On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40

Size: px
Start display at page:

Download "On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40"

Transcription

1 On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering within both X and Y, how any coparisons are needed to deterine the order on X Y? This proble is a natural generalization of the list erging proble. While searching in partially ordered sets and sorting partially ordered sets have been considered before, it sees that the proble of poset erging is an unexplored one. We present efficient algoriths for this proble, and show the first lower bounds. In certain cases, our algoriths use the optial nuber of coparisons. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40 1 Introduction Role based access control is a syste of security which has generated a lot of recent interest within the database counity, since it is able to odel any sorts of security requireents [14]. In the role based odel of Nyanchaa and Osborn [13], security privileges are odeled using a directed acyclic graph called a role graph. Each user is a node in the graph. There is a directed path fro user s to user t if and only if the privileges of s are a superset of those of t. The role graph induces a partial order on the set of users. Database interoperability and federated databases [15] are two iportant current research topics in databases. A basic requireent for both interoperability and federation is that one should be able to integrate access control inforation [14]. The study of interoperability in role based access control was initiated by Osborn [14], who gave an algorith for erging two role graphs. Inspired by [14], we further study the proble of erging role graphs. Proble Description: Let S be a finite set. A subset R of S S is called a binary relation on S. In this paper, we write x y if (x, y) R. As usual, we call the binary relation a partial order on S if it has the following three properties, for all x, y, z S: (1) Reflexivity: x x; (2) Antisyetry: x y and y x iply x = y; (3) Transitivity: x y and y z iply x z. Supported in part by NSF grant ITR Address: Departent of Coputer Science, 298 Coates Hall, Louisiana State University, Baton Rouge, LA Eail: chen@bit.csc.lsu.edu and sseiden@ac.org. Address: Departent of Matheatics, Louisiana State University, Baton Rouge, LA Eail: ding@ath.lsu.edu. 1

2 S will be called a partially ordered set, or siply, a poset, if is a partial order on S. We will write (S; ) if we need to specify. We also write s t if s t but s t. We use the notation s t to indicate that s and t are incoparable, i.e. (s, t) R and (t, s) R. A poset where all pairs of eleents are coparable is called a total order. A subset T of S where all eleents are coparable is called a chain. A poset can be represented by a directed acyclic graph G(S; ), where there is a directed path fro s to t in G(S; ) if and only if s t. We also define G(T ; ) analogously for any subset T of S. A coparison between two eleents s, t S returns one of three distinct values, naely s t, s t or s t. Suppose we have a partially ordered set S, which is partitioned into X and Y. In this paper, we exaine the question How any coparisons are required to construct G(S; ) given G(X; ) and G(Y ; )? We call this the poset erging proble. If S is totally ordered, then this is exactly the ordinary list erging proble. Two closely related probles are as follows: In the poset sorting proble, one is given no initial inforation and asked to deterine G(S; ). In the poset searching proble, we have a partially ordered set S and a subset T of S. We are given G(T ; ). We wish to answer queries of the for Does a given eleent s S belong to T? As with poset erging, in both of these probles the goal is to use the iniu nuber of coparisons. Three natural ways to categorize posets are width, diension and nuber of ideals, all easure how close a poset is to being totally ordered. We explain these easures briefly. An antichain of poset (S; ) is a subset T of S where all eleents are pairwise incoparable. The width of (S; ) is the cardinality of the largest antichain. A well known result of Dilworth [2] tells us that any poset of width w can be partitioned into w chains. A poset has diension d if it is the intersection of d total orders. An ideal in (S; ) is a subset T of S closed under. Algoriths that operate on posets often have running ties bounded as soe function of their size and one or ore of three paraeters just described. Previous Results: To the best of our knowledge, the poset erging proble have not been previously investigated. The role-graph erging algorith of Osborn [14] is a naïve poset erging algorith. It requires n+ 1 i=n i coparisons to erge two role-graphs (acyclic digraphs) on and n vertices. Next, we explore briefly what is known about the list erging proble. For a ore coplete treatent, we refer the reader to Section of Knuth [10]. We denote the iniu nuber of coparisons to erge two sorted lists of lengths n and by M(, n). As is standard in the erging literature, we always assue that n. The Linear erge algorith [10] iplies that M(, n) n + 1. Knuth [10] credits Graha and Karp with independently showing that M(, ) 2 1 and M(, + 1) 2. Stockeyer and Yao [16] show that M(, + d) 2 + d 1 for all 2d 2. Therefore, Linear is optial for these cases. Knuth [10] generalizes the arguent of Graha and Karp to obtain lower bounds for sall values of n and. The inforation theoretic bound [10] states that for all n and ( ) + n M(, n) log 2. When = 1, the inforation theoretic bound is tight, since binary search can be used to find the position for a single eleent using log 2 (n + 1) coparisons. Graha [6] and independently Hwang and Lin [8] show that 7 M(2, n) = log 2 12 (n + 1) 14 + log 2 17 (n + 1). 2

3 The first general erging procedure to outperfor Linear was proposed by Hwang and Lin [9]. Their algorith is a cobination of Linear and binary search. They show that the nuber of coparisons it uses is at ost ( ) + n log A series of increasingly coplicated and specialized algoriths have been developed by Hwang and Deutsch [7], Manacher [12], and Christen [1]. These algoriths provide iproved bounds for sall. Poset searching was first investigated by Linial and Saks [11]. They generalize binary search by defining the concept of a central eleent in a poset. By coparing the candidate eleent with the central eleent, we can eliinate a constant fraction of the ideals in the poset. They show that such eleents always exist, and that therefore searching can be accoplished using O(log N) coparisons, where N is the nuber of ideals in the poset. Unfortunately, there is no known polynoial tie algorith for finding central eleents [3]. The proble of poset sorting has also received soe attention. The case where there is a total order is, of course, the standard sorting proble, which has been studied extensively [10]. Poset sorting was first studied by Faigle and Turán [4]. Let w be the width of a poset and N be the nuber of ideals. Faigle and Turán show a nuber of upper and lower bounds, the ain upper bound being O (in{n log N, wn log n}) on the nuber of coparisons required for sorting. The situation with lower bounds is not very good. If the poset is an antichain, then ( n 2) coparisons are required. However, if the width is w, the best lower bound on the nuber of coparisons is n log 3 n n log 3 w 5n. Further, the O(n log N) upper bound relies on the recognition of central eleents [11]. Felsner, Kant, Rangan and Wagner [5] iprove the lower order ters in the O (wn log n) upper bound on poset sorting. Our Results: In this paper, we will give the first set of lower bounds and the first two non-trivial algoriths for poset erging. Our lower bounds generalize the adversary arguent of Graha and Karp [10], and the inforation theoretic bound [10]. Our first algorith is a generalization of the Linear algorith. We will prove that this algorith is optial when erging partial orders consisting of two equal sized chains. Our second algorith uses any list erging algorith A as a subroutine. When A is the Hwang-Lin algorith, we show that the nuber of coparisons used is at ost 4 3 (recall that n) ore than optial when two total orders are erged. Most of our results bound the nuber of coparisons using soe function of the widths of the posets being erged. 2 Preliinaries For a binary relation R on S, for any two eleents x and y of S, adding (x, y) to R or deleting (x, y) fro R siply results in a new binary relation R {(x, y)} or R {(x, y)}, respectively. 3

