On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40
|
|
- Elijah McBride
- 5 years ago
- Views:
Transcription
1 On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering within both X and Y, how any coparisons are needed to deterine the order on X Y? This proble is a natural generalization of the list erging proble. While searching in partially ordered sets and sorting partially ordered sets have been considered before, it sees that the proble of poset erging is an unexplored one. We present efficient algoriths for this proble, and show the first lower bounds. In certain cases, our algoriths use the optial nuber of coparisons. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40 1 Introduction Role based access control is a syste of security which has generated a lot of recent interest within the database counity, since it is able to odel any sorts of security requireents [14]. In the role based odel of Nyanchaa and Osborn [13], security privileges are odeled using a directed acyclic graph called a role graph. Each user is a node in the graph. There is a directed path fro user s to user t if and only if the privileges of s are a superset of those of t. The role graph induces a partial order on the set of users. Database interoperability and federated databases [15] are two iportant current research topics in databases. A basic requireent for both interoperability and federation is that one should be able to integrate access control inforation [14]. The study of interoperability in role based access control was initiated by Osborn [14], who gave an algorith for erging two role graphs. Inspired by [14], we further study the proble of erging role graphs. Proble Description: Let S be a finite set. A subset R of S S is called a binary relation on S. In this paper, we write x y if (x, y) R. As usual, we call the binary relation a partial order on S if it has the following three properties, for all x, y, z S: (1) Reflexivity: x x; (2) Antisyetry: x y and y x iply x = y; (3) Transitivity: x y and y z iply x z. Supported in part by NSF grant ITR Address: Departent of Coputer Science, 298 Coates Hall, Louisiana State University, Baton Rouge, LA Eail: chen@bit.csc.lsu.edu and sseiden@ac.org. Address: Departent of Matheatics, Louisiana State University, Baton Rouge, LA Eail: ding@ath.lsu.edu. 1
2 S will be called a partially ordered set, or siply, a poset, if is a partial order on S. We will write (S; ) if we need to specify. We also write s t if s t but s t. We use the notation s t to indicate that s and t are incoparable, i.e. (s, t) R and (t, s) R. A poset where all pairs of eleents are coparable is called a total order. A subset T of S where all eleents are coparable is called a chain. A poset can be represented by a directed acyclic graph G(S; ), where there is a directed path fro s to t in G(S; ) if and only if s t. We also define G(T ; ) analogously for any subset T of S. A coparison between two eleents s, t S returns one of three distinct values, naely s t, s t or s t. Suppose we have a partially ordered set S, which is partitioned into X and Y. In this paper, we exaine the question How any coparisons are required to construct G(S; ) given G(X; ) and G(Y ; )? We call this the poset erging proble. If S is totally ordered, then this is exactly the ordinary list erging proble. Two closely related probles are as follows: In the poset sorting proble, one is given no initial inforation and asked to deterine G(S; ). In the poset searching proble, we have a partially ordered set S and a subset T of S. We are given G(T ; ). We wish to answer queries of the for Does a given eleent s S belong to T? As with poset erging, in both of these probles the goal is to use the iniu nuber of coparisons. Three natural ways to categorize posets are width, diension and nuber of ideals, all easure how close a poset is to being totally ordered. We explain these easures briefly. An antichain of poset (S; ) is a subset T of S where all eleents are pairwise incoparable. The width of (S; ) is the cardinality of the largest antichain. A well known result of Dilworth [2] tells us that any poset of width w can be partitioned into w chains. A poset has diension d if it is the intersection of d total orders. An ideal in (S; ) is a subset T of S closed under. Algoriths that operate on posets often have running ties bounded as soe function of their size and one or ore of three paraeters just described. Previous Results: To the best of our knowledge, the poset erging proble have not been previously investigated. The role-graph erging algorith of Osborn [14] is a naïve poset erging algorith. It requires n+ 1 i=n i coparisons to erge two role-graphs (acyclic digraphs) on and n vertices. Next, we explore briefly what is known about the list erging proble. For a ore coplete treatent, we refer the reader to Section of Knuth [10]. We denote the iniu nuber of coparisons to erge two sorted lists of lengths n and by M(, n). As is standard in the erging literature, we always assue that n. The Linear erge algorith [10] iplies that M(, n) n + 1. Knuth [10] credits Graha and Karp with independently showing that M(, ) 2 1 and M(, + 1) 2. Stockeyer and Yao [16] show that M(, + d) 2 + d 1 for all 2d 2. Therefore, Linear is optial for these cases. Knuth [10] generalizes the arguent of Graha and Karp to obtain lower bounds for sall values of n and. The inforation theoretic bound [10] states that for all n and ( ) + n M(, n) log 2. When = 1, the inforation theoretic bound is tight, since binary search can be used to find the position for a single eleent using log 2 (n + 1) coparisons. Graha [6] and independently Hwang and Lin [8] show that 7 M(2, n) = log 2 12 (n + 1) 14 + log 2 17 (n + 1). 2
3 The first general erging procedure to outperfor Linear was proposed by Hwang and Lin [9]. Their algorith is a cobination of Linear and binary search. They show that the nuber of coparisons it uses is at ost ( ) + n log A series of increasingly coplicated and specialized algoriths have been developed by Hwang and Deutsch [7], Manacher [12], and Christen [1]. These algoriths provide iproved bounds for sall. Poset searching was first investigated by Linial and Saks [11]. They generalize binary search by defining the concept of a central eleent in a poset. By coparing the candidate eleent with the central eleent, we can eliinate a constant fraction of the ideals in the poset. They show that such eleents always exist, and that therefore searching can be accoplished using O(log N) coparisons, where N is the nuber of ideals in the poset. Unfortunately, there is no known polynoial tie algorith for finding central eleents [3]. The proble of poset sorting has also received soe attention. The case where there is a total order is, of course, the standard sorting proble, which has been studied extensively [10]. Poset sorting was first studied by Faigle and Turán [4]. Let w be the width of a poset and N be the nuber of ideals. Faigle and Turán show a nuber of upper and lower bounds, the ain upper bound being O (in{n log N, wn log n}) on the nuber of coparisons required for sorting. The situation with lower bounds is not very good. If the poset is an antichain, then ( n 2) coparisons are required. However, if the width is w, the best lower bound on the nuber of coparisons is n log 3 n n log 3 w 5n. Further, the O(n log N) upper bound relies on the recognition of central eleents [11]. Felsner, Kant, Rangan and Wagner [5] iprove the lower order ters in the O (wn log n) upper bound on poset sorting. Our Results: In this paper, we will give the first set of lower bounds and the first two non-trivial algoriths for poset erging. Our lower bounds generalize the adversary arguent of Graha and Karp [10], and the inforation theoretic bound [10]. Our first algorith is a generalization of the Linear algorith. We will prove that this algorith is optial when erging partial orders consisting of two equal sized chains. Our second algorith uses any list erging algorith A as a subroutine. When A is the Hwang-Lin algorith, we show that the nuber of coparisons used is at ost 4 3 (recall that n) ore than optial when two total orders are erged. Most of our results bound the nuber of coparisons using soe function of the widths of the posets being erged. 2 Preliinaries For a binary relation R on S, for any two eleents x and y of S, adding (x, y) to R or deleting (x, y) fro R siply results in a new binary relation R {(x, y)} or R {(x, y)}, respectively. 3
4 In this paper, the posets to be erged are always denoted by X and Y. We define = X, n = Y and assue that 0 < n. We define v and w n to be the widths of X and Y, respectively. In this case, we always assue that X and Y are given decoposed as chains X 1,..., X v and Y 1,..., Y w. If X and Y are not in this forat, they can be decoposed in polynoial tie without using any coparisons (all relations within X and Y are already known). Clearly, the width of X Y is at ost v + w. In general, if (S; ) is a poset of width w then G(S; ) can be represented using O(w S ) space. If C S is a chain in (S; ) and s S, then the greatest lower bound of s in C is an eleent c such that c s and c s for all c C such that c c. If such a c exists, then it is unique. If c does not exist, we define the greatest lower bound to be. The least upper bound of s in C is the unique eleent c such that s c and s c for all c C such that c c. Analogously, if c does not exist, we define the least upper bound to be. Suppose S 1,..., S w is a decoposition of S. Each eleent s S is copletely defined by its w least upper bounds and w greatest lower bounds with respect to the chains S 1... S w. We use 2w pointers for each eleent, and w global pointers to indicate the head of each chain. We call these pointers glb(s, S i ) and lub(s, S i ) for s S and 1 i w. So we can think of the proble of erging X and Y as that of correctly assigning glb(x, Y i ) and lub(x, Y i ) for all x X and 1 i w and glb(y, X i ) and lub(y, X i ) for all y Y and 1 i v. 3 Generalizing the Linear Algorith We start by presenting an algorith PLinear for erging two chains of a poset. PLinear is a natural generalization of the Linear erging algorith and, as shown later, the nuber of coparisons used by PLinear is optial when the two chains have equal size. At the end of this section, we will show how PLinear can be adapted to erge two general posets. Suppose we are given a poset (X Y ; ), where X = {x 1, x 2,..., x } and Y = {y 1, y 2,..., y n }. Let us also assue that x i x j and y i y j for all i j. Algorith PLinear, which is given in Figure 1 below, operates in two phases. In the first phase, we recognize all relations of the for x i y j, while in the second phase we recognize all relations of the for y i x j. Other than bookkeeping, the second phase works in the sae way as the first one does. Proposition 3.1 PLinear is correct. Proof. Since X and Y are syetric, we only need to consider Phase 1. We will show, for each i, that x i y j if and only if the algorith declares so. First, suppose i is the kind of index for which the algorith detects x i y j, for soe j, and also declares x i y k, for all k j. Since is transitive, the algorith is obviously correct for all k j. For each k < j, notice that when the subscript of y turns fro k to k + 1 in the algorith, there exists i i such that x i y k. By transitivity, we ust have x i y k, as we wanted. Next, let i be an index such that x i y j is never detected, for any j. There are two possible situations here, either x i is not copared with any y j, or x i is copared with soe y j but x i y j never occurred. In both cases, it is clear that the algorith terinates because the subscript of y turns fro n to n + 1. Consequently, there exists i with x i y n. Notice that i > i in the first situation and i = i in the second situation. Now by transitivity, it is easy to see that x i y j for all j. 4
5 Algorith PLinear: Phase 1. We start with i = j = 1 and terinate when i > or j > n. In a general step, we copare x i with y j and record the result. If x i y j, declare x i y k for all k j, set i = i + 1, and then repeat. If x i y j, set j = j + 1 and repeat. Phase 2. We start with i = j = 1 and terinate when i > n or j >. In a general step, we copare y i with x j, in case these two were not copared in Phase 1 (if they have been copared in Phase 1, we use our record and this saves one coparison). If y i x j, declare y i x k for all k j, set i = i + 1, and then repeat. If y i x j, set j = j + 1 and repeat. Figure 1: The PLinear algorith. In order to analyze the coplexity of PLinear, we need to distinguish between coparisons that are ade or requested by the algorith. They are the sae in Phase 1. But in Phase 2, when a coparison is requested, the result ight be given by the record. Proposition 3.2 When the coparison of x i and y j is requested, within that phase, PLinear has requested, including this pair, i + j 1 coparisons. Proof. This is clear when i = j = 1. Notice that, after each coparison, one of i and j is increased by one and the other reains the sae. This behaves exactly the sae as the forula i + j 1. Thus the proposition is proved. Theore 3.1 If + n > 2, then PLinear akes at ost 2 + 2n 4 coparisons when it terinates. Proof. Let C 1 and C 2 be the nuber of coparisons requested in Phases 1 and 2, respectively. Let C be the nuber of coparisons ade in both phases and let δ be the nuber of coparisons requested but not ade in Phase 2. Then it is clear that C = C 1 + C 2 δ. Notice that both phases start with the request of coparing x 1 with y 1. It follows that δ 1. By the last proposition, it is clear that C 1 + n 1 and C 2 + n 1. If at least one of the holds with strict inequality, then C 2 + 2n 4 and we are done. Thus we ay assue C 1 = C 2 = + n 1. But, by Proposition 3.2, each phase terinates only after the request of coparing x with y n. Since + n > 2, we have (1, 1) (, n). Therefore, δ 2 and so C 2 + 2n 4, as we wanted. Clearly, when + n 2, that is, when = n = 1 (as 0 < n), PLinear uses only one coparison, which is obviously the best possible. In fact, it will follow fro Theore 5.2 that, in the coparison odel, PLinear is also optial when = n 2. 5
