Convex Optimization methods for Computing Channel Capacity

Size: px
Start display at page:

Download "Convex Optimization methods for Computing Channel Capacity"

Transcription

1 Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT May 15, 2014 We consider a classical comutational roblem from Information Theory, namely, numerically determining the Shannon Caacity of a given discrete memoryless channel. We formulate the roblem as a convex otimization roblem and review a classical algorithm, namely, the Blahut-Arimoto (BA) algorithm [1] that exloits the articular structure of the roblem. This algorithm is an examle of an alternating minimizing algorithm with a guaranteed rate of convergence Θ( 1 k ). Moreover, if the otimal solution is unique, this algorithm achieves an exonential rate of convergence. Then we review some recent advances made on this roblem using methods of convex otimization. First, we review [2] where the authors resent two related algorithms, based on natural gradient and roximal oint methods resectively, that are otentially faster than the original Blahut-Arimoto algorithm. Finally, we review [4] that considers the roblem from a dual ersective and resents a dual algorithm that is shown to be a geometric rogram. We then critically evaluate the relative erformance of these methods on secific roblems. Finally, we resent some directions for further research on this interesting roblem. 1 Introduction Claude Shannon s 1948 aer [5] marked the beginning the field of mathematical study of Information and reliable transmission of Information over a noisy communication channel, known as Information Theory. In that aer, through some ingenious mathematical arguments, he showed that information can be reliably transmitted over a noisy communication channel if the rate of transmission of information is less than the channel caacity, a fundamental quantity determined by the statistical descrition of the channel. In articular, the aer shows the startling fact that resence of noise in a communication channel limits only the rate of communication and not the robability of error in information transmission. In the simlest case of discrete memoryless channel (DMC), the channel caacity is exressed as a convex rogram with the inut robability distribution as the otimiza- 1

2 Figure 1: A Communication Channel tion variables. Although this rogram can be solved exlicitly in some secial cases, no closed form formula is known for arbitrary DMCs. Hence one needs to resort to the techniques of convex otimization algorithms to evaluate the channel caacity of an arbitrary DMC. In this exository article, we will discuss an elegant iterative algorithm obtained by Suguru Arimoto, resented in IEEE Transactions on Information Theory in In this article, we will strive to rovide comlete roof of the key results starting from the first rinciles. 2 Preliminary Definitions and Results In this section, we will define some standard Information Theoretic functionals that will be extensively used in the rest of the aer. All random variables discussed in this aer are assumed to take value from a finite set (i.e. discrete) with strictly ositive robabilities and all logarithms are taken with resect to base 2, unless secified otherwise. Definition The Entroy H(X) of a random variable X taking value from a finite alhabet X with Probability Mass Function X (x) is defined as: H(X) = E( log X (X)) = x X X (x) log( X (x)) H( X ) (1) Note that H(X) deends only the robability measure of the random variable X and not on the articular values that X takes. Definition The Relative Entroy D( X q X ) of two PMFs X ( ) and q X ( ) (with q X (x) > 0, x X ) suorted on the same alhabet sace X is defined as: D( X q X ) = x X X (x) log X(x) q X (x) (2) Lemma 2.1. For any two distributions and q with the same suort, we have With equality holding iff = q. D( q) 0 (3)

3 Proof. Although this result can be roved directly using Jensen s inequality, we ot to give an elementary roof here. The fundamental inequality that we use is ex(x) 1 + x, x R (4) with the equality holding iff x = 0. The roof of this result follows from simle calculus. Taking natural logarithm of both sides of the above inequality, we conclude that for all x R with the equality holding iff x = 1. Now we write, ln(x) x 1 (5) D( q) = = i log q i i i ( q i i 1) (6) q i = 1 1 = 0 Where inequality (6) follows from Eqn. (5). Hence we have i D( q) 0 (7) Where the equality holds iff the equality holds in Eqn. 6, i.e. if = q. Definition The mutual information I(X; Y ) between two random variables X and Y, taking values from the alhabet set X Y with joint distribution XY ( ) and marginal distributions X ( ) and Y ( ) resectively, is defined as follows: I(X; Y ) = D( XY (, ) X ( ) Y ( )) = (x,y) X Y XY (x, y) log XY (x, y) X (x) Y (y) Writing XY (x, y) as X (x) Y X (y x), the above quantity may be re-written as (8) I(X; Y ) = = (x,y) X Y (x,y) X Y X (x) Y X (y x) log Y X(y x) Y (y) Y X (y x) X (x) Y X (y x) log z X X(x) Y X (y z) (9)

4 Definition A Discrete Memoryless Channel [6], denoted by (X, Y X (y x), Y) consists of two finite sets X and Y and a collection of robability mass functions { Y X ( x), x X }, with the interretation that X is the inut and Y is the outut of the channel. The caacity C of the DMC is defined as the maximum ossible rate of information transmission with arbitrary small robability of error. Shannon established the following fundamental result in his seminal aer [5]. Theorem 2.2 (The Noisy Channel Coding Theorem). C = max X I(X; Y ) (10) In the rest of this article, we discuss algorithms that solve the otimization roblem 10 for a given DMC. 3 Some Convexity Results In this section we will establish the convexity of the otimization roblem 10, starting from the first rinciles. To simlify notations, we re-label the inut symbols as [1... N] and outut symbols as [1... M] where N = X and M = Y. We denote the 1 N inut robability vector by, the N M channel matrix by Q and the 1 M outut robability vector by q. Then by the laws of robability, we have Hence the objective function I(X; Y ) can be re-written as I(X; Y ) = I(, Q) = = = q = Q (11) i Q ij log Q ij q j ( M ) M ( N ) i Q ij log Q ij i Q ij log qj ( M ) M i Q ij log Q ij q j log q j (12) Where we have utilized equation 11 in the last equation. Lemma 3.1. For a fixed channel-matrix Q, I(, Q) is concave in the inut robability distribution and hence the roblem 10 has an otimal solution. Proof. We first establish that the function f(x) = x log x, x 0 is convex in x. To establish this, just note that f (x) > 0, x > 0. Hence the function f(q) = M q i log q i is convex in q. Now from Eqn. 11 we note that q is a linear transformation of the inut robability vector. Hence, viewed as a function of, the second term on the right of Eqn. 12 is convex in. Since the first term is linear in, the result follows.

