John Weatherwax. Analysis of Parallel Depth First Search Algorithms
|
|
- John Holt
- 5 years ago
- Views:
Transcription
1 Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel Deth First Search Algorithms Following the discussion in the book on this toic I will clarify some oints that I had difficulty following. Hoefully, these comments will be of hel to others as they learn this material. In the resented analysis, there is a total of W work (searching) to be done and we initially have all of it assigned to a single rocessor. This is in fact the way most arallel rograms begin so our assumtions are in line with reality. Since we have not secifically secified the load balancing scheme we can be guaranteed that this W amount of work will be slit u and distributed to the remaining rocessors if the load balancing scheme is weakly fair. Intuitively, this means that after enough requests for work in the system (from any rocessor) have been issued eventually every rocessor will have work requested from it. In other words, no rocessor is excluded from being asked to rovide work. To quantify the notion of how many requests must take lace before we can guarantee that every rocessor has had work requested from it. We define V () to be the number of requests that must take lace in the system before we can guarantee that every rocessor has been olled for work. Obviously, V () deends on the secific load balancing scheme used be it global round
2 robin, randomized olling etc. We see that at least V () since if V () < we have not even generated enough olling to request from every existing rocessor. Secifically V () will deend on the load balancing algorithm and will be secified when we discuss the exlicit load balancing schemes below. In our initial situation, with all the work W at one rocessor, we must have V () requests in our system before we can be guaranteed to to have requested work from. With the first request that accets, the maximal work in the system dros to ( α)w. This is assuming an α-slitting as discussed in the book. After 2V () requests it dros to ( α) 2 W, etc. After nv () total requests it dros to ( α) n W. To determine the number n of V () requests before our tasks are so small they can no longer be slit we enforce the requirement that after these n work divisions, the maximal work left in the system be less than ɛ. This gives ( α) n W < ɛ Solving for n gives n > log /( α) ( W ɛ ) Thus after n chunks of V () requests we can guarantee that the maximal work at any given node in the system is less than ɛ. Thus the total number of work requests is O(nV ()) and since O(n) = O(log /( α) ( W ɛ )) = O(log W ) the total number of work requests simlifies to O(V () log W ) as given in the text. If we further assume that each request for work and the corresond work transfers occuy constant time t comm, an uer bound on the amount of communication overhead can be given by T o = t comm V () log W. For variations on communication that does not take lace in constant time this see the roblems from this chater. A Different Analysis of V() for Random Polling Here is a different method of attack for obtaining the same answer for this question. As stated in the text, assume that we have total boxes to mark and we continue to make random attemts to mark an unmarked box. Define 2
3 f(q, n) to be the robability that q boxes are marked after n trials. Then the average number of trials needed to mark all of the boxes is given by N = kf(, k) () k= A simle artial difference equation for f(q, n) is given by the following logic. The robability that q + boxes are marked after n + trials can be given by the sum of the two mutually exclusive events q + boxes are marked after n trials and the n + attemt to mark a box fails q boxes are marked after n trials and the n + attemt to mark a box succeeds Now at any stage, with q (of ) boxes marked, the chance we mark another box (a success) on the next trial is q and the chance we do not (a failure) is given by q. With this background we can now exress f(q +, n + ) as f(q +, n + ) = q + (q + ) f(q +, n) + f(q, n). (2) For q 0 and n. Note that this is a linear artial difference equation and has many amenable method for its solution. For initial and boundary conditions for f(q, n) we see from simle arguments that f(0, n) = 0 for n (3) f(q, 0) = 0 for q (4) f(q, n) = 0 for q > n (5) f(, ) = (6) f(q, q) = (q) ( )( 2)... ( q + ) = for q (7) q q We now desire the solution to the artial difference equation, Eq. 2. It will benefit us to write it decremented in q by one or as f(q, n + ) = q q f(q, n) + f(q, n) for n, q. (8) 3
