The space requirement of m-ary search trees: distributional asymptotics for m 27
|
|
- Abel Leonard
- 6 years ago
- Views:
Transcription
1 1 The space requirement of m-ary search trees: distributional asymptotics for m 7 James Allen Fill 1 and Nevin Kapur 1 Applied Mathematics and Statistics, The Johns Hopkins University, 3400 N. Charles St., Baltimore MD Computer Science, California Institute of Technology, MC 56-80, 100 E.California Blvd., Pasadena CA 9115 Abstract. We study the space requirement of m-ary search trees under the random permutation model when m 7 is fixed. Chauvin and Pouyanne have shown recently that X n, the space requirement of an m-ary search tree on n keys, equals µ(n Re [Λn λ ] + ɛ n n Re λ, where µ and λ are certain constants, Λ is a complex-valued random variable, and ɛ n 0 a.s. and in L as n. Using the contraction method, we identify the distribution of Λ. Keywords. m-ary search trees, space requirement, limiting distributions, contraction method. 1 Introduction We start by giving a brief overview of search trees, which are fundamental data structures in computer science used in searching and sorting. For integer m, the m-ary search tree, or multiway tree, generalizes the binary search tree. The quantity m is called the branching factor. According to [10], search trees of branching factors higher than were first suggested by Muntz and Uzgalis [1] to solve internal memory problems with large quantities of data. For more background we refer the reader to [7, 8] and [10]. An m-ary tree is a rooted tree with at most m children for each node (vertex, each child of a node being distinguished as one of m possible types. Recursively expressed, an m-ary tree either is empty or consists of a distinguished node (called the root together with an ordered m-tuple of subtrees, each of which is an m-ary tree. An m-ary search tree is an m-ary tree in which each node has the capacity to contain m 1 elements of some linearly ordered set, called the set of keys. In typical implementations of m-ary search trees, the keys at each node are stored in increasing order and at each node one has m pointers to the subtrees. By spreading the input data in m directions instead of only, as is the case for a binary search tree, one seeks to have shorter path lengths and thus quicker searches. We consider the space of m-ary search trees on n keys, and assume that the keys are linearly ordered. Hence, without loss of generality, we can take the set of keys to be [n] := {1,,...,n}. We construct an m-ary search tree from a sequence s of n distinct keys in the following way: (i If n < m, then all the keys are stored in the root node in increasing order. Research supported by NSF grant DMS and by The Johns Hopkins University s Acheson J. Duncan Fund for the Advancement of Research in Statistics. Research partially supported by NSF grant
2 (ii If n m, then the first m 1 keys in the sequence are stored in the root in increasing order, and the remaining n (m 1 keys are stored in the subtrees subject to the condition that if σ 1 < σ < < σ m 1 denotes the ordered sequence of keys in the root, then the keys in the jth subtree are those that lie between σ j 1 and σ j, where σ 0 := 0 and σ m := n + 1, sequenced as in s. (iii All the subtrees are m-ary search trees that satisfy conditions (i, (ii, and (iii. For example the m-ary search constructed from the sequence (10,7,1,4,1,8,5,6,9,14,11,,15,13,3 is show in Figure 1. Note that empty nodes (also called external nodes are represented as circles in the figure; m such nodes arise as children of a given node when that node becomes filled to its capacity of m 1 keys. In this paper the total number of nodes (empty and nonempty in an m-ary search tree is called the space requirement of the tree. Fig. 1. An m-ary search tree with space requirement 13. The uniform distribution on the space of permutations of [n] induces a distribution of the space of m-ary search trees with n keys. This is known as the random permutation model. Several authors have studied the limiting distribution of the space requirement under the random permutation model. Mahmoud and Pittel [11] showed that when m 15, the limiting distribution is normal. The result was later extended to include m 6 by Lew and Mahmoud [9]. Chern and Hwang [3] proved that when m 7, the space requirement centered by its mean and scaled by its standard deviation does not have a limiting distribution. Our result, stated as Theorem 1, for the case m 7 was inspired by a recent development (stated at the beginning of Section of Chauvin and Pouyanne []. Summary Let X n denote the space requirement of an m-ary search tree on n keys chosen under the random permutation model. Recently, Chauvin and Pouyanne [] have used martingale techniques to show that when m 7, we have X n = X n + n σ ɛ n, where 1 X n := H m 1 (n Re Λ], (1 [nλ
3 3 with Λ some complex-valued random variable and ɛ n 0 a.s. and in L. [In fact, they derive the asymptotics of the random vector (S n (0,...,S n (m 1, where S n (i denotes the number of nodes with i keys in a tree with n keys, but we shall be content here to study X n = m 1 i=0 S(i n.] In this representation, λ = σ + iτ is the root of the polynomial φ(z φ m (z := (z + 1 (z + m 1 m! ( having second-largest real part and positive imaginary part. It is our goal to describe the distribution of the random variable Λ. To begin, we define the following distributional transform T on M (µ, the space of probability distributions with a certain mean µ defined at (7 and finite second absolute moment: ( m T : M (µ M (µ, L(W L S λ k W k, (3 where (W k m are independent copies of W. Here S (S 1,...,S m is the vector of spacings of m 1 independent Uniform(0,1 random variables U 1,...,U m 1 ; i.e., if U (1,...,U (m 1 are their order statistics and U (0 := 0, U (m := 1, then S j := U (j U (j 1, j = 1,...,m. (4 Furthermore, we take S to be independent of (W k m. Next, define the metric d on M (µ by d (F,G := min{ X Y : L(X = F, L(Y = G}, with X := (E X 1/ denoting the L -norm. In the sequel, for notational convenience we will write d (X,Y instead of d (L(X, L(Y. Our main result is the following. (See the remark below Lemma 7 for a strengthening. Theorem 1. Let X n denote the space requirement of an m-ary search tree on n keys under the random permutation model with m 7. Define V n := X n 1 (n + 1 H m 1 and V n := Re [n λ Y ]. Here Y is a random variable with distribution equal to the unique fixed point L(Y of the distributional transform (3. Then d (V n, V n = o(n σ and consequently Λ has the same distribution as Y. The proof of Theorem 1 is presented in Section 3, with the existence of the unique fixed point established in Section 3.1 and bounds on the d -distance derived in Section 3.. n,...,s n (m 1 Remark. As discussed in [] and [6], the study of the random vector (S (0 can be recast as a generalized Pólya urn scheme which in turn can be studied by embedding into a continuous-time Markov multitype branching process. Janson [6] obtains asymptotic distributional results for a very general class of urn schemes and multitype branching processes. These include results for m-ary search trees, with (1 as a notable example. We anticipate that our contraction-method technique for identifying L(Λ in (1 will extend quite generally to oscillatory cases of Janson s results; this is the subject of ongoing research.
