Modeling Social Networks

Size: px
Start display at page:

Download "Modeling Social Networks"

Transcription

1 Distance-epenent Kronecker Graphs for 1 Moeling Social Networks Elizabeth Boine-Baron,* Member, IEEE, Babak Hassibi, Member, IEEE, an Aam Wierman, Member, IEEE Abstract This paper focuses on a generalization of stochastic Kronecker graphs, introucing a Kronecker-like operator an efining a family of generator matrices H epenent on istances between noes in a specifie graph embeing. We prove that any lattice-base network moel with sufficiently small istanceepenent connection probability will have a Poisson egree istribution an provie a general framework to prove searchability for such a network. Using this framework, we focus on a specific example of an expaning hypercube an iscuss the similarities an ifferences of such a moel with recently propose network moels base on a hien metric space. We also prove that a greey forwaring algorithm can fin very short paths of length O((log log n) 2 ) on the hypercube with n noes, emonstrating that istance-epenent Kronecker graphs can generate searchable network moels. EDICS: OTH-EMRG, SEN-APPL, SPC-APPL I. INTRODUCTION Beginning with the simple Erös-Rényi moel of ranom networks [1], network science has attempte to capture the key characteristics of complex networks such as power networks, the Internet, protein interaction networks, an social networks with a simple, mathematically tractable moel 1. Social networks in particular have generate much interest ue to the consistency of their characteristics. These networks ten E. Boine-Baron is with the Electrical Engineering Department at the California Institute of Technology, MC 16-9, 1200 E. California Boulevar, Pasaena, CA Phone: (214) Fax: (626) eaboine@caltech.eu B. Hassibi is with the Electrical Engineering Department at the California Institute of Technology, MC 16-9, 1200 E. California Boulevar, Pasaena, CA Phone: (626) Fax: (626) hassibi@caltech.eu A. Wierman is with the Computer Science Department at the California Institute of Technology, MC 05-16, 1200 E. California Boulevar, Pasaena, CA Phone: (626) Fax: (626) aamw@caltech.eu 1 A preliminary version of many of the results of this paper first appeare in [2]

2 2 to exhibit small iameter, high clustering, scale-free egree istributions, an perhaps most importantly, they are searchable by a local greey algorithm; see [], [4], an [5] for thorough surveys of this area. The Erös-Rényi ranom graph maintains a small iameter but fails to capture many of the other key properties [6], [1]. The combination of small iameter an high clustering is often calle the small-worl effect, an Watts an Strogatz (see section 2) generate much interest when they propose a moel that maintains these two characteristics simultaneously [7]. Several moels were then propose to explain the heavy-taile egree istributions an ensification of complex networks; these inclue the preferential attachment moel [8], the forest-fire moel [9], [10], Kronecker graphs [11], [12], an many others []. As emonstrate by Milgram s 1967 experiment using real people, iniviuals can iscover an use short paths using only local information [1]. Kleinberg focuses on this searchability characteristic in his lattice moel an proves searchability for a precise set of input parameters, but his moel lacks any heavy-taile istributions [14], [5], [15]. The Kronecker graphs escribe in [11], [12], an [16] are simple to generate, mathematically tractable, an have been shown to exhibit several important social network characteristics such as heavy-taile egree an eigen-istributions, high clustering, small iameter, an network ensification. However, Kronecker graphs are not searchable by a istribute greey algorithm [16]. In this paper, we exten the moel propose in [2], a generalization of stochastic Kronecker graphs that can generate searchable networks. Instea of using the traitional Kronecker operation, we introuce a new Kronecker-like operation an a family of generator matrices, H, both epenent upon the istance between two noes. This new generation metho yiels networks that have both a local (lattice-base) an global (istance-epenent) structure. This ual structure is what allows a greey algorithm to search the network using only local information. Aitionally, the networks generate have a high clustering (ue to the lattice structure) an a small iameter (ue to the aition of long-range links). As part of the analysis of this new moel, we provie a general framework for analyzing egree istributions an the performance of greey search algorithms on a general lattice-base network. We use this framework to stuy one example in etail: an expaning hypercube with istance-epenent long-range connections. We give an explicit escription of its egree istribution, the circumstances uner which it will be searchable by a local greey algorithm, an a lower boun on its iameter. We support our finings with simulations. This example is chosen because it mimics the efining feature of tree metrics an hyperbolic space exponentially expaning neighborhoos which are thought to be representative of both the Internet an social networks [17], [18], [19], [20]. Exponentially expaning neighborhoos lea to very small iameters (O(log log n as oppose to O(log n)) an we can show that,

3 as in [21], a local greey algorithm on the hypercube will fin ultra-short paths, O((log log n) 2 ). This paper is organize as follows. Section II escribes in etail our moel an its relation to the original Kronecker graph moel an other traitional moels. Section III explores the connection between a Kleinberg-like expaning hypercube example an the hien metric space moels propose in [17]. Section IV escribes a general analysis of egree istributions for lattice-base networks an gives a theorem showing that all such networks will have a Poisson egree istribution provie that P() is sufficiently small, an gives the relevant egree istribution for the expaning hypercube example. Section V gives a general framework for proving searchability of a lattice-base istance-epenent network moel an recovers the searchability result of [14] an finally proves that the expaning hypercube is in fact searchable. Section VI explores the iameter of the expaning hypercube example an Section VII conclues with propose future work. The appenices support the proof of searchability for the expaning hypercube example in Section V. II. DISTANCE-DEPENDENT KRONECKER GRAPHS In this section we escribe the original formulation of stochastic Kronecker graphs as well as our new istance -epenent extension of the moel. We then present a few examples illustrating how to generate existing network moels using the istance -epenent Kronecker graph. A. Stochastic Kronecker Graphs Stochastic Kronecker graphs are generate by recursively using a stanar matrix operation, the Kronecker prouct 2 [11]. Beginning with an initiator probability matrix P 1, with N 1 noes, where the entries p ij enote the probability that ege (i, j) is present, successively larger graphs P 2,...,P n are generate such that the k th graph P k has N k = N k 1 noes. The Kronecker prouct is use to generate each successive graph. Definition 2.1: The k th power of P 1 is efine as the matrix P k 1, such that: P1 k = P k = P 1 P 1...P }{{ 1 = P } k 1 P 1 k times For each entry p uv in P k, inclue an ege in the graph G between noes u an v with probability p uv. The resulting binary ranom matrix is the ajacency matrix of the generate graph. Kronecker graphs have many of the static properties of social networks, such as small iameter an a heavy-taile egree istribution, a heavy-taile eigenvalue istribution, an a heavy-taile eigenvector 2 For a escription of eterministic Kronecker graphs, see Leskovec et al, [11].

4 4 istribution [11]. In aition, they exhibit several temporal properties such as ensification an shrinking iameter. Using a simple 2x2 P 1, Leskovec emonstrate that he coul generate graphs matching the patterns of the various properties mentione above for several real-worl atasets [11]. However, as shown by Mahian an Xu, stochastic Kronecker graphs are not searchable by a istribute greey algorithm [16] they lack the necessary spatial structure that allows a local greey agent to fin a short path through the network. This is the motivation for the current paper. B. Distance-Depenent Kronecker Graphs In this section, we propose an extension to Kronecker graphs incorporating the spatial structure necessary to have searchability. We a to the framework of Kronecker graphs a notion of istance, which comes from the embeing of the graph, an exten the generator from a single matrix to a family of matrices, one for each istance, efining the likelihoo of a connection occurring between noes at a particular istance. We accomplish this with a new Kronecker-like operation. Specifically, whereas in the original formulation of Kronecker graphs one initiator matrix is iteratively Kronecker-multiplie with itself to prouce a new ajacency or probability matrix, we efine a istance -epenent Kronecker operator. Depening on the istance between two noes u an v, (u, v) Z, a ifferent matrix from a efine family will be selecte to be multiplie by that entry, as shown below. a 11 H (1,1) a 12 H (1,2)... a 1n H (1,n) a 21 H (2,1) a 22 H (2,2)... a 2n H (2,n) C = A H = a n1 H (n,1) a n2 H (n,2)... a nn H (n,n) where So, the k th Kronecker power is now H = {H i } i Z G k = G 1 H H }{{} k times In the Kronecker-like multiplication, the choice of H i from the family H, multiplying entry (u, v), is epenent upon the istance (u, v). Note that our (u, v) is not a true istance measure we can have negative istances. Further, (u, v) is not symmetric ((u, v) (v, u)) since we nee to maintain symmetry in the resulting matrix. Instea, (u, v) = (v, u) an H (u,v) = H (v,u).