6 Finally, we explain how to use PLinear to erge two general posets X and Y. As discussed earlier in Section 2, we assue that both X and Y are decoposed into chains X 1,..., X v and Y 1,..., Y w, where v and w are the widths of X and Y, respectively. Now PLinear adapts easily to the general situation: We siply apply the algorith to (X i, Y j ) for all 1 i v and 1 j w. To count the nuber of coparisons used by the algorith, we need a couple of ore definitions. Let S be a poset of width k and let S 1,..., S k be a partition of S into chains. The partition is balanced if the cardinality of {S i : S i = 1} is iniized, over all partitions of S into k chains. We denote this iniu value by λ(s). Theore 3.2 If PLinear is used to erge X and Y, as suggested above, than it akes at ost 2w + 2vn 4vw + λ(x)λ(y ) coparisons. Proof. To erge X and Y using PLinear, we need to first decopose the into chains. For the purpose of counting the nuber of coparisons used by the algorith, we assue that the partitions are balanced. Since we know the coplete inforation on both X and Y, finding such a decoposition does not cost any coparisons. Let i = X i for 1 i v and n i = Y i for 1 i w. Let λ(x i, Y j ) = 1 if i = n j = 1, and λ(x i, Y j ) = 0 if otherwise. Then, by Theore 3.1, we need at ost 2 i + 2n j 4 + λ(x i, Y j ) coparisons to erge X i and Y j. Thus, the total nuber of coparisons used is at ost as we wanted. v w {2 i + 2n j 4 + λ(x i, Y j )} = 2w + 2vn 4vw + λ(x)λ(y ), i=1 j=1 4 Upper Bounds for Sall The poset erging algorith given in the previous section is based on Linear. As we will see in the next section (Theore 5.2) that Linear is optial for erging partial orders consisting of two equal sized chains. In this section, we develop algoriths, which perfor better than Linear when erging a large chain with a sall one. To facilitate this, we present a general ethod for applying a list erging algorith to poset erging. Again, we exaine first the case of erging two total orders. Given any algorith A for list erging, we define an algorith PMerge(A, X, Y ) for erging two total orders: We assue A uses a total order coparison operation in the process of erging X and Y. The algorith appears in Figure 2 below. As before, this algorith can be easily generalized to erge general posets, just apply the algorith to all pairs (X i, Y j ) of chains. Let a(, n) be the axiu nuber of coparisons used by A in erging a list of size with one of size n. We say a erging algorith A is consistent if for all and n there exist i and j such that for all X = {x 1,..., x } and Y = {y 1,..., y n } the first coparison ade by A is x i y j. Note that all erging algoriths in the literature are consistent. Theore 4.1 PMerge is correct. Further, if A is consistent it uses at ost 2a(, n) 1 coparisons. 6
7 Algorith PMerge(A, X, Y ): 1. Phase(A, X, Y ). 2. Phase(A, Y, X). Phase(A, U, V ): 1. Define as follows: If a b then a b if and only if (a, b) U V. If a and b are coparable then a b if and only if a b. 2. Use A to erge U and V to get list Z = z 1,..., z n+. 3. z 0 and l For i 1,..., n + : If z i V then l i else glb(z i, V ) z l. 5. z n++1 and l n For i n +,..., 1: If z i U then l i else lub(z i, U) z l. Figure 2: The PMerge algorith. Proof. During a call to Phase, the variables glb(u, V ), u U are assigned in Steps 3 and 4. A erges U and V to get Z using the definition of in Step 1 of Phase. Note that is a total order on U V. If z i U then z j z i for all j i and z j z i for all j > i. Define V = V { }. It is easy to prove by induction that at each iteration of Step 4, l is the axiu index j i such that z j V. Clearly, z l is axial in V {z 1,..., z i }. Therefore z l is the greatest lower bound of z i in V. Also during Phase, the variables lub(v, U), v V are assigned in Steps 5 and 6. Define U = U { }. It is easy to prove by induction that at each iteration of Step 6, l is the iniu index j i such that z j U. If z i V then z i z j for all j < i and z i z j for all j i. Therefore z l is inial aong U {z i,..., z n+ } and it is the least upper bound of z i in U. During the two calls to Phase, all the variables glb(y, X), y Y ; lub(x, Y ), x X; glb(x, Y ), x X and lub(y, X), y Y are assigned. Obviously, PMerge uses at ost 2a(, n) coparisons, since it uses A to erge X and Y twice. If A is consistent, the first tie we erge X and Y, we record the outcoe of the first coparison and then recall it the second tie we erge the. To understand how well the algorith PMerge perfors, let us define T (, n) to be the nuber of coparisons required to erge two total orders of sizes and n. We point out in the following that the nuber of coparisons used by PMerge is not too far away fro T (, n). In order to do so, we have to use not only Theore 4.1, but also a result fro the next section which tells us a lower bound on T (, n). We choose to present this result here, instead of waiting till 7
8 the lower bounds have been established, because we do not like to put it too far away fro the algorith. Corollary 4.1 PMerge uses at ost T (, n) coparisons. Proof. Let A be the Hwang-Lin algorith [9], which is a generalization of both binary search and Linear. Then, by [9], we have a(, n) log 2 ( + n ) + 1. Now it follows fro Theore 4.1 that the nuber of coparisons used by PMerge is at ost ( ) + n 2a(, n) 1 2 log = 2 2 = 2 ( + n)( 1 + n) (1 + n) log 2! ( + n/2 )( 1 + n/2 ) (1 + n/2 ) log 2! ( ) + n/2 log T (, n) + 4 3, where the last step is by Theore 5.3 fro the next section It should be pointed out that Corollary 4.1 can be further iproved by using ore sophisticated algoriths for A, for instance the algorith of Christen [1]. It should also be ephasized again that, as with PLinear, PMerge can be easily adapted to general poset erging. 5 Lower Bounds In this section, we show the first lower bounds for poset erging. We begin by showing that if v and w are arbitrary, then n coparisons are required. We then show lower bounds for the erging of two total orders. As we shall see, this special case turns out to be quite iportant. We are able to generalize these lower bounds for erging two total orders to get lower bounds which are functions of v and w. Theore 5.1 If both X and Y are antichains then poset erging requires n coparisons. Proof. We prove the theore by using the following siple adversary arguent: Each tie the algorith copares two eleents, answer incoparable. Suppose the algorith outputs a candidate for G(X Y ; ) but does not copare soe eleent x X with soe eleent y Y. Then x y and x y are both consistent with all coparisons ade, so the adversary can assign the relation between x and y in such a way that the algorith s answer is wrong. 8
