A NOTE ON K-STATE SELF-STABILIZATION IN A RING WITH K= N

Size: px
Start display at page:

Download "A NOTE ON K-STATE SELF-STABILIZATION IN A RING WITH K= N"

Transcription

1 Nordic Journal of Comuting A NOTE ON K-STATE SELF-STABILIZATION IN A RING WITH K= N WAN FOKKINK Vrije Universiteit Amsterdam Deartment of Theoretical Comuter Science De Boelelaan 08a, 08 HV Amsterdam, The Netherlands CWI Deartment of Software Engineering, PO Box 94079, 090 GB Amsterdam, The Netherlands wanf@cs.vu.nl JAAP-HENK HOEPMAN Radboud University Nijmegen Institute for Comuting and Information Sciences PO BOX 900, 6500 GL Nijmegen, The Netherlands jhh@cs.ru.nl JUN PANG INRIA Futurs and LIX, École Polytechnique Rue de Saclay, 928 Palaiseau Cedex, France angjun@lix.olytechnique.fr Abstract. We show that, contrary to common belief, Dijkstra s K-state mutual exclusion algorithm on a ring also stabilizes when the number K of states er rocess is one less than the number N+ of rocesses in the ring. We formalize the algorithm and verify the roof in PVS, based on Qadeer and Shankar s work. We show that K=Nis shar by giving a counter-examle for K=N. ACM CCS Categories and Subject Descritors: C.2.2, C.2.4, D.2.4, F.3.. Key words: Distributed comuting, fault tolerance, self-stabilization, mutual exclusion, formal verification, PVS.. Introduction Dijkstra introduced the notion of self-stabilization in his seminal aer [Dijkstra 974]. A distributed system is said to be self-stabilizing if it satisfies the following two roerties: The contribution of Jun Pang to this research was suorted by the Dutch Technology Foundation STW under the roject CES5008 Imroving the quality of embedded systems using formal design and systematic testing. This aer was finalized when Jun Pang was emloyed at CWI Amsterdam. Received February, 2004; acceted March, 2005.

2 2 W.J. FOKKINK, J.-H. HOEPMAN, J. PANG () convergence: starting from an arbitrary state, the system is guaranteed to reach a stable state; (2) closure: once the system reaches a stable state, it cannot become unstable anymore. A system with the roerty of self-stabilization can have the advantages of fault tolerance, robustness for dynamic toologies, and straightforward initialization. Consider a system with a number of rocesses sharing a common resource (usually called critical section). Given an arbitrary initial state of the system, there might be more than one rocess enabled to access the common resource. The roblem of mutual exclusion is to guarantee that the common resource will not be accessed by more than one rocess simultaneously. Self-stabilizing algorithms for mutual exclusion make sure that each infinite run of the system reaches a stable state where exactly one rocess is enabled; and from then on, mutual exclusion of the common resource is guaranteed. In [Dijkstra 974], Dijkstra resented three self-stabilizing algorithms for mutual exclusion on a ring network: an algorithm with K-state rocesses, an algorithm with four-state rocesses, and an algorithm with three-state rocesses. Regarding their correctness, he wrote: For brevity s sake most of the heuristics that led me to find them, together with the roofs that they satisfy the requirements, have been omitted, [...]. After more than ten years, Dijkstra [986] ublished a roof of self-stabilization of his algorithm with three-state rocesses, and acknowledged that the verification was actually not trivial. In this aer, we focus on Dijkstra s algorithm with K-state rocesses. We consider a system of N+ rocesses, numbered from 0 through N, arranged in a unidirectional ring. Each rocess i has a counter v(i) that can hold a value from 0 to K. Each rocess can observe its own counter value and the counter value of its anti-clockwise neighbor. 0 is a distinguished rocess that is enabled when v(0)=v(n), and when enabled, it can increment its counter by modulo K. Each rocess i for i=,..., N is enabled when v(i) v(i ), and when enabled, it can udate its counter value so that v(i)=v(i ). Thus the behavior of the system can be resented as follows: Dijkstra s K-state algorithm for mutual exclusion. Let rocesses 0,..., N form a unidirectional ring, where the counter for each rocess i holds a value v(i) {0,..., K }. if v(0)=v(n), then v(0) := (v(0)+) mod K; if v(i) v(i ) for i=,..., N, then v(i) := v(i ). The system is said to be in a stable state if it contains exactly one enabled rocess, which can be interreted as holding a token. This token can be assed along the ring network; a rocess can access the common resource only when it holds the token. This algorithm has been roved correct by different roof methods for selfstabilization, e.g. [Varghese 992], [Tel 994] and [Theel 2000]. It attracted much attention from the formal verification community. There are two distinct traditions

3 A NOTE ON K-STATE SELF-STABILIZATION IN A RING WITH K = N 3 in automatic verification: theorem roving and model checking. Merz [998] formalized the algorithm and roved it correct in Isabelle/HOL [Nikow et al. 2002]. Qadeer and Shankar [998] alied PVS [Owre et al. 992] to rove its correctness. Later on, Kulkarni et al. [999] also roved its correctness using PVS in a different fashion. Model checking techniques were alied to this algorithm in [Shukla et al. 997] and [Tsuchiya et al. 200]. Shukla et al. [997] verified whether the algorithm converges to stable states from a given initial state in SPIN [Holzmann 990] for systems with rocesses u to fifty. Tsuchiya et al. [200] described the algorithm in SMV [McMillan 993] and verified the roerty of self-stabilization for systems with any ossible initial state and 3 N 8. Due to the state exlosion roblem, this aroach has some restrictions: it cannot be directly used for any ossible initial state, and/or it can only rove the algorithm correct with a limited number of rocesses and states. However, all these roofs only showed correctness of the algorithm under a stronger condition, namely the algorithm is correct if K > N. This also haened in Schneider s survey aer on self-stabilization [Schneider 993]. The only excetion we could find is [Kulkarni et al. 999]. Although they roved the algorithm correct for K> N, almost at the end of the aer, they stated: it is ossible to rove stabilization when K N we will need to redo only the roofs that deend on this assumtion, namely Lemmas 6.4, 6.6, 6.8. However, the validity of this claim is not clear, esecially their formulation of Lemma 6.4 is false when K= N. Judging from the literature, it seems to be a common belief that Dijkstra s K- state mutual exclusion algorithm on a ring only stabilizes when K > N. But in fact, Dijkstra gave a note after resenting the solution with K-state machines in [Dijkstra 974] as follows: Note. [...] the relation K N is sufficient. A brief informal roof sketch was given by himself in [Dijkstra 982]. In addition, he said: (and for smaller values of K counter examles kill the assumtion of selfstabilization.) We note that, if K = N, there should be at least three rocesses in the ring; namely, if K=N=, then clearly 0 is always enabled and is never enabled. If K> N, then the algorithm also works for a ring with two rocesses. In this aer, we formally rove that if N>, then K Nis sufficient for the stabilization of Dijkstra s K-state mutual exclusion algorithm. For the condition K>N, the roofs in [Varghese 992], [Tel 994], [Qadeer and Shankar 998], [Merz 998] and [Kulkarni et al. 999] used the classic igeonhole rincile. The roof for K = N becomes considerably more comlicated, since the igeonhole rincile cannot be simly alied for any state of the algorithm. This will be exlained in detail in Section 3. Our roof, which is different from the roof sketch in [Dijkstra 982], has been checked in PVS. The rest of the aer is structured as follows. In Section 2, we show that Dijkstra s K-state mutual exclusion algorithm on a ring also stabilizes when the number of states er rocess is one less than the number of rocesses on the ring, namely