5 5 This change to the Kronecker operation makes the moel more complicate, an we o give up some of the beneficial properties of Kronecker multiplication. Potentially, we coul have to efine a large number of matrices for H. However, for the moels we want to generate, there are actually only a few parameters to efine, as (i, j) an a simple function efines H i for i > 1. The unerlying reason for this simplicity is that the local lattice structure is usually specifie by H 0 an H 1, while the global, istance-epenent probability of connection can usually be specifie by an H i with a simple form. So, while we lose the benefits of true Kronecker multiplication, we gain generality an the ability to create many ifferent lattices an probability of long-range contacts. We note in passing that the generation of these lattice structures is not possible with the original formulation of the Kronecker graph moel. For example, it is impossible to generate the Watts-Strogatz moel with conventional Kronecker graphs. However, it can be one with the current generalization. This is illustrate in our examples below. Example 1: Original Kronecker Graph. The simplest example is that of the original Kronecker graph formulation. For this case, the istance can be arbitrary, an the family of matrices, H, is simply G 1, the same G 1 use in the original efinition. Thus, we efine G k = G 1 H H }{{} k times = G 1 G 1...G 1 }{{} k times Example 2: Watts-Strogatz Small-Worl Moel. The next example we consier, the Watts-Strogatz moel, consists of a ring of n noes, each connecte to their neighbors within istance k on the ring. The probability of a connection to any other noe on the ring is then P(u, v) = p [7]. To generate the unerlying ring structure with k = 1, start with an initiator matrix K 1, representing the graph in figure 1(a). Fig. 1. Generating the Watts-Strogatz Moel In orer to obtain the sequence of matrices representing the graphs in Figure 1, we efine a istance measure as the number of hops from one noe to another along the ring, where clockwise hops are

6 6 positive, an counter-clockwise hops are negative. Recall that the efinition of negative istance is require only to keep the matrix symmetric. The negative matrix is just the transpose of the matrix efine for the positive irection. After each operation, the istance between noes is still the number of hops along the ring, though the number of noes oubles each time. We then efine the following family of matrices, H: 1 1 p p 1 1 H 0 =,H 1 =,H i = i > p 1 1 Note that H i = H i. So, starting from the initiator matrix in Figure 1(a), we have the following progression of matrices: 1 1 p p G 1 =, p p H 0 1 H 1 p H 2 1 H 1 1 H 1 1 H 0 1 H 1 p H 2 G 2 = G 1 H = p H 2 1 H 1 1 H 0 1 H 1 1 H 1 p H 2 1 H 1 1 H p p p p p p p p p p p p p p p p p p p p = p p p p p p p p p p p p p p p p p p p p 1 1 Note that the W-S moel is not searchable by a greey agent; however, if P(u, v) = 1 (u,v), it becomes

7 7 searchable [14], [5]. It is possible to moel this P(u, v) by simply ajusting H i, i 1 as follows: i 2i+1 H 0 =, H i = i, i 1, i n 2, 1 1 H i = i 1 2i 1 2i 1 1 2i 1 1 2i 1 1 2i 1 2i, i 1, i = n 2 As in the previous examples, H i = H i. The ifferent efinition for the mile noe in the ring is ue to the fact that we nee the probability of a connection to reach a minimum at this point, an then start to rise again. With this new efinition of H i, i 1, we have the following progression of matrices: 1 1 1/ /2 G 1 =, 1/ / H 0 1 H 1 1/2 H 2 1 H 1 1 H 1 1 H 0 1 H 1 1/2 H 2 G 2 = G 1 H = 1/2 H 2 1 H 1 1 H 0 1 H 1 1 H 1 1/2 H 2 1 H 1 1 H /2 1/ 1/4 1/ 1/ /2 1/ 1/4 1/ 1/2 1/ /2 1/ 1/4 1/ 1/ 1/ /2 1/ 1/4 = 1/4 1/ 1/ /2 1/ 1/ 1/4 1/ 1/ /2 1/2 1/ 1/4 1/ 1/ /2 1/ 1/4 1/ 1/2 1 1 This example alreay illustrates that the generalize operator we have efine allows the generation of searchable networks, but we will provie another more realistic example in the next example.

8 8 Example : Kleinberg-like Moel. The final example we consier, Kleinberg s lattice moel, is particularly pertinent as it was shown to be searchable [14]. In the original formulation, local connections of noes are efine on a k-imensional lattice, an long-range links occur between two noes at istance with probability proportional to α. We focus on a Kleinberg-like moel here, where instea of a k-imensional lattice, we have an an expaning hypercube as our unerlying lattice. In this example, at any point, the graph is a hypercube with some extra long-range connections, an when it grows, it grows by oubling the number of noes an aing a imension to the hypercube. Note that we will have n noes arrange on a k = log n-imensional hypercube. This example is of particular interest ue to recent work suggesting that many networks have an unerlying hyperbolic or tree-metric structure [19], [18]. The expaning hypercube captures the key feature of these topologies, as the number of noes at istance grows exponentially in. This example is also very naturally represente using our istance -epenent Kronecker operation an a Hamming istance as our istance measure. Fig. 2. Example: the growth of an expaning hypercube To efine the expaning hypercube, we efine a graph G with n noes, numbere 1...n, where each noe is labele with its corresponing log n-length bit vector. We efine the istance between two noes as the Hamming istance between their labels. The family of matrices H is as follows: β i H 0 =,H i =,for all i β i 1 where β 1 = a normalizing constant, β i = P(i) P(i+1). The graph may or may not be searchable epening on ( P(i). To mimic Kleinberg s moel, we let P(i) = i α, so that β i = i α. i+1) Thus, for the sequence

9 9 of graphs shown in the figure above, we have the following sequence of matrices: β β 1 1 G 1 =, G 2 =, G = β β β 1 1 β 1 β 1 β 1β β 1 1 β 1 1 β 1β 2 β 1 1 β β 1 β 1β 2 1 β 1 β β 1β 2 β 1 β β 1 β 1 β 1β β 1 β 1 1 β 1β 2 β β 1 1 β 1 β 1β 2 1 β 1 1 β β 1β 2 β 1 β 1 1 β From the matrix, we can tell that in each step, 1 if (u, v) = 0, 1 P(u, v) = (u, v) α otherwise In the original k-imensional lattice, a istribute algorithm (as efine in Section V), can fin paths of length O(log n) only if α = k [14]; in the moifie case presente above, we will see in section V that we nee a ifferent probability of connection to fin short paths. III. CONNECTION TO HIDDEN HYPERBOLIC SPACE MODEL As mentione previously, the expaning hypercube moel in Example resembles moels propose in [17] an extene in [18], [21], an [22]. In [17], every noe in the network has a hien variable - their location in a hien metric space. The probability of a connection between two noes is base upon the istance between them in this hien space. The resulting egree istribution epens on the curvature of this hien space; if the space has negative curvature, the egree istribution will be scale-free with P(k) = k γ [2]. In the istance-epenent Kronecker graph escribe in this paper an [2], the probability of a connection is base on the istance between two noes in the given lattice, efine usually by H 0 an H 1 in the family of matrices H. As a result, the lattice, or metric space, is not really hien since neighbors are explicitly connecte in the lattice. It is important to note that both moels incorporate a istance-epenent probability of connection. As will be efine formally in Section V, a local greey search algorithm can take avantage of this embeing into a hien or physical space to forwar a message to a estination. If a given noe u has a message to forwar to a estination t, it can use its knowlege of the embeing to forwar the message to its neighbor closest to the estination in the embeing. It is not necessary that the embeing be physical, as shown in [18] an [21]; rather, what is necessary is that the the probability of a connection between two noes is epenent on the istance between them. In most social networks the abstract istance is a measure of social istance - the

10 10 likelihoo of two iniviuals being connecte epens on their memberships in various groups, among other factors. In aition, in the moels of [17], a hyperbolic space results in exponentially expaning neighborhoos aroun each noe. In the istance-epenent hypercube example, there are ( k ) noes at each istance, also resulting in exponentially expaning neighborhoos. However, the hien metric space moel necessarily inclues the notion of a core an periphery of the network, where high-egree noes form the core connecting many low-egree noes at the periphery [21]. In the hypercube example, all noes are homogeneous in expecte egree - there is no notion of a core. In [18], as noes are locate further from the origin in the hien hyperbolic space their expecte egree ecreases exponentially ( e βr ). When this is combine with the exponentially expaning neighborhoos ( e αr ), the result is a scale-free istribution with γ = 1 + α β. It is important to note that an exponential ecrease in expecte egree is not strictly necessary; to see this, let the number of noes at istance r from a reference origin in the hyperbolic space be Let the average egree of noes at istance r be so that Using we have n(r) = e αr (1) k(r) = r δ (2) r(k) = k 1 δ () n(k) n[r(k)] r (k) (4) n(k) e αk 1/δ k 1/δ 1 (5) which asymptotically behaves like a power law with γ = 1+1/δ. In the hypercube example, espite the exponential expansion of neighborhoos, the resulting egree istribution will always be Poisson as long as the probability of connection is sufficiently small, as shown in the next section. Nevertheless, the connection between this moel an those base on tree-metrics an hien metric spaces is important to note, as one key factor emerges: a istance-epenent relation is necessary for a greey algorithm to succee in fining shortest paths.

11 11 IV. DEGREE DISTRIBUTION In this section we escribe a general characteristic function-base analysis of egree istributions for lattice-base networks, an apply it to the expaning hypercube example in Section II. In general, any lattice-base network with a istance-epenent probability of connection will have a Poisson egree istribution, as long as the probability of a connection at a istance is sufficiently small. Formally, Theorem 4.1: The egree istribution of a general lattice-base network with a sufficiently small istance-epenent probability of connection P() an maximum istance max will have a Poisson egree istribution: P(ν = i) = e α α i i! where α = max an N() = number of noes at istance from a reference noe in the lattice. =1 P()N() (6) Proof: Let ν enote the egree of an arbitrary noe u in a general lattice-base network with n noes. Thus, ν = v 1 + v v n where 1 if link to noe i, v i = 0 otherwise. We efine the characteristic function of the egree istribution as E[e itν ] = E[e it(v1+v2+ +vn) ] = E[e itv1 ]E[e itv2 ]...E[e itvn ] (7) We can then group the expecta E[e itν max ] = (1 P() + P()e it ) N() (8) =1 max = =1 max =1 (1 P()(1 e it )) N() (9) e (1 eit )P()N() for sufficiently small P() (10) =e (1 eit max ) P()N() =1 (11) =e α(eit 1) (12) Expaning, we see that the characteristic function is E[e itν ] = e α ( 1 + αe it + (αeit ) 2 2! +... From such a representation of the characteristic function, we can clearly see the egree istribution as P(ν = i) = e α α i i! ) (1) (14)

