A Cryptographic Proof of Regularity Lemmas: Simpler Unified Proofs and Refined Bounds

Size: px
Start display at page:

Download "A Cryptographic Proof of Regularity Lemmas: Simpler Unified Proofs and Refined Bounds"

Transcription

1 A Cryptographic Proof of Reguarity Lemmas: Simper Unified Proofs and Refined Bounds Maciej Skórski IST Austria Abstract. In this work we present a short and unified proof for the Strong and Weak Reguarity Lemma, based on the cryptographic technique caed ow-compexity approximations. In short, both probems reduce to a task of finding constructivey an approximation for a certain target function under a cass of distinguishers (test functions), where distinguishers are combinations of simpe rectange-indicators. In our case these approximations can be earned by a simpe iterative procedure, which yieds a unified and simpe proof, achieving for any graph with density d and any approximation parameter ɛ the partition size a tower of 2 s of height O ( dɛ 2) for a variant of Strong Reguarity a power of 2 with exponent O ( dɛ 2) for Weak Reguarity The novety in our proof is as foows: (a) a simpe approach which yieds both strong and weaker variant, and (b) improvements for sparse graphs. At an abstract eve, our proof can be seen a refinement and simpification of the anaytic proof given by Lovasz and Szegedy. Keywords: reguarity emmas, boosting, ow-compexity approximations, convex optimization, computationa indistingusiabiity 1 Introduction Szemeredi s Reguarity Lemma was first used in his famous resut on arithmetic progressions in dense sets of integers [Sze75]. Since then, it has emerged as an important too in graph theory, with appications to extrema graph theory, property testing in computer science, combinatoria number theory, compexity theory and others. See for exampe [DLR95, FK99, HMT88] to mention ony few. Roughy speaking, the emma says that every graph can be partitioned into a finite number of parts such that the edges between these pairs behave randomy. There are two popuar forms of this resut, the origina resut referred to as the Strong Reguarity Lemma and the weaker version deveoped by Frieze and Kannan [FK99] for agorithmic appications. The purpose of this work is to give yet another proof of reguarity emmas, based on the cryptographic notion of computationa indistinguishabiity. Supported by the European Research Counci Consoidator Grant ( TOCNe).

2 2 We don t revisit appications as it woud be beyond the scope. For more about appications of reguarity emmas, we refer to surveys [KS96, RS, KR02] From now, G is a fixed graph with a vertex set V (G) = V and the edge set E(G) = E V 2. By a partition of V we understand every famiy of disjoint subsets that cover V. The rest of the paper is organized as foows: the remaining part of this section introduces necessary notions (Section 1.1), states reguarity emmas (Section 1.2), and summarizes our contribution (Section 1.3). In Section 2 we show how to obtain strong reguarity and in Section 3 we dea with weak reguarity. We concude our work in Section Preiminaries By the edge density of two vertex subsets we understand the fraction of pairs covered by graph edges. Definition 1 (Edge density). For two disjoint subsets T, S of a given graph G we define the edge density of the pair T, S as d G (T, S) = E G(T, S) T S We sighty abuse the notation denoting d G = d G (V, V ) for the graph density. (1) Sets Reguarity The notion of set irreguarity measures the difference between the number of actua edges and expected edges as if the graph was random. Note that for a random bipartite graph with a bipartirtion (T, S) we expect that for amost a subsets S, T roughy the same fraction of vertex pairs is covered by graph edges. The deviation is precisey measured as foows Definition 2 (Irreguarity [LS07, FL14]). The irreguarity of a pair (S, T ) of two vertex subsets is defined as irreg G (S, T ) = max S S,T T E(S, T ) d G (S, T ) S T If this quantity is a sma fraction of S T then the edge distribution is homogeneous or, if we want, random-ike. In turn, two vertex subsets are caed reguar if the density is amost preserved on their (sufficienty big) subsets 1 Definition 3 (Reguarity). A pair (S, T ) of two disjoint subsets of vertices is said to be ɛ-reguar, if d G (S, T ) d G (S, T ) ɛ for a S S, T T such that S ɛ S, T ɛ T. 1 The requirement of being sufficienty big is to make this notion equivaent with the irreguarity above.

3 3 For competeness we mention that irreguarity and reguarity are pretty much equivaent (up to changing ɛ) Remark 1 (Irreguarity vs Reguarity). It it easy to see that irreg G (S, T ) ɛ S T is impied by ɛ-reguarity, and it impies ɛ 1 3 -reguarity. Partition Reguarity The next important objects are reguar partitions, for which amost a pairs of parts are reguar. Note that irreguar indexes are weighted by set sizes, to propery address partitions with parts of different size. Definition 4 (Reguar Partitions). A partition V 1,..., V k of the vertex set is said to be ɛ-reguar if there is a set I V V such that V i V j ɛ V 2 (i,j) I and for a (i, j) I the pair (V i, V j ) is ɛ-reguar. We say that a partition is equitabe (or simpy: is an equipartition) if any two parts differ in size by at most one. Note that for equitabe partitions the above conditions simpy means that a but ɛ-fraction of pairs are reguar. There is aso a notion of partition irreguarity based on sets irreguarity Definition 5 (Partition Irreguarity). The irreguarity of a partition V = {V 1,..., V k } is defined to be irreg(v) = i,j irreg G(V i, V j ). Remark 2 (Partition Irreguarity vs Partition Reguarity). Again it it easy to see that both notions are equivaent up to a change in ɛ. Concretey, ɛ-reguarity is impied by irreguarity smaer than ɛ 4 V 2 and impies ɛ-irreguarity [FL14]. The partition size in the Strong Reguarity Lemma grows as fast as powers of twos. For competeness, we state the definition of the tower function. Definition 6 (Power tower). For any n we denote 1.2 Reguarity Lemmas 2 T (n) = }{{} n times Summary of the state of the art Having introduced necessary notation, we are now in position to state reguarity emmas. There is a strong (origina) and weak variant of the reguarity emma (deveoped ater for agorithmic appications), which differ dramaticay in the partition size. The strong variant has a few sighty reaxed statements, which are more convenient for appications and simper to prove. These versions are equivaent up to a repacing ɛ by ɛ O(1). The state of the art is that the variant of Strong Reguarity Lemma (Theorem 2 beow) and the Weak Reguarity Lemma (Theorem 4 beow) are tight in genera, as shown recenty 2 in [FL14]. For the sake of the competeness we note that there are more works offering the proofs for Reguarity Lemmas, for exampe [Fri99] but they are not discussed here as they do not achieve optima bounds. 2 Worse bounds were known before for exampe [Gow97].

