The Knuth-Yao Quadrangle-Inequality Speedup is a Consequence of Total-Monotonicity

Size: px
Start display at page:

Download "The Knuth-Yao Quadrangle-Inequality Speedup is a Consequence of Total-Monotonicity"

Transcription

1 The Knuth-Yao Quadrangle-Ineuality Seedu is a Conseuence of Total-Monotonicity Wolfgang W. Bein Mordecai J. Golin Lawrence L. Larmore Yan Zhang Abstract There exist several general techniues in the literature for seeding u naive imlementations of dynamic rogramming. Two of the best known are the Knuth-Yao uadrangle ineuality seedu and the SMAWK algorithm for finding the row-minima of totally monotone matrices. Although both of these techniues use a uadrangle ineuality and seem similar they are actually uite different and have been used differently in the literature. In this aer we show that the Knuth-Yao techniue is actually a direct conseuence of total monotonicity. As well as roviding new derivations of the Knuth-Yao result, this also ermits showing how to solve the Knuth-Yao roblem directly using the SMAWK algorithm. Another conseuence of this aroach is a method for solving online versions of roblems with the Knuth-Yao roerty. The online algorithms given here are asymtotically as fast as the best reviously known static ones. For examle the Knuth-Yao techniue seeds u the standard dynamic rogram for finding the otimal binary search tree of n elements from Θ(n 3 ) down to O(n 2 ), and the results in this aer allow construction of an otimal binary search tree in an online fashion (adding a node to the left or right of the current nodes at each ste) in O(n) time er ste. We conclude by discussing how the general techniue described here is also alicable to later extensions of the Kuth-Yao result, such as those develoed Borchers and Guta. Deartment of Comuter Science, University of Nevada, Las Vegas, NV bein@cs.unlv.edu. Research suorted by NSF grant CCR Det. of Comuter Science, Hong Kong UST, Clear Water Bay, Kowloon, Hong Kong. golin@cs.ust.hk Research artially suorted by Hong Kong RGC CERG grant HKUST312/E. Deartment of Comuter Science, University of Nevada, Las Vegas, NV larmore@cs.unlv.edu. Research suorted by NSF grant CCR Det. of Comuter Science, Hong Kong UST, Clear Water Bay, Kowloon, Hong Kong. cszy@cs.ust.hk Research artially suorted by Hong Kong RGC CERG grant HKUST312/E. 1

2 1 Introduction 1.1 History The construction of otimal binary search trees is a classic otimization roblem. The inut is 2n+1 weights (robabilities) 1,..., n,, 1...., n ; i is the weight that a search is for Key i ; such a search is called successful. The value i is the weight that the search argument is unsuccessful and is for an argument between Key i and Key i+1 (where we set Key = and Key n+1 = ). Our roblem is to find an otimal binary search tree (OBST) with n internal nodes corresonding to successful searches and n + 1 leaves corresonding to unsuccessful searches that minimizes the average search time. Let d( i ) be the deth of internal node corresonding to i and d( i ) the deth of leaf corresonding to i. Then we want to find a tree that minimizes j (1 + d( j )) + k d( k ). 1 j n k n It is not hard to see that this roblem reduces to solving the following recurrence: { if i = j B i,j = j t=i+1 i + j t=i j + min i<t j {B i,t 1 + B t,j } if i < j (1) where the cost of the otimal OBST is B,n. The naive way of calculating B i,j reuires Θ(j i) time, so calculating all of the B i,j would seem to reuire Θ(n 3 ) time. In fact, this is what was done in by Gilbert and Moore in 19 [8]. More than a decade later, in 191, it was noticed by Knuth [9] that, using a comlicated amortization argument, the B i,j can all be comuted using only Θ(n 2 ) time. Around another decade later, in the early 198s, Yao [1, 1] simlified Knuth s roof and, in the rocess, showed that this dynamic rogramming seedu worked for a large class of roblems satisfying a uadrangle ineuality roerty. Many other authors then used the Knuth-Yao techniue, either imlicitly or exlicitly, to seed u different dynamic rogramming roblems. See e.g., [13, 3, ]. In the 198s a variety of researchers develoed various related techniues for exloiting roerties, such as convexity and concavity, to yield dynamic rogramming seedus; a good early survey is []. A high oint of this strand of research was the develoment in the late 198s of the linear time SMAWK algorithm [1] for finding the row-minima of totally monotone matrices. The work in [] rovides a good survey of the techniues mentioned as well as alications and later extensions. One articular extension we mention (since we will use it later) is the LARSCH algorithm of Larmore and Schieber [1] which, in some cases, ermits finding row-minima even when entries of the matrix can imlicitly deend uon other entries in the matrix (a case SMAWK cannot handle). As we shall soon see, both the Knuth-Yao (KY) and SMAWK techniues rely on an underlying uadrangle ineuality in their structure and have a similar feel. In site of this, they have until usually been thought of as being different aroaches. See, e.g., [12] which uses both KY and SMAWK to seed u different roblems. In [2] Aggarwal and Park demonstrated a relationshi between the KY roblem and totally-monotone matrices by building a 3-D monotone matrix based on the KY roblem and then using an algorithm due to Wilber [1] to find tube minima in that 3-D matrix. They left as an oen uestion the ossibility of using SMAWK directly to solve the KY roblem. The main theoretical contribution of this aer is to show that the KY techniue is really just a secial case of the use of totally monotone matrices. We first show a direct solution to the KY 2

3 roblem by decomosing it into O(n) totally-monotone O(n) O(n) matrices, ermitting direct alication of the SMAWK algorithm to yield another O(n 2 ) solution. After that we describe how the Knuth-Yao techniue itself is actually a direct conseuence of total-monotonicity of certain related matrices. Finally, we show that roblems which can be solved by the KY techniue statically in O(n 2 ) time can actually be solved in an online manner using only O(n) worst case time er ste. This is done by using a new formulation of the roblem in terms of monotonematrices, along with the LARSCH algorithm Definitions Definition 1 A two dimensional uer triangular array a(i, j), 1 i j n satisfies a uadrangle ineuality (QI) if a(i, j) + a(i, j ) a(i, j) + a(i, j ) for i i j j. Note: In some alications we will write a i,j instead of a(i,j). Definition 2 A 2 2 matrix is monotone if the minimum of the uer row is not to the right of [ ] a b the minimum of the lower row. More formally, is monotone if b < a imlies that d < c c d and b = a imlies that d c. A 2-dimensional matrix M is totally monotone if every 2 2 submatrix of M is monotone. [ ] a b Definition 3 A 2 2 matrix is Monge if a + d b + c. c d A 2-dimensional matrix M is Monge if every 2 2 submatrix of M is Monge. The imortant observations (all of which can be found in []) are Observation 1 An m n matrix M is Monge if, for all 1 i < m and 1 j < n, M(i, j) + M(i + 1, j + 1) M(i, j + 1) + M(j + 1, i) (2) Observation 2 Every Monge matrix is totally monotone. Combining the above leads to the test that we will often use: Observation 3 Let M be an m n matrix. M is totally monotone, if for all 1 i < m and 1 j < n, M(i, j) + M(i + 1, j + 1) M(i, j + 1) + M(j + 1, i). (3) 1.3 Mathematical Framework Even though both the SMAWK algorithm [1] and the Knuth-Yao (KY) seedu [9, 1, 1] use an imlicit uadrangle ineuality in their associated matrices, on second glance, they seem uite different from each other. In the SMAWK techniue, the uadrangle ineuality is on the entries of a given m n inut matrix, which can be any totally monotone matrix. 2 It is not necessary for the inut matrix to 1 We should oint out that, as discussed in more detail at the end of Section 3, an alternative online algorithm to the one resented here could be derived by careful deconstruction of the static Aggarwal-Park [2] method; somehow, this never seems to have been remarked before in the literature. 2 Note that Monge Matrices satisfy a uadrangle ineuality, but in general, a totally monotone matrix may not. However, in ractice, most alications of the SMAWK algorithm make use of Monge matrices. If the inut matrix is triangular, the missing entries are assigned the default value, reserving total monotonicity. 3