12 12 We now turn to a specific lattice-base network, the hypercube istance-epenent Kronecker graph escribe in Example in Section II. In this example, N() = ( k ), an the maximum istance in the ] ) 1 network is k = log n. We use a particular P() = log k ln optimize for searchability, as etermine in Section V. [ (k 2 Theorem 4.2: The egree istribution of the expaning hypercube is given by the following Poisson istribution, P(ν = i) = e α α i i! where α.6919 n.470 log log n log n Proof: We use the same framework as in the proof of Theorem 4.1, an let e it = x for simplicity. In this case, the characteristic function becomes so that α = = (15) E[x ν ] = e (1 x) k =1 P()N() (16) k P()N() (17) =1 k =1 [( ) k 2 log k ln ] 1 ( ) k To calculate α, we use the entropy approximation ( k ) 2 kh( ) k, so that α 1 log k ln k =1 1 2 kh( k) (k 2 )H We can approximate the sum by using sale point integration. 2π g(y)e kf(y) y = k f (y 0 ) g(y 0)e kf(y0) ( k 2 ( 1 + O ) ( 1 k )) where y 0 is the sale point of the function f(y), i.e., the point at which f (y) = 0. We rewrite the sum S(k) in nats, leaving out the constants in front, [ ( S(k) = 1 )] k k H( k) (1 k)h 2 k k ek 1 k 2 an then we let y = k, S(y) = =1 1 1 k [ 1 ( ) ( y )] H(y) 1 2 y ek y H 1 y 2 (18) (19) (20) (21) (22)

13 1 so that, in the sale point approximation, g(y) = 1 y Mathematica, we fin 2 an f(y) = H(y) (1 y )H( y 1 2 y ). Using yieling, So, our α is now S(k) y 0 = f(y 0 ) = 2.4 g(y 0 ) = 0.26 f (y 0 ) = 2.2 2π 2.2k (2.4)e0.26k (2) 1 2π α log k ln 2.2k (2.4)e0.26k (24).6919 n0.470 log log n log n With the results of Theorem 4.1, we have a Poisson egree istribution with parameter α. (25) A. Expecte Degree From the characteristic function, we can also etermine the expecte egree. E[ν] = x E[xν ] (26) x=1 = x [e (1 x)α ] (27) x=1 = α (28) Thus, the expecte egree of the expaning hypercube example is is a growing function of n. B. Simulation of expaning hypercube example Simulating the expaning hypercube with the P() etermine in Section V yiels results that match well, within a constant, the analysis above. Figure below shows the comparison of the theoretical an simulate expecte egrees, while figure 4 shows an example histogram of the egree istribution, both theoretical an simulate, with n = The Poisson nature of the istribution is clearly visible, as is the growth of the expecte egree as a function of n.

14 14 Fig.. Expecte egree of expaning hypercube Fig. 4. Example histogram with n = 4096 V. PROVING SEARCHABILITY While the istance-epenent Kronecker graph moel is more complicate than the original Kronecker graph moel, it can capture several existing network moels, an it incorporates istance into the

15 15 probability of connection, allowing for several cases in which searchability can be proven. In this section, we first give a general framework within which a lattice-base network can be proven searchable an then procee to the specific cases of the Kleinberg moel [14] an the expaning hypercube moel of Example in Section II. A. General Searchability Theorem We efine a ecentralize algorithm A similar to [14]. In each step, the current message-holer u passes the message to a neighbor that is closest to the estination, t. Each noe only has knowlege of its aress on the lattice (given by its bit vector label), the aress of the estination, an the noes that have previously come into contact with the message. For the graph to be searchable, we nee to have that the istribute algorithm A is able to fin short paths through the network, which are usually O(D) where D is the iameter of the network. Let the current message holer be noe u an the estination noe t. We will say that the execution of a ecentralize search algorithm A is in phase j when 2 j < (u, t) 2 j+1, where (u, t) is the istance between noe u an noe t. Thus, the largest value of j in a general lattice-base network is j max = log max where max enotes the maximum geoesic in the network. For example, in a hypercube, the maximum geoesic is max = log n = k, so j max = log log n = log k. We efine N u,t () = {v : (v, t) 2 j, (u, v) = } an min N() = min u,t,(u,t)= N u,t (). Theorem 5.1: A ecentralize algorithm A will fin short paths, roughly O(D), when the probability of a connection is P(u, v) = [c min N() ] 1 where c log max. Proof: Suppose we are in phase j with current message holer noe u; we want to etermine the probability that the phase ens at this step. This is equivalent to the probability that the message enters a set of noes B j where B j = {v : (v, t) 2 j }. Pr(message enters B j ) =1 =1 1 v B j (1 P(u, v : v B j )) (29) (u,t)+2 j =(u,t) 2 j (1 P()) Nu,t() (u,t)+2 j =(u,t) 2 j (1 P()) min N() (0) (1)

16 16 Fig. 5. Relative positions of noes u,v, an t in phase j In any network moel, enforcing searchibility boils own to etermining this min N(), the minimum number of noes at a istance from a given noe u within a ball of noes centere aroun the estination, t, as illustrate in Figure 5. Once this min N() is foun, if we set the probability of a connection between two noes istance apart as in Theorem 5.1, with an appropriate constant, we will fin that each phase escribe above will en in approximately j max steps, an, as there are only j max such phases, our greey forwaring algorithm will fin be able to fin very short paths of length O(jmax). 2 Thus, we have Pr(message enters B j ) 1 (u,t)+2 j =(u,t) 2 j (1 P()) min N() 1 e (u,t)+2 j =(u,t) 2 j min N() P() (2) () =1 e 1 c 1 e 1 c 1 e 1 c (u,t)+2 j =(u,t) 2 j 1 (4) (u,t)+2 j ln (u,t) 2 j (5) ln 2j 2 j (6) =1 e 1 c (7) 1 c (8) where line () hols in the limit of large n (lim n (1 x/n) n = e x ), an line (8) comes from the power series expansion of e x. Let X j enote the total number of steps spent in phase j. Then, EX j = Pr[X j i] (9) i=1 ( 1 1 ) i 1 c i=1 (40)

17 17 Let X enote the total number of steps taken by the algorithm A. =c (41) an j=0 X = j max j=0 X j (42) j max EX = EX j (4) (1 + j max )(c ) (44) δ(log max ) 2, for a large enough δ. (45) With this framework, we can explore the searchability of any lattice-base network moel with istanceepenent connection probability. B. Searchability in original Kleinberg moel In the original Kleinberg two-imensional lattice [14], the number of noes at a istance from a reference noe is approximately 4, ignoring ege effects. The maximum istance between any two noes is O(n), so j max log n. Aitionally, the iameter of the graph is on the orer of log n. In general, min N() for a fixe j, resulting in the probability of connection optimize for searchability, P() = [α log(n) 2 ] 1. Using this P(), Pr(message enters B j ) 1 (u,t)+2 j =(u,t) 2 j (1 P()) min N() 1 e 1 α log n (u,t)+2 j (46) =(u,t) 2 j 1 (47) Therefore, an 1 e 1 α log n (48) 1 α log n (49) EX j α log n (50) log n EX = EX j (51) j=0 δ(log n) 2, for a large enough δ. (52)

18 18 C. Searchability in expaning hypercube example In the expaning hypercube example of Section II, each noe has log n neighbors from the lattice itself. With the aition of long-range links, we expect the iameter to be O(log log n), similar to [18]. Note that with this example, j max = log log n = log k an the number of noes at istance equals ( n ). Using Theorem 5.1, we can prove the following result: Theorem 5.2: A ecentralize algorithm A will fin paths of length O((log log n) 2 ) in the expaning hypercube example when β 0 =1, β 1 = [2 log k ln] 1, (5) β i = [( ) k 2i i i such that the probability of a connection is P(u, v) = [ (k 2 ] [( k 2(i+1) ) 1 (i + 1)] i 2 (54) i+1 1 if (u, v) = 0, 1 ) log k ln ] 1 if (u, v) = Proof: Using Theorem 5.1, all that remains is to fin min N() an to etermine the appropriate constants to use. Without loss of generality, we assume that the estination noe t is the all-zero noe (i.e., its label is the zero vector) so that we can write (u, t) = u. To etermine min N() in our case, since the istance measure is a Hamming istance, we must count the number of possible bit vectors that are at a specific istance from a noe u while still being within a certain istance of the estination. We prove that min N u,t () = ( k 2 ) in Appenix A. We then let c = log k ln for reasons that will be clear below. Using the same framework as in Theorem 5.1 we have that Pr(msg enters B j ) 1 u +2 j = u 2 j (1 P()) min N() 1 e 1 log k ln u +2 j (55) (56) = u 2 j 1 (57) Therefore, we have 1 e 1 log k (58) 1 log k (59) EX j log k (60)

19 19 an log k EX = EX j (61) j=0 δ(log k) 2, for a large enough δ. (62) Since the expecte number of steps in phase j is log k, an there are at most log k phases, the expecte amount of steps taken by the algorithm A is at most δ log 2 k. So, with this efinition of P(), the istribute algorithm provies searchabilty. D. Simulation of istribute search algorithm We simulate the local greey algorithm escribe above in MATLAB for 16 n 4096 with the probability istribution as in Theorem 5.2 an appropriate floor functions. We foun that the greey algorithm fins a path between two noes with an average length of a constant factor away from the iameter of the simulate network, where iameter is efine as the maximum geoesic in the network. Note that the two noes selecte for the simulation are actually the worst-case noes - the istance between them in the network is exactly the iameter. Figure 6 illustrates the results of the greey algorithm simulations. Fig. 6. Average path length foun by greey algorithm using local information