4 4 In the sequel we will use 1 =: λ 1,λ,...,λ m 1 to denote the m 1 roots of ( in nonincreasing order of real parts and roots with positive imaginary parts listed before their conjugates. In [10, 3.3] and [5], the polynomial ψ(λ = φ(λ 1 is considered. The properties of the roots of φ that we employ follow immediately from those known for the roots of ψ. 3 Proofs As preliminaries, note that the space requirement X n has initial conditions X 0 = X 1 = = X m = 1, and for n m 1 that the number of keys not stored in the root is n := n (m 1. It is well known that, under the random permutation model, X n satisfies the distributional recurrence X n L = m X (k J k + 1, n m 1, (5 where L = denotes equality in law (i.e., in distribution, and where, on the right, the random vector J (J 1,...,J m is uniformly distributed over all m-tuples (j 1,...,j m of nonnegative integers with j j m = n ; for each k = 1,...,m, we have X (k L j = X j ; the quantities J;X (1 0,...,X(1 n ;X( 0,...,X( n ;...;X(m 0,...,X (m n are all independent. Using (5, we get a distributional recurrence for V n, with notation as for the X s: V n L = m V (k J k, n m 1. (6 The initial conditions here are V j = 1 j+1 H m 1 for j = 0,1,...,m. The asymptotics of the mean of V n can be derived using [5, Equation (.7]: EV n = µn λ + µn λ3 + O(n Re λ4, (7 where µ is a constant. Note that no two roots of ( have the same real part unless they are mutually conjugate, so that Reλ 4 < Re λ 3 = Re λ = σ. For the reader s convenience, we state here a part of the Asymptotic Transfer Theorem of [5]. We will use this result in Section 3.. The constant K can be expressed in terms of K, but we shall have no use here for such an expression. Proposition. For fixed m, consider the recurrence a n = b n + ( m n m 1 n j=0 ( n 1 j a j, n m 1, m with specified initial conditions (a j m j=0. If b n = Kn v + o(n v with v > 1 and K a constant, then a n = K n v + o(n v where K is a constant.
5 5 3.1 Fixed point The existence and uniqueness of the fixed point of the map T at (3 follows from the contraction method (see, e.g., [13]. Indeed a routine modification of the argument presented in [5, 6] yields that T is a contraction on M (µ with contraction factor [ ] 1/ [ ] 1/ Γ(σ + 1 m! ρ = m! = < 1, Γ(σ + m (σ + m 1 (σ + 1 since for m 7, we have σ > 1/ [10, 5]. 3. d bounds We begin by defining d n := d (V n, V n and f(t := Re t = t + t. Unless otherwise noted we will henceforth assume n m 1. Throughout j will denote a sum over all m-tuples (j 1,...,j m of nonnegative integers summing to n. By the triangle inequality, d n a n + b n, (8 where, taking (Y k m to be independent copies of the random variable Y in Theorem 1 and J and S each independent of (Y k m, a n := d (V n, f(j λ k Y k (9 and b n := d ( m f(j λ k Y k, f(n λ S λ k Y k. (10 We proceed by deriving upper bounds for a n and b n separately. The bound on b n is proved as Lemma 4. For a n a crude bound can be derived as follows. Even though this bound is not sufficient to show that d n = o(n σ, it will be employed in Lemma 6, which in turn will be used to derive the estimate that we need. Lemma 3. With a n defined at (9, a n = O(n σ. Proof. By the triangle inequality, a n V n + f(j λ k Y k = V n + m f(j λ 1 Y 1. Since J 1 n and Y 1 <, we have f(j λ 1 Y 1 = O(n σ. Using independence of the V (k s, (6, and (7, we have V n = P[J = j]e V (k j k = ( 1 n j m 1 V jk + O(n σ j = ( m n m 1 n (m 1 j=0 ( n 1 j m V j + O(n σ. It follows from Theorem that V n = O(n σ, and the result follows.
6 6 To sharpen Lemma 3, we employ the following coupling between the distributions of V n and of m f(jλ k Y k. The L distance exhibited by this coupling serves as an upper bound on the d -distance. For k = 1,...,m, let (V (k 1,V (k,...;y k be independent copies of (V 1,V,...;Y such that the coupling between V j and Y is d -optimal for each j. [To construct such a coupling, first choose optimally-coupled V 1 and Y ; having chosen (V 1,...,V j ;Y, choose V j+1 so that it is optimally-coupled with Y.] Then, with J (J k m independent of everything else, Now a n V (k J k f(j λ k Y k = j P[J = j] V (k f(j λ k Y k. (11 = = V (k (k V d + f(j λ k Y k f(j λ k Y k + E 1 k l m E [ V (k 1 k l m [ V (k f(j λ k Y k ][ V (l j l f(j λ l Y l ] f(j λ k Y k ] E [ V (l j l f(j λ l Y l ] (1 If we choose the mean EY to be µ, it follows from (7 that E [ V n f(n λ Y ] = O(n Re λ4. It follows then that the second sum in (1 is O(n Re λ4 = o(n σ uniformly in j. Thus, from (11 and (1, a n E d J k + r n, (13 where r n = o(n σ. Next, we proceed to bound b n. Lemma 4. With b n defined at (10, b n = o(n σ. Proof. We take Y 1,...,Y m to be independent copies of Y and (J,S independent of Y 1,...,Y m. The conditional distribution of J given S = s (s 1,...,s m is taken to be Multinomial(n,s. Indeed this yields the distribution of the vector of sizes of
7 7 the subtrees rooted at the root of a random m-ary search tree [4]. Then b n f(j λ k Y k f(n λ S λ k Y k f(j λ k Y k f(n λ S λ k Y k [J λ k (ns k λ ]Y k (by definition of f m = Y J λ k (ns k λ (by independence = m Y J λ 1 (ns 1 λ. (by symmetry We know that Y <, and by Lemma 5 to follow the last factor above is o(n σ. Lemma 5. With σ > 1/ denoting Re λ, J λ 1 (ns 1 λ = o(n σ. Proof. Given ɛ > 0 we will show that the L -norm in question is bounded by a constant times ɛ 1/ n σ. The lemma then follows by letting ɛ 0. Observe that J λ 1 (ns 1 λ = E J λ 1 (ns 1 λ = EE [ J λ 1 (ns 1 λ S 1 ]. (14 Until further notice assume s > ɛ, and note that the conditional expectation E[ J λ 1 (ns 1 λ S 1 = s] equals P[J 1 = j S 1 = s] j λ (ns λ = n j=0 0 j n(s ɛ + n(s ɛ<j<n(s+ɛ + n(s+ɛ j n The conditional distribution of J 1 given S 1 = s is Binomial(n,s. The last sum on the right is o(1 uniformly in s since, by [7, Ex ], P[J 1 n(s + ɛ S 1 = s] P[J 1 n (s + ɛ S 1 = s] exp ( ɛ n /. For the first sum observe that, for n large enough (independently of s, [ ( P[J 1 n(s ɛ S 1 = s] P J 1 n s ɛ ] S1 = s exp( ɛ n /8, the last inequality being a consequence of the aforementioned exercise. Thus the first sum is also o(1 uniformly in s. On the other hand, for the range of summation in the middle sum, by the mean value theorem and the assumed inequality ɛ < s/ we have ( λ j s λ n ɛ λ max ζ (s ɛ,s+ɛ ζ σ 1 ɛ λ c σ s σ 1,.