4 actually be given.all that the SMAWK algorithm reuires is that, when needed, individual entries can be calculated in O(1) (amortized) time. The outut of the SMAWK algorithm is a vector containing the row-minima of the inut matrix. If m n, the SMAWK algorithm oututs this vector in O(n) time, an order of magnitude seedu of the naive algorithm that scans all mn matrix entries. The KY techniue, by contrast, uses a uadrangle ineuality in the uer-triangular n n matrix B i,j. That is, it uses the QI roerty of its result matrix to seed u the evaluation, via dynamic rogramming, of the entries in the same result matrix. More secifically, Yao s result [1] was formulated as follows: For 1 i j n let w(i, j) be a given value and { if i = j B i,j = () w(i, j) + min i<t j {B i,t 1 + B t,j } if i < j Definition w(i, j) is monotone in the lattice of intervals if [i, j] [i, j] imlies w(i, j) w(i, j ). As an examle, it is not difficult to see that the w(i, j) = j t=i+1 i+ j t=i j of the BST recurrence (1) satisfies the uadrangle ineuality and is monotone in the lattice of intervals. Definition Let K B (i, j) = max{t : w(i, j) + B i,t 1 + B t,j = B i,j }, i.e., the largest index which achieves the minimum in (). Yao then roves two Lemmas (see Figure 1 for an examle): Lemma 1 (Lemma 2.1 in [1]) If w(i j) satisfies the uadrangle ineuality as defined in Definition 1, and is also monotone on the lattice of intervals, then the B i,j defined in () also satisfy the uadrangle ineuality. Lemma 2 (Lemma 2.2 in [1]) If the function defined in () satisfies the uadrangle ineuality then K B (i, j) K B (i, j + 1) K B (i + 1, j + 1) for i < j Lemma 1 roves that a QI in the w(i, j) imlies a QI in the B i,j. Suose then that we evaluate the values of the B i,j in the order d = 1, 2,...,n, where, for each fixed d, we evaluate all of B i,i+d, i =, 1, n d. Then Lemma 2 says that B i,i+d can be evaluated in time O(K B (i + 1, i + d) K B (i, i + d 1)). Note that n d i= (K B (i + 1, i + d) K B (i, i + d 1)) K B (n d + 1, n) n and thus all entries for fixed d can be calculated in O(n) time. Summing over all d, we see that all B i,j can be obtained in O(n 2 ) time. As mentioned, Lemma 2 and the resultant O(n 2 ) running time have usually been viewed as unrelated to the SMAWK algorithm. While they seem somewhat similar (a QI leading to an order of magnitude seedu) they aeared not to be directly connected. The main theoretical result of this aer is the observation that if the w(i, j) satisfy the QI and are monotone in the lattice of intervals, then the B i,j defined by () can be derived as the row-minima of a seuence of O(n) different totally monotone matrices, each of size O(n) O(n), where the entries in a matrix deend uon the row-minima of revious matrices in the seuence. In fact, we will show three totally different decomosition of the B i,j into O(n) totally monotone matrices. In articular, our first decomosition, will ermit the direct use of SMAWK.

5 1. Online Algorithms Generally, an online roblem is defined to be a roblem where a stream of oututs must be generated in resonse to a stream of inuts, and where those resonses must be given under a rotocol which reuires some oututs be given before all inuts are known. The online versions of the roblems in which we are interested are given below. Our goal is to achieve the otimal result, while maintaining the same asymtotic time comlexity as the offline versions. Let L R be given along with values w(i, j) for all L i j R that satisfy the QI and the monotone on lattice of intervals roerty. Let { if i = j B i,j = w(i, j) + min i<t j {B i,t 1 + B t,j } if i < j and assume all B ij for L i j R have already been calculated and stored. The Right-online roblem is: Given new values w(i, R + 1) for L i R + 1, such that w(i, j) still satisfy the QI and lattice roerty, calculate all of the values B i,r+1 for L i R + 1. The Left-online roblem is: Given new values w(l 1, j) for L 1 j R, such that w(i, j) still satisfy the QI and lattice roerty, calculate all of the values B L 1,j for L 1 j R. These online roblems restricted to the otimal binary search tree would be to construct the OBST for items Key L,...,Key R, and, at each ste, add either Key R+1, a new key to the right, or Key L 1, a new key to the left. Every time a new element is added, we want to udate the B i,j (dynamic rogramming) table and thereby construct the otimal binary search tree of the new full set of elements. (See Figure 1.) To achieve this, it is certainly ossible to recomute the entire table; however this comes at the rice of O(n 2 ) time, where n = R L + 1 is the number of keys currently in the table. What we are interested in here is the uestion of how one can handle a new key where the extra comutational work is neutral to the overall comlexity of the roblem, i.e., a new key can be added in linear time. Our goal is an algorithm in which a seuence of n online key insertions will result in a worst case O(n) er ste to maintain an otimal tree, yielding an overall run time of O(n 2 ). Unfortunately, the KY seedu cannot be used to do this. The reason that the seedu fails is that the KY seedu is actually an amortization over the evaluation of all entries when done in a articular order. In the online case, adding a new item n to reviously existing items 1, 2,...,n 1, reuires using () to comute the n new entries B i,n, in the fixed order i = n, n 1,...,1, and it is not difficult to construct an examle in which calculating these new entries in this order using () reuires Θ(n 2 ) work. We will see later that the decomosition given in section 3 ermits a fully online algorithm with no enalty in erformance, i.e., after adding the n th new key, the new B i,j can be calculated in O(n) worst case time. Furthermore, this will be true for both the left-online and right-online case.