4 In this paper, the posets to be erged are always denoted by X and Y. We define = X, n = Y and assue that 0 < n. We define v and w n to be the widths of X and Y, respectively. In this case, we always assue that X and Y are given decoposed as chains X 1,..., X v and Y 1,..., Y w. If X and Y are not in this forat, they can be decoposed in polynoial tie without using any coparisons (all relations within X and Y are already known). Clearly, the width of X Y is at ost v + w. In general, if (S; ) is a poset of width w then G(S; ) can be represented using O(w S ) space. If C S is a chain in (S; ) and s S, then the greatest lower bound of s in C is an eleent c such that c s and c s for all c C such that c c. If such a c exists, then it is unique. If c does not exist, we define the greatest lower bound to be. The least upper bound of s in C is the unique eleent c such that s c and s c for all c C such that c c. Analogously, if c does not exist, we define the least upper bound to be. Suppose S 1,..., S w is a decoposition of S. Each eleent s S is copletely defined by its w least upper bounds and w greatest lower bounds with respect to the chains S 1... S w. We use 2w pointers for each eleent, and w global pointers to indicate the head of each chain. We call these pointers glb(s, S i ) and lub(s, S i ) for s S and 1 i w. So we can think of the proble of erging X and Y as that of correctly assigning glb(x, Y i ) and lub(x, Y i ) for all x X and 1 i w and glb(y, X i ) and lub(y, X i ) for all y Y and 1 i v. 3 Generalizing the Linear Algorith We start by presenting an algorith PLinear for erging two chains of a poset. PLinear is a natural generalization of the Linear erging algorith and, as shown later, the nuber of coparisons used by PLinear is optial when the two chains have equal size. At the end of this section, we will show how PLinear can be adapted to erge two general posets. Suppose we are given a poset (X Y ; ), where X = {x 1, x 2,..., x } and Y = {y 1, y 2,..., y n }. Let us also assue that x i x j and y i y j for all i j. Algorith PLinear, which is given in Figure 1 below, operates in two phases. In the first phase, we recognize all relations of the for x i y j, while in the second phase we recognize all relations of the for y i x j. Other than bookkeeping, the second phase works in the sae way as the first one does. Proposition 3.1 PLinear is correct. Proof. Since X and Y are syetric, we only need to consider Phase 1. We will show, for each i, that x i y j if and only if the algorith declares so. First, suppose i is the kind of index for which the algorith detects x i y j, for soe j, and also declares x i y k, for all k j. Since is transitive, the algorith is obviously correct for all k j. For each k < j, notice that when the subscript of y turns fro k to k + 1 in the algorith, there exists i i such that x i y k. By transitivity, we ust have x i y k, as we wanted. Next, let i be an index such that x i y j is never detected, for any j. There are two possible situations here, either x i is not copared with any y j, or x i is copared with soe y j but x i y j never occurred. In both cases, it is clear that the algorith terinates because the subscript of y turns fro n to n + 1. Consequently, there exists i with x i y n. Notice that i > i in the first situation and i = i in the second situation. Now by transitivity, it is easy to see that x i y j for all j. 4

5 Algorith PLinear: Phase 1. We start with i = j = 1 and terinate when i > or j > n. In a general step, we copare x i with y j and record the result. If x i y j, declare x i y k for all k j, set i = i + 1, and then repeat. If x i y j, set j = j + 1 and repeat. Phase 2. We start with i = j = 1 and terinate when i > n or j >. In a general step, we copare y i with x j, in case these two were not copared in Phase 1 (if they have been copared in Phase 1, we use our record and this saves one coparison). If y i x j, declare y i x k for all k j, set i = i + 1, and then repeat. If y i x j, set j = j + 1 and repeat. Figure 1: The PLinear algorith. In order to analyze the coplexity of PLinear, we need to distinguish between coparisons that are ade or requested by the algorith. They are the sae in Phase 1. But in Phase 2, when a coparison is requested, the result ight be given by the record. Proposition 3.2 When the coparison of x i and y j is requested, within that phase, PLinear has requested, including this pair, i + j 1 coparisons. Proof. This is clear when i = j = 1. Notice that, after each coparison, one of i and j is increased by one and the other reains the sae. This behaves exactly the sae as the forula i + j 1. Thus the proposition is proved. Theore 3.1 If + n > 2, then PLinear akes at ost 2 + 2n 4 coparisons when it terinates. Proof. Let C 1 and C 2 be the nuber of coparisons requested in Phases 1 and 2, respectively. Let C be the nuber of coparisons ade in both phases and let δ be the nuber of coparisons requested but not ade in Phase 2. Then it is clear that C = C 1 + C 2 δ. Notice that both phases start with the request of coparing x 1 with y 1. It follows that δ 1. By the last proposition, it is clear that C 1 + n 1 and C 2 + n 1. If at least one of the holds with strict inequality, then C 2 + 2n 4 and we are done. Thus we ay assue C 1 = C 2 = + n 1. But, by Proposition 3.2, each phase terinates only after the request of coparing x with y n. Since + n > 2, we have (1, 1) (, n). Therefore, δ 2 and so C 2 + 2n 4, as we wanted. Clearly, when + n 2, that is, when = n = 1 (as 0 < n), PLinear uses only one coparison, which is obviously the best possible. In fact, it will follow fro Theore 5.2 that, in the coparison odel, PLinear is also optial when = n 2. 5