4 4 W.J. FOKKINK, J.-H. HOEPMAN, J. PANG K N. We formalized the algorithm and checked our roof in PVS. Our verification in PVS is based on [Qadeer and Shankar 998], we reused their formalization of the algorithm and most of their lemmas. We resent the crucial lemmas of our PVS verification in Section 3. In Section 4, we show that K N is shar by a counter-examle, which was missing in [Dijkstra 982]. We conclude this aer in Section Proof of Self-Stabilization We give the roof that Dijkstra s K-state mutual exclusion algorithm on a ring stabilizes when K N >. First we rove the closure roerty for self-stabilization (see Proosition ). LEMMA. In each state of the algorithm, there is at least one enabled rocess. PROOF. We distinguish two cases: for all i {,..., N}, v(i)=v(0). In articular, v(0)=v(n), which imlies 0 is enabled; otherwise, there exists a j {,..., N} such that v( j) v(0), and for all i {,..., j }, v(i)=v(0). Since v( j) v( j ), j is enabled. Lemma imlies that no run of the algorithm ever deadlocks, as in each state the enabled rocess(es) can fire, meaning that the counter value is udated. PROPOSITION. Once in a stable state, the system will remain in stable states. PROOF. We assume i is the only enabled rocess in some stable state. It is easy to see that when i fires, it makes itself disabled, and it makes at most i s clockwise neighbor enabled. By Lemma, in each state of the algorithm, there exists at least one enabled rocess. Therefore, after the firing of i, the clockwise neighbor of i is the only enabled rocess, so the system remains in a stable state. We roceed to rove the convergence roerty for self-stabilization (see Theorem ). LEMMA 2. In each infinite run of the algorithm, 0 fires infinitely often. PROOF. Given a state, consider the sum over all elements{n i i {,..., N} i is enabled}. Clearly, when a nonzero rocess fires, this sum strictly decreases. Furthermore, for each state, this sum is at least 0. Hence, in each infinite run, 0 must fire infinitely often. DEFINITION. The legitimate states are those states that satisfy v(i)= x for all i< j and v(i)=(x ) mod K for all j i N, for some choice of x<kand j N. Note that a legitimate state is stable, as only j is enabled.

5 A NOTE ON K-STATE SELF-STABILIZATION IN A RING WITH K = N 5 THEOREM. Let N>. Even if K= N, Dijkstra s K-state mutual exclusion algorithm for N + rocesses stabilizes. PROOF. By Lemma, no run of the algorithm ever deadlocks. By Lemma 2, in each infinite run of the algorithm 0 fires infinitely often. Let N>. We rove that each infinite run of the algorithm visits a legitimate state. Consider the case where 0 fires for the first time. Then just before that, v(0)=v(n)=y for some y, and the new value of v(0) becomes (y+) mod K. Now consider the case when 0 fires again. Then just before that, v(0)=v(n)= (y+) mod K. In order for N to change its counter value from y to (y+) mod K, it must have coied (y+) mod K from its anti-clockwise neighbor N. This moment must have occurred after 0 changed its counter value to v(0) = (y+ ) mod K. But then, just after N coies (y+) mod K from N, we actually have v(n )=v(n)=(y+) mod K. In other words, since N> imlies that N 0, two different nonzero rocesses hold the same counter value (y+) mod K. Then the N nonzero rocesses hold at most N different counter values from {0,..., K }. When K N (so in articular when K=N), then at this oint in time there is an x<kthat does not occur as the counter value of any nonzero rocess in the ring. Since 0 fires infinitely often, eventually v(0) becomes x. The other rocesses merely coy counter values from their anti-clockwise neighbors, so at this oint no other rocess holds x. The next time 0 fires, v(n)=v(0)= x. The only way that N gets the counter value x is if all intermediate rocesses have coied x from 0. We conclude that all rocesses have the counter value x, which is a legitimate state. Dijkstra [982] gave a secific scenario to show that the system will definitely reach a legitimate state, after 0 has been enabled for N times. In most cases, a legitimate state can be detected earlier than in that scenario, as shown in the above roof. 3. Mechanical Verification in PVS Qadeer and Shankar [998] resented a detailed descrition of a mechanical verification in PVS of stabilization of Dijkstra s K-state mutual exclusion algorithm. Although they only checked the correctness of the algorithm under the condition K > N, their PVS formalism and roof could for a large art be reused, which saved us much effort and gave us many insightful thoughts on the verification in PVS. (The URL ft://ft.cs.york.ac.uk/ub/vs/examles/ self-stability/ contains their PVS formalization and roofs.) First, we resent Qadeer and Shankar s claims to sketch their roof skeleton. Then we show the lemma that we had to adat for our roof. The algorithm satisfies the following roerties, for each state of the system, and each infinite run from this state: I. there is always at least one enabled rocess; II. the number of enabled rocesses never increases;