8 8 where c σ is (3/ σ 1 if σ 1 and (1/ σ 1 if σ < 1. Thus j λ (ns λ = n σ ( j n λ s λ Hence the middle sum is at most ɛ λ c σs (σ 1 n σ. Note that S 1 has distribution Beta(1,m and that since σ > 1/. So Finally, ɛ 0 1 ɛ 1 0 s (σ 1 (1 s m 1 ds = ɛ λ c σs (σ 1 n σ. Γ(mΓ(σ 1 Γ(m + σ 1 < E[ J λ 1 (ns 1 λ S 1 = s]p[s 1 ds] constant ɛ n σ. E[ J λ 1 (ns 1 λ S 1 = s]p[s 1 ds] Combining (8 and (13, we get a n E (a Jk + b Jk + r n = E constant n σ P[S 1 ɛ] constant ɛn σ. a J k + E a Jk b Jk + E b J k + r n. (15 Next we bound the terms on the right-hand side, so that (15 will yield a recursive inequality. Lemma 6. E b J k = o(n σ. Proof. By linearity of expectation and symmetry, E b J k = Eb J k = meb J 1. Now, the conditional distribution of J 1 given S 1 = s is Binomial(n,s. We show that the conditional expectation E[b J 1 S 1 = s] is o(n σ. To that end, let X be distributed Binomial(n,s. For ɛ > 0, n Eb X = P[X = j]b j = +. j=0 0 j n(s ɛ n(s ɛ j n Now an argument similar to the one used in the proof of Lemma 5 can be employed. The first sum on the right is o(n σ. On the other hand, we use the fact that b n = o(n σ from Lemma 4 to conclude that the second sum is o(n σ.
9 9 Lemma 7. E a Jk b Jk = o(n σ. Proof. The proof (using the crude bound on a n established in Lemma 3 is very similar to that of Lemma 6. We omit the details. We now complete the proof of Theorem 1. Using (15 and Lemmas 7 and 6 we find a n E = ( m n m 1 a J k + g n = 1 ( n m 1 j n (m 1 j=0 ( n 1 j m a + g n = ( m n m 1 j a j + g n, a j 1 + g n where g n = o(n σ. It follows from Proposition that a n = o(n σ, so that d n a n + b n = o(n σ, as desired. Remark. The o-estimates in Lemmas 4 7 can be improved to O-estimates. In the proof of Lemma 5, choosing ɛ as a function of n (specifically, taking ɛ n to be a suitable constant multiple of n 1/ log n sharpens the estimate o(n σ to O(n σ 1 4 log n, so that b n = O(n σ 1 4 log n in Lemma 4. In turn, Lemmas 6 and 7 are then immediately strengthened to O(n σ 1 lnn and O(n σ 1 4 log n, respectively. This leads to d (V n, V n = O(n Re λ4 + O(n σ 1 8 (log n 1 4. Numerics strongly support the conjecture that σ Re λ 4 0 as m. If this is true, then d (V n, V n is O(n Re λ4 whenever m Due to the presence of r n = O(n Re λ4 in (13, this large-m rate of convergence cannot be improved by the methods of this paper and presumably is the exact rate. Finally, to prove equality in distribution of Λ and Y, we show that d (Λ,Y = 0. Indeed with Λ = Λ e iθ and Y = Y e it, we have d ( Re(n λ Λ,Re (n λ Y = d ( Re(n σ+iτ Λ e iθ,re (n σ+iτ Y e it = d (n σ Λ cos(τ lnn + Θ,n σ Y cos(τ lnn + T. But d ( Re(n λ Λ,Re (n λ Y = o(n σ so that, as n, d ( Λ cos(τ lnn + Θ, Y cos(τ lnn + T 0. For any fixed φ [0,π we can choose n such that (τ lnn mod π φ. Then Λ cos(φ + Θ and Y cos(φ + T have the same distribution. It follows from the Cramer Wold device [1, Theorem 9.4] that the random vectors ( Λ cos Θ, Λ sin Θ and ( Y cos T, Y sin T have the same distribution. In particular, Λ = Λ e iθ and Y = Y e it have the same distribution, as claimed. This completes the proof of Theorem 1.