6 Finally, we explain how to use PLinear to erge two general posets X and Y. As discussed earlier in Section 2, we assue that both X and Y are decoposed into chains X 1,..., X v and Y 1,..., Y w, where v and w are the widths of X and Y, respectively. Now PLinear adapts easily to the general situation: We siply apply the algorith to (X i, Y j ) for all 1 i v and 1 j w. To count the nuber of coparisons used by the algorith, we need a couple of ore definitions. Let S be a poset of width k and let S 1,..., S k be a partition of S into chains. The partition is balanced if the cardinality of {S i : S i = 1} is iniized, over all partitions of S into k chains. We denote this iniu value by λ(s). Theore 3.2 If PLinear is used to erge X and Y, as suggested above, than it akes at ost 2w + 2vn 4vw + λ(x)λ(y ) coparisons. Proof. To erge X and Y using PLinear, we need to first decopose the into chains. For the purpose of counting the nuber of coparisons used by the algorith, we assue that the partitions are balanced. Since we know the coplete inforation on both X and Y, finding such a decoposition does not cost any coparisons. Let i = X i for 1 i v and n i = Y i for 1 i w. Let λ(x i, Y j ) = 1 if i = n j = 1, and λ(x i, Y j ) = 0 if otherwise. Then, by Theore 3.1, we need at ost 2 i + 2n j 4 + λ(x i, Y j ) coparisons to erge X i and Y j. Thus, the total nuber of coparisons used is at ost as we wanted. v w {2 i + 2n j 4 + λ(x i, Y j )} = 2w + 2vn 4vw + λ(x)λ(y ), i=1 j=1 4 Upper Bounds for Sall The poset erging algorith given in the previous section is based on Linear. As we will see in the next section (Theore 5.2) that Linear is optial for erging partial orders consisting of two equal sized chains. In this section, we develop algoriths, which perfor better than Linear when erging a large chain with a sall one. To facilitate this, we present a general ethod for applying a list erging algorith to poset erging. Again, we exaine first the case of erging two total orders. Given any algorith A for list erging, we define an algorith PMerge(A, X, Y ) for erging two total orders: We assue A uses a total order coparison operation in the process of erging X and Y. The algorith appears in Figure 2 below. As before, this algorith can be easily generalized to erge general posets, just apply the algorith to all pairs (X i, Y j ) of chains. Let a(, n) be the axiu nuber of coparisons used by A in erging a list of size with one of size n. We say a erging algorith A is consistent if for all and n there exist i and j such that for all X = {x 1,..., x } and Y = {y 1,..., y n } the first coparison ade by A is x i y j. Note that all erging algoriths in the literature are consistent. Theore 4.1 PMerge is correct. Further, if A is consistent it uses at ost 2a(, n) 1 coparisons. 6

7 Algorith PMerge(A, X, Y ): 1. Phase(A, X, Y ). 2. Phase(A, Y, X). Phase(A, U, V ): 1. Define as follows: If a b then a b if and only if (a, b) U V. If a and b are coparable then a b if and only if a b. 2. Use A to erge U and V to get list Z = z 1,..., z n+. 3. z 0 and l For i 1,..., n + : If z i V then l i else glb(z i, V ) z l. 5. z n++1 and l n For i n +,..., 1: If z i U then l i else lub(z i, U) z l. Figure 2: The PMerge algorith. Proof. During a call to Phase, the variables glb(u, V ), u U are assigned in Steps 3 and 4. A erges U and V to get Z using the definition of in Step 1 of Phase. Note that is a total order on U V. If z i U then z j z i for all j i and z j z i for all j > i. Define V = V { }. It is easy to prove by induction that at each iteration of Step 4, l is the axiu index j i such that z j V. Clearly, z l is axial in V {z 1,..., z i }. Therefore z l is the greatest lower bound of z i in V. Also during Phase, the variables lub(v, U), v V are assigned in Steps 5 and 6. Define U = U { }. It is easy to prove by induction that at each iteration of Step 6, l is the iniu index j i such that z j U. If z i V then z i z j for all j < i and z i z j for all j i. Therefore z l is inial aong U {z i,..., z n+ } and it is the least upper bound of z i in U. During the two calls to Phase, all the variables glb(y, X), y Y ; lub(x, Y ), x X; glb(x, Y ), x X and lub(y, X), y Y are assigned. Obviously, PMerge uses at ost 2a(, n) coparisons, since it uses A to erge X and Y twice. If A is consistent, the first tie we erge X and Y, we record the outcoe of the first coparison and then recall it the second tie we erge the. To understand how well the algorith PMerge perfors, let us define T (, n) to be the nuber of coparisons required to erge two total orders of sizes and n. We point out in the following that the nuber of coparisons used by PMerge is not too far away fro T (, n). In order to do so, we have to use not only Theore 4.1, but also a result fro the next section which tells us a lower bound on T (, n). We choose to present this result here, instead of waiting till 7

8 the lower bounds have been established, because we do not like to put it too far away fro the algorith. Corollary 4.1 PMerge uses at ost T (, n) coparisons. Proof. Let A be the Hwang-Lin algorith [9], which is a generalization of both binary search and Linear. Then, by [9], we have a(, n) log 2 ( + n ) + 1. Now it follows fro Theore 4.1 that the nuber of coparisons used by PMerge is at ost ( ) + n 2a(, n) 1 2 log = 2 2 = 2 ( + n)( 1 + n) (1 + n) log 2! ( + n/2 )( 1 + n/2 ) (1 + n/2 ) log 2! ( ) + n/2 log T (, n) + 4 3, where the last step is by Theore 5.3 fro the next section It should be pointed out that Corollary 4.1 can be further iproved by using ore sophisticated algoriths for A, for instance the algorith of Christen [1]. It should also be ephasized again that, as with PLinear, PMerge can be easily adapted to general poset erging. 5 Lower Bounds In this section, we show the first lower bounds for poset erging. We begin by showing that if v and w are arbitrary, then n coparisons are required. We then show lower bounds for the erging of two total orders. As we shall see, this special case turns out to be quite iportant. We are able to generalize these lower bounds for erging two total orders to get lower bounds which are functions of v and w. Theore 5.1 If both X and Y are antichains then poset erging requires n coparisons. Proof. We prove the theore by using the following siple adversary arguent: Each tie the algorith copares two eleents, answer incoparable. Suppose the algorith outputs a candidate for G(X Y ; ) but does not copare soe eleent x X with soe eleent y Y. Then x y and x y are both consistent with all coparisons ade, so the adversary can assign the relation between x and y in such a way that the algorith s answer is wrong. 8