6 6 W.J. FOKKINK, J.-H. HOEPMAN, J. PANG III. the enabledness of each rocess is eventually toggled; IV. 0 eventually takes on any counter value below K (follows by Proerty III); These roerties require no restriction on the relation between N and K. Proerty I corresonds to Lemma. Proerty II follows the fact that when a rocess fires, it makes itself disabled, and it makes at most its clockwise neighbor enabled. Proerty III is a more general version of Lemma 2. Qadeer and Shankar s PVS roof of these first four roerties could be (more or less) reused by us directly. V. eventually the system will reach a state, where there is some value x below K such that v(i) x for all i {,..., N} (follows by Proerty IV, and the roof of Theorem ); VI. eventually the system will reach a state with v(0)=x, and v(i) x for all i {,..., N}; then 0 is disabled until v(i) = v(0) for all i {,..., N} (follows by Proerty V); VII. the system is self-stabilizing (follows by roerties VI, I, and II). The roof of Proerty V uses the igeonhole rincile, which states that if each of n+ igeons is assigned to one of n igeonholes, then some hole must contain at least two igeons. This rincile was also formulated and roved in [Qadeer and Shankar 998]. Let S (v) denote the set{x<k i {,..., N}(v(i)= x)}. The following lemma corresonds to Proerty V. It states that the nonzero rocesses do not contain all the ossible counter values. LEMMA 3. (Lemma 4.3 in [Qadeer and Shankar 998]) If K> N, then x<k(x S (v)). Under the condition K > N, this can be informally roved as follows [Qadeer and Shankar 998]: there are N nonzero rocesses, and hence at most N distinct counter values at these rocesses; if there are K (K> N) ossible counter values, then there must be some x < K that is not the counter value at any nonzero rocess. If we relax the condition to K N, the above roof fails, because the igeonhole rincile does not aly when the number of igeons equals the number of igeonholes. Starting from this oint, we assume that K N>. We define T(v) to denote the set{x<k i {,..., N }(v(i)= x)}. In the following lemma the igeonhole rincile does aly. LEMMA 4. x<k(x T(v)). PROOF. T(v) contains at most N distinct counter values at rocesses from to N. If there are K (K N) ossible counter values, then there must be some x< K with x T(v). To check the roof of Lemma 4 in PVS, we could simly follow the PVS roof stes of Lemma 3 in [Qadeer and Shankar 998]. Now we introduce an extra lemma. LEMMA 5. v(n) T(v)= S (v)=t(v).

7 A NOTE ON K-STATE SELF-STABILIZATION IN A RING WITH K = N 7 PROOF. This is straightforward by the definitions of S (v) and T(v). In PVS, Lemma 5 could be roved by using existing PVS libraries for the finite cardinalities. Now we resent the main lemma for our PVS roof, corresonding to Lemma 3 in [Qadeer and Shankar 998] (Proerty VI). LEMMA 6. Each infinite run of the algorithm eventually reaches a state where the nonzero rocesses do not contain all the ossible counter values. PROOF. We know from Proerty III that N will eventually fire. By the algorithm, we then have v(n)=v(n ), so that v(n) T(v). By Lemma 5, S (v)=t(v). By Lemma 4, we can find an x< K with x T(v), so x S (v). After roving Lemma 6, and reusing (more or less) the lemmas and the PVS roof stes for roerties VI and VII in [Qadeer and Shankar 998], we could mechanically rove self-stabilization of Dijkstra s K-state algorithm in PVS. 4. K= N is Shar N 0 N 0 0 N N N 2 N Inital state Ste: Ste: N 0 0 N N 0 0 N 2 N 2 N 2 N 3 2 N 3 2 N 3 2 Ste: N+ Ste: N Ste: N Fig. 4.: A counter-examle: a ring with K = N In this section, we give a counter-examle showing that a smaller value of K would kill self-stabilization. For examle, in Fig. 4. (which assumes that N 3), we have a system with K=N, meaning that each rocess can have a counter value{0,..., N 2}. Consider the initial state shown at the to left-hand side of Fig. 4., in which 0,..., hold counter values from 0 to N 2, N holds counter value 0, and N holds counter value. By the algorithm,,..., N are

8 8 W.J. FOKKINK, J.-H. HOEPMAN, J. PANG enabled, so the number of enabled rocesses is N. (In Fig. 4., black rocesses are enabled.) We have a run as follows: Ste : N fires and makes 0 enabled; Ste 2: N fires and makes N enabled;... Ste N : 2 fires and makes enabled; Ste N: fires and makes 2 enabled; Ste N+ : 0 fires and makes enabled. From the initial state, after the above N+ stes (all rocesses have fired only once), the system ends in a state where the counter values of the rocesses are symmetric (modulo N ) to the initial state, so it still has N enabled rocesses. This scenario can be executed infinitely often without breaking the symmetry. So the system will never reach a legitimate state. Note that the given scenario only deals with the case K=N, it can be straightforwardly generalized for other cases with K< N. Thus K= N is shar! 5. Conclusion Judging from the literature on self-stabilization, it seems to be a common belief that Dijkstra s K-state algorithm on a ring stabilizes when K > N. In this aer we show that, contrary to this common belief, the algorithm also stabilizes when the number of states er rocess is one less than the number of rocesses on the ring (namely K=N). Our roof was formalized and checked in PVS, based on [Qadeer and Shankar 998]. We have given a counter-examle showing that K = N is indeed shar. One imortant fact (Lemma 6) used in our roof is that the nonzero rocesses do not contain all the ossible counter values. By this observation, together with the fact that each rocess is infinitely often enabled, we can rove that each infinite run of the algorithm will reach a legitimate state. For the case K>N, this fact can be roved using the igeonhole rincile, as is done in [Varghese 992], [Tel 994], [Qadeer and Shankar 998], [Merz 998] and [Kulkarni et al. 999]. For the case K=N in this aer, we choose the moment that N is enabled and fires, which makes v(n)=v(n ). After that we can aly the igeonhole rincile. Another imortant fact (Lemma ) is that whenever the system reaches a stable state, it will remain in stable states. Thus we have roved the roerties for self-stabilization. Regarding the verification in PVS, we downloaded the PVS code and roof by Qadeer and Shankar. Following their roof stes in PVS, we simly added a new definition of T(v), roved two new lemmas (Lemma 4 and Lemma 5), and adated one lemma as Lemma 6. The whole verification did not take too much effort. First, we sent a few days to understand the formalism and roof in [Qadeer and Shankar 998]. Since the PVS system, including PVS libraries, has been udated after 998, the downloaded PVS roof could not be simly rerun. We made some adations to make their PVS roof work again. After that, when we had the idea to