9 We now consider the erging of two total orders. Recall that T (, n) is the nuber of coparisons required to erge two total orders of sizes and n. We start by considering n =, and then ove to the general case. When the total orders are the sae size, we show { n if n = 0 or 1 T (n, n) β(n) = 4n 4 if n 2. Let X = {x 1, x 2,..., x } and Y = {y 1, y 2,..., y n } be disjoint sets. Suppose a binary relation on X Y satisfies the following: (i) x i x j if and only if i j; (i ) y i y j if and only if i j; (ii) x ( ) i y j iplies x i y j for all j j, and x i y j for all i i; (ii ) y i x j iplies y i x j for all j j, and y i x j for all i i; (iii) x i y j x k iplies i < k; (iii ) y i x j y k iplies i < k. Then we prove a few propositions on. Proposition 5.1 The binary relation is a partial order. Proof. First, since X and Y are disjoint, (i) and (i ) directly iply reflexivity. If a, b X then (i) iplies antisyetry, while if a, b Y then (i ) iplies it. If a X and b Y, then a b since X and Y are disjoint. Suppose both a b and b a. Condition (iii) gives us a contradiction. If a Y and b X, the arguent is analogous. Therefore, antisyetry holds in all cases. Now consider transitivity. Suppose a, b, c X Y with a b c. We need to show that a c. Since X and Y are syetric, we ay assue, without loss of generality, that a = x i, for soe i. We first consider the case b = y j, for soe j. If c = y k, for soe k, then, by (i ), j k and thus, by (ii), a c holds. If c = x k, for soe k, then, by (iii), i k and thus, by (i), a c holds. The case b = x j, for soe j, is siilar to the last case. It follows fro (i) that i j. If c = x k, for soe k, then we deduce a c fro (i). If c = y k, for soe k, then we deduce a c fro (ii). Proposition 5.2 Suppose there are indices p and q such that x p y q and neither x p y q 1 nor x p+1 y q holds. Then the binary relation obtained by deleting (x p, y q ) fro also satisfies (*). Proof. It is clear that we only need to verify (ii), since all other conditions are obviously satisfied. Suppose, on the contrary, that, for soe i and j, we have x i y j while either x i y j for soe j j or x i y j for soe i i. By the definition of it is easy to see that (i, j ) = (p, q) in the first case, and (i, j) = (p, q) in the second case. It follows that, in the first case, q 1 j and thus x p y q 1 (as satisfies (ii)), while in the second case, p + 1 i and thus x p+1 y q (also because satisfies (ii)), both contradict our assuption. Reark 5.1 By the syetry between X and Y, if there are indices p and q such that y p x q and neither y p x q 1 nor y p+1 x q holds, then the binary relation obtained by deleting (y p, x q ) fro also satisfies (*). 9
10 Proposition 5.3 Suppose x p y q and y q x p. If both x p y q+1 and x p 1 y q hold, then the binary relation obtained by adding (x p, y q ) to also satisfies (*). Proof. It is clear that we only need to verify (ii), (iii), and (iii ), since all other conditions are obviously satisfied. If (iii) or (iii ) is violated, then there exists either k < p with y q x k or i > q with y i x p. In both cases, we deduce fro (ii ) that y q x p, a contradiction. Now it reains to prove (ii). Clearly, if (ii) does not hold, then we ust have (i, j) = (p, q). In addition, we ust also have either x i y j for soe j > j or x i y j for soe i < i. It follows that, in the first case, q + 1 j and thus x p y q+1, while in the second case, p 1 i and thus x p 1 y q. This contradiction copletes our proof of the proposition. Reark 5.2 By the syetry between X and Y, if y p x q, x q y p, y p x q+1, and y p 1 x q hold, then the binary relation obtained by adding (y p, x q ) to also satisfies (*). In the following, we consider a special poset. Let X = {x 1, x 2,..., x n } and Y = {y 1, y 2,..., y n }, where n 2. Let us define a binary relation on X Y as follows: (a) x i x j and y i y j for all i j; (b) x i y j if and only if j i 2; (c) y i x j if and only if j i 1. It is not difficult to see that satisfies (*) and thus, by Proposition 5.1, X Y is partially ordered by. Let R 1 = {(x i, y i+2 ) : i = 1, 2,..., n 2}, R 2 = {(y i, x i+1 ) : i = 1, 2,..., n 1}, R 3 = {(x i, y i+1 ) : i = 1, 2,..., n 1}, and R 4 = {(y i, x i ) : i = 1, 2,..., n}. Proposition 5.4 If (a, b) R 1 R 2, then deleting (a, b) fro the partial order results in a new partial order. Proof. It is straightforward to verify that the assuption here satisfies the assuptions of Proposition 5.2 or Reark 5.1. Then the result follows iediately fro Proposition 5.1. Proposition 5.5 If (a, b) R 3 R 4, then adding (a, b) to the partial order results in a new partial order. Proof. This is very siilar to the last proof. It is straightforward to verify that the assuption here satisfies the assuptions of Proposition 5.3 or Reark 5.2. Then the result follows iediately fro Proposition 5.1. Theore 5.2 The nuber of coparisons needed to recognize (X Y ; ) is at least β(n). Proof. If an algorith has ade less than β(n) coparisons, then for soe (a, b) R 1 R 2 R 3 R 4, a and b are not copared by the algorith, as R 1 R 2 R 3 R 4 = β(n). However, by Propositions 5.4 and 5.5, there is another partial order that agrees with everywhere else, except for (a, b). Thus the algorith cannot deterine if the partial order is or. 10
11 As entioned earlier in Section 3, by cobining Theore 3.1 and Theore 5.2 we conclude that PLinear is optial when erging two total orders of the sae size. Theore 5.2 also generalizes easily as follows: Suppose n/w = /v = k is integral. Then a lower bound for erging X and Y is vwβ(k). To see this, consider the case where n i = k for all 1 i w and j = k for all 1 j v. For all x, x X, x x if and only x X i, x X j with i j. In other words, only eleents within a chain are coparable in X. The sae condition holds for Y. Then, for all pairs (i, j) and (k, l), it is not difficult to see that X i erges with Y j independently of how X k erges with Y l, since G(X i Y j ; ) and G(X k Y l ; ) are independent. We now give a general lower bound for erging two total orders: Theore 5.3 For all positive integers and n, ( ) ( ) n/2 + n/2 + T (, n) log 2 + log 2. Proof. The proof is a variation on the inforation-theoretic lower bound for erging. Let X and Y be total orders with X = n and Y =. Let k = n/2. We consider only instances X, Y where glb(y, X) x k and x k+1 lub(y, X) for all y Y. We further require that for all y, y Y such that y y, glb(y, X) glb(y, X) and lub(y, X) lub(y, X). It is easy to verify that the conditions (*) hold in this case, so we have a partial order. For instances of this type, erging X