20 20 E. Path length with sub-optimal P() In this section we analyze the performance of the local greey search algorithm on the expaning hypercube when P() is not optimal, as in Theorem 5.2. For this example, let P() = [log k ( k ) ] 1, which is clearly not min N() from Lemma 8.1. We will show that this suboptimal P() also allows for searchability. Using the same framework as in Theorem 5.1, Pr(msg enters B j ) 1 1 e (u,t)+2 j =(u,t) 2 j (1 P()) min N() (u,t)+2 j =(u,t) 2 j P()min N() =1 e (u,t)+2 j P()( k 2 =(u,t) 2 j ) (6) (64) (65) 1 e 1 log k S(k,) (66) 1 e 1 log k min S(k,) (67) where S(k, ) = 2 j =2 j ( k 2 j 2 (k =2 j min ) 1 ( k 2 2 j 2 (k =2 j ) (68) 2 )H( ) kh( ) k 2 k (69) 2 )H( ) kh( ) k 2 k (70) 2 max (k 2 )H( ) kh( ) k 2 k. (71) Since the exponent is convex in, the maximum will be at either the upper or lower boun of the sum. For 0 j log k the lower boun ( = 2 j ) yiels the maximal exponent. So, Pr(msg enters B j ) 1 e 1 log k 2f(k,j) (72) where f(k, j) = (k 2j+1 2f(k,j) log k )H( 2j k 2j+1 (7) ) kh( 2j ). (74) k

21 21 Continuing with the proof of searchibility, we have EX j = Pr[X j i] (75) i=1 log k 2 f(k,j) (76) an log k EX = EX j (77) j=0 (1 + log k)log k 2 minj f(k,j) (78) δ(log k) 2, for a large enough δ (79) since f(k, j) is convex but its minimum occurs close to log k. As a result, even for suboptimal P(), a local greey algorithm can fin short paths. However, the bouns use in the analysis above are looser than those in previous sections, so the final expecte number of steps taken by A is not as tight. This analysis is supporte by simulation results as shown in the figure below. 6 Average iameter an path length of simulate Kron graphs with suboptimal P() Average iameter an path length, over 20 trials Simulate iameter Path length foun by ist alg n Fig. 7. Performance of greey algorithm when P() = [log k ( ) k ] 1 Finally, if P() = [ log k ( k ) ] 1, using the same sort of techniques as above we can show that EX δk(log k) 2 for a large enough δ. Note that in this case, the paths foun will be O(log n log log n), which are longer than before. Simulation results with this P() are shown in figure 8.

22 22 8 Average iameter an path length of simulate Kron graphs with suboptimal P() 7 Average iameter an path length, over 20 trials Simulate iameter Path length foun by ist alg n Fig. 8. Performance of greey algorithm when P() = [log k ( ) k ] 1 VI. BRIEF DIAMETER ANALYSIS OF HYPERCUBE In this section, we briefly iscuss the iameter of a general ranom graph. Fining the actual iameter, efine as either the maximum or the average geoesic in the network, can be very complicate. We iscuss a simple lower boun of the hypercube example here, which can be applie to any ranom graph. If we assume that the expecte egree of the hypercube example in Section II is polynomial in n, say n β, similar to what was foun in Section III for the expaning hypercube, we can lower boun the iameter as follows. We assume that at each step, every noe has neighbors an that it takes α steps to reach all n noes. Therefore, to reach all n noes in the network, we have α = n (80) (n β ) α = n (81) α = 1 β (82) Constant iameter (8) Thus, a simple lower boun for the iameter of a graph with polynomial expecte egree is some constant, 1 β. We can also work backwars, assuming a log log n iameter. In this case, we have α = n (84) log log n = n (85)

23 2 = n 1 log log n = e log n log log n (86) which is less than a polynomial in n, but still grows with n. Figure 9 compares the simulate iameter of the expaning hypercube example with the two lower bouns iscusse above. For 16 n 4096, both lower bouns appear to be a goo match. Fig. 9. Simulate an theoretical iameter of expaning hypercube VII. CONCLUSION We have presente a generalization of Kronecker graphs by efining a family of istance -epenent matrices an a new Kronecker-like operation. As a result, the network moel efines both local regular structures an global istance-epenent connections. Though the moel is more complicate than the original Kronecker graph moel, it is more general, as it can generate existing social network moels, an more importantly, networks that are searchable. These properties emerge naturally from the efinition of the embeing of the noes an the probability of connection within the family of matrices H. Any lattice-base network moel with istance-epenent connection probabilities can be analyze using the framework escribe in Sections IV, V, an VI for exploring egree istribution, iameter, an searchability. Most importantly, the searchability analysis shows how to make any network moel searchable by efining the appropriate probability of connection base upon N(). The particular expaning hypercube example explicitly escribe here shares characteristics with those base upon hien hyperbolic spaces [17], [18], though it has one major ifference - egree homogeneity across noes. Nevertheless, its

24 24 exponentially expaning neighborhoos an istance-epenent probability of connection make it a goo moel for social networks as people ten to exhibit strong homophily, i.e., associating with other people most like themselves. In aition, in contrast to Kleinberg s lattice-base moel [14], the searchability of the expaning hypercube is not too sensitive to the choice of P(). Though this paper gives a near complete escription of the characteristics of istance -epenent Kronecker graphs, there are many interesting questions that remain. These inclue how to parameterize the moel from real-worl ata sets, an how to incorporate network ynamics. Ieally, given any ata set, we woul like to be able to fin an appropriate family of istance-epenent matrices to match any esire characteristic of the ata set. Aitionally, while the current moel incorporates some measure of growth, growing from a small initiator matrix to a final nxn ajacency matrix, we woul like to better incorporate mobility into the moel so that it is not just a static escription of the network at one point in time. VIII. APPENDIX A - CALCULATING THE SIZE OF N u,t () In this appenix, we show a lower boun for N u,t (), the number of noes at istance from a given noe u, still within istance 2 j of the estination, t. Lemma 8.1: min N u,t () = ( k 2 ) Proof: We first count exactly the number of noes in N u,t (), the number of noes at a istance from a given noe u within a ball of noes centere aroun the estination, t, as illustrate in Figure. Without loss of generality, efine t as the all zero noe, t = (00...0). Arrange the label of u such that u = ( ). Define v = (v 11 v 10 v 01 v 00 ) accoring to this partition of u, so that v 11 an v 01 have 1 entries an v 10 an v 00 have 0 entries. Let x enote the weight, or number of ones, of the label of noe x. We know the following: We can solve in terms of v 11, yieling v 11 + v 10 + v 01 + v 00 = k (87) v 11 + v 10 = u (88) v 01 + v 10 = (89) v 11 + v 01 = v (90) v 00 =k v 11 (91) v 10 = u v 11 (92) v 01 = u + v 11 (9)

25 25 We also know that we must satisfy the following: From these bouns we have v 11, v 10, v 01, v 00 0 (94) 2 j < u 2 j+1 (95) u 2 j u + 2 j (96) v 2 j (97) max(0, u ) v 11 min( u, k, 1 2 (2j + u )) (98) Note that the secon an thir bouns o not affect v 11. Counting the number of noes in the ball, we have N u,t () = v u v 11=v l ( )( u k u v 11 u + v 11 where we have substitute v u an v l, for the upper an lower bouns above, respectively. We can now approximate the number of noes in N u,t (), using the entropy approximation for combinations. Let u = ak, = bk,2 j = ck, x = v 11. Using this notation, we have ( )( ) v u ak k(1 a) N u,t () = x k(1 b) + x x=v l v u 2 k(ah( x ak)+(1 a)h x=v l ( b a+ x k 1 a ) ) ) (99) (100) (101) 2 kx (102) where subject to ( x X = maxah + (1 a)h x ak) ( b a + x ) k 1 a (10) k max(0, a b) x k min(a,1 b, 1 (a b + c)) (104) 2 Note that line (101) is true as ( n k) = 2 n(h(p)+o(1)) when k pn. Note that the function X is concave in x, so unconstraine optimization yiels the two solutions below, each giving ifferent values of min N u,t () : x 1 = ak abk when c a + b(1 2a) yieling min N u,t () = ( ) k

26 26 yieling x 2 = 1 k(a b + c) when c < a + b(1 2a) 2 min N u,t () = ( ) k 2 The resulting min N u,t () are erive in Sections A an B below. As the secon solution yiels a smaller min N u,t (), we have an overall min N u,t () = ( k 2 ). A. Solution 1: c a + b(1 2a) In this region, the solution to the unconstraine problem, x 1 Substituting in for the size of N u,t (), we have N u,t () = 2 where line (108) is true in the limit of large k. ak abk k(ah( ak )+(1 a)h = ak abk gives us the maximal X. ( ) b a+ ak abk k ) 1 a (105) = 2 k(ah(1 b)+(1 a)h(b)) (106) = 2 kh(b) (107) ( ) k bk (108) ( ) k = (109) B. Solution 2: c < a + b(1 2a) In this region, we choose one of the bounary points, x 2 = 1 2k(a b + c), as the solution to the maximization problem. Substituting this solution for x in N u,t (), we obtain k(ah( ( ) a b+c a+b+c N u,t () = 2 2a )+(1 a)h 2(1 a) ) (110) This gives us a function of a, b, c, so we want to fin the worst case a, c that minimizes N u,t (). The new optimization problem is thus Note that the bouns for this region are: 1) a b c 0 2) a b + c 0 f(b) = min N u,t () (111) ( ) ( ) a b + c a + b + c = min + (1 a)h a,c 2a 2(1 a) (112)