10 10 References 1. P. Billingsley. Probability and measure. John Wiley & Sons Inc., New York, third edition, A Wiley-Interscience Publication.. B. Chauvin and N. Pouyanne. m-ary search trees when m 7: a strong asymptotics for the space requirements. Random Structures Algorithms, 4(: , H.-H. Chern and H.-K. Hwang. Phase changes in random m-ary search trees and generalized quicksort. Random Structures Algorithms, 19(3-4: , 001. Analysis of algorithms (Krynica Morska, L. Devroye. Universal limit laws for depths in random trees. SIAM J. Comput., 8(: (electronic, J. A. Fill and N. Kapur. Transfer theorems and asymptotic distributional results for m-ary search trees, arxiv:math.pr/ Submitted for publication. 6. S. Janson. Functional limit theorems for multitype branching processes and generalized Pólya urns. Stochastic Process. Appl., 110(:177 45, D. E. Knuth. The art of computer programming. Volume 1. Addison-Wesley Publishing Co., Reading, Mass.-London-Don Mills, Ont., 3rd edition, D. E. Knuth. The art of computer programming. Volume 3. Addison-Wesley Publishing Co., Reading, Mass.-London-Don Mills, Ont., nd edition, W. Lew and H. M. Mahmoud. The joint distribution of elastic buckets in multiway search trees. SIAM J. Comput., 3(5: , H. M. Mahmoud. Evolution of random search trees. John Wiley & Sons Inc., New York, 199. A Wiley-Interscience Publication. 11. H. M. Mahmoud and B. Pittel. Analysis of the space of search trees under the random insertion algorithm. J. Algorithms, 10(1:5 75, R. R. Muntz and R. C. Uzgalis. Dynamic storage allocation for binary search trees in a two-level memory. In Proceedings of Princeton Conference on Information Sciences and Systems, volume 4, pages , U. Rösler and L. Rüschendorf. The contraction method for recursive algorithms. Algorithmica, 9(1-:3 33, 001. Average-case analysis of algorithms (Princeton, NJ, 1998.
arxiv: v1 [math.pr] 21 Mar 2014
Asymptotic distribution of two-protected nodes in ternary search trees Cecilia Holmgren Svante Janson March 2, 24 arxiv:4.557v [math.pr] 2 Mar 24 Abstract We study protected nodes in m-ary search trees,
More informationAsymptotic distribution of two-protected nodes in ternary search trees
Asymptotic distribution of two-protected nodes in ternary search trees Cecilia Holmgren Svante Janson March 2, 204; revised October 5, 204 Abstract We study protected nodes in m-ary search trees, by putting
More informationCombinatorial/probabilistic analysis of a class of search-tree functionals
Combinatorial/probabilistic analysis of a class of search-tree functionals Jim Fill jimfill@jhu.edu http://www.mts.jhu.edu/ fill/ Mathematical Sciences The Johns Hopkins University Joint Statistical Meetings;
More informationarxiv:math.pr/ v1 17 May 2004
Probabilistic Analysis for Randomized Game Tree Evaluation Tämur Ali Khan and Ralph Neininger arxiv:math.pr/0405322 v1 17 May 2004 ABSTRACT: We give a probabilistic analysis for the randomized game tree
More informationPartial match queries in random quadtrees
Partial match queries in random quadtrees Nicolas Broutin nicolas.broutin@inria.fr Projet Algorithms INRIA Rocquencourt 78153 Le Chesnay France Ralph Neininger and Henning Sulzbach {neiningr, sulzbach}@math.uni-frankfurt.de
More informationEverything You Always Wanted to Know about Quicksort, but Were Afraid to Ask. Marianne Durand
Algorithms Seminar 200 2002, F. Chyzak (ed., INRIA, (2003, pp. 57 62. Available online at the URL http://algo.inria.fr/seminars/. Everything You Always Wanted to Know about Quicksort, but Were Afraid to
More informationMA008/MIIZ01 Design and Analysis of Algorithms Lecture Notes 3
MA008 p.1/37 MA008/MIIZ01 Design and Analysis of Algorithms Lecture Notes 3 Dr. Markus Hagenbuchner markus@uow.edu.au. MA008 p.2/37 Exercise 1 (from LN 2) Asymptotic Notation When constants appear in exponents
More informationDESTRUCTION OF VERY SIMPLE TREES
DESTRUCTION OF VERY SIMPLE TREES JAMES ALLEN FILL, NEVIN KAPUR, AND ALOIS PANHOLZER Abstract. We consider the total cost of cutting down a random rooted tree chosen from a family of so-called very simple
More informationAlmost sure asymptotics for the random binary search tree
AofA 10 DMTCS proc. AM, 2010, 565 576 Almost sure asymptotics for the rom binary search tree Matthew I. Roberts Laboratoire de Probabilités et Modèles Aléatoires, Université Paris VI Case courrier 188,
More informationDependence between Path Lengths and Size in Random Trees (joint with H.-H. Chern, H.-K. Hwang and R. Neininger)
Dependence between Path Lengths and Size in Random Trees (joint with H.-H. Chern, H.-K. Hwang and R. Neininger) Michael Fuchs Institute of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan
More informationLIMITING DISTRIBUTIONS FOR ADDITIVE FUNCTIONALS ON CATALAN TREES
LIMITING DISTRIBUTIONS FOR ADDITIVE FUNCTIONALS ON CATALAN TREES JAMES ALLEN FILL AND NEVIN KAPUR Abstract. Additive tree functionals represent the cost of many divide-andconquer algorithms. We derive
More informationPartitions with Distinct Multiplicities of Parts: On An Unsolved Problem Posed By Herbert Wilf
Partitions with Distinct Multiplicities of Parts: On An Unsolved Problem Posed By Herbert Wilf James Allen Fill Department of Applied Mathematics and Statistics The Johns Hopkins University 3400 N. Charles
More informationThe Moments of the Profile in Random Binary Digital Trees
Journal of mathematics and computer science 6(2013)176-190 The Moments of the Profile in Random Binary Digital Trees Ramin Kazemi and Saeid Delavar Department of Statistics, Imam Khomeini International
More informationLIMIT LAWS FOR SUMS OF FUNCTIONS OF SUBTREES OF RANDOM BINARY SEARCH TREES
LIMIT LAWS FOR SUMS OF FUNCTIONS OF SUBTREES OF RANDOM BINARY SEARCH TREES Luc Devroye luc@cs.mcgill.ca Abstract. We consider sums of functions of subtrees of a random binary search tree, and obtain general
More informationCSCE 222 Discrete Structures for Computing. Review for Exam 2. Dr. Hyunyoung Lee !!!