9 We now consider the erging of two total orders. Recall that T (, n) is the nuber of coparisons required to erge two total orders of sizes and n. We start by considering n =, and then ove to the general case. When the total orders are the sae size, we show { n if n = 0 or 1 T (n, n) β(n) = 4n 4 if n 2. Let X = {x 1, x 2,..., x } and Y = {y 1, y 2,..., y n } be disjoint sets. Suppose a binary relation on X Y satisfies the following: (i) x i x j if and only if i j; (i ) y i y j if and only if i j; (ii) x ( ) i y j iplies x i y j for all j j, and x i y j for all i i; (ii ) y i x j iplies y i x j for all j j, and y i x j for all i i; (iii) x i y j x k iplies i < k; (iii ) y i x j y k iplies i < k. Then we prove a few propositions on. Proposition 5.1 The binary relation is a partial order. Proof. First, since X and Y are disjoint, (i) and (i ) directly iply reflexivity. If a, b X then (i) iplies antisyetry, while if a, b Y then (i ) iplies it. If a X and b Y, then a b since X and Y are disjoint. Suppose both a b and b a. Condition (iii) gives us a contradiction. If a Y and b X, the arguent is analogous. Therefore, antisyetry holds in all cases. Now consider transitivity. Suppose a, b, c X Y with a b c. We need to show that a c. Since X and Y are syetric, we ay assue, without loss of generality, that a = x i, for soe i. We first consider the case b = y j, for soe j. If c = y k, for soe k, then, by (i ), j k and thus, by (ii), a c holds. If c = x k, for soe k, then, by (iii), i k and thus, by (i), a c holds. The case b = x j, for soe j, is siilar to the last case. It follows fro (i) that i j. If c = x k, for soe k, then we deduce a c fro (i). If c = y k, for soe k, then we deduce a c fro (ii). Proposition 5.2 Suppose there are indices p and q such that x p y q and neither x p y q 1 nor x p+1 y q holds. Then the binary relation obtained by deleting (x p, y q ) fro also satisfies (*). Proof. It is clear that we only need to verify (ii), since all other conditions are obviously satisfied. Suppose, on the contrary, that, for soe i and j, we have x i y j while either x i y j for soe j j or x i y j for soe i i. By the definition of it is easy to see that (i, j ) = (p, q) in the first case, and (i, j) = (p, q) in the second case. It follows that, in the first case, q 1 j and thus x p y q 1 (as satisfies (ii)), while in the second case, p + 1 i and thus x p+1 y q (also because satisfies (ii)), both contradict our assuption. Reark 5.1 By the syetry between X and Y, if there are indices p and q such that y p x q and neither y p x q 1 nor y p+1 x q holds, then the binary relation obtained by deleting (y p, x q ) fro also satisfies (*). 9

10 Proposition 5.3 Suppose x p y q and y q x p. If both x p y q+1 and x p 1 y q hold, then the binary relation obtained by adding (x p, y q ) to also satisfies (*). Proof. It is clear that we only need to verify (ii), (iii), and (iii ), since all other conditions are obviously satisfied. If (iii) or (iii ) is violated, then there exists either k < p with y q x k or i > q with y i x p. In both cases, we deduce fro (ii ) that y q x p, a contradiction. Now it reains to prove (ii). Clearly, if (ii) does not hold, then we ust have (i, j) = (p, q). In addition, we ust also have either x i y j for soe j > j or x i y j for soe i < i. It follows that, in the first case, q + 1 j and thus x p y q+1, while in the second case, p 1 i and thus x p 1 y q. This contradiction copletes our proof of the proposition. Reark 5.2 By the syetry between X and Y, if y p x q, x q y p, y p x q+1, and y p 1 x q hold, then the binary relation obtained by adding (y p, x q ) to also satisfies (*). In the following, we consider a special poset. Let X = {x 1, x 2,..., x n } and Y = {y 1, y 2,..., y n }, where n 2. Let us define a binary relation on X Y as follows: (a) x i x j and y i y j for all i j; (b) x i y j if and only if j i 2; (c) y i x j if and only if j i 1. It is not difficult to see that satisfies (*) and thus, by Proposition 5.1, X Y is partially ordered by. Let R 1 = {(x i, y i+2 ) : i = 1, 2,..., n 2}, R 2 = {(y i, x i+1 ) : i = 1, 2,..., n 1}, R 3 = {(x i, y i+1 ) : i = 1, 2,..., n 1}, and R 4 = {(y i, x i ) : i = 1, 2,..., n}. Proposition 5.4 If (a, b) R 1 R 2, then deleting (a, b) fro the partial order results in a new partial order. Proof. It is straightforward to verify that the assuption here satisfies the assuptions of Proposition 5.2 or Reark 5.1. Then the result follows iediately fro Proposition 5.1. Proposition 5.5 If (a, b) R 3 R 4, then adding (a, b) to the partial order results in a new partial order. Proof. This is very siilar to the last proof. It is straightforward to verify that the assuption here satisfies the assuptions of Proposition 5.3 or Reark 5.2. Then the result follows iediately fro Proposition 5.1. Theore 5.2 The nuber of coparisons needed to recognize (X Y ; ) is at least β(n). Proof. If an algorith has ade less than β(n) coparisons, then for soe (a, b) R 1 R 2 R 3 R 4, a and b are not copared by the algorith, as R 1 R 2 R 3 R 4 = β(n). However, by Propositions 5.4 and 5.5, there is another partial order that agrees with everywhere else, except for (a, b). Thus the algorith cannot deterine if the partial order is or. 10