27 27 ) c < a 2c 4) 0 c 1 2 5) 0 a, b 1 6) 0 2 a b c 7) 0 a + b c 8) 0 a + b c 2ab where 1) an 2) come from the bouns on (u, v), ) comes from the bouns on u, an 4) an 5) come from the ranges for j an the size of the network. Note that 1-5 are always true, not just in this region. 6),7), an 8) come from the fact that our solution x 2 is minimal in this region. Note that 8) implies 7). Computing the Hessian of the function in line (112) shows that it is concave in both a an b; the erivation is in Appenix B. Since our function is concave, the min N u,t () is foun from the bounary points of Region 2. Rearranging the bouns from before in terms of a we have: 1) a b + c 2) a b c ) a > c, a 2c 4) c > 0, c 1 2 5) 0 a, a 1 6) a 2 b c 7) a b + c 8) a c 1 2b b 1 2b when b 1 2 9) a c 1 2b b 1 2b when b > 1 2 Fig. 10. Bounaries of f(b) when b 1 2

28 28 When b 1 2, only bouns (1,2,,4) apply to f(b), yieling 5 points that we nee to examine, as shown in Figure 10. If b.115, then f(b) is minimal at point (1), ( b, 2b ), yieling ( b ) 2b k(1 min N u,t () = 2 )H 1 2b (11) ( ) k 2bk bk, for large k (114) ( ) k 2 = (115) If b < 0.115, then f(b) is minimal at point (5), (b, 2b), yieling min N u,t () = 2 k2b = 4 (116) When b > 1 2, only bouns (2,,4,an 8) apply to f(b), yieling 4 points that we nee to examine, as shown in Figure 11. Fig. 11. Bounaries of f(b) when b 1 2 For this region, f(b) is minimal at point (1), matching point (5) in the previous region, yieling ( b ) 2b k(1 min N u,t () = 2 )H 1 2b (117) ( ) k 2, for large k (118) Thus, when b < 0.115, we have min N u,t () = 4, an when b 0.115, we have min N u,t () = ). Finally, we have that when c < a + b(1 2a), we apply Solution 2 from Lemma 5.1, an we ( k 2 have min N u,t () = ( k 2 have again that min N u,t () = ( k 2 ) when Solution 2 is vali. Comparing the Solution 1 with Solution 2, we ).

29 29 IX. APPENDIX B - CONCAVITY OF f(a, b, c) FOR SOLUTION 2 ( ) ( ) Lemma 9.1: The function f(a, b, c) = ah a b+c 2a + (1 a)h a+b+c 2(1 a) is concave in both a an b. Proof: To prove that the function is concave in both a an b, we nee to see if the Hessian is negative efinite. Let ( a b + c f(a, b, c) = ah 2a Taking erivatives with respect to a, we fin an an f a = 1 2 ) + (1 a)h ( ) a + b + c 2(1 a) ( log c + a b log b + a c + log c a + b 2a 2a 2(1 a) + log 2 a b c 2(1 a) 2 f a 2 = (c b) 2 a(c + a b)(b + a c) + (1 c b) 2 (1 a)(c a + b)(2 a b c) = 1 ( 1 2 a b + c + 1 a + b c + 2 a + 1 a + b + c a b c + 2 ) 1 a From the bouns for this region, we can see that the function is concave in a. Taking erivatives with respect to c, we fin ) (119) (120) (121) (122) f c = 1 ( log (c + a b) + log (a + b c) log (c a + b) + log (2 a b c)) (12) 2 2 f c 2 = 1 ( 2 1 c + a b + 1 a + b c + 1 c a + b + ) 1 2 a b c From the bouns in this region, we can see that the function is concave in c. Taking erivatives with respect to both a an c, we fin 2 f c a = 1 ( 2 The Hessian H is 1 a b + c + 1 a + b c + 1 a + b + c + 2 a 2 2 a c 2 a c 2 c 2 ) 1 2 a b c (124) (125) We want to show that the Hessian is negative efinte, i.e, that H < 0. We have alreay shown that 2 a 2 < 0, so it remains to show that the secon leaing principal minor of H is positive efinite. This is just the eterminant of H et[h] = 2 2 ( ) 2 2 a 2 c 2 > 0 (126) a c

30 0 We rewrite the secon erivatives as where, from above, 2 a 2 =1 2 ( f 1 + f a + 2 ) 1 a (127) 2 c 2 =1 2 (f 1 + f 2 ) (128) 2 a c =1 2 (f 1 f 2 ) (129) f 1 = 1 a b + c a b c < 0 (10) f 2 = 1 a + b c + 1 a + b + c < 0 (11) So, our eterminant is now ( et[h] = f 1 + f a + 2 ) (f 1 + f 2 ) (f 1 f 2 ) 2 (12) 1 a = 1 4 (f 1 + f 2 ) ( 2 4 a + 2 ) (f 1 + f 2 ) 1 1 a 4 (f 1 f 2 ) 2 (1) =f 1 f 2 + (f 1 + f 2 ) (14) 2a(1 a) Simplifying, this is just et[h] = ( a b + c + 2ab) 2 (a b + c)( 2 + a + b + c)(a + b c)(a b c)a(a 1) (15) which, from our bouns, is postive. Since the eterminant of H is postive, an since 2 a 2 is negative, we can say that H is negative efinite, an the function is concave in both a an c. REFERENCES [1] P. Erős an A. Rényi, On ranom graphs, Publicationes Mathematicae 6, p , [2] E.Boine, B. Hassibi, an A. Weirman, Generalizing kronecker graphs in orer to moel searchable networks, in Proc. Forty-Seventh Annual Allerton Conference, [] M.E.J. Newman, The structure an function of complex networks, SIAM Review, 200. [4] R. Albert an A. Barabási, Statistical mechanics of complex networks, Reviews of Moern Physics, vol. 74, [5] J. Kleinberg, Complex networks an ecentralize search algorithms, in Proc. of International Conference of Mathematicians, [6] B. Bollobás, Ranom Graphs, Acaemic Press, Inc., [7] D.J. Watts an S.H. Strogatz, Collective ynamics of small-worl networks, Nature, vol. 9, pp. 440, [8] A. Barabási an R. Albert, Emergence of scaling in ranom networks, Science, vol. 286, pp , [9] J. Leskovec, J. Kleinberg, an C. Faloutsos, Graphs over time: ensification laws, shrinking iameters an possible explanations, in Proc. of ACM SIGKDD conf. on knowlege iscovery in ata mining, 2005, pp

31 1 [10] P. Bak, K. Chen, an C. Tang, A forest-fire moel an some thoughts on turbulence, Phys. Lett. A, vol. 147, pp , [11] J. Leskovec, D. Chakrabarti, J. Kleinberg, an C. Faloutsos, Realistic, mathematically tractable graph generation an evolution, using kronecker multiplication, in Conf. on Principles an Practice of Knowlege Discovery in Databases, [12] J. Leskovec, Dynamics of Large Networks, PhD in Computer Science, Carnegie Mellon University, [1] S. Migram, The small-worl problem, Psychology Toay, vol. 2, pp. 60, [14] J. Kleinberg, The small-worl phenomenon: An algorithmic perspective, in Proc. of the 2n ACM Symposium on Theory of Computing, 2000, pp [15] C. Martel an V. Nguyen, Analyzing Kleinberg s an other small-worl moels, in In PODC 04: Proc. of ACM symposium on Principles of istribute computing, 2004, pp [16] M. Mahian an Y. Xu, Stochastic kronecker graphs, in In WAW07: Proc. of Workshop On Algorithms An Moels For The Web-Graph, 2007, pp [17] M. Ángeles Serrano, D. Krioukov, an M. Boguñá, Self-similarity of complex networks an hien metric spaces, Physics Review Letters, vol. 100, [18] D. Krioukov, F. Papaopoulos, M. Boguñá, an A. Vahat, Greey forwaring in scale-free networks embee in hyperbolic metric spaces, in Proc. of MAMA Workshop at Sigmetrics, [19] A. Cvetkovski an M. Crovella, Hyperbolic embeing an routing for ynamic graphs, in Proc. of Infocom, [20] V. Ramasubramanian an D. Malkhi, On the treeness of internet latency an banwith, in Proc. of ACM Sigmetrics, 2009, pp [21] M. Boguñá an D. Krioukov, Navigating ultrasmall worls in ultrashort time, Physical Review Letters, vol. 102, pp , [22] M. Boguñá, D. Krioukov, an kc claffy, Navigability of complex networks, Nature Physics, vol. 5, pp , [2] D. Krioukov, F. Papaopoulos, A. Vahat, an M. Boguñá, Curvature an temperature of complex networks, Physical Review E, vol. 80, pp , 2009.

Generalizing Kronecker Graphs in order to Model Searchable Networks

Generalizing Kronecker Graphs in order to Model Searchable Networks Generalizing Kronecker Graphs in orer to Moel Searchable Networks Elizabeth Boine, Babak Hassibi, Aam Wierman California Institute of Technology Pasaena, CA 925 Email: {eaboine, hassibi, aamw}@caltecheu

More information

Distance-dependent Kronecker Graphs for Modeling Social Networks

Distance-dependent Kronecker Graphs for Modeling Social Networks Distance-epenent Kronecker Graphs for Moeling Social Networks Elizabeth Boine-Baron,* Member, IEEE, Babak Hassibi, Member, IEEE, an Aam Wierman, Member, IEEE Abstract This paper focuses on a generalization

More information

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013 Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing

More information

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012 CS-6 Theory Gems November 8, 0 Lecture Lecturer: Alesaner Mąry Scribes: Alhussein Fawzi, Dorina Thanou Introuction Toay, we will briefly iscuss an important technique in probability theory measure concentration

More information

Deterministic Decentralized Search in Random Graphs

Deterministic Decentralized Search in Random Graphs Deterministic Decentralized Search in Random Graphs Esteban Arcaute 1,, Ning Chen 2,, Ravi Kumar 3, David Liben-Nowell 4,, Mohammad Mahdian 3, Hamid Nazerzadeh 1,, and Ying Xu 1, 1 Stanford University.