4 Attemts to solve this artial difference equation are reorted on below using a variety of techniques. Some were more successful that others and may indicate why the book choose the aroach they took. Many reduce to the same calculations. In locations where I couldn t make more rogress, I simly stoed, oting to come back to these derivations when my skills had imroved more. Oerator Method As a first attemt, lets try to solve Eq. 8 using the Oerator Method. As such we define E f(q, n) = f(q +, n) (9) E 2 f(q, n) = f(q, n + ) (0) and our original equation becomes ( q E 2 f = ( q ) )E f () therefore recognizing the above as n iterations on f(q, n) we have (by induction) and then the binomial theorem that ( q f(q, n) = + ( q ) n )E g(q) (2) ( ) ( ) n k ( n q = q ) n k E (n k) g(q) (3) k k=0 ( ) ( ) n k ( n q = q n k g(q n + k) (4) k ) k=0 As an interesting ( ) observation, that may shed light into how to roceed, notice that ( q n k )k ( q )n k is the Binomial distribution. That is, the robability of k successes in n trials where the robability of a single success is q. The Z-transform with resect to n Taking the Z-transform with resect to n gives zf (q, z) zf(q, 0) = q q F (q, z) + F (q, z) for q (5) 4
5 Now f(q, 0) = 0 when q > 0 so the above can be solved for F (q, z) giving Solving by iteration we obtain F (q, z) = q z q F (q, z) for q (6) F (q, z) = q ( l ) q (z l (0, z) (7) )F Note that F (0, z) = Z(f(0, n)) = n 0 f(0, n)z n = f(0, 0)z 0 = f(0, 0) (8) At this oint we have not determined f(0, 0). Limiting values of Eqs. 3 and 4 above would indicate that its value should be 0. This cannot be true, or else we end u with the trivial solution for F (q, z). In addition, limiting values of the Eq. 7 require the value of f(0, 0) =, which is what we use in the analysis below. To comute the inverse Z-transform of Eq. 7 we note that this exression can be searated into a sum of individual terms by artial fractions. To enable such a transformation we are looking for a set of coefficients A l such that Multilying both sides by A l q q (z l ) = z l ( q z l ) in the standard way we can obtain the following for the coefficients A l (9) A l = q m=,m l ( l ) = m q q m=,m l (l m) for l =, 2,..., q (20) so that with this substitution F (q, z) becomes F (q, z) = ( q ( l ) ) q 5 ( z l l A l ) (2)
6 Note that the roduct exression in the above equation can be written in terms of the factorial function as q ( l q ) = l) ( (22) = q ( l) (23) q so that at this oint F (q, z) becomes = ( )( 2)... ( q) (24) q = q+ (q+) (25) F (q, z) = (q+) q q A l ( z l l ) (26) To further comute the inverse Z-transform of this exression recall that the Z-transform of the Heavyside unit ste (with jum occurring at ) is given by (see Page 2 in the book by Kelly and Peterson []: Examle 3.37) n 0 u n () = z and recalling the geometric roduct formula for the Z-transform (27) Z(a n y n ) = Y ( z a ) (28) we can invert the above function obtaining ( ) f(q, n) = (q+) q n A l l u q n () (29) l = (q+) q u n() A q+n l l n (30) The Method of Generating Functions In this method we multily both sides of the equation by x n and sum from n 0. This gives f(q, n + )x n = q n 0 n 0 f(q, n)xn + q f(q, n)x n (3) n 0 6
7 Defining F (q, x) = n 0 f(q, n)x n the above becomes or or n f(q, n)x n = q F (q, x) + ( q )F (q, x) (32) x F (q, x) = q F (q, x) + ( q )F (q, x) (33) F (q, x) = ( q ) x q (34) The Method of Searation of Variables To use Searation of Variables we define f(q, n) = F q G n and insert this into our artial difference above to get Now dividing by G n F q we obtain F q G n+ = q F qg n + ( q )F q G n (35) G n+ = q ( G n + q ) Fq. (36) F q Since the left hand side is a function only n and the right hand side is only a function of q they each must equal a searation constant we denote α. With this substitution the equation for G n then becomes G n+ = αg n (37) with a solution of Similarly F q must satisfy or G n = G 0 α n (38) q + ( q )F q F q = α (39) F q = q q αf q (40) 7
8 Derivation of a difference equation for N This may yet be another method that could yield manageable calculations. Chater 8 Solutions Problem To evaluate the erformance of this scheme we will follow the discussion given in the book and comute the overhead due to communication i.e. resulting from work requests and work transfers necessitated by the load balancing algorithm; be it asynchronous round robin, global round robin, or random oling. From the the discussions in the book, the communication overhead is given by T 0 = t comm V () log W. (4) Assuming a constant communication time (t comm ) indeendent of the distance between rocessors and the amount of data sent. Problem 4 Part (a): Assume as in the discussion in the text that W amount of work is