9 A NOTE ON K-STATE SELF-STABILIZATION IN A RING WITH K = N 9 rove (as shown in Section 2) the algorithm correct under the condition K = N, the roof was comletely checked in PVS within one day. The dum file containing our PVS formalization and roofs can be found at the URL htt:// olytechnique.fr/ angjun/stabilization/. References DIJKSTRA, E. W Self-stabilizing Systems in Site of Distributed Control. Communications of the ACM 7,, DIJKSTRA, E. W Self-stabilization in Site of Distributed Control. In Selected Writings on Comuting: A Personal Persective. Sringer-Verlag, DIJKSTRA, E. W A Belated Proof of Self-stabilization. Distributed Comuting,, 5 6. HOLZMANN, G. J Design and Validation of Comuter Protocols. Prentice Hall. KULKARNI, S. S., RUSHBY, J. M., AND SHANKAR, N A Case-study in Comonent-based Mechanical Verification of Fault-tolerant Programs. In Proceedings of 4th Worksho on Self- Stabilization. IEEE Comuter Society, MCMILLAN, K. L Symbolic Model Checking. Kluwer Academic. MERZ, S On the Verification of A Self-stabilizing Algorithm. Technical reort, University of Munich. NIPKOW, T., PAULSON, L. C., AND WENZEL, M Isabelle/HOL - A Proof Assistant for Higher- Order Logic. Sringer-Verlag. OWRE, S., RUSHBY, J. M., AND SHANKAR, N PVS: A Prototye Verification System. In Proceedings of th Conference on Automated Deduction, Volume 607 of Lecture Notes in Comuter Science. Sringer-Verlag, QADEER, S. AND SHANKAR, N Verifying A Self-stabilizing Mutual Exclusion Algorithm. In Proceedings of IFIP Working Conference on Programming Concet and Methods. Chaman & Hall, SCHNEIDER, M Self-stabilization. ACM Comuting Surveys 25,, SHUKLA, S. K., ROSENKRANTZ, D. J., AND RAVI, S. S Simulation and Validation Tool for Selfstabilizing Protocols. In Proceedings of 2nd SPIN Worksho, Volume 32 of DIMACS Series in Discrete Mathematics and Theoretical Comuter Science. TEL, G Introduction to Distributed Algorithms. Cambridge University Press. THEEL, O. E Exloitation of Ljaunov Theory for Verifying Self-stabilizing Algorithms. In Proceedings of 4th Conference on Distributed Comuting, Volume 94 of Lecture Notes in Comuter Science. Sringer-Verlag, TSUCHIYA, T., NAGANO, S., PAIDI, R. B., AND KIKUNO, T Symbolic Model Checking for Selfstabilizing Algorithms. IEEE Transaction on Parallel and Distributed Systems 2,, VARGHESE, G Self-Stabilization by Local Checking and Corrections. Phd thesis, MIT.

Sets of Real Numbers

Sets of Real Numbers Chater 4 Sets of Real Numbers 4. The Integers Z and their Proerties In our revious discussions about sets and functions the set of integers Z served as a key examle. Its ubiquitousness comes from the fact

More information

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS #A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,

More information

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle]

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle] Chater 5 Model checking, verification of CTL One must verify or exel... doubts, and convert them into the certainty of YES or NO. [Thomas Carlyle] 5. The verification setting Page 66 We introduce linear

More information

On the Toppling of a Sand Pile

On the Toppling of a Sand Pile Discrete Mathematics and Theoretical Comuter Science Proceedings AA (DM-CCG), 2001, 275 286 On the Toling of a Sand Pile Jean-Christohe Novelli 1 and Dominique Rossin 2 1 CNRS, LIFL, Bâtiment M3, Université

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

Math 104B: Number Theory II (Winter 2012)

Math 104B: Number Theory II (Winter 2012) Math 104B: Number Theory II (Winter 01) Alina Bucur Contents 1 Review 11 Prime numbers 1 Euclidean algorithm 13 Multilicative functions 14 Linear diohantine equations 3 15 Congruences 3 Primes as sums

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract

A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS CASEY BRUCK 1. Abstract The goal of this aer is to rovide a concise way for undergraduate mathematics students to learn about how rime numbers behave

More information

A Reduction Theorem for the Verification of Round-Based Distributed Algorithms

A Reduction Theorem for the Verification of Round-Based Distributed Algorithms A Reduction Theorem for the Verification of Round-Based Distributed Algorithms Mouna Chaouch-Saad 1, Bernadette Charron-Bost 2, and Stehan Merz 3 1 Faculté des Sciences, Tunis, Tunisia, Mouna.Saad@fst.rnu.tn

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

Topic 7: Using identity types

Topic 7: Using identity types Toic 7: Using identity tyes June 10, 2014 Now we would like to learn how to use identity tyes and how to do some actual mathematics with them. By now we have essentially introduced all inference rules

More information

Sums of independent random variables

Sums of independent random variables 3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where

More information

ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM

ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM JOHN BINDER Abstract. In this aer, we rove Dirichlet s theorem that, given any air h, k with h, k) =, there are infinitely many rime numbers congruent to

More information

DRAFT - do not circulate

DRAFT - do not circulate An Introduction to Proofs about Concurrent Programs K. V. S. Prasad (for the course TDA383/DIT390) Deartment of Comuter Science Chalmers University Setember 26, 2016 Rough sketch of notes released since

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

ON FREIMAN S 2.4-THEOREM

ON FREIMAN S 2.4-THEOREM ON FREIMAN S 2.4-THEOREM ØYSTEIN J. RØDSETH Abstract. Gregory Freiman s celebrated 2.4-Theorem says that if A is a set of residue classes modulo a rime satisfying 2A 2.4 A 3 and A < /35, then A is contained

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

Intrinsic Approximation on Cantor-like Sets, a Problem of Mahler

Intrinsic Approximation on Cantor-like Sets, a Problem of Mahler Intrinsic Aroximation on Cantor-like Sets, a Problem of Mahler Ryan Broderick, Lior Fishman, Asaf Reich and Barak Weiss July 200 Abstract In 984, Kurt Mahler osed the following fundamental question: How

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

On the Rank of the Elliptic Curve y 2 = x(x p)(x 2)

On the Rank of the Elliptic Curve y 2 = x(x p)(x 2) On the Rank of the Ellitic Curve y = x(x )(x ) Jeffrey Hatley Aril 9, 009 Abstract An ellitic curve E defined over Q is an algebraic variety which forms a finitely generated abelian grou, and the structure