CSCE 222 Discrete Structures for Computing Review for Exam 2 Dr. Hyunyoung Lee 1 Strategy for Exam Preparation - Start studying now (unless have already started) - Study class notes (lecture slides and
More informationSpeeding up the Dreyfus-Wagner Algorithm for minimum Steiner trees
Speeding up the Dreyfus-Wagner Algorithm for minimum Steiner trees Bernhard Fuchs Center for Applied Computer Science Cologne (ZAIK) University of Cologne, Weyertal 80, 50931 Köln, Germany Walter Kern
More informationFrom trees to seeds: on the inference of the seed from large trees in the uniform attachment model
From trees to seeds: on the inference of the seed from large trees in the uniform attachment model Sébastien Bubeck Ronen Eldan Elchanan Mossel Miklós Z. Rácz October 20, 2014 Abstract We study the influence
More informationQuivers of Period 2. Mariya Sardarli Max Wimberley Heyi Zhu. November 26, 2014
Quivers of Period 2 Mariya Sardarli Max Wimberley Heyi Zhu ovember 26, 2014 Abstract A quiver with vertices labeled from 1,..., n is said to have period 2 if the quiver obtained by mutating at 1 and then
More informationChapter 11. Min Cut Min Cut Problem Definition Some Definitions. By Sariel Har-Peled, December 10, Version: 1.
Chapter 11 Min Cut By Sariel Har-Peled, December 10, 013 1 Version: 1.0 I built on the sand And it tumbled down, I built on a rock And it tumbled down. Now when I build, I shall begin With the smoke from
More informationApproximating the Limiting Quicksort Distribution
Approximating the Limiting Quicksort Distribution James Allen Fill 1 Department of Mathematical Sciences The Johns Hopkins University jimfill@jhu.edu and http://www.mts.jhu.edu/~fill/ and Svante Janson
More informationMath 259: Introduction to Analytic Number Theory Functions of finite order: product formula and logarithmic derivative
Math 259: Introduction to Analytic Number Theory Functions of finite order: product formula and logarithmic derivative This chapter is another review of standard material in complex analysis. See for instance
More informationMonochromatic Boxes in Colored Grids
Monochromatic Boxes in Colored Grids Joshua Cooper, Stephen Fenner, and Semmy Purewal October 16, 008 Abstract A d-dimensional grid is a set of the form R = [a 1] [a d ] A d- dimensional box is a set of
More informationThe complexity of recursive constraint satisfaction problems.
The complexity of recursive constraint satisfaction problems. Victor W. Marek Department of Computer Science University of Kentucky Lexington, KY 40506, USA marek@cs.uky.edu Jeffrey B. Remmel Department
More informationThe discrepancy of permutation families
The discrepancy of permutation families J. H. Spencer A. Srinivasan P. Tetali Abstract In this note, we show that the discrepancy of any family of l permutations of [n] = {1, 2,..., n} is O( l log n),
More informationThe Subtree Size Profile of Plane-oriented Recursive Trees
The Subtree Size Profile of Plane-oriented Recursive Trees Michael Fuchs Department of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan ANALCO11, January 22nd, 2011 Michael Fuchs (NCTU)
More informationRandom Dyadic Tilings of the Unit Square
Random Dyadic Tilings of the Unit Square Svante Janson, Dana Randall and Joel Spencer June 24, 2002 Abstract A dyadic rectangle is a set of the form R = [a2 s, (a+1)2 s ] [b2 t, (b+1)2 t ], where s and
More informationShort cycles in random regular graphs
Short cycles in random regular graphs Brendan D. McKay Department of Computer Science Australian National University Canberra ACT 0200, Australia bdm@cs.anu.ed.au Nicholas C. Wormald and Beata Wysocka
More informationNON-FRINGE SUBTREES IN CONDITIONED GALTON WATSON TREES
NON-FRINGE SUBTREES IN CONDITIONED GALTON WATSON TREES XING SHI CAI AND SVANTE JANSON Abstract. We study ST n, the number of subtrees in a conditioned Galton Watson tree of size n. With two very different
More informationAsymptotic Analysis of (3, 2, 1)-Shell Sort
Asymptotic Analysis of (3, 2, 1)-Shell Sort R.T. Smythe, 1 J.A. Wellner 2 * 1 Department of Statistics, Oregon State University, Corvallis, OR 97331; e-mail: smythe@stat.orst.edu 2 Statistics, University
More informationOn finding a minimum spanning tree in a network with random weights
On finding a minimum spanning tree in a network with random weights Colin McDiarmid Department of Statistics University of Oxford Harold S. Stone IBM T.J. Watson Center 30 August 1996 Theodore Johnson
More informationONLINE APPENDIX TO: NONPARAMETRIC IDENTIFICATION OF THE MIXED HAZARD MODEL USING MARTINGALE-BASED MOMENTS
ONLINE APPENDIX TO: NONPARAMETRIC IDENTIFICATION OF THE MIXED HAZARD MODEL USING MARTINGALE-BASED MOMENTS JOHANNES RUF AND JAMES LEWIS WOLTER Appendix B. The Proofs of Theorem. and Proposition.3 The proof
More informationMAXIMAL CLADES IN RANDOM BINARY SEARCH TREES
MAXIMAL CLADES IN RANDOM BINARY SEARCH TREES SVANTE JANSON Abstract. We study maximal clades in random phylogenetic trees with the Yule Harding model or, equivalently, in binary search trees. We use probabilistic
More informationOn the Properties of a Tree-Structured Server Process
On the Properties of a Tree-Structured Server Process J. Komlos Rutgers University A. Odlyzko L. Ozarow L. A. Shepp AT&T Bell Laboratories Murray Hill, New Jersey 07974 I. INTRODUCTION In this paper we
More informationIntroduction and Preliminaries
Chapter 1 Introduction and Preliminaries This chapter serves two purposes. The first purpose is to prepare the readers for the more systematic development in later chapters of methods of real analysis
More informationk-protected VERTICES IN BINARY SEARCH TREES
k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from
More informationThe Number of Bit Comparisons Used by Quicksort: An Average-case Analysis
The Number of Bit Comparisons Used by Quicksort: An Average-case Analysis James Allen Fill Svante Janson Abstract The analyses of many algorithms and data structures (such as digital search trees) for