6 Figure 1: An examle of the online case for otimal binary search trees where (,,, ) = (2, 9, 38, 8) and ( 3,,,, ) = (2, 9, 31,, 1). The leftmost table contains the B i,j values; the rightmost one, the K B (i, j) values. The unshaded entries in the table are for the roblem restricted to only keys,. The dark gray cells are the entries added to the table when key is added to the right. The light gray cells are the entries added when key is added to the left. The corresonding otimal binary search trees are also given, where circles corresond to successful searches and suares to unsuccessful ones. The values in the nodes are the weights of the nodes (not their keys). 2 The First Decomosition Definition For 1 d < n define the (n d + 1) (n + 1) matrix D d by Di,j d = { w(i, i + d) + Bi,j 1 + B j,i+d if i < j i + d n, otherwise. () Figure 2 illustrates the first decomosition. Note that () immediately imlies B i,i+d = min j n Dd i,j () so finding the row-minima of D d yields B i,i+d, i =,...,n d. Put another way, the B i,j entries on diagonal j i = d are exactly the row-minima of matrix D d. Lemma 3 If the function B i,j defined in () satisfies the QI then, for each d n, D d is a totally monotone matrix Proof : From Observation 3 it suffices to rove that Note that if i < j j + d, then from Lemma 1, D d i,j + D d i+1,j+1 D d i+1,j + D d i,j+1 () B i,j 1 + B i+1,j B i+1,j 1 + B i,j (8)

7 i j D 12 D 11 D 1 D 9 D 8 D D D D D 3 D 2 D 1 i j Row-Min B,8 B 1,9 B 2,1 B 3,11 B,12 Figure 2: The lefthand figure shows the B i,j matrix for n = 12. Each diagonal, d = i j, in the matrix will corresond to a totally monotone matrix D d. The minimal item of row i in D d will be the value B i,i+d. The righthand figure shows D 8. and Thus, B j,i+d + B j+1,i+1+d B j,i+1+d + B j+1,i+d. (9) D d i,j + D d i+1,j+1 = [w(i, i + d) + B i,j 1 + B j,i+d ] + [w(i + 1, i + d + 1) + B i+1,j + B j+1,i+1+d ] = w(i, i + d) + w(i + 1, i + d + 1) + [B i,j 1 + B i+1,j ] + [B j,i+d + B j+1,i+1+d ] w(i, i + d) + w(i + 1, i + d + 1) + [B i+1,j 1 + B i,j ] + [B j,i+d+1 + B j+1,i+d ] = [w(i + 1, i + d + 1) + B i+1,j 1 + B j,i+1+d ] + [w(i, i + d) + B i,j + B j+1,i+d ] = D d i+1,j + D d i,j+1 and () is correct (where we note that the right hand side is if i j or j i + d). Lemma Assuming that all of the row-minima of D 1, D 2,...,D d 1 have already been calculated, all of the row-minima of D d can be calculated using the SMAWK algorithm in O(n) time. Proof : From the revious lemma, D d is a totally monotone matrix. Also, by definition, its entries can be calculated in O(1) time, using the reviously calculated row-minima of D d where d < d. Thus SMAWK can be alied. Combined with () this immediately gives a new O(n 2 ) algorithm for solving the KY roblem; just run SMAWK on the D d in the order d = 1, 2,...,n 1 and reort all of the row-minima. We oint out that this techniue cannot hel us solve the online roblem as defined in subsection 1., though. To see why, suose that items 1,...,n have reviously been given, new item n + 1 has just been added, and we need to calculate the values B i,n+1 for i =,...,n. In our formulation this would corresond to adding a new bottom row to every matrix D d and creating a new matrix D n+1. In our formulation, we would need to find the row-minima of all of the n new bottom rows. Unfortunately, the SMAWK algorithm only works on the rows of matrices all at once and cannot hel to find the row-minima of a single new row.

8 i j R 1 R R 3 1 R R 1 R 1 R R 8 1 R 9 1 R 1 R 11 i j Row-Min B,8 B 1,8 B 2,8 B 3,8 B,8 B,8 B,8 B,8 R 12 Figure 3: The lefthand figure shows the B i,j matrix for n = 12. Each column in the B i,j matrix will corresond to a totally monotone matrix R m. The minimal element of row i in R m will be the value B i,m. The righthand figure shows R 8. 3 The Second & Third Decomositions So far we have seen that it is ossible to derive the KY running time via reeated calls to the SMAWK algorithm. We now see two more decomositions into totally-monotone matrices. These decomositions will trivially imly Lemma 2 (Lemma 2.1 in [1]), which is the basis of the KY seedu. Thus, the KY seedu is just a conseuence of total-monotonicity. These new decomositions will also ermit us to efficiently solve the online roblem given in subsection 1.. The second decomosition is indexed by the rightmost element seen so far. See Figure 3. Definition For 1 m n define the (m + 1) (m + 1) matrix R m by { Ri,j m w(i, m) + Bi,j 1 + B = j,m if i < j m, otherwise. (1) Note that () immediately imlies B i,m = min j m Rm i,j (11) so finding the row-minima of R m yields B i,m for i =,...,m. Put another way, the B i,j entries in column m are exactly the row minima of R m. The third decomosition is similar to the second excet that it is indexed by the leftmost element seen so far. See Figure. Definition 8 For m < n define the (n m) (n m) matrix L m by { L m w(m, j) + Bm,i 1 + B j,i = i,j if m < i j n, otherwise. (12) (For convenience, we set the row and column indices to run from (m+1)...n and not 1...(n m).) Note that () immediately imlies B m,j = min m<i j n Lm j,i (13) 8

9 i j L L 1 L 2 L 3 L L L L L 8 L 9 L 1 L 11 j i Row-Min B 8,9 B 8,1 B 8,11 B 8,12 Figure : The lefthand figure shows the B i,j matrix for n = 12. Each row in the B i,j matrix will corresond to a totally monotone matrix L m. The minimal element of row j in L m will be the value B m,j. The righthand figure shows L 8. so finding the row-minima of L m yields B m,j for j = m+1,...,n. Put another way, the B i,j entries in row m are exactly the row minima of matrix L m. Lemma If the function defined in () satisfies the QI then R m and L m are totally monotone matrices. Proof : The roofs are very similar to that of Lemma 3. Note that if i < j m, we can again use (8); writing the entries from (8) in boldface gives R m i,j + R m i+1,j+1 = [w(i, m) + B i,j 1 + B j,m ] + [w(i + 1, m) + B i+1,j + B j+1,m ] [w(i + 1, m) + B i+1,j 1 + B j,m ] + [w(i, m) + B i,j + B j+1,m ] = R m i+1,j + R m i,j+1 and thus R m is Monge (where we note that the right hand side is if i j) and thus totally monotone. If m < i < j then we again use (8) (with j relaced by j + 1) to get L m j,i + L m j+1,i+1 = [w(m, j) + B m,i 1 + B i,j ] + [w(m, j + 1) + B m,i + B i+1,j+1 ] [w(m, j + 1) + B m,i 1 + B i,j+1 ] + [w(m, j) + B m,i + B i+1,j ] = L m j+1,i + L m j,i+1 and thus L m is Monge (where we note that the right hand side is if i j) and thus totally monotone. We oint out these two decomositions immediately imly a new roof of Lemma 2 (Lemma 2.1 in [1]) which states that K B (i, j) K B (i, j + 1) K B (i + 1, j + 1). (1) To see this note that K B (i, j +1) is the location of the rightmost row-minimum of row i in matrix R j+1, while K B (i + 1, j + 1) is the location of the rightmost row-minimum of row i + 1 in matrix R j+1. Thus, the definition of total monotonicity (Definition 2) immediately gives K B (i, j + 1) K B (i + 1, j + 1). (1) 9