11 As entioned earlier in Section 3, by cobining Theore 3.1 and Theore 5.2 we conclude that PLinear is optial when erging two total orders of the sae size. Theore 5.2 also generalizes easily as follows: Suppose n/w = /v = k is integral. Then a lower bound for erging X and Y is vwβ(k). To see this, consider the case where n i = k for all 1 i w and j = k for all 1 j v. For all x, x X, x x if and only x X i, x X j with i j. In other words, only eleents within a chain are coparable in X. The sae condition holds for Y. Then, for all pairs (i, j) and (k, l), it is not difficult to see that X i erges with Y j independently of how X k erges with Y l, since G(X i Y j ; ) and G(X k Y l ; ) are independent. We now give a general lower bound for erging two total orders: Theore 5.3 For all positive integers and n, ( ) ( ) n/2 + n/2 + T (, n) log 2 + log 2. Proof. The proof is a variation on the inforation-theoretic lower bound for erging. Let X and Y be total orders with X = n and Y =. Let k = n/2. We consider only instances X, Y where glb(y, X) x k and x k+1 lub(y, X) for all y Y. We further require that for all y, y Y such that y y, glb(y, X) glb(y, X) and lub(y, X) lub(y, X). It is easy to verify that the conditions (*) hold in this case, so we have a partial order. For instances of this type, erging X and Y involves solving two totally independent sub-probles. The first is to deterine glb(y, X) for all y Y. The nuber of possible solutions to this sub-proble is s = ( n/2 +). Note that in solving this sub-proble, the three outcoes of a coparison really only give us one bit of inforation. That is, when coparing an eleent y Y with x i for i k, we never get the answer y x i. Therefore, the nuber of coparisons needed is at least log 2 s. A siilar arguent holds for the sub-proble of deterining lub(y, X) for all y Y. 6 Suary and Future Research Directions Poset erging is an iportant but understudied research area. In this paper, we have presented the first non-trivial upper bounds, and the first lower bounds for this proble. We proved that our upper bounds are not too far away fro our lower bounds, and in soe cases, these two bounds are actually equal. In our odel, we do not ipose any condition on the union of the two posets to be erged. It will be very interesting to see whether tighter bounds exist if we do know soe extra inforation on the union. In particular, the following proble is still open: Suppose we are erging X and Y and we are given that the width of X Y is k < v + w. How can we use this inforation to reduce the nuber of coparisons? For instance, for n = and v = w = 1 if k = 2 we require at least coparisons, while if k = 1 we need at ost n + 1. Acknowledgent. We are grateful to the two anonyous referees for carefully reading our paper and for helping us iproving the paper. 11

12 References [1] Christen, C. Iproving the bounds on optial erging. In Proceedings of the 19th Annual Syposiu on Foundations of Coputer Science (Oct. 1978), pp [2] Dilworth, R. P. A decoposition theore for partially ordered sets. Annals of Matheatics 51 (1950), [3] Dubhashi, D. P., Mehlhorn, K., Ranjan, D., and Thiel, C. Searching, sorting and randoised algoriths for central eleents and ideal counting in posets. In Proceedings of the 13th Conference on Foundations of Software Technology and Theoretical Coputer Science (Dec. 1993), pp [4] Faigle, U., and Turán, G. Sorting and recognition probles for ordered sets. SIAM Journal on Coputing 17, 1 (Feb. 1988), [5] Felsner, S., Kant, R., Rangan, C., and Wagner, D. On the coplexity of partial order properties. ORDER: A Journal on the Theory of Ordered Sets and Its Applications 17, 2 (2000), [6] Graha, R. L. On sorting by coparisons. In Coputers in Nuber Theory: Proceedings of the Science Research Council Atlas Syposiu no. 2 (Aug. 1969), pp [7] Hwang, F. K., and Deutsch, D. N. A class of erging algoriths. Journal of the ACM 20, 1 (Jan. 1973), [8] Hwang, F. K., and Lin, S. Optial erging of 2 eleents with n eleents. Acta Inforatica 1, 2 (1971), [9] Hwang, F. K., and Lin, S. A siple algorith for erging two disjoint linearly ordered sets. SIAM Journal on Coputing 1, 1 (Mar. 1972), [10] Knuth, D. E. Sorting and Searching, second ed., vol. 3 of The Art of Coputer Prograing. Addison-Wesley, Reading, MA, USA, [11] Linial, N., and Saks, M. Every poset has a central eleent. Journal of Cobinatorial Theory, Series A 40 (1985), [12] Manacher, G. K. Significant iproveents to the Hwang-Lin erging algoriths. Journal of the ACM 26, 3 (July 1979), [13] Nyanchaa, M., and Osborn, S. The role graph odel and conflict of interest. ACM Transactions on Inforation and Systes Security 2, 1 (1999), [14] Osborn, S. Database security integration using role-based access control. In Proceedings of the IFIP WG11.3 Working Conference on Database Security (Aug. 2000), pp [15] Sheth, A. P., and Larson, J. A. Federated database systes for anaging distributed, heterogeneous, and autonoous databases. ACM Coputing Surveys 22, 3 (1990), [16] Stockeyer, P. K., and Yao, F. F. On the optiality of linear erge. SIAM Journal on Coputing 9, 1 (1980),

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest

More information

Homework 3 Solutions CSE 101 Summer 2017

Homework 3 Solutions CSE 101 Summer 2017 Hoework 3 Solutions CSE 0 Suer 207. Scheduling algoriths The following n = 2 jobs with given processing ties have to be scheduled on = 3 parallel and identical processors with the objective of iniizing

More information

Poly-Bernoulli Numbers and Eulerian Numbers

Poly-Bernoulli Numbers and Eulerian Numbers 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 21 (2018, Article 18.6.1 Poly-Bernoulli Nubers and Eulerian Nubers Beáta Bényi Faculty of Water Sciences National University of Public Service H-1441

More information

Lecture 21. Interior Point Methods Setup and Algorithm

Lecture 21. Interior Point Methods Setup and Algorithm Lecture 21 Interior Point Methods In 1984, Kararkar introduced a new weakly polynoial tie algorith for solving LPs [Kar84a], [Kar84b]. His algorith was theoretically faster than the ellipsoid ethod and