5 Since the constraint set in the otimization roblem 10 is the robability simlex 1 = 1, i 0, the above lemma establishes that the otimization roblem 10 is that of maximizing a concave function over a convex constraint set. We record this fact in the following theorem Theorem 3.2. The otimization roblem given in 10 is convex. 4 A Variational Characterization of Mutual Information In this section we will exress the mutual information I(X; Y ) as variational roblem. This will lead us directly to an alternating minimization algorithm for solving the otimization roblem 10. Let us denote the set of all conditional distributions on the alhabet X, indexed by the outut alhabet Y by Φ = {φ( j), j Y}. For any φ Φ define the quantity Ĩ(, Q; φ) as follows: Ĩ(, Q; φ) = The concavity of Ĩ(, Q; φ) w.r.t. and φ is readily aarent. i Q ij log φ(i j) i (13) Lemma 4.1. For fixed and Q, Ĩ(, Q; φ) is concave in φ. Similarly, for fixed φ and Q, Ĩ(, Q; φ) is concave in. Proof. This follows from the concavity of the functions log(x) and x log 1 x and the definition of Ĩ(, Q; φ). i Clearly, from the defining Eqn. 12, it follows that for the articular choice φ (i j) = Q ij N, we have iqij Ĩ(, Q; φ ) = I(, Q) (14) The following lemma shows that φ maximizes Ĩ(, Q; ). Lemma 4.2. For any matrix of conditional robabilities φ, we have Proof. We have, I(, Q) Ĩ(, Q; φ) = N = = Ĩ(, Q; φ) I(, Q) (15) N q j N q j i Q ij log Q ij q j i Q ij q j log iq ij /q j φ(i j) φ (i j) log φ (i j) φ(i j) i Q ij log φ(i j) i (16) (17) (18)

6 Define r(i j) = i Q ij /q j which can be interreted as a osteriori inut robability distribution given the outut variable to take value j. Then we can write down the above equation as follows M I(, Q) Ĩ(, Q; φ) = q j D(φ ( j) φ( j)) (19) Which is non-negative and equality holds iff φ(i j) = φ (i j), i, j, by virtue of lemma 2.1. Combining the above results, we have the following variational characterization of mutual information Theorem 4.3. For any inut distribution and any channel matrix Q we have I(, Q) = max Ĩ(, Q; φ) (20) φ Φ And the conditional robability matrix that achieves the maximum is given by Q ij φ(i j) = φ (i j) = i N (21) iq ij Based on the above theorem, we can recast the otimization roblem 10 as follows C = max X max Ĩ(, Q; φ) (22) φ Φ Since the channel matrix Q is fixed, we can view the otimization roblem 22 as otimizing over two different sets of variables, and φ. One natural iterative aroach to solve the roblem is to fix one set of variables and otimize over the other and vice versa. This method is esecially attractive when closed form solution for both the maximizations are available. As we will see in the following theorem, this is recisely the case here. This is in essence the Blahut-Arimoto (BA) algorithm for obtaining the caacity of a Discrete Memoryless Channel [1]. 5 The geometric idea of alternating otimization We consider the following roblem, given two convex sets A and b in R n as shown in Figure 2, we wish to determine the minimum distance between them. More recisely, we wish to determine d min = min d(a, b) (23) a A,b B Where d(a, b) is the euclidean distance between a and b. An obvious algorithm to do this would be to take any oint x A, and find the y B that is closest to it. Then fix this y and find the closest oint in A. Reeating this rocess, it is clear that the distance is non-increasing at each stage. But it is not obvious whether the algorithm

7 A B Figure 2: Alternating Minimization converges to the otimal solution. However, we will show that if the sets are robability distributions and the distance measure is the relative entroy then the algorithm does converge to the minimum relative entroy between two sets. To use the above idea of alternating otimization in roblem 22, if ossible, it is advantageous to have a closed form exression for the solution of either otimization roblem. The theorem below indicates that this is indeed ossible and finds the solution of either otimization in closed form. Theorem 5.1. For a fixed and Q, we have arg max Ĩ(, Q; φ) = φ (24) φ Φ Where, Q ij φ (i j) = i N k=1 (25) kq kj And for a fixed φ and Q, we have Where the comonents of are given by, arg max Ĩ(, Q; φ) = (26) And the maximum value is given by (i) = r i k r k max Ĩ(, Q; φ) = log( i (27) r i ) (28) Where, ( ) r i = ex Q ij log φ(i j) j (29)

8 Proof. The first art of the theorem is already roved as art of the theorem 4.3. We rove here the second art only. As with any constrained-otimization roblem with equality constraint, a straightforward way to aroach the roblem is to use the method of lagrange-multilier. However an elegant way to solve the roblem is to use lemma 2.1 in a clever way to tightly uer-bound the objective function and then to find an otimal inut-distribution which achieves the bound. We take this aroach here. Consider an inut distribution such that (i) = Dr(i), i X where, log r(i) = j Q ij log φ(i j) (30) And D is the normalization constant, i.e. D = ( i X r(i)) 1. From Lemma 2.1, we have i.e., D( ) 0 (31) M i log i i log (i) = log D + i Q ij log φ(i j) (32) Rearranging the above equation, we have Ĩ(, Q; φ) = With the equality holding iff =. log D = log i r i. i Q ij log φ(i j) i log D (33) Clearly the otimal value is given by Equied with Theorem 5.1, we are now ready to describe the Blahut-Arimoto (BA) algorithm formally. Ste 1: Initialize (1) to the uniform distribution over X, i.e. (1) i = 1 X for all i X. Set t to 1. Ste 2: Find φ (t+1) as follows: φ (t+1) (i j) = Ste 3: Udate (t+1) as follows: (t) i Q ij k (t) k Q kj, i, j (34) (t+1) i = r (t+1) i k X r(t+1) k (35)