4 4 Strong Reguarity The origina variant of the Strong Reguarity Lemma simpy says that there is aways an equipartition such that amost every pair of parts is reguar, and the partition size is not dependent on the graph size. Theorem 1 (Strong Reguarity Lemma, origina variant 1). For any graph G there exists a partition V 1,..., V k of vertices such that for a up to ɛ-fraction of pairs (i, j) E(S, T ) d G (V i, V j ) S T ɛ V i V j for any S V i, T V j such that S ɛ V i, T ɛ V j. Moreover, the size of partition is at most a power of twos of height poy(1/ɛ). It has been observed that proofs are much easier when one works with the tota irreguarity, rather than separate bounds for each pair. The foowing version is equivaent (up to changing ɛ) Theorem 2 (Strong Reguarity Lemma, variant 2 [FL14]). For any graph G there exists a partition V 1,..., V k of the vertices such that irreg G (V i, V j ) ɛ V 2. (2) i<j Moreover, the partition size k is a power of twos of ength O(ɛ 2 ). The reguarity emma can be aso formuated as an approximation by a weighted graph. Theorem 3 (Strong Reguarity Lemma, variant 3 [LS07]). For any graph G there exists a partition V 1,..., V k of the vertices and rea numbers d i,j such that max E(S, T ) d i,j S T ɛ V 2, (3) S V i,t V j i<j and moreover the partition size k is at most a tower 3 of twos of height O(ɛ 2 ). Weak Reguarity Finay, we state the weaker version obtained by Frieze and Kannan Theorem 4 (Weak Reguarity Lemma). For any graph G there exists a partition V 1,..., V k of the vertices such that E(S V i, T V j ) d i,j S V i T V j i,j i,j ɛ V 2 (4) for a S, T. Moreover, the partition is generated 4 by O ( ɛ 2) subsets of V. In particuar, k is at most 2 O(ɛ 2). 3 The origina work [LS07] proves a bound being O(ɛ 2 ) iterations of the function s(1) = 1, s(k + 1) = 2 s(1)4...s(k) 4 starting at 1. It is easy to see that s(k) can be bounded by a tower of height k + O(1). 4 The generated partition arises as intersections of the generating sets with their compements.

5 5 1.3 Our contribution and reated works We present a simpe proof of both Reguarity Lemmas, using the cryptographic framework of ow compexity approximations. Our contribution is twofod: (a) conceptua, as we show how the Reguarity Lemmas can be written and easy proved using the notion of indistinguishabiity, and (b) technica, as we improve known bounds by a factor equa to the graph density. We eaborate more on out techniques and resuts beow. A Simper Proof. Our proof uses ony a naive optimization agorithm, avoiding combinatoric cacuations using energy arguments based on Cauchy-Schwarz inequaities, that appear in other proofs ike [FL14]. Quantitative Improvements For the Strong Reguarity Lemma we bound the partition size by a tower of twos of height O(ɛ 2 d G ) which is an improvement by a factor of d G over best resuts [FL14]. Simiary, for the Weak Reguarity Lemma we prove that the partition is an overay of O(ɛ 2 d G ) subsets (in particuar has up to 2 O(ɛ 2 d G ) members) which is again an improvement by a factor of d G comparing to best bounds [FL14]. Note that for constant densities d G, this matches both best upper and ower bounds [FL14]. Our improvements for smaer densities doesn t contradict the ower bounds as they depend on the density in a compicated and non-expicit way (and hence don t appy to a regimes of d G ). Reguarity Lemmas as Low Compexity Approximations We show that a variant of the Szemeredi Reguarity Lemma, equivaent to the most often used statement, can be written in the foowing form f F : E g(e)f(e) E h(e)f(e) ɛ (5) e X e X for some functions g, f and a cass of functions F on a finite set X, where h is efficient in terms of compexity. More precisey, the resut states that a given function f (in our case reated to the irreguarity of the graph) can be efficienty approximated under a certain cass of test functions (caed aso distinguishers). In cryptography resuts of this sort are known as ow compexity approximations and are a powerfu and eegant technique of proving compicated resuts [TTV09,VZ13,JP14]. The quantity in the absoute vaues in Equation (5) is referred to as the advantage of f in distinguishing g and h, so the statement simpy means that h is indistinguishabe from g for sma ɛ by a functions in F. Depending on the cass F it may be a good repacement for g in appications. In our case the cass of test functions changes depending on the probem. For weak reguarity we use rectange indicator functions, whereas for strong reguarity we consider combinations of rectange-indicator functions F = {f : f = ±1 T S } F = f : f = i,j ±1 Ti,j S i,j (for Weak Reguarity) (for Strong Reguarity)

6 6 The proof is in both cases very simpe and can be viewed as a specia case of the genera subgradient descent agorithm we known in convex optimization 5. The agorithm is given beow in pseudocode (see Agorithm 1) Agorithm 1: Low Compexity Approximations Input : target function g to approximate, cass of test functions F, a starting point h 0, accuracy parameter ɛ, stepsize t Output: function h of ow compexity w.r.t F and indistinguishabe from g (with respect to test functions F) 1.1 n whie can distinguish h n and g by some f F with advantage ɛ do 1.3 n n h n h n 1 t f A simiar resut has been shown by Trevisan et a. [TTV09] with respect to the weak reguarity emma. It turns out that the weak reguarity emma can be directy transated to a form of Equation (5). The case of the Strong Reguarity Lemma is however a bit different, because the standard statement doesn t admit a direct transation to Equation (5) so we need first to reduce the Reguarity Lemma to a sighty reaxed form simiar 6 to Theorem 2 and prove the reaxed statement by ow compexity approximation toos. Aso, the same cass of functions appear in the anaytic proof in [LS07] but in a different approximation technique. Abstracting the concept of pseudo-reguarity In the Weak Reguarity Lemma, we measure the irreguarity of the partition as average difference between the actua number of edges and the expected number of edges across the pairs of parts of the partition. Therefore, the Weak Reguarity Lemma is obtained from the bound E(T i, S j ) d i,j T i S j V 2 i,j i,j (where T i, S j are subsets of V i and V j respectivey; note that i,j E(T i, S j ) = E(T, S)). In turn, to prove the Strong Reguarity Lemma, we measure the av- 5 If we consider the mapping h max f E g(e)f(e) E h(e)f(e) then its subgradient equas f for some f F. Then the update is h := h t f precisey as in e X e X the proof of Section The reaxed form we use is except that we aow any numbers d i,j in pace of densities d G(V i, V j).

7 7 erage absoute difference between the actua number of edges and the expected number of edges. To prove our resut we introduce the foowing condition (for some constants d i,j ) E(T i,j, S i,j ) d i,j T i,j S i,j V 2. i,j (S i,j, T i,j being subsets of V i and V j respectivey), and refer to this property as pseudo-reguarity 7. This condition extends sighty the notion of irreguarity, where the true densities of pairs (V i, V j ) appear in pace of d i,j. Note that pseudo-reguarity can be understood as approximating the graph by a weighted graph, where we contro the absoute deviation of number of edges across pairs of partition parts. The approach with unrestricted constants is much easier to prove and is more fexibe. In fact, the idea of reaxing restrictions on densities (equivaenty: considering a weighted graph) goes back to [FK99]. The concept of pseudoreguarity is what aows us to connect the approximation emma with the Strong Reguarity Lemma. 1.4 Proof techniques The key ingredient of our proof is a descent agorithm, which transated back to the partition anguage is simiar to the popuar technique of proving reguarity emmas. As ong as the current partition fais to satisfy the desired property, the agorithm uses sets being counterexampes to refine the partition. Moreover, we show that a certain quantity, caed the energy function, decreases with every step by a constant (depending on ɛ). From this one concudes that the process of refining the partition hats after a number of step (the bound depends on concrete energy estimates). Our proof is different with respect to the energy function, as we use simpy the eucidean distance (second norm) between the candidate soution and the target. This aows us to decrease the number of rounds by the initia distance, which in our case equas d G, as we start from f = 1 E (where E is the edge set) and g = 0. An overview of the proof (of the Strong Reguarity Lemma) is iustrated in Figure 1. Indistinguishabiity A tower of height ɛ 2 d G (decent agorithm, Section 2.1) Pseudo-reguarity (impies Theorem 3) ɛ repaced by ɛ 0.25 (Section 2.2) Reguarity A constant oss (Section 2.3) Equiparition (impies Theorem 1) Fig. 1. An overview of our proof of the Strong Reguarity Lemma. 7 This property was aso impicity used in [LS07]