More information

arxiv:math/ v4 [math.gn] 25 Nov 2006

arxiv:math/ v4 [math.gn] 25 Nov 2006 arxiv:math/0607751v4 [math.gn] 25 Nov 2006 On the uniqueness of the coincidence index on orientable differentiable manifolds P. Christoher Staecker October 12, 2006 Abstract The fixed oint index of toological

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

Representing Integers as the Sum of Two Squares in the Ring Z n

Representing Integers as the Sum of Two Squares in the Ring Z n 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 17 (2014), Article 14.7.4 Reresenting Integers as the Sum of Two Squares in the Ring Z n Joshua Harrington, Lenny Jones, and Alicia Lamarche Deartment

More information

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS #A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS Ramy F. Taki ElDin Physics and Engineering Mathematics Deartment, Faculty of Engineering, Ain Shams University, Cairo, Egyt

More information

ON POLYNOMIAL SELECTION FOR THE GENERAL NUMBER FIELD SIEVE

ON POLYNOMIAL SELECTION FOR THE GENERAL NUMBER FIELD SIEVE MATHEMATICS OF COMPUTATIO Volume 75, umber 256, October 26, Pages 237 247 S 25-5718(6)187-9 Article electronically ublished on June 28, 26 O POLYOMIAL SELECTIO FOR THE GEERAL UMBER FIELD SIEVE THORSTE

More information

Commutators on l. D. Dosev and W. B. Johnson

Commutators on l. D. Dosev and W. B. Johnson Submitted exclusively to the London Mathematical Society doi:10.1112/0000/000000 Commutators on l D. Dosev and W. B. Johnson Abstract The oerators on l which are commutators are those not of the form λi

More information

On a Markov Game with Incomplete Information

On a Markov Game with Incomplete Information On a Markov Game with Incomlete Information Johannes Hörner, Dinah Rosenberg y, Eilon Solan z and Nicolas Vieille x{ January 24, 26 Abstract We consider an examle of a Markov game with lack of information

More information

Elementary theory of L p spaces

Elementary theory of L p spaces CHAPTER 3 Elementary theory of L saces 3.1 Convexity. Jensen, Hölder, Minkowski inequality. We begin with two definitions. A set A R d is said to be convex if, for any x 0, x 1 2 A x = x 0 + (x 1 x 0 )

More information

HENSEL S LEMMA KEITH CONRAD

HENSEL S LEMMA KEITH CONRAD HENSEL S LEMMA KEITH CONRAD 1. Introduction In the -adic integers, congruences are aroximations: for a and b in Z, a b mod n is the same as a b 1/ n. Turning information modulo one ower of into similar

More information

arxiv: v1 [physics.data-an] 26 Oct 2012

arxiv: v1 [physics.data-an] 26 Oct 2012 Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch

More information

Examples from Elements of Theory of Computation. Abstract. Introduction

Examples from Elements of Theory of Computation. Abstract. Introduction Examles from Elements of Theory of Comutation Mostafa Ghandehari Samee Ullah Khan Deartment of Comuter Science and Engineering University of Texas at Arlington, TX-7609, USA Tel: +(87)7-5688, Fax: +(87)7-784

More information

MA3H1 TOPICS IN NUMBER THEORY PART III

MA3H1 TOPICS IN NUMBER THEORY PART III MA3H1 TOPICS IN NUMBER THEORY PART III SAMIR SIKSEK 1. Congruences Modulo m In quadratic recirocity we studied congruences of the form x 2 a (mod ). We now turn our attention to situations where is relaced

More information

ARITHMETIC PROGRESSIONS OF POLYGONAL NUMBERS WITH COMMON DIFFERENCE A POLYGONAL NUMBER

ARITHMETIC PROGRESSIONS OF POLYGONAL NUMBERS WITH COMMON DIFFERENCE A POLYGONAL NUMBER #A43 INTEGERS 17 (2017) ARITHMETIC PROGRESSIONS OF POLYGONAL NUMBERS WITH COMMON DIFFERENCE A POLYGONAL NUMBER Lenny Jones Deartment of Mathematics, Shiensburg University, Shiensburg, Pennsylvania lkjone@shi.edu

More information

#A37 INTEGERS 15 (2015) NOTE ON A RESULT OF CHUNG ON WEIL TYPE SUMS

#A37 INTEGERS 15 (2015) NOTE ON A RESULT OF CHUNG ON WEIL TYPE SUMS #A37 INTEGERS 15 (2015) NOTE ON A RESULT OF CHUNG ON WEIL TYPE SUMS Norbert Hegyvári ELTE TTK, Eötvös University, Institute of Mathematics, Budaest, Hungary hegyvari@elte.hu François Hennecart Université

More information

Verifying Two Conjectures on Generalized Elite Primes

Verifying Two Conjectures on Generalized Elite Primes 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 12 (2009), Article 09.4.7 Verifying Two Conjectures on Generalized Elite Primes Xiaoqin Li 1 Mathematics Deartment Anhui Normal University Wuhu 241000,

More information

Improvement on the Decay of Crossing Numbers

Improvement on the Decay of Crossing Numbers Grahs and Combinatorics 2013) 29:365 371 DOI 10.1007/s00373-012-1137-3 ORIGINAL PAPER Imrovement on the Decay of Crossing Numbers Jakub Černý Jan Kynčl Géza Tóth Received: 24 Aril 2007 / Revised: 1 November

More information

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

Elliptic Curves Spring 2015 Problem Set #1 Due: 02/13/2015

Elliptic Curves Spring 2015 Problem Set #1 Due: 02/13/2015 18.783 Ellitic Curves Sring 2015 Problem Set #1 Due: 02/13/2015 Descrition These roblems are related to the material covered in Lectures 1-2. Some of them require the use of Sage, and you will need to

More information

#A47 INTEGERS 15 (2015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS

#A47 INTEGERS 15 (2015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS #A47 INTEGERS 15 (015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS Mihai Ciu Simion Stoilow Institute of Mathematics of the Romanian Academy, Research Unit No. 5,

More information

A Self-Stabilizing Algorithm for Finding a Minimal Distance-2 Dominating Set in Distributed Systems

A Self-Stabilizing Algorithm for Finding a Minimal Distance-2 Dominating Set in Distributed Systems JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 1709-1718 (2008) A Self-Stabilizing Algorithm for Finding a Minimal Distance-2 Dominating Set in Distributed Systems JI-CHERNG LIN, TETZ C. HUANG, CHENG-PIN