9 Where, r (t+1) i ( ) = ex Q ij log φ (t+1) (i j) j (36) Ste 4: Set t t + 1 and goto Ste 2. We can combine Ste 2 and Ste 3 as follows. Denote the outut distribution induced by the inut distribution t by q t, i.e. q t = t Q. Hence from Eqn. 34 we have φ (t+1) (i j) = (t) i Q ij q (t) (j) (37) We now evaluate the term inside the exonent of Eqn 36 as follows Q ij log φ (t+1) (i j) = j j Q ij log (t) i Q ij q (t) (j) = D(Q i q (t) ) + log (t) i (38) Where Q i denotes the i th row of the channel matrix Q. Hence from Eqn. 36 we have r (t+1) i = (t) i ex ( D(Q i q (t) ) ) (39) Thus the above algorithm has the following simlified descrition Simlified Blahut-Arimoto Algorithm Ste 1: Initialize (1) to the uniform distribution over X, i.e. (1) i = 1 X for all i X. Set t to 1. Ste 2: Reeat until convergence: q (t) = (t) Q (40) i = (t) ex ( D(Q i q (t) ) ) i k (t) k ex ( D(Q k q (t) ) ) i X (41) (t+1) 6 Proximal Point Reformulation : Accelerated Blahut- Arimoto Algorithm In this section we re-examine the alternating minimization rocedure of the Blahut- Arimoto algorithm [2]. Plugging in the otimal solution φ t from the first otimization

10 to the second otimization, we have t+1 = arg max Ĩ(, Q; φ t ) = arg max = arg max = arg max i Q ij log φt (i j) i i Q ij log t i Q ij i q t j ( N ) i D(Q i q t ) D( t ) (42) The Eqn. (42) can be interreted a maximization of N id(q i q t ) with a enalty term D( t ) which ensures that the udate t+1 remains in the vicinity of t [2]. Algorithms of this tye are known as roximal oint methods, since they force the udate to stay in the roximity of the current guess. This is reasonable in our case because the first term in 42 is an aroximation of the mutual information I(; Q), by relacing the KLDs D(Q i q ) with D(Q i q t ). The enalty term D( k ) ensures that the maximization is restricted to a neighbourhood of k for which the aroximation D(Q i q ) D(Q i q t ) is accurate. In fact we have the following equality k+1 = arg max (Ĩt () D( t ) ) (43) Where Ĩt () = I( t, Q)+ N ( i t i )D(Q i q t ), which can be shown to be a firstorder Taylor series aroximation of I(). Thus the original Blahut-Arimoto algorithm can be thought of as a roximal oint method maximizing the first-order Taylor series aroximation of I(, Q) with a roximity enalty exressed by D( t ). It is now natural to modify (43) by an emhasizing/attenuating the enalty term via a weighting factor, i.e.,consider the following iteration t+1 = arg max (Ĩt () γ t D( t ) ) (44) The idea is that close to the otimal solution the K-L distance of to t would be small and hence the roximity constraint γ t can be gradually relaxed by decreasing γ t. One such ossible choice of the {γ t } t 1 sequence. In the following sub-section we derive a sequence of ste-sizes that guarantees non-decreasing mutual information estimates I( (t), Q). We note below the accelerated BA algorithm as derived above Ste 1: Initialize (1) to the uniform distribution over X, i.e. (1) i = 1 X for all i X. Set t to 1.

11 Ste 2: Reeat until convergence: q (t) = (t) Q (45) i = (t) ex ( γt 1 D(Q i q (t) ) ) i k (t) k ex ( γt 1 D(Q k q (t) ) ), i X (46) (t+1) 6.1 Suitable choice of ste-sizes for accelerated BA algorithm A fundamental roerty of the BA algorithm is that the mutual information I( t, Q), which reresents the current caacity estimate at the t th iteration is non-decreasing. For the accelerated BA algorithm, we need to choose a sequence {γ t } t 1 that reserves this roerty. For this we need the following lemma. Lemma 6.1. For any iteration t, we have Proof. Recall that, D(q (t+1) q (t) ) q (t+1) = (t+1) Q = (t+1) i D(Q i q (t) ) (47) (t+1) i Q i (48) The above equation exresses the outut robability vector q k+1 as a convex combination of the rows of the matrix Q. Since the relative entroy D( ) is convex in both the arguments, we have D(q (t+1) q (t) ) (t+1) i D(Q i q (t) ) Equied with the above lemma, we now establish a lower bound on increment of mutual information I(, Q) at each stage. Lemma 6.2. For every stage t of the accelerated BA algorithm, we have I( (t+1), Q) I( (t), Q) + γ t D( (t+1) (t) ) D(q (t+1) q (t) ) (49) Proof. We have from Eqn. 44 of the accelerated BA iteration Ĩ t ( (t+1) ) γ t D( (t+1) (t) ) Ĩt ( (t) ) (50)