8 8 The proof of the Weak Reguarity Lemma is even simper and consists of ony first step (with the cass of test functions changed accordingy). 1.5 Organization In Section 2 we prove a variant of the Strong Reguarity Lemma, in Section 3 we prove the Weak Reguarity Lemma and concude the work in Section 4. 2 Strong Reguarity Lemma 2.1 Obtaining a partition with sma pseudo-irreguarity The key ingredient is the foowing approximation resut, proved by the technique sketched in Agorithm 1. Theorem 5 (Simuating against stepwise functions). For any rea function g on V 2 and any ɛ > 0, there exists a partition V 1,..., V k and a piece-wise function h constant on rectanges V i V j such that h and g are ɛ-indistinguishabe by functions piecewise constant on subrectanges of V i V j where i j F k = f = a i,j 1 Si,j T i,j : a i,j = ±1, S i,j V i, T i,j V j, (6) i j where indistinguishabiity means f F k : h(e)f(e) g(e)f(e) ɛ V 2, (7) e V 2 e V 2 and moreover k is not bigger than O(dɛ 2 ) iterations of the function k k 2 k+1 at k = 1, where d = 1 V 2 e V 2 g(e)2. In particuar, k is at most a tower of 2 s of height O ( dɛ 2). Remark 3 (Symmetrizing cass F). Note that ordering pairs (i j) in the definition of cass F is crucia to obtain the compexity being a power of 2. Otherwise, we woud obtain a (much worse) tower of 4 s of the same height. Remark 4. It is easy to see that the function is a power-tower of twos of height O(d G δ 2 ) (a forma proof can obtained by induction as in [FL14]. As a coroary we obtain the foowing statement which is precisey the variant stated in Theorem 3. Coroary 1 (Reguarity Lemma in terms of pseudo-reguarity (variant 3)). For any graph G there is a partition of vertices V such that the absoute pseudo-irreguarity is at most ɛ V 2, that is for some numbers d i,j we have max E(T, S) d i,j T S ɛ V 2 (8) S V i,t V j (i,j):i j k and moreover, the number of partition parts is is a power-tower of twos of height O(d G δ 2 ).

9 Proof (Proof of Coroary 1). It suffices to appy Theorem 5 to g = 1 E and h = 0. We have then e g(e)t(e) = i j a i,je(s i,j, T i,j ) and e h(e)t(e) = i j a i,jd i,j S i,j T i,j. The absoute vaues in Equation (8) are achieved by fitting signs of the coefficients a i,j = ±1. Proof (of Theorem 5). Suppose we have a function h on a partition V 1,..., V k which is δ V -indistingushabe from g by a function f piecewise constant on squares T i S j, that is (g(e) h(e))f(e) δ V 2 (9) e 9 Consider now h = h + t f and note that (h (e) g(e)) 2 = (h(e) h(e)) 2 2t e e e (g(e) h(e))f(e) + t 2 e f(e) 2. Setting t = δ in the above equation, by Equation (9) we obtain (h (e) g(e)) 2 (h(e) h(e)) 2 δ 2 V 2, e e which means that by repacing h by h we decrease the distance to g by δ 2 V 2. Since our first choice for h is the zero function, the initia distance was equa to e g(e)2 = d V 2 and the oop ends after at most O(dδ 2 ). Regarding the compexity of h = h+t i j a i,j1 Si,j T i,j note that when adding step functions 1 Si,j T i,j, any fixed partition member V i is intersected by at most k + 1 sets of the form S i,j or T i,j (because we consider ony ordered pairs i j!). Therefore, the function h is piecewise constant on the partition V generated by V and sets S i,j, T i,j which has at most k 2 k+1 members. 2.2 Sma pseudo-irreguarity impies reguarity In this section we show that pseudo-reguarity impies reguarity in the sense of Definition 3. Proposition 1. Suppose that for a partition V 1,..., V k of V there exist numbers d i,j such that E(S i,j, T i,j ) d i,j T i,j S i,j ɛ 4 V 2 (10) i,j k for a disjoint rectanges T i,j S i,j V i V j. Then the partition is 2ɛ-reguar. Proof. Rewrite Equation (10) as i,j k S i,j T i,j V 2 d G (S i,j, T i,j ) d i,j ɛ 4

10 10 In particuar, we get i,j k V i V j V 2 d G (S i, T j ) d i,j ɛ 2 (11) when S i,j, T i,j ɛ V for a i. Let S i,j, T i,j (both bigger than ɛ V ) maximize d G (S i,j, T i,j ) d i,j. By the Markov inequaity (appied to the probabiity weights p i,j = Vi Vj V ), there exists an exceptiona set I {1..k} 2 such that 2 and (i,j) I V i V j ɛ V 2. (i, j) I : d G (S i,j, T i,j) d i,j ɛ By the choice of the pairs (S i,j, T i,j ) this impies d G(S i,j, T i,j ) d i,j ɛ for every pair S i,j V i, T i,j V j (provided that (i, j) I. In particuar, this is true with S i,j = V i and T i,j = V j which gives d G (V i, V j ) d i,j ɛ. By the triange inequaity we have d G (S i,j, T i,j ) d G V i V j 2ɛ for (i, j) I which finishes the proof. 2.3 Enforcing equipartition To compete the ast step of the proof we have to prove the foowing Lemma 1. For any ɛ-reguar partition V there exists a O(ɛ)-reguar equipartition W of size W = O ( ɛ 1 V ). The key observation is the foowing usefu fact, which simpy states that reguarity is preserved under refinements. A simpe proof is given in Appendix A. Lemma 2 (Reguarity preserved under refinements). For any graph G, if (S, T ) is ɛ-reguar and S S, T T, then (S, T ) is 2ɛ-reguar. Consider now a coarser partition {V i,i } i,i such that for every i the set V i is partitioned into k(i) k ɛ parts V i,i where i = 1,..., k(i) which are a, up to one, of equa size V V i,i =, i = 1,..., k(i) 1 V V i,i <, i = k(i) Let V = V k(i). In other words, the set V combines a residua parts into i one component. We partition W again into equa (except one) parts V 1,..., V r