10 Similarly, K B (i, j) is the rightmost row-minimum of row j in L i while K B (i, j + 1) is the location of the rightmost row-minimum of row j + 1 in L i. Thus K B (i, j) K B (i, j + 1). (1) Combining (1) and (1) yields (1), which is what we want. Since the actual seedu in the KY techniue comes from an amortization argument based on (1), we have just seen that the original KY-seedu itself is also a conseuence of total monotonicity. We have still not seen how to actually calculate the B i,j using the R m and L m. Before continuing, we oint out that even though the R m are totally monotone, their row minima cannot be calculated using the SMAWK algorithm. This is because, for < i < j m, the value of entry R m i,j = w(i, m) + B i,j 1 + B j,m, which is deendent uon B j,m which is itself the row-minimum of row j in the same matrix R m. Thus, the values of the entries of R m deend uon the other entries in R m which is something that SMAWK does not allow. The same roblem occurs with the L m. We will now see that, desite this deendence, we can still use the LARSCH algorithm to find the row-minima of the R m. This will have the added advantage of solving the online roblem as well. At this oint we should note that our decomositions L m could also be derived by careful cutting of the 3-D monotone matrices of Aggarwal and Park [2] along articular lanes. Aggarwal and Park used an algorithm of Wilber [1] (derived for finding the maxima of certain concaveseuences) to find various tube maxima of their matrices, leading to another O(n 2 ) algorithm for solving the KY-roblem. In fact, even though their algorithm was resented as a static algorithm, careful decomosition of what they do ermits using it to solve what we call the left-online KYroblem. A symmetry argument could then yield a right-online algorithm. This never seems to have been noted in the literature, though. In the next section, we resent a different online algorithm, based on our decomositions and the LARSCH algorithm. Online Algorithms Without Losing the KY Seedu To execute the LARSCH algorithm, as defined in Section 3 of [1] we need only that X satisfy the following conditions: 1. X is a totally monotone n m matrix. 2. For each row index i of X, there is a column index C i such that for j > C i, X i,j = Furthermore, C i C i Let C =. If C i < j C i+1 then, for any k > i, X k,j can be evaluated in O(1) time rovided that the row minima of the first i rows are already known. If these conditions are satisfied, the LARSCH algorithm then calculates all of the row minima of X in O(n + m) time. We can now use this algorithm to derive Lemma Given that all values B i,j, m < i j n have already been calculated, all of the row-minima of L m can be calculated in O(n m) time. Given that all values B i,j, i j < m have already been calculated, all of the row-minima of R m can be calculated in O(m) time. Proof : For the first art, it is easy to see that L m satisfies the first two conditions reuired by the LARSCH algorithm with C j = j. The third condition is euivalent to saying that if C i < j C i+1, 1

11 i.e., if j = i+1, then k > i, L m k,j = Lm k,i+1 = w(m, k)+b m,i+b i+1,k can be evaluated in O(1) time rovided that the row minima of the first i rows are already known. But, w(m, k) and B i+1,k are already known and can be retrieved in O(1) time and B m,i is the row-minimum of row i of L m so this condition is trivially satisfied. Thus, all of the row-minima of the (n m) (n m) matrix L m can be calculated in O(n m) time. For the second art, set X to be the (m+1) (m+1) matrix defined by X i,j = Rm i,m j m. Then X satisfies the first two LARSCH conditions with C i = i 1. The third condition is euivalent to saying that if C i < j C i+1, i.e., if j = i, then k > i, X k,j = Rm k,m i m = w(m k, m) + B m k,m i 1 + B m i,m can be evaluated in O(1) time rovided that the row minima of the first i rows are already known. But w(m k, m) and B m k,m i 1 are already known and can be retrieved in O(1) time and B m i,m is the row-minimum of row i of X so this condition is also trivially satisfied. Thus, all of the row-minima of X and euivalently of R m can be calculated in O(m) time. Note that Lemma immediately solves the right-online and left-online roblems described in subsection 1.; Given the new values w(i, R + 1) for L i R + 1, simly find the row minima of R R+1 in time O(R L). Given the new values w(l 1, j) for L 1 j R, simly find the row minima of L L 1. We have therefore just shown that any dynamic rogramming roblem for which the KY seedu can statically imrove run time from Θ(n 3 ) to O(n 2 ) time can be solved in an online fashion in O(n) time er ste. That is, online rocessing incurs no enalty comared to static rocessing. In articular, the otimum binary search tree (as illustrated in 1.), can be maintained in O(n) time er ste as nodes are added to both its left and right. A further alication In [], Borchers and Guta extend the Knuth-Yao uadrangle ineuality. One of their major alications is finding an otimal Rectilinear Steiner Minimal Arborescence (RSMA) of a slide. A slide is a set of oints (x i, y i ) such that, if i < j, then x i < x j and y i > y j. A Rectilinear Steiner Arborescence is a directed tree in which each edge either goes u or to the right. In [11] it was shown that the minimum cost Rectilinear Steiner Arborescence connecting slide-oints (x i, y i ), (x i+1, y i+1 ),...(x j, y j ) satisfies L(i, j) = min i s<j (L i,s + L s+1,j + x s+1 x 1 + y s y j ). (1) [11] solved this recurrence in O(n 3 ) time. Even though (1) is not in the KY form () Borchers and Guta [] were still able to show that L i,j satisfies a uadrangle ineuality. This sufficed to show that Lemma 2 still holds for L i.j and thus ermitted deriving an O(n 2 ) algorithm for calculating all of the L i,j. In fact, they showed that if L(i, j) is given by a DP recurrence of the form L(i, j) = min i s<j (w(i, s, j) + L i,s + L s+1,j ). (18) where w(i, s, j) satisfies generalized versions of the uadrangle ineuality and monotonicity on integer lattices roerty, then Yao s result could alsways be generalized to aly. Note that the major difference between () and (18) is that (18) allows w() to deend uon the slitting index s and be brought inside the min. We oint out that even though we derived our results for roblems that satisfy the KY form () it is uite straightforward to show all of the results in this aer can be extended to work for all L i,j that satisfy (18) with the Borchers and Guta seedu conditions. In articular, this yields an O(n) er-ste worst-case online algorithm for constructing the new RSMA when adding oints to the left and right of a slide. 11