More information

A Brief Introduction to Model Checking

A Brief Introduction to Model Checking A Brief Introduction to Model Checking Jan. 18, LIX Page 1 Model Checking A technique for verifying finite state concurrent systems; a benefit on this restriction: largely automatic; a problem to fight:

More information

HASSE INVARIANTS FOR THE CLAUSEN ELLIPTIC CURVES

HASSE INVARIANTS FOR THE CLAUSEN ELLIPTIC CURVES HASSE INVARIANTS FOR THE CLAUSEN ELLIPTIC CURVES AHMAD EL-GUINDY AND KEN ONO Astract. Gauss s F x hyergeometric function gives eriods of ellitic curves in Legendre normal form. Certain truncations of this

More information

Statics and dynamics: some elementary concepts

Statics and dynamics: some elementary concepts 1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

BOUNDS FOR THE SIZE OF SETS WITH THE PROPERTY D(n) Andrej Dujella University of Zagreb, Croatia

BOUNDS FOR THE SIZE OF SETS WITH THE PROPERTY D(n) Andrej Dujella University of Zagreb, Croatia GLASNIK MATMATIČKI Vol. 39(59(2004, 199 205 BOUNDS FOR TH SIZ OF STS WITH TH PROPRTY D(n Andrej Dujella University of Zagreb, Croatia Abstract. Let n be a nonzero integer and a 1 < a 2 < < a m ositive

More information

arxiv:cond-mat/ v2 25 Sep 2002

arxiv:cond-mat/ v2 25 Sep 2002 Energy fluctuations at the multicritical oint in two-dimensional sin glasses arxiv:cond-mat/0207694 v2 25 Se 2002 1. Introduction Hidetoshi Nishimori, Cyril Falvo and Yukiyasu Ozeki Deartment of Physics,

More information

CHAPTER 2: SMOOTH MAPS. 1. Introduction In this chapter we introduce smooth maps between manifolds, and some important

CHAPTER 2: SMOOTH MAPS. 1. Introduction In this chapter we introduce smooth maps between manifolds, and some important CHAPTER 2: SMOOTH MAPS DAVID GLICKENSTEIN 1. Introduction In this chater we introduce smooth mas between manifolds, and some imortant concets. De nition 1. A function f : M! R k is a smooth function if

More information

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca

More information

Combinatorics of topmost discs of multi-peg Tower of Hanoi problem

Combinatorics of topmost discs of multi-peg Tower of Hanoi problem Combinatorics of tomost discs of multi-eg Tower of Hanoi roblem Sandi Klavžar Deartment of Mathematics, PEF, Unversity of Maribor Koroška cesta 160, 000 Maribor, Slovenia Uroš Milutinović Deartment of

More information

1 Gambler s Ruin Problem

1 Gambler s Ruin Problem Coyright c 2017 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins

More information

arxiv: v1 [math.nt] 4 Nov 2015

arxiv: v1 [math.nt] 4 Nov 2015 Wall s Conjecture and the ABC Conjecture George Grell, Wayne Peng August 0, 018 arxiv:1511.0110v1 [math.nt] 4 Nov 015 Abstract We show that the abc conjecture of Masser-Oesterlé-Sziro for number fields

More information

An Estimate For Heilbronn s Exponential Sum

An Estimate For Heilbronn s Exponential Sum An Estimate For Heilbronn s Exonential Sum D.R. Heath-Brown Magdalen College, Oxford For Heini Halberstam, on his retirement Let be a rime, and set e(x) = ex(2πix). Heilbronn s exonential sum is defined

More information

Solvability and Number of Roots of Bi-Quadratic Equations over p adic Fields

Solvability and Number of Roots of Bi-Quadratic Equations over p adic Fields Malaysian Journal of Mathematical Sciences 10(S February: 15-35 (016 Secial Issue: The 3 rd International Conference on Mathematical Alications in Engineering 014 (ICMAE 14 MALAYSIAN JOURNAL OF MATHEMATICAL

More information

New Information Measures for the Generalized Normal Distribution

New Information Measures for the Generalized Normal Distribution Information,, 3-7; doi:.339/info3 OPEN ACCESS information ISSN 75-7 www.mdi.com/journal/information Article New Information Measures for the Generalized Normal Distribution Christos P. Kitsos * and Thomas

More information

A Special Case Solution to the Perspective 3-Point Problem William J. Wolfe California State University Channel Islands

A Special Case Solution to the Perspective 3-Point Problem William J. Wolfe California State University Channel Islands A Secial Case Solution to the Persective -Point Problem William J. Wolfe California State University Channel Islands william.wolfe@csuci.edu Abstract In this aer we address a secial case of the ersective

More information

Notes on Instrumental Variables Methods

Notes on Instrumental Variables Methods Notes on Instrumental Variables Methods Michele Pellizzari IGIER-Bocconi, IZA and frdb 1 The Instrumental Variable Estimator Instrumental variable estimation is the classical solution to the roblem of

More information

Linear diophantine equations for discrete tomography

Linear diophantine equations for discrete tomography Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,

More information

Principles of Computed Tomography (CT)

Principles of Computed Tomography (CT) Page 298 Princiles of Comuted Tomograhy (CT) The theoretical foundation of CT dates back to Johann Radon, a mathematician from Vienna who derived a method in 1907 for rojecting a 2-D object along arallel

More information

t 0 Xt sup X t p c p inf t 0

t 0 Xt sup X t p c p inf t 0 SHARP MAXIMAL L -ESTIMATES FOR MARTINGALES RODRIGO BAÑUELOS AND ADAM OSȨKOWSKI ABSTRACT. Let X be a suermartingale starting from 0 which has only nonnegative jums. For each 0 < < we determine the best

More information

Multiplicative group law on the folium of Descartes

Multiplicative group law on the folium of Descartes Multilicative grou law on the folium of Descartes Steluţa Pricoie and Constantin Udrişte Abstract. The folium of Descartes is still studied and understood today. Not only did it rovide for the roof of

More information

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1)

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1) CERTAIN CLASSES OF FINITE SUMS THAT INVOLVE GENERALIZED FIBONACCI AND LUCAS NUMBERS The beautiful identity R.S. Melham Deartment of Mathematical Sciences, University of Technology, Sydney PO Box 23, Broadway,