11 11 so that V i = V r < V, i = 1,..., r 1 V Therefore, the famiy i=1,...,k i =1,...,k(i) 1 {V i,i } i,i i=1,...,r is a partition of V that has members, 1 of them being of size being a remainder of size smaer than to be of size at east V ( 1) V V {V i } (12) V and one. It foows that the ast term has, that is between V and V ( 1). Now by moving up to one eement from each of the other 1 components to the remaining component we arrive at an equipartition W 1,..., W where a members are of equa size up to one eement, that is W i W j 1 (13) Note that we moved from sets V i to V at most k V = O(ɛ V ) vertices, which by Equation (12) beong to at most O(ɛ) parts W j. Therefore Caim (Partition W i is a refinement of V i up to a sma fraction of members). For a up to a O(ɛ)-fraction of pairs (i, j) {1,..., } 2, the sets W i, W j are subsets of some pair V i, V j. Let I W be the set of a pairs (i, j) such that the pair (W i, W j ) is not ɛ-reguar, and et I V be the set of pairs (i, j) such that (V i, V j ) is not ɛ-reguar. W i W j ɛ V 2 + W i W j (14) (i,j) I W (i,j):w i V i,w j V j V i V j (15) (i,j) I V O ( ɛ V 2), (16) where the first ine foows by the ast caim and the fact that W i are disjoint, the second ine foows by the reguarity of the partition V i. Now Equation (13) impies I W = O(ɛ 2 ). 3 Weak Reguarity Lemma Theorem 6 (Simuating against rectange-indicator functions). For any function g : V 2 [ 1, 1], and any ɛ > 0, there exists a partition V 1,..., V k and

12 12 a piece-wise function h constant on squares V i V j such that f and g are ɛ- indistinguishabe by indicators of rectanges V i V j where i j F = {f = ±1 S T : S V i, T V j }, (17) that is f F : h(e)f(e) g(e)f(e) ɛ V 2. (18) e V 2 e V 2 Moreover, k is not bigger than 2 O(d Gɛ 2). In fact, the partition is an overay of O(d G ɛ 2 ) subsets of vertices. By appying this resut to the function 1 E on V 2 (being 1 for pairs e = (v 1, v 2 ) which are connected and 0 otherwise) we reprove Theorem 4 Coroary 2 (Deriving Weak Reguarity Lemma). The Weak Reguarity Lemma hods with k = O(d G ɛ 2 ). This resut, without the factor d G was proved in [TTV09]. We skip the proof of Theorem 6 as it merey repeats the argument from Theorem 5, noticing ony that the cacuation of k is different because the cass F is now simper. Note aso that for this resut the cass F doesn t change with every round. 4 Concusion We have shown that both: weak and strong reguarity emmas can be written as indistinguishabiity statements, where the edge indicator function is approximated by a combination of rectange-indicator functions. This extends the resut of Trevisan at a. for weak reguarity to the case of Strong Reguarity Lemma. Moreover, due to a different anaysis of the underying descent agorithm, our proof achieves quantitative improvements graphs with ow edge densities. References DLR95. FK99. FL14. Fri99. Richard A. Duke, Hanno Lefmann, and Vojtech Rd, A fast approximation agorithm for computing the frequencies of subgraphs in a given graph., SIAM J. Comput. 24 (1995), no. 3, Aan M. Frieze and Ravi Kannan, Quick approximation to matrices and appications., Combinatorica 19 (1999), no. 2, Jacob Fox and Lászó Mikós Lovász, A tight ower bound for szemerédi s reguarity emma, CoRR abs/ (2014). Kannan Ravi Frieze, Aan, A simpe agorithm for constructing szemerdi s reguarity partition., The Eectronic Journa of Combinatorics [eectronic ony] 6 (1999), no. 1, Research paper R17, 7 p. Research paper R17, 7 p. (eng).

13 13 Gow97. W.T. Gowers, Lower bounds of tower type for szemerédi s uniformity emma, Geometric & Functiona Anaysis GAFA 7 (1997), no. 2, HMT88. András Hajna, Wofgang Maass, and György Turán, On the communication compexity of graph properties, Proceedings of the Twentieth Annua ACM Symposium on Theory of Computing (New York, NY, USA), STOC 88, ACM, 1988, pp JP14. Dimitar Jetchev and Krzysztof Pietrzak, How to fake auxiiary input, TCC 2014, San Diego, CA, USA, February 24-26, Proceedings (Yehuda Linde, ed.), Lecture Notes in Computer Science, vo. 8349, Springer, 2014, pp KR02. Y. Kohayakawa and V. Rd, Szemeredi s reguarity emma and quasirandomness, KS96. Jnos Koms and Miks Simonovits, Szemerdi s reguarity emma and its appications in graph theory, LS07. Lászó Lovász and Baázs Szegedy, Szemerédi s emma for the anayst, Geom. Funct. Ana. 17 (2007), no. 1, MR MR (2008a:05129) RS. Vojtch Rd and Mathias Schacht, Reguarity emmas for graphs. Sze75. E. Szemerdi, On sets of integers containing no k eements in arithmetic progression, TTV09. Luca Trevisan, Madhur Tusiani, and Sai Vadhan, Reguarity, boosting, and efficienty simuating every high-entropy distribution, Proceedings of the th Annua IEEE Conference on Computationa Compexity (Washington, DC, USA), CCC 09, IEEE Computer Society, 2009, pp VZ13. Sai Vadhan and CoinJia Zheng, A uniform min-max theorem with appications in cryptography, Advances in Cryptoogy CRYPTO 2013 (Ran Canetti and JuanA. Garay, eds.), Lecture Notes in Computer Science, vo. 8042, Springer Berin Heideberg, 2013, pp (Engish). A Proof of Lemma 2 Proof. Let d be the edge density of the pair (T, S) and d be the edge density of the pair (T, S ). Denote ɛ = irreg G (T, S). For any two subsets T T, S S, which are aso subsets of T and S respectivey, by the definition of d we have which transates to E(T, S ) T S d ɛ. Therefore, by Equation (19) and the triange inequaity d d ɛ. (19) E(T, S ) d T S E(T, S ) d T S + ɛ T S. (20) Since the definition of d appied to T T, S S impies from Equation (20) we concude that which finishes the proof. E(T, S ) d T S ɛ T S, E(T, S ) d T S 2ɛ T S,

arxiv: v1 [math.co] 17 Dec 2018

arxiv: v1 [math.co] 17 Dec 2018 On the Extrema Maximum Agreement Subtree Probem arxiv:1812.06951v1 [math.o] 17 Dec 2018 Aexey Markin Department of omputer Science, Iowa State University, USA amarkin@iastate.edu Abstract Given two phyogenetic

More information

CS229 Lecture notes. Andrew Ng

CS229 Lecture notes. Andrew Ng CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view

More information

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity

More information

#A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG

#A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG #A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG Guixin Deng Schoo of Mathematica Sciences, Guangxi Teachers Education University, Nanning, P.R.China dengguixin@ive.com Pingzhi Yuan

More information

Cryptanalysis of PKP: A New Approach

Cryptanalysis of PKP: A New Approach Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in

More information

Theory of Generalized k-difference Operator and Its Application in Number Theory

Theory of Generalized k-difference Operator and Its Application in Number Theory Internationa Journa of Mathematica Anaysis Vo. 9, 2015, no. 19, 955-964 HIKARI Ltd, www.m-hiari.com http://dx.doi.org/10.12988/ijma.2015.5389 Theory of Generaized -Difference Operator and Its Appication

More information

Problem set 6 The Perron Frobenius theorem.