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography Tight Bounds for axial Identifiability of Failure Nodes in Boolean Network Toography Nicola Galesi Sapienza Università di Roa nicola.galesi@uniroa1.it Fariba Ranjbar Sapienza Università di Roa fariba.ranjbar@uniroa1.it

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs On the Inapproxiability of Vertex Cover on k-partite k-unifor Hypergraphs Venkatesan Guruswai and Rishi Saket Coputer Science Departent Carnegie Mellon University Pittsburgh, PA 1513. Abstract. Coputing

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

1 Proof of learning bounds

1 Proof of learning bounds COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #4 Scribe: Akshay Mittal February 13, 2013 1 Proof of learning bounds For intuition of the following theore, suppose there exists a

More information

Computable Shell Decomposition Bounds

Computable Shell Decomposition Bounds Coputable Shell Decoposition Bounds John Langford TTI-Chicago jcl@cs.cu.edu David McAllester TTI-Chicago dac@autoreason.co Editor: Leslie Pack Kaelbling and David Cohn Abstract Haussler, Kearns, Seung

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

#A52 INTEGERS 10 (2010), COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES

#A52 INTEGERS 10 (2010), COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES #A5 INTEGERS 10 (010), 697-703 COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES Bruce E Sagan 1 Departent of Matheatics, Michigan State University, East Lansing,

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

Acyclic Colorings of Directed Graphs

Acyclic Colorings of Directed Graphs Acyclic Colorings of Directed Graphs Noah Golowich Septeber 9, 014 arxiv:1409.7535v1 [ath.co] 6 Sep 014 Abstract The acyclic chroatic nuber of a directed graph D, denoted χ A (D), is the iniu positive

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths

More information

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3 A. Find all ordered pairs a, b) of positive integers for which a + b = 3 08. Answer. The six ordered pairs are 009, 08), 08, 009), 009 337, 674) = 35043, 674), 009 346, 673) = 3584, 673), 674, 009 337)

More information

Lecture 9 November 23, 2015

Lecture 9 November 23, 2015 CSC244: Discrepancy Theory in Coputer Science Fall 25 Aleksandar Nikolov Lecture 9 Noveber 23, 25 Scribe: Nick Spooner Properties of γ 2 Recall that γ 2 (A) is defined for A R n as follows: γ 2 (A) = in{r(u)

More information

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds

More information

The concavity and convexity of the Boros Moll sequences

The concavity and convexity of the Boros Moll sequences The concavity and convexity of the Boros Moll sequences Ernest X.W. Xia Departent of Matheatics Jiangsu University Zhenjiang, Jiangsu 1013, P.R. China ernestxwxia@163.co Subitted: Oct 1, 013; Accepted:

More information

Introduction to Discrete Optimization

Introduction to Discrete Optimization Prof. Friedrich Eisenbrand Martin Nieeier Due Date: March 9 9 Discussions: March 9 Introduction to Discrete Optiization Spring 9 s Exercise Consider a school district with I neighborhoods J schools and

More information

An EGZ generalization for 5 colors

An EGZ generalization for 5 colors An EGZ generalization for 5 colors David Grynkiewicz and Andrew Schultz July 6, 00 Abstract Let g zs(, k) (g zs(, k + 1)) be the inial integer such that any coloring of the integers fro U U k 1,..., g

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information

A Note on Online Scheduling for Jobs with Arbitrary Release Times

A Note on Online Scheduling for Jobs with Arbitrary Release Times A Note on Online Scheduling for Jobs with Arbitrary Release Ties Jihuan Ding, and Guochuan Zhang College of Operations Research and Manageent Science, Qufu Noral University, Rizhao 7686, China dingjihuan@hotail.co

More information

Computable Shell Decomposition Bounds

Computable Shell Decomposition Bounds Journal of Machine Learning Research 5 (2004) 529-547 Subitted 1/03; Revised 8/03; Published 5/04 Coputable Shell Decoposition Bounds John Langford David McAllester Toyota Technology Institute at Chicago

More information

On Process Complexity

On Process Complexity On Process Coplexity Ada R. Day School of Matheatics, Statistics and Coputer Science, Victoria University of Wellington, PO Box 600, Wellington 6140, New Zealand, Eail: ada.day@cs.vuw.ac.nz Abstract Process

More information

Solutions of some selected problems of Homework 4

Solutions of some selected problems of Homework 4 Solutions of soe selected probles of Hoework 4 Sangchul Lee May 7, 2018 Proble 1 Let there be light A professor has two light bulbs in his garage. When both are burned out, they are replaced, and the next

More information

The Euler-Maclaurin Formula and Sums of Powers

The Euler-Maclaurin Formula and Sums of Powers DRAFT VOL 79, NO 1, FEBRUARY 26 1 The Euler-Maclaurin Forula and Sus of Powers Michael Z Spivey University of Puget Sound Tacoa, WA 98416 spivey@upsedu Matheaticians have long been intrigued by the su

More information

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate The Siplex Method is Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010 Abstract In this note we prove that the classic siplex ethod with the ost-negativereduced-cost

More information

Estimating Entropy and Entropy Norm on Data Streams

Estimating Entropy and Entropy Norm on Data Streams Estiating Entropy and Entropy Nor on Data Streas Ait Chakrabarti 1, Khanh Do Ba 1, and S. Muthukrishnan 2 1 Departent of Coputer Science, Dartouth College, Hanover, NH 03755, USA 2 Departent of Coputer

More information

arxiv: v1 [cs.ds] 29 Jan 2012

arxiv: v1 [cs.ds] 29 Jan 2012 A parallel approxiation algorith for ixed packing covering seidefinite progras arxiv:1201.6090v1 [cs.ds] 29 Jan 2012 Rahul Jain National U. Singapore January 28, 2012 Abstract Penghui Yao National U. Singapore

More information

DSPACE(n)? = NSPACE(n): A Degree Theoretic Characterization

DSPACE(n)? = NSPACE(n): A Degree Theoretic Characterization DSPACE(n)? = NSPACE(n): A Degree Theoretic Characterization Manindra Agrawal Departent of Coputer Science and Engineering Indian Institute of Technology, Kanpur 208016, INDIA eail: anindra@iitk.ernet.in

More information

1 Identical Parallel Machines

1 Identical Parallel Machines FB3: Matheatik/Inforatik Dr. Syaantak Das Winter 2017/18 Optiizing under Uncertainty Lecture Notes 3: Scheduling to Miniize Makespan In any standard scheduling proble, we are given a set of jobs J = {j

More information

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product.