initially laced at a single rocessor. In V () requests and assuming an α-slitting we reduce the maximum work at any given node to ( α)w. We also require distributing either αw or ( α)w to the requesting rocessor (in a real imlementation where communication bandwidth is limited one would want to transmit the smaller of those two exressions). This transmission requires a communication time roortional to either αw or ( α)w and is bounded above by the larger of these two. Since we assume that 0 < α < 0.5 this is ( α)w. This total negotiation for work results in at most V () requests each with t comm communication time and the additional transfer of work which is bounded above by t w ( α)w. Giving a total communication overhead of T () o = t comm V () + t w ( α)w. (42) A second alication of the same logic results in T (2) o = T () o + t comm V () + t w ( α) 2 W (43) 8
9 = 2t comm V () + t w ( ( α)w + ( α) 2 W ) (44) Induction to multile blocks of work requests on the above attern (until the work at all rocessors is less than the minimum slit amount ɛ) gives for the total overhead due to communication (transfer of data lus requests) of n T o = t comm V () log W + t w W ( α) i/2 (45) Where as in the notes for this section n > log /( α) ( W ɛ ). To determine the total communication overhead we must erform the summation in Eq. 45. The simlest way to evaluate this exression is to consider the limit when n tends to infinity. In that case, the summation above is a geometric series and converges nicely to a constant. Giving in total that the total overhead is given by i= T 0 = t comm V () log(w ) + O(t w W ) (46) Now Eq. 46 reresents the communication required by the load balancing strategy through its deendence on V (). For load balancing by Global Round Robin (GRR) the function V () = since we must have at least work requests in the system before we can be gaurrenteed that every rocessor has received at least one request and Eq. 46 becomes T 0 = t comm log(w ) + C t w W + C0 (47) For the hyercube architecture the average distance between rocessors is given by Θ(log()) so that the above becomes T 0 = O( log() log(w )) + O(t w W ). (48) To derive the iso-efficiency function we ballance the communication overhead T 0 with the total work to be done W giving W = O( log() log(w )) + O( W ) (49) and we desire to solve the above asymtotically for W = W (). Asymtotically, W W, and we dro the O( W ) term from the above giving W log() log(w ) when W 9
10 giving W = O( log() log( log( log(w )))) (50) = O( log((log() + log(log()) + log(w )))) (5) O( log() 2 ) (52) As discussed in the text for global round robin, the iso-efficiency due to contention for the shared resource counter rocessor is O( 2 log()) and this dominates the iso-efficiency above. Part (b): In this case, after the system has seen V () work requests the maximal work at any one rocessor is reduced to W ( α), after two blocks of V () work requests the maximal work in any one rocessor is given by W ( α) 2. As before we have, after n blocks of V () work requests the maximal work in any one rocessor is given by W ( α) n. The assumtions of this art of the roblem assume that the communication time for the transfer of work is uer bounded by log(w ( α) n ). (53) So in total, the total time required for the data transfered is bounded above by n t w log(w ( α) i ) = n t w log(w ) + i log( α) (54) i= i= = n t w n log(w ) + t w log( α) i (55) i= with t w the er word data transfer time (time required to transfer a word of data). Since n = O(log(W )) as discussed above we observe that the above is bounded above by t w (log(w )) 2 + t w log( α)n 2 = O(log(W ) 2 ). (56) Thus the overhead due to communication of work requests is T 0 = t comm V () log(w ) + (log(w )) 2 (57) since for Global Round Robin V () = and we obtain T 0 = t comm log(w ) + (log(w )) 2 (58) 0
11 For the hyercube architecture t comm = log() and we have T 0 = log() log(w ) + (log(w )) 2. (59) To derive the iso-efficency function set T 0 = W and solve for W as a function of. The assignment of T 0 = W gives W = log() log(w ) + (log(w )) 2 (60) Since (log(w )) 2 is subdominant to W (the left hand side) we obtain equating W with the log() term the exression W = log() log(w ) (6) which is the same result as in Part (a) and gives an iso-efficiency function of W = O((log()) 2 as before. Since for both of these situations the communication time due to data transfer did not affect the iso-efficiency function we see a motivation for not including it in the discussion resented in the book. References [] W. G. Kelley and A. C. Peterson. Difference Equations. An Introduction with Alications. Academic Press, New York, 99.
Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018
Comuter arithmetic Intensive Comutation Annalisa Massini 7/8 Intensive Comutation - 7/8 References Comuter Architecture - A Quantitative Aroach Hennessy Patterson Aendix J Intensive Comutation - 7/8 3
More information4. Score normalization technical details We now discuss the technical details of the score normalization method.
SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules
More informationMATH 2710: NOTES FOR ANALYSIS
MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite
More informationFeedback-error control
Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller
More informationHotelling s Two- Sample T 2
Chater 600 Hotelling s Two- Samle T Introduction This module calculates ower for the Hotelling s two-grou, T-squared (T) test statistic. Hotelling s T is an extension of the univariate two-samle t-test
More informationRound-off Errors and Computer Arithmetic - (1.2)
Round-off Errors and Comuter Arithmetic - (.). Round-off Errors: Round-off errors is roduced when a calculator or comuter is used to erform real number calculations. That is because the arithmetic erformed
More informationModel checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle]
Chater 5 Model checking, verification of CTL One must verify or exel... doubts, and convert them into the certainty of YES or NO. [Thomas Carlyle] 5. The verification setting Page 66 We introduce linear
More informationAnalysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel
Performance Analysis Introduction Analysis of execution time for arallel algorithm to dertmine if it is worth the effort to code and debug in arallel Understanding barriers to high erformance and redict
More informationStatics and dynamics: some elementary concepts
1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and
More informationCHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules
CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules. Introduction: The is widely used in industry to monitor the number of fraction nonconforming units. A nonconforming unit is
More informationMODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL
Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management
More informationOutline. EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Simple Error Detection Coding
Outline EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Error detection using arity Hamming code for error detection/correction Linear Feedback Shift
More informationPrinciples of Computed Tomography (CT)
Page 298 Princiles of Comuted Tomograhy (CT) The theoretical foundation of CT dates back to Johann Radon, a mathematician from Vienna who derived a method in 1907 for rojecting a 2-D object along arallel
More informationElementary Analysis in Q p
Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some
More informationApproximating min-max k-clustering
Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost
More informationShadow Computing: An Energy-Aware Fault Tolerant Computing Model
Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms
More informationMachine Learning: Homework 4
10-601 Machine Learning: Homework 4 Due 5.m. Monday, February 16, 2015 Instructions Late homework olicy: Homework is worth full credit if submitted before the due date, half credit during the next 48 hours,
More informationEvaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models
Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu
More informationAsymptotically Optimal Simulation Allocation under Dependent Sampling
Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee
More informationConvex Optimization methods for Computing Channel Capacity
Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem
More informationDepartment of Mathematics
Deartment of Mathematics Ma 3/03 KC Border Introduction to Probability and Statistics Winter 209 Sulement : Series fun, or some sums Comuting the mean and variance of discrete distributions often involves
More informationA Social Welfare Optimal Sequential Allocation Procedure
A Social Welfare Otimal Sequential Allocation Procedure Thomas Kalinowsi Universität Rostoc, Germany Nina Narodytsa and Toby Walsh NICTA and UNSW, Australia May 2, 201 Abstract We consider a simle sequential
More informationUnderstanding DPMFoam/MPPICFoam
Understanding DPMFoam/MPPICFoam Jeroen Hofman March 18, 2015 In this document I intend to clarify the flow solver and at a later stage, the article-fluid and article-article interaction forces as imlemented
More information8 STOCHASTIC PROCESSES
8 STOCHASTIC PROCESSES The word stochastic is derived from the Greek στoχαστικoς, meaning to aim at a target. Stochastic rocesses involve state which changes in a random way. A Markov rocess is a articular