More informationCMPUT 675: Approximation Algorithms Fall 2014
CMPUT 675: Approximation Algorithms Fall 204 Lecture 25 (Nov 3 & 5): Group Steiner Tree Lecturer: Zachary Friggstad Scribe: Zachary Friggstad 25. Group Steiner Tree In this problem, we are given a graph
More informationMath 259: Introduction to Analytic Number Theory Functions of finite order: product formula and logarithmic derivative
Math 259: Introduction to Analytic Number Theory Functions of finite order: product formula and logarithmic derivative This chapter is another review of standard material in complex analysis. See for instance
More informationOn the Set of Limit Points of Normed Sums of Geometrically Weighted I.I.D. Bounded Random Variables
On the Set of Limit Points of Normed Sums of Geometrically Weighted I.I.D. Bounded Random Variables Deli Li 1, Yongcheng Qi, and Andrew Rosalsky 3 1 Department of Mathematical Sciences, Lakehead University,
More informationRandom trees and branching processes
Random trees and branching processes Svante Janson IMS Medallion Lecture 12 th Vilnius Conference and 2018 IMS Annual Meeting Vilnius, 5 July, 2018 Part I. Galton Watson trees Let ξ be a random variable
More informationGENERALIZED STIRLING PERMUTATIONS, FAMILIES OF INCREASING TREES AND URN MODELS
GENERALIZED STIRLING PERMUTATIONS, FAMILIES OF INCREASING TREES AND URN MODELS SVANTE JANSON, MARKUS KUBA, AND ALOIS PANHOLZER ABSTRACT. Bona [6] studied the distribution of ascents, plateaux and descents
More informationA Note on the Transcendence of Zeros of a Certain Family of Weakly Holomorphic Forms
A Note on the Transcendence of Zeros of a Certain Family of Weakly Holomorphic Forms Jennings-Shaffer C. & Swisher H. (014). A Note on the Transcendence of Zeros of a Certain Family of Weakly Holomorphic
More informationPartitions with Distinct Multiplicities of Parts: On An Unsolved Problem Posed By Herbert Wilf
Partitions with Distinct Multiplicities of Parts: On An Unsolved Problem Posed By Herbert Wilf arxiv:1203.2670v1 [math.co] 12 Mar 2012 James Allen Fill Department of Applied Mathematics and Statistics
More informationPROTECTED NODES AND FRINGE SUBTREES IN SOME RANDOM TREES
PROTECTED NODES AND FRINGE SUBTREES IN SOME RANDOM TREES LUC DEVROYE AND SVANTE JANSON Abstract. We study protected nodes in various classes of random rooted trees by putting them in the general context
More informationErdős-Renyi random graphs basics
Erdős-Renyi random graphs basics Nathanaël Berestycki U.B.C. - class on percolation We take n vertices and a number p = p(n) with < p < 1. Let G(n, p(n)) be the graph such that there is an edge between
More informationCounting independent sets up to the tree threshold
Counting independent sets up to the tree threshold Dror Weitz March 16, 2006 Abstract We consider the problem of approximately counting/sampling weighted independent sets of a graph G with activity λ,
More informationMatthew Rathkey, Roy Wiggins, and Chelsea Yost. May 27, 2013
Pólya Urn Models Matthew Rathkey, Roy Wiggins, and Chelsea Yost May 7, 0 Urn Models In terms of concept, an urn model is simply a model for simulating chance occurrences and thereby representing many problems
More informationLecture 1: Brief Review on Stochastic Processes
Lecture 1: Brief Review on Stochastic Processes A stochastic process is a collection of random variables {X t (s) : t T, s S}, where T is some index set and S is the common sample space of the random variables.
More informationAverage Case Analysis of QuickSort and Insertion Tree Height using Incompressibility
Average Case Analysis of QuickSort and Insertion Tree Height using Incompressibility Tao Jiang, Ming Li, Brendan Lucier September 26, 2005 Abstract In this paper we study the Kolmogorov Complexity of a
More informationPartitioning Metric Spaces
Partitioning Metric Spaces Computational and Metric Geometry Instructor: Yury Makarychev 1 Multiway Cut Problem 1.1 Preliminaries Definition 1.1. We are given a graph G = (V, E) and a set of terminals
More informationDistance between multinomial and multivariate normal models
Chapter 9 Distance between multinomial and multivariate normal models SECTION 1 introduces Andrew Carter s recursive procedure for bounding the Le Cam distance between a multinomialmodeland its approximating
More informationOn Differentiability of Average Cost in Parameterized Markov Chains
On Differentiability of Average Cost in Parameterized Markov Chains Vijay Konda John N. Tsitsiklis August 30, 2002 1 Overview The purpose of this appendix is to prove Theorem 4.6 in 5 and establish various
More information1 Approximate Quantiles and Summaries
CS 598CSC: Algorithms for Big Data Lecture date: Sept 25, 2014 Instructor: Chandra Chekuri Scribe: Chandra Chekuri Suppose we have a stream a 1, a 2,..., a n of objects from an ordered universe. For simplicity
More informationGRAPHS CONTAINING TRIANGLES ARE NOT 3-COMMON
GRAPHS CONTAINING TRIANGLES ARE NOT 3-COMMON JAMES CUMMINGS AND MICHAEL YOUNG Abstract. A finite graph G is k-common if the minimum (over all k- colourings of the edges of K n) of the number of monochromatic
More informationMath 324 Summer 2012 Elementary Number Theory Notes on Mathematical Induction
Math 4 Summer 01 Elementary Number Theory Notes on Mathematical Induction Principle of Mathematical Induction Recall the following axiom for the set of integers. Well-Ordering Axiom for the Integers If
More informationMatchings in hypergraphs of large minimum degree
Matchings in hypergraphs of large minimum degree Daniela Kühn Deryk Osthus Abstract It is well known that every bipartite graph with vertex classes of size n whose minimum degree is at least n/2 contains
More informationAssignment 2 : Probabilistic Methods
Assignment 2 : Probabilistic Methods jverstra@math Question 1. Let d N, c R +, and let G n be an n-vertex d-regular graph. Suppose that vertices of G n are selected independently with probability p, where
More informationModern Discrete Probability Branching processes