12 References [1] Alok Aggarwal, Maria M. Klawe, Shlomo Moran, Peter W. Shor, and Robert E. Wilber. Geometric alications of a matrix-searching algorithm. Algorithmica, 2:19 28, 198. [2] Alok Aggarwal and James Park. Notes on searching in multidimensional monotone arrays. In Proceedings of the 29th Annual Symosium on Foundations of Comuter Science, ages 9 12, [3] M. J. Atallah, S. R. Kosaraju, L. L. Larmore, G. L. Miller, and S.-H. Teng. Constructing trees in arallel. In Proceedings of the First Annual ACM Symosium on Parallel Algorithms and Architectures, ages 21 31, [] Amotz Bar-Noy and Richard E. Ladner. Efficient algorithms for otimal stream merging for media-on-demand. SIAM Journal on Comuting, 33():111 13, 2. [] Al Borchers and Prosenjit Guta. Extending the uadrangle ineuality to seed-u dynamic rogramming. Information Processing Letters, 9():28 29, 199. [] Rainer E. Burkard, Bettina Klinz, and Rudiger Rudolf. Persectives of Monge roerties in otimization. Discrete Alied Mathematics, (2):9 11, 199. [] Zvi Galil and Kunsoo Park. Dynamic rogramming with convexity, concavity and sarsity. Theoretical Comuter Science., 92(1):9, [8] E. N. Gilbert and E. F. Moore. Variable length encodings. Bell System Technical Journal, 38:933 98, 199. [9] Donald E. Knuth. Otimum binary search trees. Acta Informatica, 1:1 2, 191. [1] Lawrence L. Larmore and Baruch Schieber. On-line dynamic rogramming with alications to the rediction of RNA secondary structure. Journal of Algorithms, 12(3):9 1, [11] Sailesh K. Rao, P. Sadayaan, Frank K. Hwang, and Peter W. Shor. The rectilinear steiner arborescence roblem. Algorithmica, (2-3):2 288, [12] Amir Said. Efficient alhabet artitioning algorithms for low-comlexity entroy coding. In Proceedings of the 2 Data Comression Conference, ages , 2. [13] Russell L. Wessner. Otimal alhabetic search trees with restricted maximal height. Information Processing Letters, ():9 9, 19. [1] Robert Wilber. The concave least-weight subseuence roblem revisited. Journal of Algorithms, 9(3):18 2, [1] F. Frances Yao. Efficient dynamic rogramming using uadrangle ineualities. In Proceedings of the Twelfth Annual ACM Symosium on Theory of Comuting, ages 29 3, 198. [1] F. Frances Yao. Seed-u in dynamic rogramming. SIAM Journal on Matrix Analysis and Alications (formerly SIAM Journal on Algebraic and Discrete Methods), 3():32,

The Knuth-Yao Quadrangle-Inequality Speedup is a Consequence of Total-Monotonicity

The Knuth-Yao Quadrangle-Inequality Speedup is a Consequence of Total-Monotonicity The Knuth-Yao Quadrangle-Inequality Speedup is a Consequence of Total-Monotonicity Wolfgang W. Bein Mordecai J. Golin Lawrence L. Larmore Yan Zhang Abstract There exist several general techniques in the

More information

The Knuth-Yao Quadrangle-Inequality Speedup is a Consequence of Total-Monotonicity

The Knuth-Yao Quadrangle-Inequality Speedup is a Consequence of Total-Monotonicity The Knuth-Yao Quadrangle-Inequality Speedup is a Consequence of Total-Monotonicity Wolfgang W. Bein Mordecai J. Golin Lawrence L. Larmore Yan Zhang Abstract There exist several general techniques in the

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

GIVEN an input sequence x 0,..., x n 1 and the

GIVEN an input sequence x 0,..., x n 1 and the 1 Running Max/Min Filters using 1 + o(1) Comarisons er Samle Hao Yuan, Member, IEEE, and Mikhail J. Atallah, Fellow, IEEE Abstract A running max (or min) filter asks for the maximum or (minimum) elements

More information

Extension of Minimax to Infinite Matrices

Extension of Minimax to Infinite Matrices Extension of Minimax to Infinite Matrices Chris Calabro June 21, 2004 Abstract Von Neumann s minimax theorem is tyically alied to a finite ayoff matrix A R m n. Here we show that (i) if m, n are both inite,

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

Numerical Linear Algebra

Numerical Linear Algebra Numerical Linear Algebra Numerous alications in statistics, articularly in the fitting of linear models. Notation and conventions: Elements of a matrix A are denoted by a ij, where i indexes the rows and

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

On the Toppling of a Sand Pile

On the Toppling of a Sand Pile Discrete Mathematics and Theoretical Comuter Science Proceedings AA (DM-CCG), 2001, 275 286 On the Toling of a Sand Pile Jean-Christohe Novelli 1 and Dominique Rossin 2 1 CNRS, LIFL, Bâtiment M3, Université

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

where x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H:

where x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H: Mehryar Mohri Foundations of Machine Learning Courant Institute of Mathematical Sciences Homework assignment 2 October 25, 2017 Due: November 08, 2017 A. Growth function Growth function of stum functions.

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

Asymptotically Optimal Simulation Allocation under Dependent Sampling

Asymptotically Optimal Simulation Allocation under Dependent Sampling Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee

More information

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018 Comuter arithmetic Intensive Comutation Annalisa Massini 7/8 Intensive Comutation - 7/8 References Comuter Architecture - A Quantitative Aroach Hennessy Patterson Aendix J Intensive Comutation - 7/8 3

More information

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS #A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

An Introduction To Range Searching

An Introduction To Range Searching An Introduction To Range Searching Jan Vahrenhold eartment of Comuter Science Westfälische Wilhelms-Universität Münster, Germany. Overview 1. Introduction: Problem Statement, Lower Bounds 2. Range Searching

More information

Universal Finite Memory Coding of Binary Sequences

Universal Finite Memory Coding of Binary Sequences Deartment of Electrical Engineering Systems Universal Finite Memory Coding of Binary Sequences Thesis submitted towards the degree of Master of Science in Electrical and Electronic Engineering in Tel-Aviv

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

Radial Basis Function Networks: Algorithms

Radial Basis Function Networks: Algorithms Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.