More information

A FEW EQUIVALENCES OF WALL-SUN-SUN PRIME CONJECTURE

A FEW EQUIVALENCES OF WALL-SUN-SUN PRIME CONJECTURE International Journal of Mathematics & Alications Vol 4, No 1, (June 2011), 77-86 A FEW EQUIVALENCES OF WALL-SUN-SUN PRIME CONJECTURE ARPAN SAHA AND KARTHIK C S ABSTRACT: In this aer, we rove a few lemmas

More information

Strong Matching of Points with Geometric Shapes

Strong Matching of Points with Geometric Shapes Strong Matching of Points with Geometric Shaes Ahmad Biniaz Anil Maheshwari Michiel Smid School of Comuter Science, Carleton University, Ottawa, Canada December 9, 05 In memory of Ferran Hurtado. Abstract

More information

On the Multiplicative Order of a n Modulo n

On the Multiplicative Order of a n Modulo n 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 13 2010), Article 10.2.1 On the Multilicative Order of a n Modulo n Jonathan Chaelo Université Lille Nord de France F-59000 Lille France jonathan.chaelon@lma.univ-littoral.fr

More information

MATH 361: NUMBER THEORY EIGHTH LECTURE

MATH 361: NUMBER THEORY EIGHTH LECTURE MATH 361: NUMBER THEORY EIGHTH LECTURE 1. Quadratic Recirocity: Introduction Quadratic recirocity is the first result of modern number theory. Lagrange conjectured it in the late 1700 s, but it was first

More information

Lilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3

Lilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3 Pesquisa Oeracional (2013) 33(1): 123-132 2013 Brazilian Oerations Research Society Printed version ISSN 0101-7438 / Online version ISSN 1678-5142 www.scielo.br/oe SOME RESULTS ABOUT THE CONNECTIVITY OF

More information

Factorability in the ring Z[ 5]

Factorability in the ring Z[ 5] University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Dissertations, Theses, and Student Research Paers in Mathematics Mathematics, Deartment of 4-2004 Factorability in the ring

More information

CERIAS Tech Report The period of the Bell numbers modulo a prime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education

CERIAS Tech Report The period of the Bell numbers modulo a prime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education CERIAS Tech Reort 2010-01 The eriod of the Bell numbers modulo a rime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education and Research Information Assurance and Security Purdue University,

More information

IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES

IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES OHAD GILADI AND ASSAF NAOR Abstract. It is shown that if (, ) is a Banach sace with Rademacher tye 1 then for every n N there exists

More information

Assignment 1 Solutions Structural Induction and First-Order Logic Due: 11am on Monday 26th August 2013

Assignment 1 Solutions Structural Induction and First-Order Logic Due: 11am on Monday 26th August 2013 Deartment of Comuter Science, Australian National University COMP2600 Formal Methods in Software Engineering Semester 2, 2013 Assignment 1 Solutions Structural Induction and First-Order Logic Due: 11am

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

Distributed Maximality based CTL Model Checking

Distributed Maximality based CTL Model Checking IJCSI International Journal of Comuter Science Issues Vol 7 Issue No ay ISSN Onlin: 694-784 ISSN Print: 694-84 Distributed aximality based CTL odel Checking Djamel Eddine Saidouni ine EL Abidine Bouneb

More information

The Fekete Szegő theorem with splitting conditions: Part I

The Fekete Szegő theorem with splitting conditions: Part I ACTA ARITHMETICA XCIII.2 (2000) The Fekete Szegő theorem with slitting conditions: Part I by Robert Rumely (Athens, GA) A classical theorem of Fekete and Szegő [4] says that if E is a comact set in the

More information

Real Analysis 1 Fall Homework 3. a n.

Real Analysis 1 Fall Homework 3. a n. eal Analysis Fall 06 Homework 3. Let and consider the measure sace N, P, µ, where µ is counting measure. That is, if N, then µ equals the number of elements in if is finite; µ = otherwise. One usually

More information

Fault Tolerant Quantum Computing Robert Rogers, Thomas Sylwester, Abe Pauls

Fault Tolerant Quantum Computing Robert Rogers, Thomas Sylwester, Abe Pauls CIS 410/510, Introduction to Quantum Information Theory Due: June 8th, 2016 Sring 2016, University of Oregon Date: June 7, 2016 Fault Tolerant Quantum Comuting Robert Rogers, Thomas Sylwester, Abe Pauls

More information

MAZUR S CONSTRUCTION OF THE KUBOTA LEPOLDT p-adic L-FUNCTION. n s = p. (1 p s ) 1.

MAZUR S CONSTRUCTION OF THE KUBOTA LEPOLDT p-adic L-FUNCTION. n s = p. (1 p s ) 1. MAZUR S CONSTRUCTION OF THE KUBOTA LEPOLDT -ADIC L-FUNCTION XEVI GUITART Abstract. We give an overview of Mazur s construction of the Kubota Leooldt -adic L- function as the -adic Mellin transform of a

More information

BEST POSSIBLE DENSITIES OF DICKSON m-tuples, AS A CONSEQUENCE OF ZHANG-MAYNARD-TAO

BEST POSSIBLE DENSITIES OF DICKSON m-tuples, AS A CONSEQUENCE OF ZHANG-MAYNARD-TAO BEST POSSIBLE DENSITIES OF DICKSON m-tuples, AS A CONSEQUENCE OF ZHANG-MAYNARD-TAO ANDREW GRANVILLE, DANIEL M. KANE, DIMITRIS KOUKOULOPOULOS, AND ROBERT J. LEMKE OLIVER Abstract. We determine for what

More information

A CLASS OF ALGEBRAIC-EXPONENTIAL CONGRUENCES MODULO p. 1. Introduction

A CLASS OF ALGEBRAIC-EXPONENTIAL CONGRUENCES MODULO p. 1. Introduction Acta Math. Univ. Comenianae Vol. LXXI, (2002),. 3 7 3 A CLASS OF ALGEBRAIC-EXPONENTIAL CONGRUENCES MODULO C. COBELI, M. VÂJÂITU and A. ZAHARESCU Abstract. Let be a rime number, J a set of consecutive integers,

More information

The Hasse Minkowski Theorem Lee Dicker University of Minnesota, REU Summer 2001

The Hasse Minkowski Theorem Lee Dicker University of Minnesota, REU Summer 2001 The Hasse Minkowski Theorem Lee Dicker University of Minnesota, REU Summer 2001 The Hasse-Minkowski Theorem rovides a characterization of the rational quadratic forms. What follows is a roof of the Hasse-Minkowski