and Y involves solving two totally independent sub-probles. The first is to deterine glb(y, X) for all y Y. The nuber of possible solutions to this sub-proble is s = ( n/2 +). Note that in solving this sub-proble, the three outcoes of a coparison really only give us one bit of inforation. That is, when coparing an eleent y Y with x i for i k, we never get the answer y x i. Therefore, the nuber of coparisons needed is at least log 2 s. A siilar arguent holds for the sub-proble of deterining lub(y, X) for all y Y. 6 Suary and Future Research Directions Poset erging is an iportant but understudied research area. In this paper, we have presented the first non-trivial upper bounds, and the first lower bounds for this proble. We proved that our upper bounds are not too far away fro our lower bounds, and in soe cases, these two bounds are actually equal. In our odel, we do not ipose any condition on the union of the two posets to be erged. It will be very interesting to see whether tighter bounds exist if we do know soe extra inforation on the union. In particular, the following proble is still open: Suppose we are erging X and Y and we are given that the width of X Y is k < v + w. How can we use this inforation to reduce the nuber of coparisons? For instance, for n = and v = w = 1 if k = 2 we require at least coparisons, while if k = 1 we need at ost n + 1. Acknowledgent. We are grateful to the two anonyous referees for carefully reading our paper and for helping us iproving the paper. 11
12 References [1] Christen, C. Iproving the bounds on optial erging. In Proceedings of the 19th Annual Syposiu on Foundations of Coputer Science (Oct. 1978), pp [2] Dilworth, R. P. A decoposition theore for partially ordered sets. Annals of Matheatics 51 (1950), [3] Dubhashi, D. P., Mehlhorn, K., Ranjan, D., and Thiel, C. Searching, sorting and randoised algoriths for central eleents and ideal counting in posets. In Proceedings of the 13th Conference on Foundations of Software Technology and Theoretical Coputer Science (Dec. 1993), pp [4] Faigle, U., and Turán, G. Sorting and recognition probles for ordered sets. SIAM Journal on Coputing 17, 1 (Feb. 1988), [5] Felsner, S., Kant, R., Rangan, C., and Wagner, D. On the coplexity of partial order properties. ORDER: A Journal on the Theory of Ordered Sets and Its Applications 17, 2 (2000), [6] Graha, R. L. On sorting by coparisons. In Coputers in Nuber Theory: Proceedings of the Science Research Council Atlas Syposiu no. 2 (Aug. 1969), pp [7] Hwang, F. K., and Deutsch, D. N. A class of erging algoriths. Journal of the ACM 20, 1 (Jan. 1973), [8] Hwang, F. K., and Lin, S. Optial erging of 2 eleents with n eleents. Acta Inforatica 1, 2 (1971), [9] Hwang, F. K., and Lin, S. A siple algorith for erging two disjoint linearly ordered sets. SIAM Journal on Coputing 1, 1 (Mar. 1972), [10] Knuth, D. E. Sorting and Searching, second ed., vol. 3 of The Art of Coputer Prograing. Addison-Wesley, Reading, MA, USA, [11] Linial, N., and Saks, M. Every poset has a central eleent. Journal of Cobinatorial Theory, Series A 40 (1985), [12] Manacher, G. K. Significant iproveents to the Hwang-Lin erging algoriths. Journal of the ACM 26, 3 (July 1979), [13] Nyanchaa, M., and Osborn, S. The role graph odel and conflict of interest. ACM Transactions on Inforation and Systes Security 2, 1 (1999), [14] Osborn, S. Database security integration using role-based access control. In Proceedings of the IFIP WG11.3 Working Conference on Database Security (Aug. 2000), pp [15] Sheth, A. P., and Larson, J. A. Federated database systes for anaging distributed, heterogeneous, and autonoous databases. ACM Coputing Surveys 22, 3 (1990), [16] Stockeyer, P. K., and Yao, F. F. On the optiality of linear erge. SIAM Journal on Coputing 9, 1 (1980),
A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness
A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,
More informationList Scheduling and LPT Oliver Braun (09/05/2017)
List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)
More informationPolygonal Designs: Existence and Construction
Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G
More informationA Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science
A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest
More informationHomework 3 Solutions CSE 101 Summer 2017
Hoework 3 Solutions CSE 0 Suer 207. Scheduling algoriths The following n = 2 jobs with given processing ties have to be scheduled on = 3 parallel and identical processors with the objective of iniizing
More informationPoly-Bernoulli Numbers and Eulerian Numbers
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 21 (2018, Article 18.6.1 Poly-Bernoulli Nubers and Eulerian Nubers Beáta Bényi Faculty of Water Sciences National University of Public Service H-1441
More informationLecture 21. Interior Point Methods Setup and Algorithm
Lecture 21 Interior Point Methods In 1984, Kararkar introduced a new weakly polynoial tie algorith for solving LPs [Kar84a], [Kar84b]. His algorith was theoretically faster than the ellipsoid ethod and
More informationCurious Bounds for Floor Function Sums
1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International
More informationBlock designs and statistics
Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent
More informationAlgorithms for parallel processor scheduling with distinct due windows and unit-time jobs
BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and
More informationA note on the multiplication of sparse matrices
Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani
More informationTight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography
Tight Bounds for axial Identifiability of Failure Nodes in Boolean Network Toography Nicola Galesi Sapienza Università di Roa nicola.galesi@uniroa1.it Fariba Ranjbar Sapienza Università di Roa fariba.ranjbar@uniroa1.it
More informationOn the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation
journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation
More informationA Simple Regression Problem
A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where
More informationarxiv: v1 [cs.ds] 3 Feb 2014
arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/
More informationFeature Extraction Techniques
Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that
More informationThe Weierstrass Approximation Theorem
36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined
More informationOn the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs
On the Inapproxiability of Vertex Cover on k-partite k-unifor Hypergraphs Venkatesan Guruswai and Rishi Saket Coputer Science Departent Carnegie Mellon University Pittsburgh, PA 1513. Abstract. Coputing
More informationBipartite subgraphs and the smallest eigenvalue
Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.