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product. Coding Theory Massoud Malek Reed-Muller Codes An iportant class of linear block codes rich in algebraic and geoetric structure is the class of Reed-Muller codes, which includes the Extended Haing code.

More information

time time δ jobs jobs

time time δ jobs jobs Approxiating Total Flow Tie on Parallel Machines Stefano Leonardi Danny Raz y Abstract We consider the proble of optiizing the total ow tie of a strea of jobs that are released over tie in a ultiprocessor

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

Kernel Methods and Support Vector Machines

Kernel Methods and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic

More information

Convex Programming for Scheduling Unrelated Parallel Machines

Convex Programming for Scheduling Unrelated Parallel Machines Convex Prograing for Scheduling Unrelated Parallel Machines Yossi Azar Air Epstein Abstract We consider the classical proble of scheduling parallel unrelated achines. Each job is to be processed by exactly

More information

ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS

ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS #A34 INTEGERS 17 (017) ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS Jürgen Kritschgau Departent of Matheatics, Iowa State University, Aes, Iowa jkritsch@iastateedu Adriana Salerno

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

Stochastic Machine Scheduling with Precedence Constraints

Stochastic Machine Scheduling with Precedence Constraints Stochastic Machine Scheduling with Precedence Constraints Martin Skutella Fakultät II, Institut für Matheatik, Sekr. MA 6-, Technische Universität Berlin, 0623 Berlin, Gerany skutella@ath.tu-berlin.de

More information

arxiv: v1 [cs.ds] 17 Mar 2016

arxiv: v1 [cs.ds] 17 Mar 2016 Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass

More information

Tight Information-Theoretic Lower Bounds for Welfare Maximization in Combinatorial Auctions

Tight Information-Theoretic Lower Bounds for Welfare Maximization in Combinatorial Auctions Tight Inforation-Theoretic Lower Bounds for Welfare Maxiization in Cobinatorial Auctions Vahab Mirrokni Jan Vondrák Theory Group, Microsoft Dept of Matheatics Research Princeton University Redond, WA 9805

More information

Physics 215 Winter The Density Matrix

Physics 215 Winter The Density Matrix Physics 215 Winter 2018 The Density Matrix The quantu space of states is a Hilbert space H. Any state vector ψ H is a pure state. Since any linear cobination of eleents of H are also an eleent of H, it

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

Energy-Efficient Threshold Circuits Computing Mod Functions

Energy-Efficient Threshold Circuits Computing Mod Functions Energy-Efficient Threshold Circuits Coputing Mod Functions Akira Suzuki Kei Uchizawa Xiao Zhou Graduate School of Inforation Sciences, Tohoku University Araaki-aza Aoba 6-6-05, Aoba-ku, Sendai, 980-8579,

More information

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe PROPERTIES OF MULTIVARIATE HOMOGENEOUS ORTHOGONAL POLYNOMIALS Brahi Benouahane y Annie Cuyt? Keywords Abstract It is well-known that the denoinators of Pade approxiants can be considered as orthogonal

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

Note on generating all subsets of a finite set with disjoint unions

Note on generating all subsets of a finite set with disjoint unions Note on generating all subsets of a finite set with disjoint unions David Ellis e-ail: dce27@ca.ac.uk Subitted: Dec 2, 2008; Accepted: May 12, 2009; Published: May 20, 2009 Matheatics Subject Classification:

More information

Finite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields

Finite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields Finite fields I talked in class about the field with two eleents F 2 = {, } and we ve used it in various eaples and hoework probles. In these notes I will introduce ore finite fields F p = {,,...,p } for

More information

A New Model for Selfish Routing

A New Model for Selfish Routing A New Model for Selfish Routing Thoas Lücking Marios Mavronicolas Burkhard Monien Manuel Rode Abstract In this work, we introduce and study a new, potentially rich odel for selfish routing over non-cooperative

More information

Reduced Length Checking Sequences

Reduced Length Checking Sequences Reduced Length Checing Sequences Robert M. Hierons 1 and Hasan Ural 2 1 Departent of Inforation Systes and Coputing, Brunel University, Middlesex, UB8 3PH, United Kingdo 2 School of Inforation echnology

More information

arxiv: v1 [math.co] 19 Apr 2017

arxiv: v1 [math.co] 19 Apr 2017 PROOF OF CHAPOTON S CONJECTURE ON NEWTON POLYTOPES OF q-ehrhart POLYNOMIALS arxiv:1704.0561v1 [ath.co] 19 Apr 017 JANG SOO KIM AND U-KEUN SONG Abstract. Recently, Chapoton found a q-analog of Ehrhart polynoials,

More information

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna

More information

On the Existence of Pure Nash Equilibria in Weighted Congestion Games

On the Existence of Pure Nash Equilibria in Weighted Congestion Games MATHEMATICS OF OPERATIONS RESEARCH Vol. 37, No. 3, August 2012, pp. 419 436 ISSN 0364-765X (print) ISSN 1526-5471 (online) http://dx.doi.org/10.1287/oor.1120.0543 2012 INFORMS On the Existence of Pure

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS

EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS Jochen Till, Sebastian Engell, Sebastian Panek, and Olaf Stursberg Process Control Lab (CT-AST), University of Dortund,

More information

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool Constant-Space String-Matching in Sublinear Average Tie (Extended Abstract) Maxie Crocheore Universite de Marne-la-Vallee Leszek Gasieniec y Max-Planck Institut fur Inforatik Wojciech Rytter z Warsaw University

More information

arxiv: v1 [math.na] 10 Oct 2016

arxiv: v1 [math.na] 10 Oct 2016 GREEDY GAUSS-NEWTON ALGORITHM FOR FINDING SPARSE SOLUTIONS TO NONLINEAR UNDERDETERMINED SYSTEMS OF EQUATIONS MÅRTEN GULLIKSSON AND ANNA OLEYNIK arxiv:6.395v [ath.na] Oct 26 Abstract. We consider the proble

More information

M ath. Res. Lett. 15 (2008), no. 2, c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS. Van H. Vu. 1.