12 Plugging in the exression for Ĩt ( ) from above, we have I( (t+1), Q) + ( (t+1) i (t) i )D(Q i q (t) ) I( (t), Q) + γ t D( (t+1) (t) ) (51) Now using the lemma 6.1 and using the non-negativity of K-L divergence, the result follows. From the above lemma, it follows that a sufficient condition for I( (t+1), Q) to be non-decreasing is 1 D((t+1) (t) ) γ t D( (t+1) Q (t) Q) (52) Now define the maximum KLD-induced eigenvalue of Q as λ 2 D(Q Q) KL(Q) = su D( ) (53) Using the above definition, we conclude that a sufficient condition for I( (t+1), Q) to be non-decreasing is given by γ t λ 2 KL(Q) (54) 7 Convergence Statements of the Accelerated BA Algorithm In the revious section we roved that for any ste-size sequence γ t λ 2 KL (Q), the accelerated BA algorithm has the otential for increased convergence seed. For lack of sace, we only give the statements of the theorem. Comlete roofs of these theorems may be found in [2]. Theorem 7.1. Consider the accelerated BA algorithm with I t = i t i D(Q i q (t) ) and L t = γ t log( i (t) i ex(γt 1 D(Q i q (t) )). Assume that γ inf = inf t γt 1 > 0 and (54) is satisfied for all t. Then lim L t = lim I t = C (55) t t And the convergence rate is at least roortional to 1/t, i.e. C L t < D( 0 ) µ inf t (56)

13 8 Dual Aroach : Geometric Programming In this section, we take a dual aroach to solve the roblem 10 and show that the dual roblem reduces to a simle Geometric Program [4]. We also derive several useful uer bounds on the channel caacity from the dual rogram. First we rewrite the mutual information functional as follows. I(X; Y ) = H(Y ) H(Y X) = q j log q j r (57) Where, Subject to, r i = Q ij log Q ij (58) q = Q (59) 1 = 1, >= 0 (60) Hence the otimization roblem 10 may be rewritten as follows max r q j log q j (61) Subject to, Q = q 1 = 1 0 It is to be noted that keeing two sets of otimization variables and q and introducing the equality constraint Q = q in the rimal roblem is a key ste to derive an exlicit and simle Lagrange dual roblem of 61. Theorem 8.1. The Lagrange dual of the channel caacity roblem 61 is given by the following roblem Subject to, min α M log ex(α j ) (62) Qα r (63)

14 An equivalent version of the above Lagrange dual roblem is the following Geometric rogram (in the standard form): Subject to, M min z z j (64) z Pij j ex ( H(Q i ) ), i = 1, 2,..., N z 0 From the Lagrange dual roblem, we immediately have the following uer bound on the channel caacity. ( ) M Weak Duality: log ex(α j) C, for all α that satisfy Qα + r 0. ( ) M Strong Duality: log ex(α j) = C, for the otimal dual variable α. 8.1 Bounding From the Dual Because the inequality constraints in the dual roblem 64 are affine, it is easy to obtain a dual feasible α by finding any solution to a system of linear inequalities, and the resulting value of the dual objective function rovides an easily derivable uer bound on channel caacity. The following is one such non-trivial bound. Corollary 8.2. Channel caacity is uer-bounded in terms of a maximum-likelihood receiver selecting arg max i P ij for each outut symbol j C log max P ij i which is tight iff the otimal outut distribution q is q j = max i P ij M k=1 P ik (65) As is readily aarent, the geometric rogram Lagrange dual 64 generates a broader class of uer bounds on caacity. This uer bounds can be effectively used to terminate an iterative otimization rocedure for channel caacity.

15 9 Conclusion In this reort, we have surveyed various convex otimization algorithms for solving the channel caacity roblem. In articular, we have derived the classical Blahut-Arimoto algorithm from first rinciles. Then we established a connection with Proximal algorithms and original BA iteration. Using a roer ste-size sequence, we have derived an acceerated version of the BA algorithm. Finally we have considered the dual of the channel caacity roblem and have shown that its Lagrange dual is given by a Geometric Program (GP). The GP have been effectively utilized to derive non-trivial uer bound on the channel caacity. References [1] S. Arimoto, An algorithm for comuting the caacity of arbitrary discrete memoryless channels, Information Theory, IEEE Transactions on, vol. 18, no. 1, , [2] G. Matz and P. Duhamel, Information geometric formulation and interretation of accelerated blahut-arimoto-tye algorithms, in Information theory worksho, IEEE. IEEE, 2004, [3] Y. Yu, Squeezing the arimoto-blahut algorithm for faster convergence, arxiv rerint arxiv: , [4] M. Chiang and S. Boyd, Geometric rogramming duals of channel caacity and rate distortion, Information Theory, IEEE Transactions on, vol. 50, no. 2, , [5] C. E. Shannon, A mathematical theory of communication, ACM SIGMOBILE Mobile Comuting and Communications Review, vol. 5, no. 1,. 3 55, [6] T. M. Cover and J. A. Thomas, Elements of information theory. John Wiley & Sons, 2012.

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

On Code Design for Simultaneous Energy and Information Transfer

On Code Design for Simultaneous Energy and Information Transfer On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

ECE 534 Information Theory - Midterm 2

ECE 534 Information Theory - Midterm 2 ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various

More information

On the Chvatál-Complexity of Knapsack Problems

On the Chvatál-Complexity of Knapsack Problems R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew

More information

Inequalities for the L 1 Deviation of the Empirical Distribution

Inequalities for the L 1 Deviation of the Empirical Distribution Inequalities for the L 1 Deviation of the Emirical Distribution Tsachy Weissman, Erik Ordentlich, Gadiel Seroussi, Sergio Verdu, Marcelo J. Weinberger June 13, 2003 Abstract We derive bounds on the robability

More information

ON THE NORM OF AN IDEMPOTENT SCHUR MULTIPLIER ON THE SCHATTEN CLASS

ON THE NORM OF AN IDEMPOTENT SCHUR MULTIPLIER ON THE SCHATTEN CLASS PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volume 00, Number 0, Pages 000 000 S 000-9939XX)0000-0 ON THE NORM OF AN IDEMPOTENT SCHUR MULTIPLIER ON THE SCHATTEN CLASS WILLIAM D. BANKS AND ASMA HARCHARRAS

More information

Notes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle

Notes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle McMaster University Advanced Otimization Laboratory Title: Notes on duality in second order and -order cone otimization Author: Erling D. Andersen, Cornelis Roos and Tamás Terlaky AdvOl-Reort No. 000/8