More information

Introduction to MVC. least common denominator of all non-identical-zero minors of all order of G(s). Example: The minor of order 2: 1 2 ( s 1)

Introduction to MVC. least common denominator of all non-identical-zero minors of all order of G(s). Example: The minor of order 2: 1 2 ( s 1) Introduction to MVC Definition---Proerness and strictly roerness A system G(s) is roer if all its elements { gij ( s)} are roer, and strictly roer if all its elements are strictly roer. Definition---Causal

More information

A Parallel Algorithm for Minimization of Finite Automata

A Parallel Algorithm for Minimization of Finite Automata A Parallel Algorithm for Minimization of Finite Automata B. Ravikumar X. Xiong Deartment of Comuter Science University of Rhode Island Kingston, RI 02881 E-mail: fravi,xiongg@cs.uri.edu Abstract In this

More information

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

Linear diophantine equations for discrete tomography

Linear diophantine equations for discrete tomography Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,

More information

Some Results on the Generalized Gaussian Distribution

Some Results on the Generalized Gaussian Distribution Some Results on the Generalized Gaussian Distribution Alex Dytso, Ronit Bustin, H. Vincent Poor, Daniela Tuninetti 3, Natasha Devroye 3, and Shlomo Shamai (Shitz) Abstract The aer considers information-theoretic

More information

2 K. ENTACHER 2 Generalized Haar function systems In the following we x an arbitrary integer base b 2. For the notations and denitions of generalized

2 K. ENTACHER 2 Generalized Haar function systems In the following we x an arbitrary integer base b 2. For the notations and denitions of generalized BIT 38 :2 (998), 283{292. QUASI-MONTE CARLO METHODS FOR NUMERICAL INTEGRATION OF MULTIVARIATE HAAR SERIES II KARL ENTACHER y Deartment of Mathematics, University of Salzburg, Hellbrunnerstr. 34 A-52 Salzburg,

More information

Parallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720

Parallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720 Parallelism and Locality in Priority Queues A. Ranade S. Cheng E. Derit J. Jones S. Shih Comuter Science Division University of California Berkeley, CA 94720 Abstract We exlore two ways of incororating

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca

More information

An Inverse Problem for Two Spectra of Complex Finite Jacobi Matrices

An Inverse Problem for Two Spectra of Complex Finite Jacobi Matrices Coyright 202 Tech Science Press CMES, vol.86, no.4,.30-39, 202 An Inverse Problem for Two Sectra of Comlex Finite Jacobi Matrices Gusein Sh. Guseinov Abstract: This aer deals with the inverse sectral roblem

More information

A Recursive Block Incomplete Factorization. Preconditioner for Adaptive Filtering Problem

A Recursive Block Incomplete Factorization. Preconditioner for Adaptive Filtering Problem Alied Mathematical Sciences, Vol. 7, 03, no. 63, 3-3 HIKARI Ltd, www.m-hiari.com A Recursive Bloc Incomlete Factorization Preconditioner for Adative Filtering Problem Shazia Javed School of Mathematical

More information

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces Abstract and Alied Analysis Volume 2012, Article ID 264103, 11 ages doi:10.1155/2012/264103 Research Article An iterative Algorithm for Hemicontractive Maings in Banach Saces Youli Yu, 1 Zhitao Wu, 2 and

More information

q-ary Symmetric Channel for Large q

q-ary Symmetric Channel for Large q List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

Topic 7: Using identity types

Topic 7: Using identity types Toic 7: Using identity tyes June 10, 2014 Now we would like to learn how to use identity tyes and how to do some actual mathematics with them. By now we have essentially introduced all inference rules

More information

Some results of convex programming complexity

Some results of convex programming complexity 2012c12 $ Ê Æ Æ 116ò 14Ï Dec., 2012 Oerations Research Transactions Vol.16 No.4 Some results of convex rogramming comlexity LOU Ye 1,2 GAO Yuetian 1 Abstract Recently a number of aers were written that

More information

15-451/651: Design & Analysis of Algorithms October 23, 2018 Lecture #17: Prediction from Expert Advice last changed: October 25, 2018

15-451/651: Design & Analysis of Algorithms October 23, 2018 Lecture #17: Prediction from Expert Advice last changed: October 25, 2018 5-45/65: Design & Analysis of Algorithms October 23, 208 Lecture #7: Prediction from Exert Advice last changed: October 25, 208 Prediction with Exert Advice Today we ll study the roblem of making redictions

More information

Sequence Comparison with Mixed Convex and Concave Costs

Sequence Comparison with Mixed Convex and Concave Costs Sequence Comparison with Mixed Convex and Concave Costs David Eppstein Computer Science Department Columbia University New York, NY 10027 February 20, 1989 Running Head: Sequence Comparison with Mixed

More information

Approximation of the Euclidean Distance by Chamfer Distances

Approximation of the Euclidean Distance by Chamfer Distances Acta Cybernetica 0 (0 399 47. Aroximation of the Euclidean Distance by Chamfer Distances András Hajdu, Lajos Hajdu, and Robert Tijdeman Abstract Chamfer distances lay an imortant role in the theory of

More information

Network Configuration Control Via Connectivity Graph Processes

Network Configuration Control Via Connectivity Graph Processes Network Configuration Control Via Connectivity Grah Processes Abubakr Muhammad Deartment of Electrical and Systems Engineering University of Pennsylvania Philadelhia, PA 90 abubakr@seas.uenn.edu Magnus

More information

New Schedulability Test Conditions for Non-preemptive Scheduling on Multiprocessor Platforms

New Schedulability Test Conditions for Non-preemptive Scheduling on Multiprocessor Platforms New Schedulability Test Conditions for Non-reemtive Scheduling on Multirocessor Platforms Technical Reort May 2008 Nan Guan 1, Wang Yi 2, Zonghua Gu 3 and Ge Yu 1 1 Northeastern University, Shenyang, China

More information

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete

More information

arxiv: v1 [cs.gt] 2 Nov 2018

arxiv: v1 [cs.gt] 2 Nov 2018 Tight Aroximation Ratio of Anonymous Pricing Yaonan Jin Pinyan Lu Qi Qi Zhihao Gavin Tang Tao Xiao arxiv:8.763v [cs.gt] 2 Nov 28 Abstract We consider two canonical Bayesian mechanism design settings. In

More information

A New Perspective on Learning Linear Separators with Large L q L p Margins

A New Perspective on Learning Linear Separators with Large L q L p Margins A New Persective on Learning Linear Searators with Large L q L Margins Maria-Florina Balcan Georgia Institute of Technology Christoher Berlind Georgia Institute of Technology Abstract We give theoretical

More information

Use of Transformations and the Repeated Statement in PROC GLM in SAS Ed Stanek

Use of Transformations and the Repeated Statement in PROC GLM in SAS Ed Stanek Use of Transformations and the Reeated Statement in PROC GLM in SAS Ed Stanek Introduction We describe how the Reeated Statement in PROC GLM in SAS transforms the data to rovide tests of hyotheses of interest.