Modern Discrete Probability IV - Branching processes Review Sébastien Roch UW Madison Mathematics November 15, 2014 1 Basic definitions 2 3 4 Galton-Watson branching processes I Definition A Galton-Watson
More informationThe expansion of random regular graphs
The expansion of random regular graphs David Ellis Introduction Our aim is now to show that for any d 3, almost all d-regular graphs on {1, 2,..., n} have edge-expansion ratio at least c d d (if nd is
More informationRemarks on a Ramsey theory for trees
Remarks on a Ramsey theory for trees János Pach EPFL, Lausanne and Rényi Institute, Budapest József Solymosi University of British Columbia, Vancouver Gábor Tardos Simon Fraser University and Rényi Institute,
More informationALEA, Lat. Am. J. Probab. Math. Stat. 13, (2016) B. Chauvin, D. Gardy, N. Pouyanne and D.-H. Ton-That
ALEA, Lat. Am. J. Probab. Math. Stat. 13, 605 634 (2016) B-urns B. Chauvin, D. Gardy, N. Pouyanne and D.-H. Ton-That Laboratoire de Mathématiques de Versailles, UVSQ, CNRS, Université Paris-Saclay 78035
More informationApplications of Analytic Combinatorics in Mathematical Biology (joint with H. Chang, M. Drmota, E. Y. Jin, and Y.-W. Lee)
Applications of Analytic Combinatorics in Mathematical Biology (joint with H. Chang, M. Drmota, E. Y. Jin, and Y.-W. Lee) Michael Fuchs Department of Applied Mathematics National Chiao Tung University
More informationTHE LIGHT BULB PROBLEM 1
THE LIGHT BULB PROBLEM 1 Ramamohan Paturi 2 Sanguthevar Rajasekaran 3 John Reif 3 Univ. of California, San Diego Univ. of Pennsylvania Duke University 1 Running Title: The Light Bulb Problem Corresponding
More informationA General Lower Bound on the I/O-Complexity of Comparison-based Algorithms
A General Lower ound on the I/O-Complexity of Comparison-based Algorithms Lars Arge Mikael Knudsen Kirsten Larsent Aarhus University, Computer Science Department Ny Munkegade, DK-8000 Aarhus C. August
More informationDistribution of the Number of Encryptions in Revocation Schemes for Stateless Receivers
Discrete Mathematics and Theoretical Computer Science DMTCS vol. subm., by the authors, 1 1 Distribution of the Number of Encryptions in Revocation Schemes for Stateless Receivers Christopher Eagle 1 and
More informationOn the Average Path Length of Complete m-ary Trees
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 17 2014, Article 14.6.3 On the Average Path Length of Complete m-ary Trees M. A. Nyblom School of Mathematics and Geospatial Science RMIT University
More informationOn Symmetries of Non-Plane Trees in a Non-Uniform Model
On Symmetries of Non-Plane Trees in a Non-Uniform Model Jacek Cichoń Abram Magner Wojciech Spankowski Krystof Turowski October 3, 26 Abstract Binary trees come in two varieties: plane trees, often simply
More informationRandom Bernstein-Markov factors
Random Bernstein-Markov factors Igor Pritsker and Koushik Ramachandran October 20, 208 Abstract For a polynomial P n of degree n, Bernstein s inequality states that P n n P n for all L p norms on the unit
More informationA simple branching process approach to the phase transition in G n,p
A simple branching process approach to the phase transition in G n,p Béla Bollobás Department of Pure Mathematics and Mathematical Statistics Wilberforce Road, Cambridge CB3 0WB, UK b.bollobas@dpmms.cam.ac.uk
More informationarxiv: v1 [math.co] 1 Aug 2018
REDUCING SIMPLY GENERATED TREES BY ITERATIVE LEAF CUTTING BENJAMIN HACKL, CLEMENS HEUBERGER, AND STEPHAN WAGNER arxiv:1808.00363v1 [math.co] 1 Aug 2018 ABSTRACT. We consider a procedure to reduce simply
More informationPacking and decomposition of graphs with trees
Packing and decomposition of graphs with trees Raphael Yuster Department of Mathematics University of Haifa-ORANIM Tivon 36006, Israel. e-mail: raphy@math.tau.ac.il Abstract Let H be a tree on h 2 vertices.
More informationarxiv: v1 [math.co] 22 Jan 2013
NESTED RECURSIONS, SIMULTANEOUS PARAMETERS AND TREE SUPERPOSITIONS ABRAHAM ISGUR, VITALY KUZNETSOV, MUSTAZEE RAHMAN, AND STEPHEN TANNY arxiv:1301.5055v1 [math.co] 22 Jan 2013 Abstract. We apply a tree-based
More informationStrong log-concavity is preserved by convolution
Strong log-concavity is preserved by convolution Jon A. Wellner Abstract. We review and formulate results concerning strong-log-concavity in both discrete and continuous settings. Although four different
More informationFinite Metric Spaces & Their Embeddings: Introduction and Basic Tools
Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools Manor Mendel, CMI, Caltech 1 Finite Metric Spaces Definition of (semi) metric. (M, ρ): M a (finite) set of points. ρ a distance function
More informationTHE METHOD OF CONDITIONAL PROBABILITIES: DERANDOMIZING THE PROBABILISTIC METHOD
THE METHOD OF CONDITIONAL PROBABILITIES: DERANDOMIZING THE PROBABILISTIC METHOD JAMES ZHOU Abstract. We describe the probabilistic method as a nonconstructive way of proving the existence of combinatorial
More informationFIRST ORDER SENTENCES ON G(n, p), ZERO-ONE LAWS, ALMOST SURE AND COMPLETE THEORIES ON SPARSE RANDOM GRAPHS
FIRST ORDER SENTENCES ON G(n, p), ZERO-ONE LAWS, ALMOST SURE AND COMPLETE THEORIES ON SPARSE RANDOM GRAPHS MOUMANTI PODDER 1. First order theory on G(n, p) We start with a very simple property of G(n,
More informationRates of convergence for a self-organizing scheme for binary search trees
Rates of convergence for a self-organizing scheme for binary search trees [short title: Convergence rates for self-organizing trees] by Robert P. Dobrow and James Allen Fill 1 The Johns Hopkins University
More informationFrom trees to seeds:
From trees to seeds: on the inference of the seed from large random trees Joint work with Sébastien Bubeck, Ronen Eldan, and Elchanan Mossel Miklós Z. Rácz Microsoft Research Banff Retreat September 25,
More informationNotes on Paths, Trees and Lagrange Inversion