More information

FE FORMULATIONS FOR PLASTICITY

FE FORMULATIONS FOR PLASTICITY G These slides are designed based on the book: Finite Elements in Plasticity Theory and Practice, D.R.J. Owen and E. Hinton, 1970, Pineridge Press Ltd., Swansea, UK. 1 Course Content: A INTRODUCTION AND

More information

LECTURE 7 NOTES. x n. d x if. E [g(x n )] E [g(x)]

LECTURE 7 NOTES. x n. d x if. E [g(x n )] E [g(x)] LECTURE 7 NOTES 1. Convergence of random variables. Before delving into the large samle roerties of the MLE, we review some concets from large samle theory. 1. Convergence in robability: x n x if, for

More information

Some results of convex programming complexity

Some results of convex programming complexity 2012c12 $ Ê Æ Æ 116ò 14Ï Dec., 2012 Oerations Research Transactions Vol.16 No.4 Some results of convex rogramming comlexity LOU Ye 1,2 GAO Yuetian 1 Abstract Recently a number of aers were written that

More information

Asymptotically Optimal Simulation Allocation under Dependent Sampling

Asymptotically Optimal Simulation Allocation under Dependent Sampling Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

An Introduction to Information Theory: Notes

An Introduction to Information Theory: Notes An Introduction to Information Theory: Notes Jon Shlens jonshlens@ucsd.edu 03 February 003 Preliminaries. Goals. Define basic set-u of information theory. Derive why entroy is the measure of information

More information

Numerical Linear Algebra

Numerical Linear Algebra Numerical Linear Algebra Numerous alications in statistics, articularly in the fitting of linear models. Notation and conventions: Elements of a matrix A are denoted by a ij, where i indexes the rows and

More information

Radial Basis Function Networks: Algorithms

Radial Basis Function Networks: Algorithms Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.

More information

Formal Modeling in Cognitive Science Lecture 29: Noisy Channel Model and Applications;

Formal Modeling in Cognitive Science Lecture 29: Noisy Channel Model and Applications; Formal Modeling in Cognitive Science Lecture 9: and ; ; Frank Keller School of Informatics University of Edinburgh keller@inf.ed.ac.uk Proerties of 3 March, 6 Frank Keller Formal Modeling in Cognitive

More information

On a Markov Game with Incomplete Information

On a Markov Game with Incomplete Information On a Markov Game with Incomlete Information Johannes Hörner, Dinah Rosenberg y, Eilon Solan z and Nicolas Vieille x{ January 24, 26 Abstract We consider an examle of a Markov game with lack of information

More information

Statics and dynamics: some elementary concepts

Statics and dynamics: some elementary concepts 1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and

More information

On Doob s Maximal Inequality for Brownian Motion

On Doob s Maximal Inequality for Brownian Motion Stochastic Process. Al. Vol. 69, No., 997, (-5) Research Reort No. 337, 995, Det. Theoret. Statist. Aarhus On Doob s Maximal Inequality for Brownian Motion S. E. GRAVERSEN and G. PESKIR If B = (B t ) t

More information

HENSEL S LEMMA KEITH CONRAD

HENSEL S LEMMA KEITH CONRAD HENSEL S LEMMA KEITH CONRAD 1. Introduction In the -adic integers, congruences are aroximations: for a and b in Z, a b mod n is the same as a b 1/ n. Turning information modulo one ower of into similar

More information

Elementary theory of L p spaces

Elementary theory of L p spaces CHAPTER 3 Elementary theory of L saces 3.1 Convexity. Jensen, Hölder, Minkowski inequality. We begin with two definitions. A set A R d is said to be convex if, for any x 0, x 1 2 A x = x 0 + (x 1 x 0 )

More information

1 Riesz Potential and Enbeddings Theorems

1 Riesz Potential and Enbeddings Theorems Riesz Potential and Enbeddings Theorems Given 0 < < and a function u L loc R, the Riesz otential of u is defined by u y I u x := R x y dy, x R We begin by finding an exonent such that I u L R c u L R for

More information

On Isoperimetric Functions of Probability Measures Having Log-Concave Densities with Respect to the Standard Normal Law

On Isoperimetric Functions of Probability Measures Having Log-Concave Densities with Respect to the Standard Normal Law On Isoerimetric Functions of Probability Measures Having Log-Concave Densities with Resect to the Standard Normal Law Sergey G. Bobkov Abstract Isoerimetric inequalities are discussed for one-dimensional

More information

An Estimate For Heilbronn s Exponential Sum

An Estimate For Heilbronn s Exponential Sum An Estimate For Heilbronn s Exonential Sum D.R. Heath-Brown Magdalen College, Oxford For Heini Halberstam, on his retirement Let be a rime, and set e(x) = ex(2πix). Heilbronn s exonential sum is defined

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding Homework Set # Rates definitions, Channel Coding, Source-Channel coding. Rates (a) Channels coding Rate: Assuming you are sending 4 different messages using usages of a channel. What is the rate (in bits

More information

Advanced Calculus I. Part A, for both Section 200 and Section 501

Advanced Calculus I. Part A, for both Section 200 and Section 501 Sring 2 Instructions Please write your solutions on your own aer. These roblems should be treated as essay questions. A roblem that says give an examle requires a suorting exlanation. In all roblems, you

More information

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle]

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle] Chater 5 Model checking, verification of CTL One must verify or exel... doubts, and convert them into the certainty of YES or NO. [Thomas Carlyle] 5. The verification setting Page 66 We introduce linear

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

Optimization in Information Theory

Optimization in Information Theory Optimization in Information Theory Dawei Shen November 11, 2005 Abstract This tutorial introduces the application of optimization techniques in information theory. We revisit channel capacity problem from

More information

Uniformly best wavenumber approximations by spatial central difference operators: An initial investigation