More information13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices
CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay
More information1 Proof of learning bounds
COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #4 Scribe: Akshay Mittal February 13, 2013 1 Proof of learning bounds For intuition of the following theore, suppose there exists a
More informationComputable Shell Decomposition Bounds
Coputable Shell Decoposition Bounds John Langford TTI-Chicago jcl@cs.cu.edu David McAllester TTI-Chicago dac@autoreason.co Editor: Leslie Pack Kaelbling and David Cohn Abstract Haussler, Kearns, Seung
More informatione-companion ONLY AVAILABLE IN ELECTRONIC FORM
OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer
More information#A52 INTEGERS 10 (2010), COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES
#A5 INTEGERS 10 (010), 697-703 COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES Bruce E Sagan 1 Departent of Matheatics, Michigan State University, East Lansing,
More informationIntelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines
Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes
More informationAcyclic Colorings of Directed Graphs
Acyclic Colorings of Directed Graphs Noah Golowich Septeber 9, 014 arxiv:1409.7535v1 [ath.co] 6 Sep 014 Abstract The acyclic chroatic nuber of a directed graph D, denoted χ A (D), is the iniu positive
More informationFast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials
Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter
More informationQuantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search
Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths
More informationA1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3
A. Find all ordered pairs a, b) of positive integers for which a + b = 3 08. Answer. The six ordered pairs are 009, 08), 08, 009), 009 337, 674) = 35043, 674), 009 346, 673) = 3584, 673), 674, 009 337)
More informationLecture 9 November 23, 2015
CSC244: Discrepancy Theory in Coputer Science Fall 25 Aleksandar Nikolov Lecture 9 Noveber 23, 25 Scribe: Nick Spooner Properties of γ 2 Recall that γ 2 (A) is defined for A R n as follows: γ 2 (A) = in{r(u)
More informationE0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis
E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds
More informationThe concavity and convexity of the Boros Moll sequences
The concavity and convexity of the Boros Moll sequences Ernest X.W. Xia Departent of Matheatics Jiangsu University Zhenjiang, Jiangsu 1013, P.R. China ernestxwxia@163.co Subitted: Oct 1, 013; Accepted:
More informationIntroduction to Discrete Optimization
Prof. Friedrich Eisenbrand Martin Nieeier Due Date: March 9 9 Discussions: March 9 Introduction to Discrete Optiization Spring 9 s Exercise Consider a school district with I neighborhoods J schools and
More informationAn EGZ generalization for 5 colors
An EGZ generalization for 5 colors David Grynkiewicz and Andrew Schultz July 6, 00 Abstract Let g zs(, k) (g zs(, k + 1)) be the inial integer such that any coloring of the integers fro U U k 1,..., g
More informationModel Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon
Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential
More informationChapter 6 1-D Continuous Groups
Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:
More informationIn this chapter, we consider several graph-theoretic and probabilistic models
THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions
More informationA Note on Online Scheduling for Jobs with Arbitrary Release Times
A Note on Online Scheduling for Jobs with Arbitrary Release Ties Jihuan Ding, and Guochuan Zhang College of Operations Research and Manageent Science, Qufu Noral University, Rizhao 7686, China dingjihuan@hotail.co
More informationComputable Shell Decomposition Bounds
Journal of Machine Learning Research 5 (2004) 529-547 Subitted 1/03; Revised 8/03; Published 5/04 Coputable Shell Decoposition Bounds John Langford David McAllester Toyota Technology Institute at Chicago
More informationOn Process Complexity
On Process Coplexity Ada R. Day School of Matheatics, Statistics and Coputer Science, Victoria University of Wellington, PO Box 600, Wellington 6140, New Zealand, Eail: ada.day@cs.vuw.ac.nz Abstract Process
More informationSolutions of some selected problems of Homework 4
Solutions of soe selected probles of Hoework 4 Sangchul Lee May 7, 2018 Proble 1 Let there be light A professor has two light bulbs in his garage. When both are burned out, they are replaced, and the next
More informationThe Euler-Maclaurin Formula and Sums of Powers
DRAFT VOL 79, NO 1, FEBRUARY 26 1 The Euler-Maclaurin Forula and Sus of Powers Michael Z Spivey University of Puget Sound Tacoa, WA 98416 spivey@upsedu Matheaticians have long been intrigued by the su
More informationThe Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate
The Siplex Method is Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010 Abstract In this note we prove that the classic siplex ethod with the ost-negativereduced-cost
More informationEstimating Entropy and Entropy Norm on Data Streams
Estiating Entropy and Entropy Nor on Data Streas Ait Chakrabarti 1, Khanh Do Ba 1, and S. Muthukrishnan 2 1 Departent of Coputer Science, Dartouth College, Hanover, NH 03755, USA 2 Departent of Coputer
More informationarxiv: v1 [cs.ds] 29 Jan 2012
A parallel approxiation algorith for ixed packing covering seidefinite progras arxiv:1201.6090v1 [cs.ds] 29 Jan 2012 Rahul Jain National U. Singapore January 28, 2012 Abstract Penghui Yao National U. Singapore
More informationDSPACE(n)? = NSPACE(n): A Degree Theoretic Characterization
DSPACE(n)? = NSPACE(n): A Degree Theoretic Characterization Manindra Agrawal Departent of Coputer Science and Engineering Indian Institute of Technology, Kanpur 208016, INDIA eail: anindra@iitk.ernet.in
More information1 Identical Parallel Machines
FB3: Matheatik/Inforatik Dr. Syaantak Das Winter 2017/18 Optiizing under Uncertainty Lecture Notes 3: Scheduling to Miniize Makespan In any standard scheduling proble, we are given a set of jobs J = {j
More informationReed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product.