Problem set 6 The Perron Frobenius theorem. Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator

More information

Explicit overall risk minimization transductive bound

Explicit overall risk minimization transductive bound 1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,

More information

Efficiently Generating Random Bits from Finite State Markov Chains

Efficiently Generating Random Bits from Finite State Markov Chains 1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

Supersaturation for Ramsey-Turán problems

Supersaturation for Ramsey-Turán problems Supersaturation for Ramsey-Turán probems Dhruv Mubayi Vojtĕch Röd Apri 8, 005 Abstract For an -graph G, the Turán number ex(n, G is the maximum number of edges in an n-vertex -graph H containing no copy

More information

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After

More information

Ramsey numbers of sparse hypergraphs

Ramsey numbers of sparse hypergraphs Ramsey numbers of sparse hypergraphs David Conon Jacob Fox Benny Sudakov Abstract We give a short proof that any k-uniform hypergraph H on n vertices with bounded degree has Ramsey number at most c(, k)n,

More information

K a,k minors in graphs of bounded tree-width *

K a,k minors in graphs of bounded tree-width * K a,k minors in graphs of bounded tree-width * Thomas Böhme Institut für Mathematik Technische Universität Imenau Imenau, Germany E-mai: tboehme@theoinf.tu-imenau.de and John Maharry Department of Mathematics

More information

Symbolic models for nonlinear control systems using approximate bisimulation

Symbolic models for nonlinear control systems using approximate bisimulation Symboic modes for noninear contro systems using approximate bisimuation Giordano Poa, Antoine Girard and Pauo Tabuada Abstract Contro systems are usuay modeed by differentia equations describing how physica

More information

On Bounded Nondeterminism and Alternation

On Bounded Nondeterminism and Alternation On Bounded Nondeterminism and Aternation Mathias Hauptmann May 4, 2016 Abstract We continue our work on the combination of variants of McCreight and Meyer s Union Theorem with separation resuts aong the

More information

The Group Structure on a Smooth Tropical Cubic

The Group Structure on a Smooth Tropical Cubic The Group Structure on a Smooth Tropica Cubic Ethan Lake Apri 20, 2015 Abstract Just as in in cassica agebraic geometry, it is possibe to define a group aw on a smooth tropica cubic curve. In this note,

More information

Secure Information Flow Based on Data Flow Analysis

Secure Information Flow Based on Data Flow Analysis SSN 746-7659, Engand, UK Journa of nformation and Computing Science Vo., No. 4, 007, pp. 5-60 Secure nformation Fow Based on Data Fow Anaysis Jianbo Yao Center of nformation and computer, Zunyi Norma Coege,

More information

MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES

MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES ANDRZEJ DUDEK AND ANDRZEJ RUCIŃSKI Abstract. For positive integers k and, a k-uniform hypergraph is caed a oose path of ength, and denoted by

More information

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

STABLE GRAPHS BENJAMIN OYE

STABLE GRAPHS BENJAMIN OYE STABLE GRAPHS BENJAMIN OYE Abstract. In Reguarity Lemmas for Stabe Graphs [1] Maiaris and Sheah appy toos from mode theory to obtain stronger forms of Ramsey's theorem and Szemeredi's reguarity emma for

More information

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University

More information

arxiv: v1 [math.fa] 23 Aug 2018

arxiv: v1 [math.fa] 23 Aug 2018 An Exact Upper Bound on the L p Lebesgue Constant and The -Rényi Entropy Power Inequaity for Integer Vaued Random Variabes arxiv:808.0773v [math.fa] 3 Aug 08 Peng Xu, Mokshay Madiman, James Mebourne Abstract

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

Week 6 Lectures, Math 6451, Tanveer

Week 6 Lectures, Math 6451, Tanveer Fourier Series Week 6 Lectures, Math 645, Tanveer In the context of separation of variabe to find soutions of PDEs, we encountered or and in other cases f(x = f(x = a 0 + f(x = a 0 + b n sin nπx { a n

More information

Restricted weak type on maximal linear and multilinear integral maps.

Restricted weak type on maximal linear and multilinear integral maps. Restricted weak type on maxima inear and mutiinear integra maps. Oscar Basco Abstract It is shown that mutiinear operators of the form T (f 1,..., f k )(x) = R K(x, y n 1,..., y k )f 1 (y 1 )...f k (y

More information

Completion. is dense in H. If V is complete, then U(V) = H.

Completion. is dense in H. If V is complete, then U(V) = H. Competion Theorem 1 (Competion) If ( V V ) is any inner product space then there exists a Hibert space ( H H ) and a map U : V H such that (i) U is 1 1 (ii) U is inear (iii) UxUy H xy V for a xy V (iv)

More information

How many random edges make a dense hypergraph non-2-colorable?

How many random edges make a dense hypergraph non-2-colorable? How many random edges make a dense hypergraph non--coorabe? Benny Sudakov Jan Vondrák Abstract We study a mode of random uniform hypergraphs, where a random instance is obtained by adding random edges

More information

Co-degree density of hypergraphs

Co-degree density of hypergraphs Co-degree density of hypergraphs Dhruv Mubayi Department of Mathematics, Statistics, and Computer Science University of Iinois at Chicago Chicago, IL 60607 Yi Zhao Department of Mathematics and Statistics

More information

XSAT of linear CNF formulas

XSAT of linear CNF formulas XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open

More information

Analysis of Emerson s Multiple Model Interpolation Estimation Algorithms: The MIMO Case

Analysis of Emerson s Multiple Model Interpolation Estimation Algorithms: The MIMO Case Technica Report PC-04-00 Anaysis of Emerson s Mutipe Mode Interpoation Estimation Agorithms: The MIMO Case João P. Hespanha Dae E. Seborg University of Caifornia, Santa Barbara February 0, 004 Anaysis

More information

Transcendence of stammering continued fractions. Yann BUGEAUD

Transcendence of stammering continued fractions. Yann BUGEAUD Transcendence of stammering continued fractions Yann BUGEAUD To the memory of Af van der Poorten Abstract. Let θ = [0; a 1, a 2,...] be an agebraic number of degree at east three. Recenty, we have estabished

More information

Lecture Note 3: Stationary Iterative Methods

Lecture Note 3: Stationary Iterative Methods MATH 5330: Computationa Methods of Linear Agebra Lecture Note 3: Stationary Iterative Methods Xianyi Zeng Department of Mathematica Sciences, UTEP Stationary Iterative Methods The Gaussian eimination (or

More information

Minimum Enclosing Circle of a Set of Fixed Points and a Mobile Point

Minimum Enclosing Circle of a Set of Fixed Points and a Mobile Point Minimum Encosing Circe of a Set of Fixed Points and a Mobie Point Aritra Banik 1, Bhaswar B. Bhattacharya 2, and Sandip Das 1 1 Advanced Computing and Microeectronics Unit, Indian Statistica Institute,