More information

MULTIFRACTAL NETWORK GENERATORS

MULTIFRACTAL NETWORK GENERATORS MULTIFRACTAL NETWORK GENERATORS AUSTIN R. BENSON, CARLOS RIQUELME, SVEN P. SCHMIT (0) Abstract. Generating ranom graphs to moel networks has a rich history. In this paper, we explore a recent generative

More information

Math 1B, lecture 8: Integration by parts

Math 1B, lecture 8: Integration by parts Math B, lecture 8: Integration by parts Nathan Pflueger 23 September 2 Introuction Integration by parts, similarly to integration by substitution, reverses a well-known technique of ifferentiation an explores

More information

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments 2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor

More information

Lower Bounds for the Smoothed Number of Pareto optimal Solutions

Lower Bounds for the Smoothed Number of Pareto optimal Solutions Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.

More information

Make graph of g by adding c to the y-values. on the graph of f by c. multiplying the y-values. even-degree polynomial. graph goes up on both sides

Make graph of g by adding c to the y-values. on the graph of f by c. multiplying the y-values. even-degree polynomial. graph goes up on both sides Reference 1: Transformations of Graphs an En Behavior of Polynomial Graphs Transformations of graphs aitive constant constant on the outsie g(x) = + c Make graph of g by aing c to the y-values on the graph

More information

Lower bounds on Locality Sensitive Hashing

Lower bounds on Locality Sensitive Hashing Lower bouns on Locality Sensitive Hashing Rajeev Motwani Assaf Naor Rina Panigrahy Abstract Given a metric space (X, X ), c 1, r > 0, an p, q [0, 1], a istribution over mappings H : X N is calle a (r,

More information

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations Diophantine Approximations: Examining the Farey Process an its Metho on Proucing Best Approximations Kelly Bowen Introuction When a person hears the phrase irrational number, one oes not think of anything

More information

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control 19 Eigenvalues, Eigenvectors, Orinary Differential Equations, an Control This section introuces eigenvalues an eigenvectors of a matrix, an iscusses the role of the eigenvalues in etermining the behavior

More information

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21 Large amping in a structural material may be either esirable or unesirable, epening on the engineering application at han. For example, amping is a esirable property to the esigner concerne with limiting

More information

u!i = a T u = 0. Then S satisfies

u!i = a T u = 0. Then S satisfies Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace

More information

Proof of SPNs as Mixture of Trees

Proof of SPNs as Mixture of Trees A Proof of SPNs as Mixture of Trees Theorem 1. If T is an inuce SPN from a complete an ecomposable SPN S, then T is a tree that is complete an ecomposable. Proof. Argue by contraiction that T is not a

More information

Linear First-Order Equations

Linear First-Order Equations 5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)

More information

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION The Annals of Statistics 1997, Vol. 25, No. 6, 2313 2327 LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION By Eva Riccomagno, 1 Rainer Schwabe 2 an Henry P. Wynn 1 University of Warwick, Technische

More information

Calculus and optimization

Calculus and optimization Calculus an optimization These notes essentially correspon to mathematical appenix 2 in the text. 1 Functions of a single variable Now that we have e ne functions we turn our attention to calculus. A function

More information

Capacity Analysis of MIMO Systems with Unknown Channel State Information

Capacity Analysis of MIMO Systems with Unknown Channel State Information Capacity Analysis of MIMO Systems with Unknown Channel State Information Jun Zheng an Bhaskar D. Rao Dept. of Electrical an Computer Engineering University of California at San Diego e-mail: juzheng@ucs.eu,

More information

Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Codes

Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Codes Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Coes Kaiann Fu an Achilleas Anastasopoulos Electrical Engineering an Computer Science Dept. University of Michigan, Ann Arbor, MI

More information

Generalization of the persistent random walk to dimensions greater than 1

Generalization of the persistent random walk to dimensions greater than 1 PHYSICAL REVIEW E VOLUME 58, NUMBER 6 DECEMBER 1998 Generalization of the persistent ranom walk to imensions greater than 1 Marián Boguñá, Josep M. Porrà, an Jaume Masoliver Departament e Física Fonamental,

More information

A Weak First Digit Law for a Class of Sequences

A Weak First Digit Law for a Class of Sequences International Mathematical Forum, Vol. 11, 2016, no. 15, 67-702 HIKARI Lt, www.m-hikari.com http://x.oi.org/10.1288/imf.2016.6562 A Weak First Digit Law for a Class of Sequences M. A. Nyblom School of

More information

Integration Review. May 11, 2013

Integration Review. May 11, 2013 Integration Review May 11, 2013 Goals: Review the funamental theorem of calculus. Review u-substitution. Review integration by parts. Do lots of integration eamples. 1 Funamental Theorem of Calculus In

More information

Introduction to the Vlasov-Poisson system

Introduction to the Vlasov-Poisson system Introuction to the Vlasov-Poisson system Simone Calogero 1 The Vlasov equation Consier a particle with mass m > 0. Let x(t) R 3 enote the position of the particle at time t R an v(t) = ẋ(t) = x(t)/t its

More information

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes Leaving Ranomness to Nature: -Dimensional Prouct Coes through the lens of Generalize-LDPC coes Tavor Baharav, Kannan Ramchanran Dept. of Electrical Engineering an Computer Sciences, U.C. Berkeley {tavorb,

More information

Influence of weight initialization on multilayer perceptron performance

Influence of weight initialization on multilayer perceptron performance Influence of weight initialization on multilayer perceptron performance M. Karouia (1,2) T. Denœux (1) R. Lengellé (1) (1) Université e Compiègne U.R.A. CNRS 817 Heuiasyc BP 649 - F-66 Compiègne ceex -

More information

. Using a multinomial model gives us the following equation for P d. , with respect to same length term sequences.

. Using a multinomial model gives us the following equation for P d. , with respect to same length term sequences. S 63 Lecture 8 2/2/26 Lecturer Lillian Lee Scribes Peter Babinski, Davi Lin Basic Language Moeling Approach I. Special ase of LM-base Approach a. Recap of Formulas an Terms b. Fixing θ? c. About that Multinomial

More information

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy,

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy, NOTES ON EULER-BOOLE SUMMATION JONATHAN M BORWEIN, NEIL J CALKIN, AND DANTE MANNA Abstract We stuy a connection between Euler-MacLaurin Summation an Boole Summation suggeste in an AMM note from 196, which

More information

Lecture 2 Lagrangian formulation of classical mechanics Mechanics

Lecture 2 Lagrangian formulation of classical mechanics Mechanics Lecture Lagrangian formulation of classical mechanics 70.00 Mechanics Principle of stationary action MATH-GA To specify a motion uniquely in classical mechanics, it suffices to give, at some time t 0,

More information

The derivative of a function f(x) is another function, defined in terms of a limiting expression: f(x + δx) f(x)

The derivative of a function f(x) is another function, defined in terms of a limiting expression: f(x + δx) f(x) Y. D. Chong (2016) MH2801: Complex Methos for the Sciences 1. Derivatives The erivative of a function f(x) is another function, efine in terms of a limiting expression: f (x) f (x) lim x δx 0 f(x + δx)

More information

Calculus of Variations

Calculus of Variations 16.323 Lecture 5 Calculus of Variations Calculus of Variations Most books cover this material well, but Kirk Chapter 4 oes a particularly nice job. x(t) x* x*+ αδx (1) x*- αδx (1) αδx (1) αδx (1) t f t

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors Math 18.02 Notes on ifferentials, the Chain Rule, graients, irectional erivative, an normal vectors Tangent plane an linear approximation We efine the partial erivatives of f( xy, ) as follows: f f( x+

More information

inflow outflow Part I. Regular tasks for MAE598/494 Task 1

inflow outflow Part I. Regular tasks for MAE598/494 Task 1 MAE 494/598, Fall 2016 Project #1 (Regular tasks = 20 points) Har copy of report is ue at the start of class on the ue ate. The rules on collaboration will be release separately. Please always follow the

More information

7.1 Support Vector Machine

7.1 Support Vector Machine 67577 Intro. to Machine Learning Fall semester, 006/7 Lecture 7: Support Vector Machines an Kernel Functions II Lecturer: Amnon Shashua Scribe: Amnon Shashua 7. Support Vector Machine We return now to

More information

Acute sets in Euclidean spaces

Acute sets in Euclidean spaces Acute sets in Eucliean spaces Viktor Harangi April, 011 Abstract A finite set H in R is calle an acute set if any angle etermine by three points of H is acute. We examine the maximal carinality α() of

More information

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k A Proof of Lemma 2 B Proof of Lemma 3 Proof: Since the support of LL istributions is R, two such istributions are equivalent absolutely continuous with respect to each other an the ivergence is well-efine

More information

arxiv: v4 [cs.ds] 7 Mar 2014

arxiv: v4 [cs.ds] 7 Mar 2014 Analysis of Agglomerative Clustering Marcel R. Ackermann Johannes Blömer Daniel Kuntze Christian Sohler arxiv:101.697v [cs.ds] 7 Mar 01 Abstract The iameter k-clustering problem is the problem of partitioning

More information

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs Lectures - Week 10 Introuction to Orinary Differential Equations (ODES) First Orer Linear ODEs When stuying ODEs we are consiering functions of one inepenent variable, e.g., f(x), where x is the inepenent

More information

A Sketch of Menshikov s Theorem

A Sketch of Menshikov s Theorem A Sketch of Menshikov s Theorem Thomas Bao March 14, 2010 Abstract Let Λ be an infinite, locally finite oriente multi-graph with C Λ finite an strongly connecte, an let p