More informationA generalization of Amdahl's law and relative conditions of parallelism
A generalization of Amdahl's law and relative conditions of arallelism Author: Gianluca Argentini, New Technologies and Models, Riello Grou, Legnago (VR), Italy. E-mail: gianluca.argentini@riellogrou.com
More informationarxiv: v1 [physics.data-an] 26 Oct 2012
Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch
More informationNumerical Linear Algebra
Numerical Linear Algebra Numerous alications in statistics, articularly in the fitting of linear models. Notation and conventions: Elements of a matrix A are denoted by a ij, where i indexes the rows and
More informationChapter 7 Rational and Irrational Numbers
Chater 7 Rational and Irrational Numbers In this chater we first review the real line model for numbers, as discussed in Chater 2 of seventh grade, by recalling how the integers and then the rational numbers
More informationAn Analysis of Reliable Classifiers through ROC Isometrics
An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit
More informationDistributed Rule-Based Inference in the Presence of Redundant Information
istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced
More informationAnalysis of some entrance probabilities for killed birth-death processes
Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction
More informationImproved Capacity Bounds for the Binary Energy Harvesting Channel
Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,
More informationUse of Transformations and the Repeated Statement in PROC GLM in SAS Ed Stanek
Use of Transformations and the Reeated Statement in PROC GLM in SAS Ed Stanek Introduction We describe how the Reeated Statement in PROC GLM in SAS transforms the data to rovide tests of hyotheses of interest.
More informationModeling and Estimation of Full-Chip Leakage Current Considering Within-Die Correlation
6.3 Modeling and Estimation of Full-Chi Leaage Current Considering Within-Die Correlation Khaled R. eloue, Navid Azizi, Farid N. Najm Deartment of ECE, University of Toronto,Toronto, Ontario, Canada {haled,nazizi,najm}@eecg.utoronto.ca
More informationTests for Two Proportions in a Stratified Design (Cochran/Mantel-Haenszel Test)
Chater 225 Tests for Two Proortions in a Stratified Design (Cochran/Mantel-Haenszel Test) Introduction In a stratified design, the subects are selected from two or more strata which are formed from imortant
More informationANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM
ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM JOHN BINDER Abstract. In this aer, we rove Dirichlet s theorem that, given any air h, k with h, k) =, there are infinitely many rime numbers congruent to
More informationMATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK
Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment
More informationEconomics 101. Lecture 7 - Monopoly and Oligopoly
Economics 0 Lecture 7 - Monooly and Oligooly Production Equilibrium After having exlored Walrasian equilibria with roduction in the Robinson Crusoe economy, we will now ste in to a more general setting.
More informationChapter 1 Fundamentals
Chater Fundamentals. Overview of Thermodynamics Industrial Revolution brought in large scale automation of many tedious tasks which were earlier being erformed through manual or animal labour. Inventors
More information2 Asymptotic density and Dirichlet density
8.785: Analytic Number Theory, MIT, sring 2007 (K.S. Kedlaya) Primes in arithmetic rogressions In this unit, we first rove Dirichlet s theorem on rimes in arithmetic rogressions. We then rove the rime
More informationNotes on pressure coordinates Robert Lindsay Korty October 1, 2002
Notes on ressure coordinates Robert Lindsay Korty October 1, 2002 Obviously, it makes no difference whether the quasi-geostrohic equations are hrased in height coordinates (where x, y,, t are the indeendent
More informationScaling Multiple Point Statistics for Non-Stationary Geostatistical Modeling
Scaling Multile Point Statistics or Non-Stationary Geostatistical Modeling Julián M. Ortiz, Steven Lyster and Clayton V. Deutsch Centre or Comutational Geostatistics Deartment o Civil & Environmental Engineering
More informationSupplementary Materials for Robust Estimation of the False Discovery Rate
Sulementary Materials for Robust Estimation of the False Discovery Rate Stan Pounds and Cheng Cheng This sulemental contains roofs regarding theoretical roerties of the roosed method (Section S1), rovides
More informationSets of Real Numbers