M ath. Res. Lett. 15 (2008), no. 2, c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS. Van H. Vu. 1. M ath. Res. Lett. 15 (2008), no. 2, 375 388 c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS Van H. Vu Abstract. Let F q be a finite field of order q and P be a polynoial in F q[x

More information

Handout 7. and Pr [M(x) = χ L (x) M(x) =? ] = 1.

Handout 7. and Pr [M(x) = χ L (x) M(x) =? ] = 1. Notes on Coplexity Theory Last updated: October, 2005 Jonathan Katz Handout 7 1 More on Randoized Coplexity Classes Reinder: so far we have seen RP,coRP, and BPP. We introduce two ore tie-bounded randoized

More information

New Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors

New Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors New Slack-Monotonic Schedulability Analysis of Real-Tie Tasks on Multiprocessors Risat Mahud Pathan and Jan Jonsson Chalers University of Technology SE-41 96, Göteborg, Sweden {risat, janjo}@chalers.se

More information

Learnability and Stability in the General Learning Setting

Learnability and Stability in the General Learning Setting Learnability and Stability in the General Learning Setting Shai Shalev-Shwartz TTI-Chicago shai@tti-c.org Ohad Shair The Hebrew University ohadsh@cs.huji.ac.il Nathan Srebro TTI-Chicago nati@uchicago.edu

More information

MULTIPLAYER ROCK-PAPER-SCISSORS

MULTIPLAYER ROCK-PAPER-SCISSORS MULTIPLAYER ROCK-PAPER-SCISSORS CHARLOTTE ATEN Contents 1. Introduction 1 2. RPS Magas 3 3. Ites as a Function of Players and Vice Versa 5 4. Algebraic Properties of RPS Magas 6 References 6 1. Introduction

More information

3.8 Three Types of Convergence

3.8 Three Types of Convergence 3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

A Bernstein-Markov Theorem for Normed Spaces

A Bernstein-Markov Theorem for Normed Spaces A Bernstein-Markov Theore for Nored Spaces Lawrence A. Harris Departent of Matheatics, University of Kentucky Lexington, Kentucky 40506-0027 Abstract Let X and Y be real nored linear spaces and let φ :

More information

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words) 1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October

More information

Interactive Markov Models of Evolutionary Algorithms

Interactive Markov Models of Evolutionary Algorithms Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary

More information

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China 6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith

More information

Computational and Statistical Learning Theory

Computational and Statistical Learning Theory Coputational and Statistical Learning Theory Proble sets 5 and 6 Due: Noveber th Please send your solutions to learning-subissions@ttic.edu Notations/Definitions Recall the definition of saple based Radeacher

More information

arxiv: v2 [math.nt] 5 Sep 2012

arxiv: v2 [math.nt] 5 Sep 2012 ON STRONGER CONJECTURES THAT IMPLY THE ERDŐS-MOSER CONJECTURE BERND C. KELLNER arxiv:1003.1646v2 [ath.nt] 5 Sep 2012 Abstract. The Erdős-Moser conjecture states that the Diophantine equation S k () = k,

More information

Lower Bounds for Quantized Matrix Completion

Lower Bounds for Quantized Matrix Completion Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &

More information

Math 262A Lecture Notes - Nechiporuk s Theorem

Math 262A Lecture Notes - Nechiporuk s Theorem Math 6A Lecture Notes - Nechiporuk s Theore Lecturer: Sa Buss Scribe: Stefan Schneider October, 013 Nechiporuk [1] gives a ethod to derive lower bounds on forula size over the full binary basis B The lower

More information

Characterization of the Line Complexity of Cellular Automata Generated by Polynomial Transition Rules. Bertrand Stone

Characterization of the Line Complexity of Cellular Automata Generated by Polynomial Transition Rules. Bertrand Stone Characterization of the Line Coplexity of Cellular Autoata Generated by Polynoial Transition Rules Bertrand Stone Abstract Cellular autoata are discrete dynaical systes which consist of changing patterns

More information

Understanding Machine Learning Solution Manual

Understanding Machine Learning Solution Manual Understanding Machine Learning Solution Manual Written by Alon Gonen Edited by Dana Rubinstein Noveber 17, 2014 2 Gentle Start 1. Given S = ((x i, y i )), define the ultivariate polynoial p S (x) = i []:y

More information

On Certain C-Test Words for Free Groups

On Certain C-Test Words for Free Groups Journal of Algebra 247, 509 540 2002 doi:10.1006 jabr.2001.9001, available online at http: www.idealibrary.co on On Certain C-Test Words for Free Groups Donghi Lee Departent of Matheatics, Uni ersity of

More information

lecture 36: Linear Multistep Mehods: Zero Stability

lecture 36: Linear Multistep Mehods: Zero Stability 95 lecture 36: Linear Multistep Mehods: Zero Stability 5.6 Linear ultistep ethods: zero stability Does consistency iply convergence for linear ultistep ethods? This is always the case for one-step ethods,

More information

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES

More information

On the Use of A Priori Information for Sparse Signal Approximations

On the Use of A Priori Information for Sparse Signal Approximations ITS TECHNICAL REPORT NO. 3/4 On the Use of A Priori Inforation for Sparse Signal Approxiations Oscar Divorra Escoda, Lorenzo Granai and Pierre Vandergheynst Signal Processing Institute ITS) Ecole Polytechnique

More information

Hybrid System Identification: An SDP Approach

Hybrid System Identification: An SDP Approach 49th IEEE Conference on Decision and Control Deceber 15-17, 2010 Hilton Atlanta Hotel, Atlanta, GA, USA Hybrid Syste Identification: An SDP Approach C Feng, C M Lagoa, N Ozay and M Sznaier Abstract The

More information

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder Convolutional Codes Lecture Notes 8: Trellis Codes In this lecture we discuss construction of signals via a trellis. That is, signals are constructed by labeling the branches of an infinite trellis with

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

Sharp Time Data Tradeoffs for Linear Inverse Problems

Sharp Time Data Tradeoffs for Linear Inverse Problems Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used

More information