More information

Distributed average consensus: Beyond the realm of linearity

Distributed average consensus: Beyond the realm of linearity Distributed average consensus: Beyond the ream of inearity Usman A. Khan, Soummya Kar, and José M. F. Moura Department of Eectrica and Computer Engineering Carnegie Meon University 5 Forbes Ave, Pittsburgh,

More information

Primal and dual active-set methods for convex quadratic programming

Primal and dual active-set methods for convex quadratic programming Math. Program., Ser. A 216) 159:469 58 DOI 1.17/s117-15-966-2 FULL LENGTH PAPER Prima and dua active-set methods for convex quadratic programming Anders Forsgren 1 Phiip E. Gi 2 Eizabeth Wong 2 Received:

More information

Multilayer Kerceptron

Multilayer Kerceptron Mutiayer Kerceptron Zotán Szabó, András Lőrincz Department of Information Systems, Facuty of Informatics Eötvös Loránd University Pázmány Péter sétány 1/C H-1117, Budapest, Hungary e-mai: szzoi@csetehu,

More information

ORTHOGONAL MULTI-WAVELETS FROM MATRIX FACTORIZATION

ORTHOGONAL MULTI-WAVELETS FROM MATRIX FACTORIZATION J. Korean Math. Soc. 46 2009, No. 2, pp. 281 294 ORHOGONAL MLI-WAVELES FROM MARIX FACORIZAION Hongying Xiao Abstract. Accuracy of the scaing function is very crucia in waveet theory, or correspondingy,

More information

(f) is called a nearly holomorphic modular form of weight k + 2r as in [5].

(f) is called a nearly holomorphic modular form of weight k + 2r as in [5]. PRODUCTS OF NEARLY HOLOMORPHIC EIGENFORMS JEFFREY BEYERL, KEVIN JAMES, CATHERINE TRENTACOSTE, AND HUI XUE Abstract. We prove that the product of two neary hoomorphic Hece eigenforms is again a Hece eigenform

More information

Input-to-state stability for a class of Lurie systems

Input-to-state stability for a class of Lurie systems Automatica 38 (2002) 945 949 www.esevier.com/ocate/automatica Brief Paper Input-to-state stabiity for a cass of Lurie systems Murat Arcak a;, Andrew Tee b a Department of Eectrica, Computer and Systems

More information

17 Lecture 17: Recombination and Dark Matter Production

17 Lecture 17: Recombination and Dark Matter Production PYS 652: Astrophysics 88 17 Lecture 17: Recombination and Dark Matter Production New ideas pass through three periods: It can t be done. It probaby can be done, but it s not worth doing. I knew it was

More information

On colorings of the Boolean lattice avoiding a rainbow copy of a poset arxiv: v1 [math.co] 21 Dec 2018

On colorings of the Boolean lattice avoiding a rainbow copy of a poset arxiv: v1 [math.co] 21 Dec 2018 On coorings of the Booean attice avoiding a rainbow copy of a poset arxiv:1812.09058v1 [math.co] 21 Dec 2018 Baázs Patkós Afréd Rényi Institute of Mathematics, Hungarian Academy of Scinces H-1053, Budapest,

More information

THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE

THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE KATIE L. MAY AND MELISSA A. MITCHELL Abstract. We show how to identify the minima path network connecting three fixed points on

More information

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm 1 Asymptotic Properties of a Generaized Cross Entropy Optimization Agorithm Zijun Wu, Michae Koonko, Institute for Appied Stochastics and Operations Research, Caustha Technica University Abstract The discrete

More information

Akaike Information Criterion for ANOVA Model with a Simple Order Restriction

Akaike Information Criterion for ANOVA Model with a Simple Order Restriction Akaike Information Criterion for ANOVA Mode with a Simpe Order Restriction Yu Inatsu * Department of Mathematics, Graduate Schoo of Science, Hiroshima University ABSTRACT In this paper, we consider Akaike

More information

The Binary Space Partitioning-Tree Process Supplementary Material

The Binary Space Partitioning-Tree Process Supplementary Material The inary Space Partitioning-Tree Process Suppementary Materia Xuhui Fan in Li Scott. Sisson Schoo of omputer Science Fudan University ibin@fudan.edu.cn Schoo of Mathematics and Statistics University of

More information

Efficient Generation of Random Bits from Finite State Markov Chains

Efficient Generation of Random Bits from Finite State Markov Chains Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS

NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS TONY ALLEN, EMILY GEBHARDT, AND ADAM KLUBALL 3 ADVISOR: DR. TIFFANY KOLBA 4 Abstract. The phenomenon of noise-induced stabiization occurs

More information

arxiv: v1 [math.co] 12 May 2013

arxiv: v1 [math.co] 12 May 2013 EMBEDDING CYCLES IN FINITE PLANES FELIX LAZEBNIK, KEITH E. MELLINGER, AND SCAR VEGA arxiv:1305.2646v1 [math.c] 12 May 2013 Abstract. We define and study embeddings of cyces in finite affine and projective

More information

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Brandon Maone Department of Computer Science University of Hesini February 18, 2014 Abstract This document derives, in excrutiating

More information

FRIEZE GROUPS IN R 2

FRIEZE GROUPS IN R 2 FRIEZE GROUPS IN R 2 MAXWELL STOLARSKI Abstract. Focusing on the Eucidean pane under the Pythagorean Metric, our goa is to cassify the frieze groups, discrete subgroups of the set of isometries of the

More information

A UNIVERSAL METRIC FOR THE CANONICAL BUNDLE OF A HOLOMORPHIC FAMILY OF PROJECTIVE ALGEBRAIC MANIFOLDS

A UNIVERSAL METRIC FOR THE CANONICAL BUNDLE OF A HOLOMORPHIC FAMILY OF PROJECTIVE ALGEBRAIC MANIFOLDS A UNIERSAL METRIC FOR THE CANONICAL BUNDLE OF A HOLOMORPHIC FAMILY OF PROJECTIE ALGEBRAIC MANIFOLDS DROR AROLIN Dedicated to M Saah Baouendi on the occasion of his 60th birthday 1 Introduction In his ceebrated

More information

CS 331: Artificial Intelligence Propositional Logic 2. Review of Last Time

CS 331: Artificial Intelligence Propositional Logic 2. Review of Last Time CS 33 Artificia Inteigence Propositiona Logic 2 Review of Last Time = means ogicay foows - i means can be derived from If your inference agorithm derives ony things that foow ogicay from the KB, the inference

More information

Szemerédi s Lemma for the Analyst

Szemerédi s Lemma for the Analyst Szemerédi s Lemma for the Analyst László Lovász and Balázs Szegedy Microsoft Research April 25 Microsoft Research Technical Report # MSR-TR-25-9 Abstract Szemerédi s Regularity Lemma is a fundamental tool

More information

SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS

SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS ISEE 1 SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS By Yingying Fan and Jinchi Lv University of Southern Caifornia This Suppementary Materia

More information

Math 124B January 31, 2012

Math 124B January 31, 2012 Math 124B January 31, 212 Viktor Grigoryan 7 Inhomogeneous boundary vaue probems Having studied the theory of Fourier series, with which we successfuy soved boundary vaue probems for the homogeneous heat