Uniformly best wavenumber approximations by spatial central difference operators: An initial investigation Uniformly best wavenumber aroximations by satial central difference oerators: An initial investigation Vitor Linders and Jan Nordström Abstract A characterisation theorem for best uniform wavenumber aroximations

More information

Sums of independent random variables

Sums of independent random variables 3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where

More information

arxiv: v1 [physics.data-an] 26 Oct 2012

arxiv: v1 [physics.data-an] 26 Oct 2012 Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch

More information

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in

More information

Robust Solutions to Markov Decision Problems

Robust Solutions to Markov Decision Problems Robust Solutions to Markov Decision Problems Arnab Nilim and Laurent El Ghaoui Deartment of Electrical Engineering and Comuter Sciences University of California, Berkeley, CA 94720 nilim@eecs.berkeley.edu,

More information

Homework 2: Solution

Homework 2: Solution 0-704: Information Processing and Learning Sring 0 Lecturer: Aarti Singh Homework : Solution Acknowledgement: The TA graciously thanks Rafael Stern for roviding most of these solutions.. Problem Hence,

More information

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm Gabriel Noriega, José Restreo, Víctor Guzmán, Maribel Giménez and José Aller Universidad Simón Bolívar Valle de Sartenejas,

More information

Convex Analysis and Economic Theory Winter 2018

Convex Analysis and Economic Theory Winter 2018 Division of the Humanities and Social Sciences Ec 181 KC Border Conve Analysis and Economic Theory Winter 2018 Toic 16: Fenchel conjugates 16.1 Conjugate functions Recall from Proosition 14.1.1 that is

More information

BEST CONSTANT IN POINCARÉ INEQUALITIES WITH TRACES: A FREE DISCONTINUITY APPROACH

BEST CONSTANT IN POINCARÉ INEQUALITIES WITH TRACES: A FREE DISCONTINUITY APPROACH BEST CONSTANT IN POINCARÉ INEQUALITIES WITH TRACES: A FREE DISCONTINUITY APPROACH DORIN BUCUR, ALESSANDRO GIACOMINI, AND PAOLA TREBESCHI Abstract For Ω R N oen bounded and with a Lischitz boundary, and

More information

A Social Welfare Optimal Sequential Allocation Procedure

A Social Welfare Optimal Sequential Allocation Procedure A Social Welfare Otimal Sequential Allocation Procedure Thomas Kalinowsi Universität Rostoc, Germany Nina Narodytsa and Toby Walsh NICTA and UNSW, Australia May 2, 201 Abstract We consider a simle sequential

More information

A construction of bent functions from plateaued functions

A construction of bent functions from plateaued functions A construction of bent functions from lateaued functions Ayça Çeşmelioğlu, Wilfried Meidl Sabancı University, MDBF, Orhanlı, 34956 Tuzla, İstanbul, Turkey. Abstract In this resentation, a technique for

More information

Cryptanalysis of Pseudorandom Generators

Cryptanalysis of Pseudorandom Generators CSE 206A: Lattice Algorithms and Alications Fall 2017 Crytanalysis of Pseudorandom Generators Instructor: Daniele Micciancio UCSD CSE As a motivating alication for the study of lattice in crytograhy we

More information

Some Results on the Generalized Gaussian Distribution

Some Results on the Generalized Gaussian Distribution Some Results on the Generalized Gaussian Distribution Alex Dytso, Ronit Bustin, H. Vincent Poor, Daniela Tuninetti 3, Natasha Devroye 3, and Shlomo Shamai (Shitz) Abstract The aer considers information-theoretic

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

HAUSDORFF MEASURE OF p-cantor SETS

HAUSDORFF MEASURE OF p-cantor SETS Real Analysis Exchange Vol. 302), 2004/2005,. 20 C. Cabrelli, U. Molter, Deartamento de Matemática, Facultad de Cs. Exactas y Naturales, Universidad de Buenos Aires and CONICET, Pabellón I - Ciudad Universitaria,

More information

arxiv: v1 [cs.gt] 2 Nov 2018

arxiv: v1 [cs.gt] 2 Nov 2018 Tight Aroximation Ratio of Anonymous Pricing Yaonan Jin Pinyan Lu Qi Qi Zhihao Gavin Tang Tao Xiao arxiv:8.763v [cs.gt] 2 Nov 28 Abstract We consider two canonical Bayesian mechanism design settings. In

More information

AM 221: Advanced Optimization Spring Prof. Yaron Singer Lecture 6 February 12th, 2014

AM 221: Advanced Optimization Spring Prof. Yaron Singer Lecture 6 February 12th, 2014 AM 221: Advanced Otimization Sring 2014 Prof. Yaron Singer Lecture 6 February 12th, 2014 1 Overview In our revious lecture we exlored the concet of duality which is the cornerstone of Otimization Theory.

More information

PROFIT MAXIMIZATION. π = p y Σ n i=1 w i x i (2)

PROFIT MAXIMIZATION. π = p y Σ n i=1 w i x i (2) PROFIT MAXIMIZATION DEFINITION OF A NEOCLASSICAL FIRM A neoclassical firm is an organization that controls the transformation of inuts (resources it owns or urchases into oututs or roducts (valued roducts

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

Universal Finite Memory Coding of Binary Sequences

Universal Finite Memory Coding of Binary Sequences Deartment of Electrical Engineering Systems Universal Finite Memory Coding of Binary Sequences Thesis submitted towards the degree of Master of Science in Electrical and Electronic Engineering in Tel-Aviv

More information

Math 104B: Number Theory II (Winter 2012)

Math 104B: Number Theory II (Winter 2012) Math 104B: Number Theory II (Winter 01) Alina Bucur Contents 1 Review 11 Prime numbers 1 Euclidean algorithm 13 Multilicative functions 14 Linear diohantine equations 3 15 Congruences 3 Primes as sums