Coding Theory Massoud Malek Reed-Muller Codes An iportant class of linear block codes rich in algebraic and geoetric structure is the class of Reed-Muller codes, which includes the Extended Haing code.
More informationtime time δ jobs jobs
Approxiating Total Flow Tie on Parallel Machines Stefano Leonardi Danny Raz y Abstract We consider the proble of optiizing the total ow tie of a strea of jobs that are released over tie in a ultiprocessor
More informationNon-Parametric Non-Line-of-Sight Identification 1
Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,
More informationKernel Methods and Support Vector Machines
Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic
More informationConvex Programming for Scheduling Unrelated Parallel Machines
Convex Prograing for Scheduling Unrelated Parallel Machines Yossi Azar Air Epstein Abstract We consider the classical proble of scheduling parallel unrelated achines. Each job is to be processed by exactly
More informationORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS
#A34 INTEGERS 17 (017) ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS Jürgen Kritschgau Departent of Matheatics, Iowa State University, Aes, Iowa jkritsch@iastateedu Adriana Salerno
More informationSupport Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization
Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering
More informationProbability Distributions
Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples
More informationStochastic Machine Scheduling with Precedence Constraints
Stochastic Machine Scheduling with Precedence Constraints Martin Skutella Fakultät II, Institut für Matheatik, Sekr. MA 6-, Technische Universität Berlin, 0623 Berlin, Gerany skutella@ath.tu-berlin.de
More informationarxiv: v1 [cs.ds] 17 Mar 2016
Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass
More informationTight Information-Theoretic Lower Bounds for Welfare Maximization in Combinatorial Auctions
Tight Inforation-Theoretic Lower Bounds for Welfare Maxiization in Cobinatorial Auctions Vahab Mirrokni Jan Vondrák Theory Group, Microsoft Dept of Matheatics Research Princeton University Redond, WA 9805
More informationPhysics 215 Winter The Density Matrix
Physics 215 Winter 2018 The Density Matrix The quantu space of states is a Hilbert space H. Any state vector ψ H is a pure state. Since any linear cobination of eleents of H are also an eleent of H, it
More informationVulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links
Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp
More informationEnergy-Efficient Threshold Circuits Computing Mod Functions
Energy-Efficient Threshold Circuits Coputing Mod Functions Akira Suzuki Kei Uchizawa Xiao Zhou Graduate School of Inforation Sciences, Tohoku University Araaki-aza Aoba 6-6-05, Aoba-ku, Sendai, 980-8579,
More information. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe
PROPERTIES OF MULTIVARIATE HOMOGENEOUS ORTHOGONAL POLYNOMIALS Brahi Benouahane y Annie Cuyt? Keywords Abstract It is well-known that the denoinators of Pade approxiants can be considered as orthogonal
More informationThis model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.
CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when
More informationNote on generating all subsets of a finite set with disjoint unions
Note on generating all subsets of a finite set with disjoint unions David Ellis e-ail: dce27@ca.ac.uk Subitted: Dec 2, 2008; Accepted: May 12, 2009; Published: May 20, 2009 Matheatics Subject Classification:
More informationFinite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields
Finite fields I talked in class about the field with two eleents F 2 = {, } and we ve used it in various eaples and hoework probles. In these notes I will introduce ore finite fields F p = {,,...,p } for
More informationA New Model for Selfish Routing
A New Model for Selfish Routing Thoas Lücking Marios Mavronicolas Burkhard Monien Manuel Rode Abstract In this work, we introduce and study a new, potentially rich odel for selfish routing over non-cooperative
More informationReduced Length Checking Sequences
Reduced Length Checing Sequences Robert M. Hierons 1 and Hasan Ural 2 1 Departent of Inforation Systes and Coputing, Brunel University, Middlesex, UB8 3PH, United Kingdo 2 School of Inforation echnology
More informationarxiv: v1 [math.co] 19 Apr 2017
PROOF OF CHAPOTON S CONJECTURE ON NEWTON POLYTOPES OF q-ehrhart POLYNOMIALS arxiv:1704.0561v1 [ath.co] 19 Apr 017 JANG SOO KIM AND U-KEUN SONG Abstract. Recently, Chapoton found a q-analog of Ehrhart polynoials,
More informationExperimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis
City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna
More informationOn the Existence of Pure Nash Equilibria in Weighted Congestion Games
MATHEMATICS OF OPERATIONS RESEARCH Vol. 37, No. 3, August 2012, pp. 419 436 ISSN 0364-765X (print) ISSN 1526-5471 (online) http://dx.doi.org/10.1287/oor.1120.0543 2012 INFORMS On the Existence of Pure
More informationRandomized Recovery for Boolean Compressed Sensing
Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch
More informationEMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS
EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS Jochen Till, Sebastian Engell, Sebastian Panek, and Olaf Stursberg Process Control Lab (CT-AST), University of Dortund,
More informationConstant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool
Constant-Space String-Matching in Sublinear Average Tie (Extended Abstract) Maxie Crocheore Universite de Marne-la-Vallee Leszek Gasieniec y Max-Planck Institut fur Inforatik Wojciech Rytter z Warsaw University
More informationarxiv: v1 [math.na] 10 Oct 2016
GREEDY GAUSS-NEWTON ALGORITHM FOR FINDING SPARSE SOLUTIONS TO NONLINEAR UNDERDETERMINED SYSTEMS OF EQUATIONS MÅRTEN GULLIKSSON AND ANNA OLEYNIK arxiv:6.395v [ath.na] Oct 26 Abstract. We consider the proble
More informationM ath. Res. Lett. 15 (2008), no. 2, c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS. Van H. Vu. 1.