More information

A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC

A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC (January 8, 2003) A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC DAMIAN CLANCY, University of Liverpoo PHILIP K. POLLETT, University of Queensand Abstract

More information

THINKING IN PYRAMIDS

THINKING IN PYRAMIDS ECS 178 Course Notes THINKING IN PYRAMIDS Kenneth I. Joy Institute for Data Anaysis and Visuaization Department of Computer Science University of Caifornia, Davis Overview It is frequenty usefu to think

More information

Smoothers for ecient multigrid methods in IGA

Smoothers for ecient multigrid methods in IGA Smoothers for ecient mutigrid methods in IGA Cemens Hofreither, Stefan Takacs, Water Zuehner DD23, Juy 2015 supported by The work was funded by the Austrian Science Fund (FWF): NFN S117 (rst and third

More information

Algorithms to solve massively under-defined systems of multivariate quadratic equations

Algorithms to solve massively under-defined systems of multivariate quadratic equations Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations

More information

(This is a sample cover image for this issue. The actual cover is not yet available at this time.)

(This is a sample cover image for this issue. The actual cover is not yet available at this time.) (This is a sampe cover image for this issue The actua cover is not yet avaiabe at this time) This artice appeared in a journa pubished by Esevier The attached copy is furnished to the author for interna

More information

Minimizing Total Weighted Completion Time on Uniform Machines with Unbounded Batch

Minimizing Total Weighted Completion Time on Uniform Machines with Unbounded Batch The Eighth Internationa Symposium on Operations Research and Its Appications (ISORA 09) Zhangiaie, China, September 20 22, 2009 Copyright 2009 ORSC & APORC, pp. 402 408 Minimizing Tota Weighted Competion

More information

Approximate Bandwidth Allocation for Fixed-Priority-Scheduled Periodic Resources (WSU-CS Technical Report Version)

Approximate Bandwidth Allocation for Fixed-Priority-Scheduled Periodic Resources (WSU-CS Technical Report Version) Approximate Bandwidth Aocation for Fixed-Priority-Schedued Periodic Resources WSU-CS Technica Report Version) Farhana Dewan Nathan Fisher Abstract Recent research in compositiona rea-time systems has focused

More information

On Non-Optimally Expanding Sets in Grassmann Graphs

On Non-Optimally Expanding Sets in Grassmann Graphs ectronic Cooquium on Computationa Compexity, Report No. 94 (07) On Non-Optimay xpanding Sets in Grassmann Graphs Irit Dinur Subhash Khot Guy Kinder Dor Minzer Mui Safra Abstract The paper investigates

More information

Continued fractions with low complexity: Transcendence measures and quadratic approximation. Yann BUGEAUD

Continued fractions with low complexity: Transcendence measures and quadratic approximation. Yann BUGEAUD Continued fractions with ow compexity: Transcendence measures and quadratic approximation Yann BUGEAUD Abstract. We estabish measures of non-quadraticity and transcendence measures for rea numbers whose

More information

C. Fourier Sine Series Overview

C. Fourier Sine Series Overview 12 PHILIP D. LOEWEN C. Fourier Sine Series Overview Let some constant > be given. The symboic form of the FSS Eigenvaue probem combines an ordinary differentia equation (ODE) on the interva (, ) with a

More information

Coupling of LWR and phase transition models at boundary

Coupling of LWR and phase transition models at boundary Couping of LW and phase transition modes at boundary Mauro Garaveo Dipartimento di Matematica e Appicazioni, Università di Miano Bicocca, via. Cozzi 53, 20125 Miano Itay. Benedetto Piccoi Department of

More information

u(x) s.t. px w x 0 Denote the solution to this problem by ˆx(p, x). In order to obtain ˆx we may simply solve the standard problem max x 0

u(x) s.t. px w x 0 Denote the solution to this problem by ˆx(p, x). In order to obtain ˆx we may simply solve the standard problem max x 0 Bocconi University PhD in Economics - Microeconomics I Prof M Messner Probem Set 4 - Soution Probem : If an individua has an endowment instead of a monetary income his weath depends on price eves In particuar,

More information

Generalized Bell polynomials and the combinatorics of Poisson central moments

Generalized Bell polynomials and the combinatorics of Poisson central moments Generaized Be poynomias and the combinatorics of Poisson centra moments Nicoas Privaut Division of Mathematica Sciences Schoo of Physica and Mathematica Sciences Nanyang Technoogica University SPMS-MAS-05-43,

More information

Approximated MLC shape matrix decomposition with interleaf collision constraint

Approximated MLC shape matrix decomposition with interleaf collision constraint Approximated MLC shape matrix decomposition with intereaf coision constraint Thomas Kainowski Antje Kiese Abstract Shape matrix decomposition is a subprobem in radiation therapy panning. A given fuence

More information

HAMILTON DECOMPOSITIONS OF ONE-ENDED CAYLEY GRAPHS

HAMILTON DECOMPOSITIONS OF ONE-ENDED CAYLEY GRAPHS HAMILTON DECOMPOSITIONS OF ONE-ENDED CAYLEY GRAPHS JOSHUA ERDE, FLORIAN LEHNER, AND MAX PITZ Abstract. We prove that any one-ended, ocay finite Cayey graph with non-torsion generators admits a decomposition

More information

Another Class of Admissible Perturbations of Special Expressions

Another Class of Admissible Perturbations of Special Expressions Int. Journa of Math. Anaysis, Vo. 8, 014, no. 1, 1-8 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.1988/ijma.014.31187 Another Cass of Admissibe Perturbations of Specia Expressions Jerico B. Bacani

More information

4 Separation of Variables

4 Separation of Variables 4 Separation of Variabes In this chapter we describe a cassica technique for constructing forma soutions to inear boundary vaue probems. The soution of three cassica (paraboic, hyperboic and eiptic) PDE

More information

Indirect Optimal Control of Dynamical Systems

Indirect Optimal Control of Dynamical Systems Computationa Mathematics and Mathematica Physics, Vo. 44, No. 3, 24, pp. 48 439. Transated from Zhurna Vychisite noi Matematiki i Matematicheskoi Fiziki, Vo. 44, No. 3, 24, pp. 444 466. Origina Russian

More information

Investigation on spectrum of the adjacency matrix and Laplacian matrix of graph G l

Investigation on spectrum of the adjacency matrix and Laplacian matrix of graph G l Investigation on spectrum of the adjacency matrix and Lapacian matrix of graph G SHUHUA YIN Computer Science and Information Technoogy Coege Zhejiang Wani University Ningbo 3500 PEOPLE S REPUBLIC OF CHINA

More information

TIGHT HAMILTON CYCLES IN RANDOM HYPERGRAPHS

TIGHT HAMILTON CYCLES IN RANDOM HYPERGRAPHS TIGHT HAMILTON CYCLES IN RANDOM HYPERGRAPHS PETER ALLEN*, JULIA BÖTTCHER*, YOSHIHARU KOHAYAKAWA, AND YURY PERSON Abstract. We give an agorithmic proof for the existence of tight Hamiton cyces in a random