More information

VARIANTS OF ENTROPY POWER INEQUALITY

VARIANTS OF ENTROPY POWER INEQUALITY VARIANTS OF ENTROPY POWER INEQUALITY Sergey G. Bobkov and Arnaud Marsiglietti Abstract An extension of the entroy ower inequality to the form N α r (X + Y ) N α r (X) + N α r (Y ) with arbitrary indeendent

More information

Department of Mathematics

Department of Mathematics Deartment of Mathematics Ma 3/03 KC Border Introduction to Probability and Statistics Winter 209 Sulement : Series fun, or some sums Comuting the mean and variance of discrete distributions often involves

More information

Convexification of Generalized Network Flow Problem with Application to Power Systems

Convexification of Generalized Network Flow Problem with Application to Power Systems 1 Convexification of Generalized Network Flow Problem with Alication to Power Systems Somayeh Sojoudi and Javad Lavaei + Deartment of Comuting and Mathematical Sciences, California Institute of Technology

More information

arxiv: v2 [math.na] 6 Apr 2016

arxiv: v2 [math.na] 6 Apr 2016 Existence and otimality of strong stability reserving linear multiste methods: a duality-based aroach arxiv:504.03930v [math.na] 6 Ar 06 Adrián Németh January 9, 08 Abstract David I. Ketcheson We rove

More information

A New Perspective on Learning Linear Separators with Large L q L p Margins

A New Perspective on Learning Linear Separators with Large L q L p Margins A New Persective on Learning Linear Searators with Large L q L Margins Maria-Florina Balcan Georgia Institute of Technology Christoher Berlind Georgia Institute of Technology Abstract We give theoretical

More information

CSE 599d - Quantum Computing When Quantum Computers Fall Apart

CSE 599d - Quantum Computing When Quantum Computers Fall Apart CSE 599d - Quantum Comuting When Quantum Comuters Fall Aart Dave Bacon Deartment of Comuter Science & Engineering, University of Washington In this lecture we are going to begin discussing what haens to

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

arxiv:cond-mat/ v2 25 Sep 2002

arxiv:cond-mat/ v2 25 Sep 2002 Energy fluctuations at the multicritical oint in two-dimensional sin glasses arxiv:cond-mat/0207694 v2 25 Se 2002 1. Introduction Hidetoshi Nishimori, Cyril Falvo and Yukiyasu Ozeki Deartment of Physics,

More information

OPTIMAL AFFINE INVARIANT SMOOTH MINIMIZATION ALGORITHMS

OPTIMAL AFFINE INVARIANT SMOOTH MINIMIZATION ALGORITHMS 1 OPTIMAL AFFINE INVARIANT SMOOTH MINIMIZATION ALGORITHMS ALEXANDRE D ASPREMONT, CRISTÓBAL GUZMÁN, AND MARTIN JAGGI ABSTRACT. We formulate an affine invariant imlementation of the accelerated first-order

More information

MATH 361: NUMBER THEORY EIGHTH LECTURE

MATH 361: NUMBER THEORY EIGHTH LECTURE MATH 361: NUMBER THEORY EIGHTH LECTURE 1. Quadratic Recirocity: Introduction Quadratic recirocity is the first result of modern number theory. Lagrange conjectured it in the late 1700 s, but it was first

More information

Discrete Memoryless Channels with Memoryless Output Sequences

Discrete Memoryless Channels with Memoryless Output Sequences Discrete Memoryless Channels with Memoryless utput Sequences Marcelo S Pinho Department of Electronic Engineering Instituto Tecnologico de Aeronautica Sao Jose dos Campos, SP 12228-900, Brazil Email: mpinho@ieeeorg

More information

Real Analysis 1 Fall Homework 3. a n.

Real Analysis 1 Fall Homework 3. a n. eal Analysis Fall 06 Homework 3. Let and consider the measure sace N, P, µ, where µ is counting measure. That is, if N, then µ equals the number of elements in if is finite; µ = otherwise. One usually

More information

Sharp gradient estimate and spectral rigidity for p-laplacian

Sharp gradient estimate and spectral rigidity for p-laplacian Shar gradient estimate and sectral rigidity for -Lalacian Chiung-Jue Anna Sung and Jiaing Wang To aear in ath. Research Letters. Abstract We derive a shar gradient estimate for ositive eigenfunctions of

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018 Comuter arithmetic Intensive Comutation Annalisa Massini 7/8 Intensive Comutation - 7/8 References Comuter Architecture - A Quantitative Aroach Hennessy Patterson Aendix J Intensive Comutation - 7/8 3

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

Uniform Law on the Unit Sphere of a Banach Space

Uniform Law on the Unit Sphere of a Banach Space Uniform Law on the Unit Shere of a Banach Sace by Bernard Beauzamy Société de Calcul Mathématique SA Faubourg Saint Honoré 75008 Paris France Setember 008 Abstract We investigate the construction of a

More information

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca

More information

Decoding Linear Block Codes Using a Priority-First Search: Performance Analysis and Suboptimal Version

Decoding Linear Block Codes Using a Priority-First Search: Performance Analysis and Suboptimal Version IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 3, MAY 1998 133 Decoding Linear Block Codes Using a Priority-First Search Performance Analysis Subotimal Version Yunghsiang S. Han, Member, IEEE, Carlos

More information

Coding Along Hermite Polynomials for Gaussian Noise Channels

Coding Along Hermite Polynomials for Gaussian Noise Channels Coding Along Hermite olynomials for Gaussian Noise Channels Emmanuel A. Abbe IG, EFL Lausanne, 1015 CH Email: emmanuel.abbe@efl.ch Lizhong Zheng LIDS, MIT Cambridge, MA 0139 Email: lizhong@mit.edu Abstract