More information

A Note on Guaranteed Sparse Recovery via l 1 -Minimization

A Note on Guaranteed Sparse Recovery via l 1 -Minimization A Note on Guaranteed Sarse Recovery via l -Minimization Simon Foucart, Université Pierre et Marie Curie Abstract It is roved that every s-sarse vector x C N can be recovered from the measurement vector

More information

Weakly Short Memory Stochastic Processes: Signal Processing Perspectives

Weakly Short Memory Stochastic Processes: Signal Processing Perspectives Weakly Short emory Stochastic Processes: Signal Processing Persectives by Garimella Ramamurthy Reort No: IIIT/TR/9/85 Centre for Security, Theory and Algorithms International Institute of Information Technology

More information

RECIPROCITY LAWS JEREMY BOOHER

RECIPROCITY LAWS JEREMY BOOHER RECIPROCITY LAWS JEREMY BOOHER 1 Introduction The law of uadratic recirocity gives a beautiful descrition of which rimes are suares modulo Secial cases of this law going back to Fermat, and Euler and Legendre

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

GRACEFUL NUMBERS. KIRAN R. BHUTANI and ALEXANDER B. LEVIN. Received 14 May 2001

GRACEFUL NUMBERS. KIRAN R. BHUTANI and ALEXANDER B. LEVIN. Received 14 May 2001 IJMMS 29:8 2002 495 499 PII S06720200765 htt://immshindawicom Hindawi Publishing Cor GRACEFUL NUMBERS KIRAN R BHUTANI and ALEXANDER B LEVIN Received 4 May 200 We construct a labeled grah Dn that reflects

More information

POINTS ON CONICS MODULO p

POINTS ON CONICS MODULO p POINTS ON CONICS MODULO TEAM 2: JONGMIN BAEK, ANAND DEOPURKAR, AND KATHERINE REDFIELD Abstract. We comute the number of integer oints on conics modulo, where is an odd rime. We extend our results to conics

More information

ON UNIFORM BOUNDEDNESS OF DYADIC AVERAGING OPERATORS IN SPACES OF HARDY-SOBOLEV TYPE. 1. Introduction

ON UNIFORM BOUNDEDNESS OF DYADIC AVERAGING OPERATORS IN SPACES OF HARDY-SOBOLEV TYPE. 1. Introduction ON UNIFORM BOUNDEDNESS OF DYADIC AVERAGING OPERATORS IN SPACES OF HARDY-SOBOLEV TYPE GUSTAVO GARRIGÓS ANDREAS SEEGER TINO ULLRICH Abstract We give an alternative roof and a wavelet analog of recent results

More information

Computation Tree Logic

Computation Tree Logic Comutation Tree Logic Finite State Model Checking of Branching Time Logic Kim Guldstrand Larsen BRICS@Aalborg 1 Tool Suort Finite State Systems System Descrition A Reuirement F CTL TOOL Course Objectives:

More information

Understanding DPMFoam/MPPICFoam

Understanding DPMFoam/MPPICFoam Understanding DPMFoam/MPPICFoam Jeroen Hofman March 18, 2015 In this document I intend to clarify the flow solver and at a later stage, the article-fluid and article-article interaction forces as imlemented

More information

p-adic Properties of Lengyel s Numbers

p-adic Properties of Lengyel s Numbers 1 3 47 6 3 11 Journal of Integer Sequences, Vol. 17 (014), Article 14.7.3 -adic Proerties of Lengyel s Numbers D. Barsky 7 rue La Condamine 75017 Paris France barsky.daniel@orange.fr J.-P. Bézivin 1, Allée

More information

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th 18.415/6.854 Advanced Algorithms ovember 7, 1996 Euclidean TSP (art I) Lecturer: Michel X. Goemans MIT These notes are based on scribe notes by Marios Paaefthymiou and Mike Klugerman. 1 Euclidean TSP Consider

More information

δ(xy) = φ(x)δ(y) + y p δ(x). (1)

δ(xy) = φ(x)δ(y) + y p δ(x). (1) LECTURE II: δ-rings Fix a rime. In this lecture, we discuss some asects of the theory of δ-rings. This theory rovides a good language to talk about rings with a lift of Frobenius modulo. Some of the material

More information

A review of the foundations of perfectoid spaces

A review of the foundations of perfectoid spaces A review of the foundations of erfectoid saces (Notes for some talks in the Fargues Fontaine curve study grou at Harvard, Oct./Nov. 2017) Matthew Morrow Abstract We give a reasonably detailed overview

More information

Dirichlet s Theorem on Arithmetic Progressions

Dirichlet s Theorem on Arithmetic Progressions Dirichlet s Theorem on Arithmetic Progressions Thai Pham Massachusetts Institute of Technology May 2, 202 Abstract In this aer, we derive a roof of Dirichlet s theorem on rimes in arithmetic rogressions.

More information

A Social Welfare Optimal Sequential Allocation Procedure

A Social Welfare Optimal Sequential Allocation Procedure A Social Welfare Otimal Sequential Allocation Procedure Thomas Kalinowsi Universität Rostoc, Germany Nina Narodytsa and Toby Walsh NICTA and UNSW, Australia May 2, 201 Abstract We consider a simle sequential

More information

A viability result for second-order differential inclusions

A viability result for second-order differential inclusions Electronic Journal of Differential Equations Vol. 00(00) No. 76. 1 1. ISSN: 107-6691. URL: htt://ejde.math.swt.edu or htt://ejde.math.unt.edu ft ejde.math.swt.edu (login: ft) A viability result for second-order

More information

19th Bay Area Mathematical Olympiad. Problems and Solutions. February 28, 2017

19th Bay Area Mathematical Olympiad. Problems and Solutions. February 28, 2017 th Bay Area Mathematical Olymiad February, 07 Problems and Solutions BAMO- and BAMO- are each 5-question essay-roof exams, for middle- and high-school students, resectively. The roblems in each exam are

More information

QUADRATIC RECIPROCITY

QUADRATIC RECIPROCITY QUADRATIC RECIPROCIT POOJA PATEL Abstract. This aer is an self-contained exosition of the law of uadratic recirocity. We will give two roofs of the Chinese remainder theorem and a roof of uadratic recirocity.

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information