Notes on Paths, Trees and Lagrange Inversion Today we are going to start with a problem that may seem somewhat unmotivated, and solve it in two ways. From there, we will proceed to discuss applications
More informationOn a hypergraph matching problem
On a hypergraph matching problem Noga Alon Raphael Yuster Abstract Let H = (V, E) be an r-uniform hypergraph and let F 2 V. A matching M of H is (α, F)- perfect if for each F F, at least α F vertices of
More informationHomework 6: Solutions Sid Banerjee Problem 1: (The Flajolet-Martin Counter) ORIE 4520: Stochastics at Scale Fall 2015
Problem 1: (The Flajolet-Martin Counter) In class (and in the prelim!), we looked at an idealized algorithm for finding the number of distinct elements in a stream, where we sampled uniform random variables
More informationRectangular Young tableaux and the Jacobi ensemble
Rectangular Young tableaux and the Jacobi ensemble Philippe Marchal October 20, 2015 Abstract It has been shown by Pittel and Romik that the random surface associated with a large rectangular Young tableau
More informationMaximal and Maximum Independent Sets In Graphs With At Most r Cycles
Maximal and Maximum Independent Sets In Graphs With At Most r Cycles Bruce E. Sagan Department of Mathematics Michigan State University East Lansing, MI sagan@math.msu.edu Vincent R. Vatter Department
More informationPartial Quicksort. Conrado Martínez
Partial Quicksort Conrado Martínez Abstract This short note considers the following common problem: rearrange a given array with n elements, so that the first m places contain the m smallest elements in
More informationarxiv: v1 [math.co] 29 Nov 2018
ON THE INDUCIBILITY OF SMALL TREES AUDACE A. V. DOSSOU-OLORY AND STEPHAN WAGNER arxiv:1811.1010v1 [math.co] 9 Nov 018 Abstract. The quantity that captures the asymptotic value of the maximum number of
More informationOn the discrepancy of circular sequences of reals
On the discrepancy of circular sequences of reals Fan Chung Ron Graham Abstract In this paper we study a refined measure of the discrepancy of sequences of real numbers in [0, ] on a circle C of circumference.
More informationBanach Spaces II: Elementary Banach Space Theory
BS II c Gabriel Nagy Banach Spaces II: Elementary Banach Space Theory Notes from the Functional Analysis Course (Fall 07 - Spring 08) In this section we introduce Banach spaces and examine some of their
More informationGenerating All Circular Shifts by Context-Free Grammars in Chomsky Normal Form
Generating All Circular Shifts by Context-Free Grammars in Chomsky Normal Form Peter R.J. Asveld Department of Computer Science, Twente University of Technology P.O. Box 217, 7500 AE Enschede, the Netherlands
More informationContinued fractions for complex numbers and values of binary quadratic forms
arxiv:110.3754v1 [math.nt] 18 Feb 011 Continued fractions for complex numbers and values of binary quadratic forms S.G. Dani and Arnaldo Nogueira February 1, 011 Abstract We describe various properties
More informationCSCI 3110 Assignment 6 Solutions
CSCI 3110 Assignment 6 Solutions December 5, 2012 2.4 (4 pts) Suppose you are choosing between the following three algorithms: 1. Algorithm A solves problems by dividing them into five subproblems of half
More informationLAYERED NETWORKS, THE DISCRETE LAPLACIAN, AND A CONTINUED FRACTION IDENTITY
LAYERE NETWORKS, THE ISCRETE LAPLACIAN, AN A CONTINUE FRACTION IENTITY OWEN. BIESEL, AVI V. INGERMAN, JAMES A. MORROW, AN WILLIAM T. SHORE ABSTRACT. We find explicit formulas for the conductivities of
More information0 Sets and Induction. Sets
0 Sets and Induction Sets A set is an unordered collection of objects, called elements or members of the set. A set is said to contain its elements. We write a A to denote that a is an element of the set
More informationProperly colored Hamilton cycles in edge colored complete graphs
Properly colored Hamilton cycles in edge colored complete graphs N. Alon G. Gutin Dedicated to the memory of Paul Erdős Abstract It is shown that for every ɛ > 0 and n > n 0 (ɛ), any complete graph K on
More informationENUMERATION OF TREES AND ONE AMAZING REPRESENTATION OF THE SYMMETRIC GROUP. Igor Pak Harvard University
ENUMERATION OF TREES AND ONE AMAZING REPRESENTATION OF THE SYMMETRIC GROUP Igor Pak Harvard University E-mail: pak@math.harvard.edu Alexander Postnikov Massachusetts Institute of Technology E-mail: apost@math.mit.edu
More informationMath212a1413 The Lebesgue integral.
Math212a1413 The Lebesgue integral. October 28, 2014 Simple functions. In what follows, (X, F, m) is a space with a σ-field of sets, and m a measure on F. The purpose of today s lecture is to develop the
More informationMaximum Agreement Subtrees
Maximum Agreement Subtrees Seth Sullivant North Carolina State University March 24, 2018 Seth Sullivant (NCSU) Maximum Agreement Subtrees March 24, 2018 1 / 23 Phylogenetics Problem Given a collection
More informationOn the mean connected induced subgraph order of cographs
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 71(1) (018), Pages 161 183 On the mean connected induced subgraph order of cographs Matthew E Kroeker Lucas Mol Ortrud R Oellermann University of Winnipeg Winnipeg,
More informationEnumerating split-pair arrangements
Journal of Combinatorial Theory, Series A 115 (28 293 33 www.elsevier.com/locate/jcta Enumerating split-pair arrangements Ron Graham 1, Nan Zang Department of Computer Science, University of California
More informationOn the Markov chain for the move-to-root rule for binary search trees
On the Markov chain for the move-to-root rule for binary search trees [short title: Move-to-root rule for binary search trees] by Robert P. Dobrow and James Allen Fill The Johns Hopkins University September
More informationBivariate Uniqueness in the Logistic Recursive Distributional Equation
Bivariate Uniqueness in the Logistic Recursive Distributional Equation Antar Bandyopadhyay Technical Report # 629 University of California Department of Statistics 367 Evans Hall # 3860 Berkeley CA 94720-3860
More information