Chater 4 Sets of Real Numbers 4. The Integers Z and their Proerties In our revious discussions about sets and functions the set of integers Z served as a key examle. Its ubiquitousness comes from the fact
More informationFig. 21: Architecture of PeerSim [44]
Sulementary Aendix A: Modeling HPP with PeerSim Fig. : Architecture of PeerSim [] In PeerSim, every comonent can be relaced by another comonent imlementing the same interface, and the general simulation
More informationON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS
#A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,
More informationAI*IA 2003 Fusion of Multiple Pattern Classifiers PART III
AI*IA 23 Fusion of Multile Pattern Classifiers PART III AI*IA 23 Tutorial on Fusion of Multile Pattern Classifiers by F. Roli 49 Methods for fusing multile classifiers Methods for fusing multile classifiers
More informationPARALLEL MATRIX MULTIPLICATION: A SYSTEMATIC JOURNEY
PARALLEL MATRIX MULTIPLICATION: A SYSTEMATIC JOURNEY MARTIN D SCHATZ, ROBERT A VAN DE GEIJN, AND JACK POULSON Abstract We exose a systematic aroach for develoing distributed memory arallel matrix matrix
More information1 Gambler s Ruin Problem
Coyright c 2017 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins
More informationTopic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar
15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider
More informationCMSC 425: Lecture 4 Geometry and Geometric Programming
CMSC 425: Lecture 4 Geometry and Geometric Programming Geometry for Game Programming and Grahics: For the next few lectures, we will discuss some of the basic elements of geometry. There are many areas
More informationPeriodic scheduling 05/06/
Periodic scheduling T T or eriodic scheduling, the best that we can do is to design an algorithm which will always find a schedule if one exists. A scheduler is defined to be otimal iff it will find a
More informationMAS 4203 Number Theory. M. Yotov
MAS 4203 Number Theory M. Yotov June 15, 2017 These Notes were comiled by the author with the intent to be used by his students as a main text for the course MAS 4203 Number Theory taught at the Deartment
More informationChapter 7 Sampling and Sampling Distributions. Introduction. Selecting a Sample. Introduction. Sampling from a Finite Population
Chater 7 and s Selecting a Samle Point Estimation Introduction to s of Proerties of Point Estimators Other Methods Introduction An element is the entity on which data are collected. A oulation is a collection
More informationPaper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation
Paer C Exact Volume Balance Versus Exact Mass Balance in Comositional Reservoir Simulation Submitted to Comutational Geosciences, December 2005. Exact Volume Balance Versus Exact Mass Balance in Comositional
More informationRESOLUTIONS OF THREE-ROWED SKEW- AND ALMOST SKEW-SHAPES IN CHARACTERISTIC ZERO
RESOLUTIONS OF THREE-ROWED SKEW- AND ALMOST SKEW-SHAPES IN CHARACTERISTIC ZERO MARIA ARTALE AND DAVID A. BUCHSBAUM Abstract. We find an exlicit descrition of the terms and boundary mas for the three-rowed
More informationThe non-stochastic multi-armed bandit problem
Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at
More informationPARALLEL MATRIX MULTIPLICATION: A SYSTEMATIC JOURNEY
PARALLEL MATRIX MULTIPLICATION: A SYSTEMATIC JOURNEY MARTIN D SCHATZ, ROBERT A VAN DE GEIJN, AND JACK POULSON Abstract We exose a systematic aroach for develoing distributed memory arallel matrixmatrix
More informationPlotting the Wilson distribution
, Survey of English Usage, University College London Setember 018 1 1. Introduction We have discussed the Wilson score interval at length elsewhere (Wallis 013a, b). Given an observed Binomial roortion
More information2 Asymptotic density and Dirichlet density
8.785: Analytic Number Theory, MIT, sring 2007 (K.S. Kedlaya) Primes in arithmetic rogressions In this unit, we first rove Dirichlet s theorem on rimes in arithmetic rogressions. We then rove the rime
More informationPHYS 301 HOMEWORK #9-- SOLUTIONS
PHYS 0 HOMEWORK #9-- SOLUTIONS. We are asked to use Dirichlet' s theorem to determine the value of f (x) as defined below at x = 0, ± /, ± f(x) = 0, - < x
More informationFault Tolerant Quantum Computing Robert Rogers, Thomas Sylwester, Abe Pauls
CIS 410/510, Introduction to Quantum Information Theory Due: June 8th, 2016 Sring 2016, University of Oregon Date: June 7, 2016 Fault Tolerant Quantum Comuting Robert Rogers, Thomas Sylwester, Abe Pauls
More informationCMSC 425: Lecture 7 Geometric Programming: Sample Solutions
CMSC 425: Lecture 7 Geometric Programming: Samle Solutions Samles: In the last few lectures, we have been discussing affine and Euclidean geometr, coordinate frames and affine transformations, and rotations.