More information

State Estimation with ARMarkov Models

State Estimation with ARMarkov Models Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

Multi-Operation Multi-Machine Scheduling

Multi-Operation Multi-Machine Scheduling Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job

More information

Correspondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R.

Correspondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R. 1 Corresondence Between Fractal-Wavelet Transforms and Iterated Function Systems With Grey Level Mas F. Mendivil and E.R. Vrscay Deartment of Alied Mathematics Faculty of Mathematics University of Waterloo

More information

HARMONIC EXTENSION ON NETWORKS

HARMONIC EXTENSION ON NETWORKS HARMONIC EXTENSION ON NETWORKS MING X. LI Abstract. We study the imlication of geometric roerties of the grah of a network in the extendibility of all γ-harmonic germs at an interior node. We rove that

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

A Bound on the Error of Cross Validation Using the Approximation and Estimation Rates, with Consequences for the Training-Test Split

A Bound on the Error of Cross Validation Using the Approximation and Estimation Rates, with Consequences for the Training-Test Split A Bound on the Error of Cross Validation Using the Aroximation and Estimation Rates, with Consequences for the Training-Test Slit Michael Kearns AT&T Bell Laboratories Murray Hill, NJ 7974 mkearns@research.att.com

More information

A note on the random greedy triangle-packing algorithm

A note on the random greedy triangle-packing algorithm A note on the random greedy triangle-acking algorithm Tom Bohman Alan Frieze Eyal Lubetzky Abstract The random greedy algorithm for constructing a large artial Steiner-Trile-System is defined as follows.

More information

Reconstructing Householder Vectors from Tall-Skinny QR

Reconstructing Householder Vectors from Tall-Skinny QR Reconstructing Householder Vectors from Tall-Skinny QR Grey Ballard James Demmel Laura Grigori Mathias Jacquelin Hong Die Nguyen Edgar Solomonik Electrical Engineering and Comuter Sciences University of

More information

Interactive Hypothesis Testing Against Independence

Interactive Hypothesis Testing Against Independence 013 IEEE International Symosium on Information Theory Interactive Hyothesis Testing Against Indeendence Yu Xiang and Young-Han Kim Deartment of Electrical and Comuter Engineering University of California,

More information

A Social Welfare Optimal Sequential Allocation Procedure

A Social Welfare Optimal Sequential Allocation Procedure A Social Welfare Otimal Sequential Allocation Procedure Thomas Kalinowsi Universität Rostoc, Germany Nina Narodytsa and Toby Walsh NICTA and UNSW, Australia May 2, 201 Abstract We consider a simle sequential

More information

The inverse Goldbach problem

The inverse Goldbach problem 1 The inverse Goldbach roblem by Christian Elsholtz Submission Setember 7, 2000 (this version includes galley corrections). Aeared in Mathematika 2001. Abstract We imrove the uer and lower bounds of the

More information

Notes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle

Notes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle McMaster University Advanced Otimization Laboratory Title: Notes on duality in second order and -order cone otimization Author: Erling D. Andersen, Cornelis Roos and Tamás Terlaky AdvOl-Reort No. 000/8

More information

Real-Time Computing with Lock-Free Shared Objects

Real-Time Computing with Lock-Free Shared Objects Real-Time Comuting with Lock-Free Shared Objects JAMES H. ADERSO, SRIKATH RAMAMURTHY, and KEVI JEFFAY University of orth Carolina This article considers the use of lock-free shared objects within hard

More information

IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES

IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES OHAD GILADI AND ASSAF NAOR Abstract. It is shown that if (, ) is a Banach sace with Rademacher tye 1 then for every n N there exists

More information

arxiv:cond-mat/ v2 25 Sep 2002

arxiv:cond-mat/ v2 25 Sep 2002 Energy fluctuations at the multicritical oint in two-dimensional sin glasses arxiv:cond-mat/0207694 v2 25 Se 2002 1. Introduction Hidetoshi Nishimori, Cyril Falvo and Yukiyasu Ozeki Deartment of Physics,

More information

Sums of independent random variables

Sums of independent random variables 3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where

More information

Convexification of Generalized Network Flow Problem with Application to Power Systems

Convexification of Generalized Network Flow Problem with Application to Power Systems 1 Convexification of Generalized Network Flow Problem with Alication to Power Systems Somayeh Sojoudi and Javad Lavaei + Deartment of Comuting and Mathematical Sciences, California Institute of Technology

More information

Quantitative estimates of propagation of chaos for stochastic systems with W 1, kernels

Quantitative estimates of propagation of chaos for stochastic systems with W 1, kernels oname manuscrit o. will be inserted by the editor) Quantitative estimates of roagation of chaos for stochastic systems with W, kernels Pierre-Emmanuel Jabin Zhenfu Wang Received: date / Acceted: date Abstract

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

Improvement on the Decay of Crossing Numbers

Improvement on the Decay of Crossing Numbers Grahs and Combinatorics 2013) 29:365 371 DOI 10.1007/s00373-012-1137-3 ORIGINAL PAPER Imrovement on the Decay of Crossing Numbers Jakub Černý Jan Kynčl Géza Tóth Received: 24 Aril 2007 / Revised: 1 November

More information

STABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS

STABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS STABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS Massimo Vaccarini Sauro Longhi M. Reza Katebi D.I.I.G.A., Università Politecnica delle Marche, Ancona, Italy

More information

A generalization of Amdahl's law and relative conditions of parallelism

A generalization of Amdahl's law and relative conditions of parallelism A generalization of Amdahl's law and relative conditions of arallelism Author: Gianluca Argentini, New Technologies and Models, Riello Grou, Legnago (VR), Italy. E-mail: gianluca.argentini@riellogrou.com

More information

2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S.

2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S. -D Analysis for Iterative Learning Controller for Discrete-ime Systems With Variable Initial Conditions Yong FANG, and ommy W. S. Chow Abstract In this aer, an iterative learning controller alying to linear

More information

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies Online Aendix to Accomany AComarisonof Traditional and Oen-Access Aointment Scheduling Policies Lawrence W. Robinson Johnson Graduate School of Management Cornell University Ithaca, NY 14853-6201 lwr2@cornell.edu

More information

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables Imroved Bounds on Bell Numbers and on Moments of Sums of Random Variables Daniel Berend Tamir Tassa Abstract We rovide bounds for moments of sums of sequences of indeendent random variables. Concentrating

More information

ECE 534 Information Theory - Midterm 2

ECE 534 Information Theory - Midterm 2 ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You

More information

A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract

A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS CASEY BRUCK 1. Abstract The goal of this aer is to rovide a concise way for undergraduate mathematics students to learn about how rime numbers behave