More information

Improving on the Cutset Bound via a Geometric Analysis of Typical Sets

Improving on the Cutset Bound via a Geometric Analysis of Typical Sets Imroving on the Cutset Bound via a Geometric Analysis of Tyical Sets Ayfer Özgür Stanford University CUHK, May 28, 2016 Joint work with Xiugang Wu (Stanford). Ayfer Özgür (Stanford) March 16 1 / 33 Gaussian

More information

Multi-Operation Multi-Machine Scheduling

Multi-Operation Multi-Machine Scheduling Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job

More information

Interactive Hypothesis Testing Against Independence

Interactive Hypothesis Testing Against Independence 013 IEEE International Symosium on Information Theory Interactive Hyothesis Testing Against Indeendence Yu Xiang and Young-Han Kim Deartment of Electrical and Comuter Engineering University of California,

More information

REGULARITY OF SOLUTIONS TO DOUBLY NONLINEAR DIFFUSION EQUATIONS

REGULARITY OF SOLUTIONS TO DOUBLY NONLINEAR DIFFUSION EQUATIONS Seventh Mississii State - UAB Conference on Differential Equations and Comutational Simulations, Electronic Journal of Differential Equations, Conf. 17 2009,. 185 195. ISSN: 1072-6691. URL: htt://ejde.math.txstate.edu

More information

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables Imroved Bounds on Bell Numbers and on Moments of Sums of Random Variables Daniel Berend Tamir Tassa Abstract We rovide bounds for moments of sums of sequences of indeendent random variables. Concentrating

More information

Inference for Empirical Wasserstein Distances on Finite Spaces: Supplementary Material

Inference for Empirical Wasserstein Distances on Finite Spaces: Supplementary Material Inference for Emirical Wasserstein Distances on Finite Saces: Sulementary Material Max Sommerfeld Axel Munk Keywords: otimal transort, Wasserstein distance, central limit theorem, directional Hadamard

More information

IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES

IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES OHAD GILADI AND ASSAF NAOR Abstract. It is shown that if (, ) is a Banach sace with Rademacher tye 1 then for every n N there exists

More information

Intrinsic Approximation on Cantor-like Sets, a Problem of Mahler

Intrinsic Approximation on Cantor-like Sets, a Problem of Mahler Intrinsic Aroximation on Cantor-like Sets, a Problem of Mahler Ryan Broderick, Lior Fishman, Asaf Reich and Barak Weiss July 200 Abstract In 984, Kurt Mahler osed the following fundamental question: How

More information

Extension of Minimax to Infinite Matrices

Extension of Minimax to Infinite Matrices Extension of Minimax to Infinite Matrices Chris Calabro June 21, 2004 Abstract Von Neumann s minimax theorem is tyically alied to a finite ayoff matrix A R m n. Here we show that (i) if m, n are both inite,

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

OPTIMAL DESIGNS FOR TWO-LEVEL FACTORIAL EXPERIMENTS WITH BINARY RESPONSE

OPTIMAL DESIGNS FOR TWO-LEVEL FACTORIAL EXPERIMENTS WITH BINARY RESPONSE Statistica Sinica: Sulement OPTIMAL DESIGNS FOR TWO-LEVEL FACTORIAL EXPERIMENTS WITH BINARY RESPONSE Jie Yang 1, Abhyuday Mandal, and Dibyen Majumdar 1 1 University of Illinois at Chicago and University

More information

Principal Components Analysis and Unsupervised Hebbian Learning

Principal Components Analysis and Unsupervised Hebbian Learning Princial Comonents Analysis and Unsuervised Hebbian Learning Robert Jacobs Deartment of Brain & Cognitive Sciences University of Rochester Rochester, NY 1467, USA August 8, 008 Reference: Much of the material

More information

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

State Estimation with ARMarkov Models

State Estimation with ARMarkov Models Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,

More information

Fig. 4. Example of Predicted Workers. Fig. 3. A Framework for Tackling the MQA Problem.

Fig. 4. Example of Predicted Workers. Fig. 3. A Framework for Tackling the MQA Problem. 217 IEEE 33rd International Conference on Data Engineering Prediction-Based Task Assignment in Satial Crowdsourcing Peng Cheng #, Xiang Lian, Lei Chen #, Cyrus Shahabi # Hong Kong University of Science

More information

Finite Mixture EFA in Mplus

Finite Mixture EFA in Mplus Finite Mixture EFA in Mlus November 16, 2007 In this document we describe the Mixture EFA model estimated in Mlus. Four tyes of deendent variables are ossible in this model: normally distributed, ordered

More information

arxiv:math/ v4 [math.gn] 25 Nov 2006

arxiv:math/ v4 [math.gn] 25 Nov 2006 arxiv:math/0607751v4 [math.gn] 25 Nov 2006 On the uniqueness of the coincidence index on orientable differentiable manifolds P. Christoher Staecker October 12, 2006 Abstract The fixed oint index of toological

More information

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4 Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work

More information

Uncertainty Modeling with Interval Type-2 Fuzzy Logic Systems in Mobile Robotics

Uncertainty Modeling with Interval Type-2 Fuzzy Logic Systems in Mobile Robotics Uncertainty Modeling with Interval Tye-2 Fuzzy Logic Systems in Mobile Robotics Ondrej Linda, Student Member, IEEE, Milos Manic, Senior Member, IEEE bstract Interval Tye-2 Fuzzy Logic Systems (IT2 FLSs)

More information

Quantitative estimates of propagation of chaos for stochastic systems with W 1, kernels

Quantitative estimates of propagation of chaos for stochastic systems with W 1, kernels oname manuscrit o. will be inserted by the editor) Quantitative estimates of roagation of chaos for stochastic systems with W, kernels Pierre-Emmanuel Jabin Zhenfu Wang Received: date / Acceted: date Abstract

More information

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces Abstract and Alied Analysis Volume 2012, Article ID 264103, 11 ages doi:10.1155/2012/264103 Research Article An iterative Algorithm for Hemicontractive Maings in Banach Saces Youli Yu, 1 Zhitao Wu, 2 and

More information