val Tannen presented by Clemens Ley place
More information3. Abstract Boolean Algebras
3. ABSTRACT BOOLEAN ALGEBRAS 123 3. Abstract Boolean Algebras 3.1. Abstract Boolean Algebra. Definition 3.1.1. An abstract Boolean algebra is defined as a set B containing two distinct elements 0 and 1,
More informationA Piggybacking Design Framework for Read-and Download-efficient Distributed Storage Codes
A Piggybacing Design Framewor for Read-and Download-efficient Distributed Storage Codes K V Rashmi, Nihar B Shah, Kannan Ramchandran, Fellow, IEEE Department of Electrical Engineering and Computer Sciences
More informationVC-DENSITY FOR TREES
VC-DENSITY FOR TREES ANTON BOBKOV Abstract. We show that for the theory of infinite trees we have vc(n) = n for all n. VC density was introduced in [1] by Aschenbrenner, Dolich, Haskell, MacPherson, and
More informationConstructing c-ary Perfect Factors
Constructing c-ary Perfect Factors Chris J. Mitchell Computer Science Department Royal Holloway University of London Egham Hill Egham Surrey TW20 0EX England. Tel.: +44 784 443423 Fax: +44 784 443420 Email:
More informationOn flexible database querying via extensions to fuzzy sets
On flexible database querying via extensions to fuzzy sets Guy de Tré, Rita de Caluwe Computer Science Laboratory Ghent University Sint-Pietersnieuwstraat 41, B-9000 Ghent, Belgium {guy.detre,rita.decaluwe}@ugent.be
More informationcse303 ELEMENTS OF THE THEORY OF COMPUTATION Professor Anita Wasilewska
cse303 ELEMENTS OF THE THEORY OF COMPUTATION Professor Anita Wasilewska LECTURE 3 CHAPTER 1 SETS, RELATIONS, and LANGUAGES 6. Closures and Algorithms 7. Alphabets and Languages 8. Finite Representation
More informationMAT 585: Johnson-Lindenstrauss, Group testing, and Compressed Sensing
MAT 585: Johnson-Lindenstrauss, Group testing, and Compressed Sensing Afonso S. Bandeira April 9, 2015 1 The Johnson-Lindenstrauss Lemma Suppose one has n points, X = {x 1,..., x n }, in R d with d very
More informationCOLLAPSING PERMUTATION GROUPS
COLLAPSING PERMUTATION GROUPS KEITH A. KEARNES AND ÁGNES SZENDREI Abstract. It is shown in [3] that any nonregular quasiprimitive permutation group is collapsing. In this paper we describe a wider class
More informationAN EXTENSION OF A THEOREM OF EULER. 1. Introduction
AN EXTENSION OF A THEOREM OF EULER NORIKO HIRATA-KOHNO, SHANTA LAISHRAM, T. N. SHOREY, AND R. TIJDEMAN Abstract. It is proved that equation (1 with 4 109 does not hold. The paper contains analogous result
More informationStanford Encyclopedia of Philosophy
Stanford Encyclopedia of Philosophy The Mathematics of Boolean Algebra First published Fri Jul 5, 2002; substantive revision Mon Jul 14, 2014 Boolean algebra is the algebra of two-valued logic with only
More informationLINEAR EQUATIONS WITH UNKNOWNS FROM A MULTIPLICATIVE GROUP IN A FUNCTION FIELD. To Professor Wolfgang Schmidt on his 75th birthday
LINEAR EQUATIONS WITH UNKNOWNS FROM A MULTIPLICATIVE GROUP IN A FUNCTION FIELD JAN-HENDRIK EVERTSE AND UMBERTO ZANNIER To Professor Wolfgang Schmidt on his 75th birthday 1. Introduction Let K be a field
More information