More information

Inequalities for the L 1 Deviation of the Empirical Distribution

Inequalities for the L 1 Deviation of the Empirical Distribution Inequalities for the L 1 Deviation of the Emirical Distribution Tsachy Weissman, Erik Ordentlich, Gadiel Seroussi, Sergio Verdu, Marcelo J. Weinberger June 13, 2003 Abstract We derive bounds on the robability

More information

Mobility-Induced Service Migration in Mobile. Micro-Clouds

Mobility-Induced Service Migration in Mobile. Micro-Clouds arxiv:503054v [csdc] 7 Mar 205 Mobility-Induced Service Migration in Mobile Micro-Clouds Shiiang Wang, Rahul Urgaonkar, Ting He, Murtaza Zafer, Kevin Chan, and Kin K LeungTime Oerating after ossible Deartment

More information

RESOLUTIONS OF THREE-ROWED SKEW- AND ALMOST SKEW-SHAPES IN CHARACTERISTIC ZERO

RESOLUTIONS OF THREE-ROWED SKEW- AND ALMOST SKEW-SHAPES IN CHARACTERISTIC ZERO RESOLUTIONS OF THREE-ROWED SKEW- AND ALMOST SKEW-SHAPES IN CHARACTERISTIC ZERO MARIA ARTALE AND DAVID A. BUCHSBAUM Abstract. We find an exlicit descrition of the terms and boundary mas for the three-rowed

More information

Recursive Estimation of the Preisach Density function for a Smart Actuator

Recursive Estimation of the Preisach Density function for a Smart Actuator Recursive Estimation of the Preisach Density function for a Smart Actuator Ram V. Iyer Deartment of Mathematics and Statistics, Texas Tech University, Lubbock, TX 7949-142. ABSTRACT The Preisach oerator

More information

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino

More information

ON THE NORM OF AN IDEMPOTENT SCHUR MULTIPLIER ON THE SCHATTEN CLASS

ON THE NORM OF AN IDEMPOTENT SCHUR MULTIPLIER ON THE SCHATTEN CLASS PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volume 00, Number 0, Pages 000 000 S 000-9939XX)0000-0 ON THE NORM OF AN IDEMPOTENT SCHUR MULTIPLIER ON THE SCHATTEN CLASS WILLIAM D. BANKS AND ASMA HARCHARRAS

More information

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4 Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work

More information

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel Performance Analysis Introduction Analysis of execution time for arallel algorithm to dertmine if it is worth the effort to code and debug in arallel Understanding barriers to high erformance and redict

More information

DUAL NUMBERS, WEIGHTED QUIVERS, AND EXTENDED SOMOS AND GALE-ROBINSON SEQUENCES. To Alexandre Alexandrovich Kirillov on his 3 4 th anniversary

DUAL NUMBERS, WEIGHTED QUIVERS, AND EXTENDED SOMOS AND GALE-ROBINSON SEQUENCES. To Alexandre Alexandrovich Kirillov on his 3 4 th anniversary DUAL NUMBERS, WEIGHTED QUIVERS, AND EXTENDED SOMOS AND GALE-ROBINSON SEQUENCES VALENTIN OVSIENKO AND SERGE TABACHNIKOV Abstract. We investigate a general method that allows one to construct new integer

More information

Near-Optimal Routing Lookups with Bounded Worst Case Performance

Near-Optimal Routing Lookups with Bounded Worst Case Performance Near-Otimal Routing Loous with Bounded Worst Case Performance Panaj Guta Balaji Prabhaar Stehen Boyd Deartments of Electrical Engineering and Comuter Science Stanford University, CA 94305. anaj@stanford.edu,

More information

A randomized sorting algorithm on the BSP model

A randomized sorting algorithm on the BSP model A randomized sorting algorithm on the BSP model Alexandros V. Gerbessiotis a, Constantinos J. Siniolakis b a CS Deartment, New Jersey Institute of Technology, Newark, NJ 07102, USA b The American College

More information

CMSC 425: Lecture 4 Geometry and Geometric Programming

CMSC 425: Lecture 4 Geometry and Geometric Programming CMSC 425: Lecture 4 Geometry and Geometric Programming Geometry for Game Programming and Grahics: For the next few lectures, we will discuss some of the basic elements of geometry. There are many areas

More information

A Special Case Solution to the Perspective 3-Point Problem William J. Wolfe California State University Channel Islands

A Special Case Solution to the Perspective 3-Point Problem William J. Wolfe California State University Channel Islands A Secial Case Solution to the Persective -Point Problem William J. Wolfe California State University Channel Islands william.wolfe@csuci.edu Abstract In this aer we address a secial case of the ersective

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

EE/Stats 376A: Information theory Winter Lecture 5 Jan 24. Lecturer: David Tse Scribe: Michael X, Nima H, Geng Z, Anton J, Vivek B.

EE/Stats 376A: Information theory Winter Lecture 5 Jan 24. Lecturer: David Tse Scribe: Michael X, Nima H, Geng Z, Anton J, Vivek B. EE/Stats 376A: Information theory Winter 207 Lecture 5 Jan 24 Lecturer: David Tse Scribe: Michael X, Nima H, Geng Z, Anton J, Vivek B. 5. Outline Markov chains and stationary distributions Prefix codes

More information

arxiv: v2 [cs.it] 10 Aug 2009

arxiv: v2 [cs.it] 10 Aug 2009 Sarse recovery by non-convex otimization instance otimality Rayan Saab arxiv:89.745v2 [cs.it] 1 Aug 29 Deartment of Electrical and Comuter Engineering, University of British Columbia, Vancouver, B.C. Canada

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information

t 0 Xt sup X t p c p inf t 0

t 0 Xt sup X t p c p inf t 0 SHARP MAXIMAL L -ESTIMATES FOR MARTINGALES RODRIGO BAÑUELOS AND ADAM OSȨKOWSKI ABSTRACT. Let X be a suermartingale starting from 0 which has only nonnegative jums. For each 0 < < we determine the best

More information

Averaging sums of powers of integers and Faulhaber polynomials

Averaging sums of powers of integers and Faulhaber polynomials Annales Mathematicae et Informaticae 42 (20. 0 htt://ami.ektf.hu Averaging sums of owers of integers and Faulhaber olynomials José Luis Cereceda a a Distrito Telefónica Madrid Sain jl.cereceda@movistar.es

More information

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu

More information

Introduction Consider a set of jobs that are created in an on-line fashion and should be assigned to disks. Each job has a weight which is the frequen

Introduction Consider a set of jobs that are created in an on-line fashion and should be assigned to disks. Each job has a weight which is the frequen Ancient and new algorithms for load balancing in the L norm Adi Avidor Yossi Azar y Jir Sgall z July 7, 997 Abstract We consider the on-line load balancing roblem where there are m identical machines (servers)

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

On the Chvatál-Complexity of Knapsack Problems

On the Chvatál-Complexity of Knapsack Problems R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew

More information