More information

Lecture 10: Logistic growth models #2

Lecture 10: Logistic growth models #2 Lecture 1: Logistic growth moels #2 Fugo Takasu Dept. Information an Computer Sciences Nara Women s University takasu@ics.nara-wu.ac.jp 6 July 29 1 Analysis of the stochastic process of logistic growth

More information

θ x = f ( x,t) could be written as

θ x = f ( x,t) could be written as 9. Higher orer PDEs as systems of first-orer PDEs. Hyperbolic systems. For PDEs, as for ODEs, we may reuce the orer by efining new epenent variables. For example, in the case of the wave equation, (1)

More information

arxiv: v2 [math.st] 29 Oct 2015

arxiv: v2 [math.st] 29 Oct 2015 EXPONENTIAL RANDOM SIMPLICIAL COMPLEXES KONSTANTIN ZUEV, OR EISENBERG, AND DMITRI KRIOUKOV arxiv:1502.05032v2 [math.st] 29 Oct 2015 Abstract. Exponential ranom graph moels have attracte significant research

More information

Lecture 6: Calculus. In Song Kim. September 7, 2011

Lecture 6: Calculus. In Song Kim. September 7, 2011 Lecture 6: Calculus In Song Kim September 7, 20 Introuction to Differential Calculus In our previous lecture we came up with several ways to analyze functions. We saw previously that the slope of a linear

More information

Parameter estimation: A new approach to weighting a priori information

Parameter estimation: A new approach to weighting a priori information Parameter estimation: A new approach to weighting a priori information J.L. Mea Department of Mathematics, Boise State University, Boise, ID 83725-555 E-mail: jmea@boisestate.eu Abstract. We propose a

More information

Table of Common Derivatives By David Abraham

Table of Common Derivatives By David Abraham Prouct an Quotient Rules: Table of Common Derivatives By Davi Abraham [ f ( g( ] = [ f ( ] g( + f ( [ g( ] f ( = g( [ f ( ] g( g( f ( [ g( ] Trigonometric Functions: sin( = cos( cos( = sin( tan( = sec

More information

Calculus Class Notes for the Combined Calculus and Physics Course Semester I

Calculus Class Notes for the Combined Calculus and Physics Course Semester I Calculus Class Notes for the Combine Calculus an Physics Course Semester I Kelly Black December 14, 2001 Support provie by the National Science Founation - NSF-DUE-9752485 1 Section 0 2 Contents 1 Average

More information

ensembles When working with density operators, we can use this connection to define a generalized Bloch vector: v x Tr x, v y Tr y

ensembles When working with density operators, we can use this connection to define a generalized Bloch vector: v x Tr x, v y Tr y Ph195a lecture notes, 1/3/01 Density operators for spin- 1 ensembles So far in our iscussion of spin- 1 systems, we have restricte our attention to the case of pure states an Hamiltonian evolution. Toay

More information

The Principle of Least Action

The Principle of Least Action Chapter 7. The Principle of Least Action 7.1 Force Methos vs. Energy Methos We have so far stuie two istinct ways of analyzing physics problems: force methos, basically consisting of the application of

More information

Optimal Variable-Structure Control Tracking of Spacecraft Maneuvers

Optimal Variable-Structure Control Tracking of Spacecraft Maneuvers Optimal Variable-Structure Control racking of Spacecraft Maneuvers John L. Crassiis 1 Srinivas R. Vaali F. Lanis Markley 3 Introuction In recent years, much effort has been evote to the close-loop esign

More information

The total derivative. Chapter Lagrangian and Eulerian approaches

The total derivative. Chapter Lagrangian and Eulerian approaches Chapter 5 The total erivative 51 Lagrangian an Eulerian approaches The representation of a flui through scalar or vector fiels means that each physical quantity uner consieration is escribe as a function

More information

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Ashish Goel Michael Kapralov Sanjeev Khanna Abstract We consier the well-stuie problem of fining a perfect matching in -regular bipartite

More information

APPPHYS 217 Thursday 8 April 2010

APPPHYS 217 Thursday 8 April 2010 APPPHYS 7 Thursay 8 April A&M example 6: The ouble integrator Consier the motion of a point particle in D with the applie force as a control input This is simply Newton s equation F ma with F u : t q q

More information

u t v t v t c a u t b a v t u t v t b a

u t v t v t c a u t b a v t u t v t b a Nonlinear Dynamical Systems In orer to iscuss nonlinear ynamical systems, we must first consier linear ynamical systems. Linear ynamical systems are just systems of linear equations like we have been stuying

More information

arxiv: v1 [math.co] 29 May 2009

arxiv: v1 [math.co] 29 May 2009 arxiv:0905.4913v1 [math.co] 29 May 2009 simple Havel-Hakimi type algorithm to realize graphical egree sequences of irecte graphs Péter L. Erős an István Miklós. Rényi Institute of Mathematics, Hungarian

More information

Lecture 5. Symmetric Shearer s Lemma

Lecture 5. Symmetric Shearer s Lemma Stanfor University Spring 208 Math 233: Non-constructive methos in combinatorics Instructor: Jan Vonrák Lecture ate: January 23, 208 Original scribe: Erik Bates Lecture 5 Symmetric Shearer s Lemma Here

More information

arxiv: v4 [math.pr] 27 Jul 2016

arxiv: v4 [math.pr] 27 Jul 2016 The Asymptotic Distribution of the Determinant of a Ranom Correlation Matrix arxiv:309768v4 mathpr] 7 Jul 06 AM Hanea a, & GF Nane b a Centre of xcellence for Biosecurity Risk Analysis, University of Melbourne,

More information

Agmon Kolmogorov Inequalities on l 2 (Z d )

Agmon Kolmogorov Inequalities on l 2 (Z d ) Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,

More information

Stable and compact finite difference schemes

Stable and compact finite difference schemes Center for Turbulence Research Annual Research Briefs 2006 2 Stable an compact finite ifference schemes By K. Mattsson, M. Svär AND M. Shoeybi. Motivation an objectives Compact secon erivatives have long

More information

A new proof of the sharpness of the phase transition for Bernoulli percolation on Z d

A new proof of the sharpness of the phase transition for Bernoulli percolation on Z d A new proof of the sharpness of the phase transition for Bernoulli percolation on Z Hugo Duminil-Copin an Vincent Tassion October 8, 205 Abstract We provie a new proof of the sharpness of the phase transition

More information

Asymptotic determination of edge-bandwidth of multidimensional grids and Hamming graphs

Asymptotic determination of edge-bandwidth of multidimensional grids and Hamming graphs Asymptotic etermination of ege-banwith of multiimensional gris an Hamming graphs Reza Akhtar Tao Jiang Zevi Miller. Revise on May 7, 007 Abstract The ege-banwith B (G) of a graph G is the banwith of the

More information

On combinatorial approaches to compressed sensing

On combinatorial approaches to compressed sensing On combinatorial approaches to compresse sensing Abolreza Abolhosseini Moghaam an Hayer Raha Department of Electrical an Computer Engineering, Michigan State University, East Lansing, MI, U.S. Emails:{abolhos,raha}@msu.eu

More information

Diagonalization of Matrices Dr. E. Jacobs

Diagonalization of Matrices Dr. E. Jacobs Diagonalization of Matrices Dr. E. Jacobs One of the very interesting lessons in this course is how certain algebraic techniques can be use to solve ifferential equations. The purpose of these notes is

More information

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS MARK SCHACHNER Abstract. When consiere as an algebraic space, the set of arithmetic functions equippe with the operations of pointwise aition an

More information

EVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION OF UNIVARIATE TAYLOR SERIES

EVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION OF UNIVARIATE TAYLOR SERIES MATHEMATICS OF COMPUTATION Volume 69, Number 231, Pages 1117 1130 S 0025-5718(00)01120-0 Article electronically publishe on February 17, 2000 EVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION

More information

Throughput Optimal Control of Cooperative Relay Networks

Throughput Optimal Control of Cooperative Relay Networks hroughput Optimal Control of Cooperative Relay Networks Emun Yeh Dept. of Electrical Engineering Yale University New Haven, C 06520, USA E-mail: emun.yeh@yale.eu Ranall Berry Dept. of Electrical an Computer

More information

Performance of Opportunistic Epidemic Routing on Edge-Markovian Dynamic Graphs

Performance of Opportunistic Epidemic Routing on Edge-Markovian Dynamic Graphs IEEE TRANSACTIONS ON COMMUNICATIONS, TCOM-9-63 Performance of Opportunistic Epiemic Routing on Ege-Markovian Dynamic Graphs John Whitbeck, Vania Conan, an Marcelo Dias e Amorim arxiv:99.29v3 [cs.ni] 25

More information

arxiv: v1 [hep-lat] 19 Nov 2013

arxiv: v1 [hep-lat] 19 Nov 2013 HU-EP-13/69 SFB/CPP-13-98 DESY 13-225 Applicability of Quasi-Monte Carlo for lattice systems arxiv:1311.4726v1 [hep-lat] 19 ov 2013, a,b Tobias Hartung, c Karl Jansen, b Hernan Leovey, Anreas Griewank

More information

ELEC3114 Control Systems 1

ELEC3114 Control Systems 1 ELEC34 Control Systems Linear Systems - Moelling - Some Issues Session 2, 2007 Introuction Linear systems may be represente in a number of ifferent ways. Figure shows the relationship between various representations.