More information

CONJUGATE GRADIENT WITH SUBSPACE OPTIMIZATION

CONJUGATE GRADIENT WITH SUBSPACE OPTIMIZATION CONJUGATE GRADIENT WITH SUBSPACE OPTIMIZATION SAHAR KARIMI AND STEPHEN VAVASIS Abstract. In this paper we present a variant of the conjugate gradient (CG) agorithm in which we invoke a subspace minimization

More information

Lower Bounds for the Relative Greedy Algorithm for Approximating Steiner Trees

Lower Bounds for the Relative Greedy Algorithm for Approximating Steiner Trees This paper appeared in: Networks 47:2 (2006), -5 Lower Bounds for the Reative Greed Agorithm for Approimating Steiner Trees Stefan Hougard Stefan Kirchner Humbodt-Universität zu Berin Institut für Informatik

More information

8 Digifl'.11 Cth:uits and devices

8 Digifl'.11 Cth:uits and devices 8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,

More information

Convergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems

Convergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems Convergence Property of the Iri-Imai Agorithm for Some Smooth Convex Programming Probems S. Zhang Communicated by Z.Q. Luo Assistant Professor, Department of Econometrics, University of Groningen, Groningen,

More information

Some Measures for Asymmetry of Distributions

Some Measures for Asymmetry of Distributions Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester

More information

An explicit Jordan Decomposition of Companion matrices

An explicit Jordan Decomposition of Companion matrices An expicit Jordan Decomposition of Companion matrices Fermín S V Bazán Departamento de Matemática CFM UFSC 88040-900 Forianópois SC E-mai: fermin@mtmufscbr S Gratton CERFACS 42 Av Gaspard Coriois 31057

More information

Integrating Factor Methods as Exponential Integrators

Integrating Factor Methods as Exponential Integrators Integrating Factor Methods as Exponentia Integrators Borisav V. Minchev Department of Mathematica Science, NTNU, 7491 Trondheim, Norway Borko.Minchev@ii.uib.no Abstract. Recenty a ot of effort has been

More information

On the Goal Value of a Boolean Function

On the Goal Value of a Boolean Function On the Goa Vaue of a Booean Function Eric Bach Dept. of CS University of Wisconsin 1210 W. Dayton St. Madison, WI 53706 Lisa Heerstein Dept of CSE NYU Schoo of Engineering 2 Metrotech Center, 10th Foor

More information

Empty non-convex and convex four-gons in random point sets

Empty non-convex and convex four-gons in random point sets Empty non-convex and convex four-gons in random point sets Ruy Fabia-Monroy 1, Cemens Huemer, and Dieter Mitsche 3 1 Departamento de Matemáticas, CINVESTAV-IPN, México Universitat Poitècnica de Cataunya,

More information

Selmer groups and Euler systems

Selmer groups and Euler systems Semer groups and Euer systems S. M.-C. 21 February 2018 1 Introduction Semer groups are a construction in Gaois cohomoogy that are cosey reated to many objects of arithmetic importance, such as cass groups

More information

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract Stochastic Compement Anaysis of Muti-Server Threshod Queues with Hysteresis John C.S. Lui The Dept. of Computer Science & Engineering The Chinese University of Hong Kong Leana Goubchik Dept. of Computer

More information

Pattern Frequency Sequences and Internal Zeros

Pattern Frequency Sequences and Internal Zeros Advances in Appied Mathematics 28, 395 420 (2002 doi:10.1006/aama.2001.0789, avaiabe onine at http://www.ideaibrary.com on Pattern Frequency Sequences and Interna Zeros Mikós Bóna Department of Mathematics,

More information

Small generators of function fields

Small generators of function fields Journa de Théorie des Nombres de Bordeaux 00 (XXXX), 000 000 Sma generators of function fieds par Martin Widmer Résumé. Soit K/k une extension finie d un corps goba, donc K contient un éément primitif

More information

Statistical Learning Theory: A Primer

Statistical Learning Theory: A Primer Internationa Journa of Computer Vision 38(), 9 3, 2000 c 2000 uwer Academic Pubishers. Manufactured in The Netherands. Statistica Learning Theory: A Primer THEODOROS EVGENIOU, MASSIMILIANO PONTIL AND TOMASO

More information

Fitting affine and orthogonal transformations between two sets of points

Fitting affine and orthogonal transformations between two sets of points Mathematica Communications 9(2004), 27-34 27 Fitting affine and orthogona transformations between two sets of points Hemuth Späth Abstract. Let two point sets P and Q be given in R n. We determine a transation

More information

King Fahd University of Petroleum & Minerals

King Fahd University of Petroleum & Minerals King Fahd University of Petroeum & Mineras DEPARTMENT OF MATHEMATICAL SCIENCES Technica Report Series TR 369 December 6 Genera decay of soutions of a viscoeastic equation Saim A. Messaoudi DHAHRAN 3161

More information

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR 1 Maximizing Sum Rate and Minimizing MSE on Mutiuser Downink: Optimaity, Fast Agorithms and Equivaence via Max-min SIR Chee Wei Tan 1,2, Mung Chiang 2 and R. Srikant 3 1 Caifornia Institute of Technoogy,

More information

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness 1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea- Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process Management,

More information

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with?

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with? Bayesian Learning A powerfu and growing approach in machine earning We use it in our own decision making a the time You hear a which which coud equay be Thanks or Tanks, which woud you go with? Combine

More information

A Fourier-Analytic Approach to List-Decoding for Sparse Random Linear Codes

A Fourier-Analytic Approach to List-Decoding for Sparse Random Linear Codes 53 IEICE TRANS. INF. & SYST., VOL.E98 D, NO.3 MARCH 015 PAPER Specia Section on Foundations of Computer Science New Spirits in Theory of Computation and Agorithm A Fourier-Anaytic Approach to List-Decoding

More information

Homework 5 Solutions

Homework 5 Solutions Stat 310B/Math 230B Theory of Probabiity Homework 5 Soutions Andrea Montanari Due on 2/19/2014 Exercise [5.3.20] 1. We caim that n 2 [ E[h F n ] = 2 n i=1 A i,n h(u)du ] I Ai,n (t). (1) Indeed, integrabiity

More information

ON THE POSITIVITY OF SOLUTIONS OF SYSTEMS OF STOCHASTIC PDES

ON THE POSITIVITY OF SOLUTIONS OF SYSTEMS OF STOCHASTIC PDES ON THE POSITIVITY OF SOLUTIONS OF SYSTEMS OF STOCHASTIC PDES JACKY CRESSON 1,2, MESSOUD EFENDIEV 3, AND STEFANIE SONNER 3,4 On the occasion of the 75 th birthday of Prof. Dr. Dr.h.c. Wofgang L. Wendand

More information

B. Brown, M. Griebel, F.Y. Kuo and I.H. Sloan

B. Brown, M. Griebel, F.Y. Kuo and I.H. Sloan Wegeerstraße 6 53115 Bonn Germany phone +49 8 73-347 fax +49 8 73-757 www.ins.uni-bonn.de B. Brown, M. Griebe, F.Y. Kuo and I.H. Soan On the expected uniform error of geometric Brownian motion approximated

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai

More information