M ath. Res. Lett. 15 (2008), no. 2, 375 388 c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS Van H. Vu Abstract. Let F q be a finite field of order q and P be a polynoial in F q[x
More informationHandout 7. and Pr [M(x) = χ L (x) M(x) =? ] = 1.
Notes on Coplexity Theory Last updated: October, 2005 Jonathan Katz Handout 7 1 More on Randoized Coplexity Classes Reinder: so far we have seen RP,coRP, and BPP. We introduce two ore tie-bounded randoized
More informationNew Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors
New Slack-Monotonic Schedulability Analysis of Real-Tie Tasks on Multiprocessors Risat Mahud Pathan and Jan Jonsson Chalers University of Technology SE-41 96, Göteborg, Sweden {risat, janjo}@chalers.se
More informationLearnability and Stability in the General Learning Setting
Learnability and Stability in the General Learning Setting Shai Shalev-Shwartz TTI-Chicago shai@tti-c.org Ohad Shair The Hebrew University ohadsh@cs.huji.ac.il Nathan Srebro TTI-Chicago nati@uchicago.edu
More informationMULTIPLAYER ROCK-PAPER-SCISSORS
MULTIPLAYER ROCK-PAPER-SCISSORS CHARLOTTE ATEN Contents 1. Introduction 1 2. RPS Magas 3 3. Ites as a Function of Players and Vice Versa 5 4. Algebraic Properties of RPS Magas 6 References 6 1. Introduction
More information3.8 Three Types of Convergence
3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to
More informationUniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval
Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,
More informationA Bernstein-Markov Theorem for Normed Spaces
A Bernstein-Markov Theore for Nored Spaces Lawrence A. Harris Departent of Matheatics, University of Kentucky Lexington, Kentucky 40506-0027 Abstract Let X and Y be real nored linear spaces and let φ :
More informationA Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)
1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu
More informationCourse Notes for EE227C (Spring 2018): Convex Optimization and Approximation
Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October
More informationInteractive Markov Models of Evolutionary Algorithms
Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary
More informationDepartment of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China
6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith
More informationComputational and Statistical Learning Theory
Coputational and Statistical Learning Theory Proble sets 5 and 6 Due: Noveber th Please send your solutions to learning-subissions@ttic.edu Notations/Definitions Recall the definition of saple based Radeacher
More informationarxiv: v2 [math.nt] 5 Sep 2012
ON STRONGER CONJECTURES THAT IMPLY THE ERDŐS-MOSER CONJECTURE BERND C. KELLNER arxiv:1003.1646v2 [ath.nt] 5 Sep 2012 Abstract. The Erdős-Moser conjecture states that the Diophantine equation S k () = k,
More informationLower Bounds for Quantized Matrix Completion
Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &
More informationMath 262A Lecture Notes - Nechiporuk s Theorem
Math 6A Lecture Notes - Nechiporuk s Theore Lecturer: Sa Buss Scribe: Stefan Schneider October, 013 Nechiporuk [1] gives a ethod to derive lower bounds on forula size over the full binary basis B The lower
More informationCharacterization of the Line Complexity of Cellular Automata Generated by Polynomial Transition Rules. Bertrand Stone
Characterization of the Line Coplexity of Cellular Autoata Generated by Polynoial Transition Rules Bertrand Stone Abstract Cellular autoata are discrete dynaical systes which consist of changing patterns
More informationUnderstanding Machine Learning Solution Manual
Understanding Machine Learning Solution Manual Written by Alon Gonen Edited by Dana Rubinstein Noveber 17, 2014 2 Gentle Start 1. Given S = ((x i, y i )), define the ultivariate polynoial p S (x) = i []:y
More informationOn Certain C-Test Words for Free Groups
Journal of Algebra 247, 509 540 2002 doi:10.1006 jabr.2001.9001, available online at http: www.idealibrary.co on On Certain C-Test Words for Free Groups Donghi Lee Departent of Matheatics, Uni ersity of
More informationlecture 36: Linear Multistep Mehods: Zero Stability
95 lecture 36: Linear Multistep Mehods: Zero Stability 5.6 Linear ultistep ethods: zero stability Does consistency iply convergence for linear ultistep ethods? This is always the case for one-step ethods,
More informationSoft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis
Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES
More informationOn the Use of A Priori Information for Sparse Signal Approximations
ITS TECHNICAL REPORT NO. 3/4 On the Use of A Priori Inforation for Sparse Signal Approxiations Oscar Divorra Escoda, Lorenzo Granai and Pierre Vandergheynst Signal Processing Institute ITS) Ecole Polytechnique
More informationHybrid System Identification: An SDP Approach
49th IEEE Conference on Decision and Control Deceber 15-17, 2010 Hilton Atlanta Hotel, Atlanta, GA, USA Hybrid Syste Identification: An SDP Approach C Feng, C M Lagoa, N Ozay and M Sznaier Abstract The
More informationConvolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder
Convolutional Codes Lecture Notes 8: Trellis Codes In this lecture we discuss construction of signals via a trellis. That is, signals are constructed by labeling the branches of an infinite trellis with
More informationThe Transactional Nature of Quantum Information
The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.
More informationSharp Time Data Tradeoffs for Linear Inverse Problems
Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used
More information