More information

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5

More information

Transmission Line Matrix (TLM) network analogues of reversible trapping processes Part B: scaling and consistency

Transmission Line Matrix (TLM) network analogues of reversible trapping processes Part B: scaling and consistency Transmission Line Matrix (TLM network analogues of reversible trapping processes Part B: scaling an consistency Donar e Cogan * ANC Eucation, 308-310.A. De Mel Mawatha, Colombo 3, Sri Lanka * onarecogan@gmail.com

More information

Balancing Expected and Worst-Case Utility in Contracting Models with Asymmetric Information and Pooling

Balancing Expected and Worst-Case Utility in Contracting Models with Asymmetric Information and Pooling Balancing Expecte an Worst-Case Utility in Contracting Moels with Asymmetric Information an Pooling R.B.O. erkkamp & W. van en Heuvel & A.P.M. Wagelmans Econometric Institute Report EI2018-01 9th January

More information

The Exact Form and General Integrating Factors

The Exact Form and General Integrating Factors 7 The Exact Form an General Integrating Factors In the previous chapters, we ve seen how separable an linear ifferential equations can be solve using methos for converting them to forms that can be easily

More information

A PAC-Bayesian Approach to Spectrally-Normalized Margin Bounds for Neural Networks

A PAC-Bayesian Approach to Spectrally-Normalized Margin Bounds for Neural Networks A PAC-Bayesian Approach to Spectrally-Normalize Margin Bouns for Neural Networks Behnam Neyshabur, Srinah Bhojanapalli, Davi McAllester, Nathan Srebro Toyota Technological Institute at Chicago {bneyshabur,

More information

DEGREE DISTRIBUTION OF SHORTEST PATH TREES AND BIAS OF NETWORK SAMPLING ALGORITHMS

DEGREE DISTRIBUTION OF SHORTEST PATH TREES AND BIAS OF NETWORK SAMPLING ALGORITHMS DEGREE DISTRIBUTION OF SHORTEST PATH TREES AND BIAS OF NETWORK SAMPLING ALGORITHMS SHANKAR BHAMIDI 1, JESSE GOODMAN 2, REMCO VAN DER HOFSTAD 3, AND JÚLIA KOMJÁTHY3 Abstract. In this article, we explicitly

More information

Assignment 1. g i (x 1,..., x n ) dx i = 0. i=1

Assignment 1. g i (x 1,..., x n ) dx i = 0. i=1 Assignment 1 Golstein 1.4 The equations of motion for the rolling isk are special cases of general linear ifferential equations of constraint of the form g i (x 1,..., x n x i = 0. i=1 A constraint conition

More information

Hyperbolic Moment Equations Using Quadrature-Based Projection Methods

Hyperbolic Moment Equations Using Quadrature-Based Projection Methods Hyperbolic Moment Equations Using Quarature-Base Projection Methos J. Koellermeier an M. Torrilhon Department of Mathematics, RWTH Aachen University, Aachen, Germany Abstract. Kinetic equations like the

More information

Switching Time Optimization in Discretized Hybrid Dynamical Systems

Switching Time Optimization in Discretized Hybrid Dynamical Systems Switching Time Optimization in Discretize Hybri Dynamical Systems Kathrin Flaßkamp, To Murphey, an Sina Ober-Blöbaum Abstract Switching time optimization (STO) arises in systems that have a finite set

More information

Lower Bounds for Local Monotonicity Reconstruction from Transitive-Closure Spanners

Lower Bounds for Local Monotonicity Reconstruction from Transitive-Closure Spanners Lower Bouns for Local Monotonicity Reconstruction from Transitive-Closure Spanners Arnab Bhattacharyya Elena Grigorescu Mahav Jha Kyomin Jung Sofya Raskhonikova Davi P. Wooruff Abstract Given a irecte

More information

Problem Sheet 2: Eigenvalues and eigenvectors and their use in solving linear ODEs

Problem Sheet 2: Eigenvalues and eigenvectors and their use in solving linear ODEs Problem Sheet 2: Eigenvalues an eigenvectors an their use in solving linear ODEs If you fin any typos/errors in this problem sheet please email jk28@icacuk The material in this problem sheet is not examinable

More information

COUPLING REQUIREMENTS FOR WELL POSED AND STABLE MULTI-PHYSICS PROBLEMS

COUPLING REQUIREMENTS FOR WELL POSED AND STABLE MULTI-PHYSICS PROBLEMS VI International Conference on Computational Methos for Couple Problems in Science an Engineering COUPLED PROBLEMS 15 B. Schrefler, E. Oñate an M. Paparakakis(Es) COUPLING REQUIREMENTS FOR WELL POSED AND

More information

Consider for simplicity a 3rd-order IIR filter with a transfer function. where

Consider for simplicity a 3rd-order IIR filter with a transfer function. where Basic IIR Digital Filter The causal IIR igital filters we are concerne with in this course are characterie by a real rational transfer function of or, equivalently by a constant coefficient ifference equation

More information

Schrödinger s equation.

Schrödinger s equation. Physics 342 Lecture 5 Schröinger s Equation Lecture 5 Physics 342 Quantum Mechanics I Wenesay, February 3r, 2010 Toay we iscuss Schröinger s equation an show that it supports the basic interpretation of

More information

Bohr Model of the Hydrogen Atom

Bohr Model of the Hydrogen Atom Class 2 page 1 Bohr Moel of the Hyrogen Atom The Bohr Moel of the hyrogen atom assumes that the atom consists of one electron orbiting a positively charge nucleus. Although it oes NOT o a goo job of escribing

More information

A Second Time Dimension, Hidden in Plain Sight

A Second Time Dimension, Hidden in Plain Sight A Secon Time Dimension, Hien in Plain Sight Brett A Collins. In this paper I postulate the existence of a secon time imension, making five imensions, three space imensions an two time imensions. I will

More information

FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS. 1. Introduction

FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS. 1. Introduction FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS ALINA BUCUR, CHANTAL DAVID, BROOKE FEIGON, MATILDE LALÍN 1 Introuction In this note, we stuy the fluctuations in the number

More information

Entanglement is not very useful for estimating multiple phases

Entanglement is not very useful for estimating multiple phases PHYSICAL REVIEW A 70, 032310 (2004) Entanglement is not very useful for estimating multiple phases Manuel A. Ballester* Department of Mathematics, University of Utrecht, Box 80010, 3508 TA Utrecht, The

More information

Pure Further Mathematics 1. Revision Notes

Pure Further Mathematics 1. Revision Notes Pure Further Mathematics Revision Notes June 20 2 FP JUNE 20 SDB Further Pure Complex Numbers... 3 Definitions an arithmetical operations... 3 Complex conjugate... 3 Properties... 3 Complex number plane,

More information

Permanent vs. Determinant

Permanent vs. Determinant Permanent vs. Determinant Frank Ban Introuction A major problem in theoretical computer science is the Permanent vs. Determinant problem. It asks: given an n by n matrix of ineterminates A = (a i,j ) an

More information

Space-time Linear Dispersion Using Coordinate Interleaving

Space-time Linear Dispersion Using Coordinate Interleaving Space-time Linear Dispersion Using Coorinate Interleaving Jinsong Wu an Steven D Blostein Department of Electrical an Computer Engineering Queen s University, Kingston, Ontario, Canaa, K7L3N6 Email: wujs@ieeeorg

More information

Implicit Differentiation

Implicit Differentiation Implicit Differentiation Thus far, the functions we have been concerne with have been efine explicitly. A function is efine explicitly if the output is given irectly in terms of the input. For instance,

More information

Multi-View Clustering via Canonical Correlation Analysis

Multi-View Clustering via Canonical Correlation Analysis Technical Report TTI-TR-2008-5 Multi-View Clustering via Canonical Correlation Analysis Kamalika Chauhuri UC San Diego Sham M. Kakae Toyota Technological Institute at Chicago ABSTRACT Clustering ata in

More information

Chapter 4. Electrostatics of Macroscopic Media

Chapter 4. Electrostatics of Macroscopic Media Chapter 4. Electrostatics of Macroscopic Meia 4.1 Multipole Expansion Approximate potentials at large istances 3 x' x' (x') x x' x x Fig 4.1 We consier the potential in the far-fiel region (see Fig. 4.1

More information

Qubit channels that achieve capacity with two states

Qubit channels that achieve capacity with two states Qubit channels that achieve capacity with two states Dominic W. Berry Department of Physics, The University of Queenslan, Brisbane, Queenslan 4072, Australia Receive 22 December 2004; publishe 22 March

More information

PDE Notes, Lecture #11

PDE Notes, Lecture #11 PDE Notes, Lecture # from Professor Jalal Shatah s Lectures Febuary 9th, 2009 Sobolev Spaces Recall that for u L loc we can efine the weak erivative Du by Du, φ := udφ φ C0 If v L loc such that Du, φ =

More information

Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets

Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Proceeings of the 4th East-European Conference on Avances in Databases an Information Systems ADBIS) 200 Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Eleftherios Tiakas, Apostolos.

More information

Thermal conductivity of graded composites: Numerical simulations and an effective medium approximation

Thermal conductivity of graded composites: Numerical simulations and an effective medium approximation JOURNAL OF MATERIALS SCIENCE 34 (999)5497 5503 Thermal conuctivity of grae composites: Numerical simulations an an effective meium approximation P. M. HUI Department of Physics, The Chinese University

More information

Chromatic number for a generalization of Cartesian product graphs

Chromatic number for a generalization of Cartesian product graphs Chromatic number for a generalization of Cartesian prouct graphs Daniel Král Douglas B. West Abstract Let G be a class of graphs. The -fol gri over G, enote G, is the family of graphs obtaine from -imensional

More information

Spring 2016 Network Science

Spring 2016 Network Science Spring 206 Network Science Sample Problems for Quiz I Problem [The Application of An one-imensional Poisson Process] Suppose that the number of typographical errors in a new text is Poisson istribute with

More information