More informationOn the Toppling of a Sand Pile
Discrete Mathematics and Theoretical Comuter Science Proceedings AA (DM-CCG), 2001, 275 286 On the Toling of a Sand Pile Jean-Christohe Novelli 1 and Dominique Rossin 2 1 CNRS, LIFL, Bâtiment M3, Université
More informationCharacterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations
Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of
More informationPublished: 14 October 2013
Electronic Journal of Alied Statistical Analysis EJASA, Electron. J. A. Stat. Anal. htt://siba-ese.unisalento.it/index.h/ejasa/index e-issn: 27-5948 DOI: 1.1285/i275948v6n213 Estimation of Parameters of
More informationEnd-to-End Delay Minimization in Thermally Constrained Distributed Systems
End-to-End Delay Minimization in Thermally Constrained Distributed Systems Pratyush Kumar, Lothar Thiele Comuter Engineering and Networks Laboratory (TIK) ETH Zürich, Switzerland {ratyush.kumar, lothar.thiele}@tik.ee.ethz.ch
More informationCHAPTER 5 STATISTICAL INFERENCE. 1.0 Hypothesis Testing. 2.0 Decision Errors. 3.0 How a Hypothesis is Tested. 4.0 Test for Goodness of Fit
Chater 5 Statistical Inference 69 CHAPTER 5 STATISTICAL INFERENCE.0 Hyothesis Testing.0 Decision Errors 3.0 How a Hyothesis is Tested 4.0 Test for Goodness of Fit 5.0 Inferences about Two Means It ain't
More informationRadial Basis Function Networks: Algorithms
Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.
More informationCSC165H, Mathematical expression and reasoning for computer science week 12
CSC165H, Mathematical exression and reasoning for comuter science week 1 nd December 005 Gary Baumgartner and Danny Hea hea@cs.toronto.edu SF4306A 416-978-5899 htt//www.cs.toronto.edu/~hea/165/s005/index.shtml
More informationThe Arm Prime Factors Decomposition
The Arm Prime Factors Decomosition Arm Boris Nima arm.boris@gmail.com Abstract We introduce the Arm rime factors decomosition which is the equivalent of the Taylor formula for decomosition of integers
More informationSolutions to Problem Set 5
Solutions to Problem Set Problem 4.6. f () ( )( 4) For this simle rational function, we see immediately that the function has simle oles at the two indicated oints, and so we use equation (6.) to nd the
More informationECE 534 Information Theory - Midterm 2
ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You
More informationSTART Selected Topics in Assurance
START Selected Toics in Assurance Related Technologies Table of Contents Introduction Statistical Models for Simle Systems (U/Down) and Interretation Markov Models for Simle Systems (U/Down) and Interretation
More informationPositive decomposition of transfer functions with multiple poles
Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.
More informationMA3H1 TOPICS IN NUMBER THEORY PART III
MA3H1 TOPICS IN NUMBER THEORY PART III SAMIR SIKSEK 1. Congruences Modulo m In quadratic recirocity we studied congruences of the form x 2 a (mod ). We now turn our attention to situations where is relaced
More informationAdam Paweł Zaborski. 8 Plasticity. reloading. 1. Bauschinger s effect. 2. unchanged yielding limit. 3. isotropic hardening
8 lasticity Introduction Definitions loading/unloading/reloading words commonly used in lasticity lastic strain a ermanent strain that doesn t vanish after unloading, lastically assive rocess a rocess
More informationHENSEL S LEMMA KEITH CONRAD
HENSEL S LEMMA KEITH CONRAD 1. Introduction In the -adic integers, congruences are aroximations: for a and b in Z, a b mod n is the same as a b 1/ n. Turning information modulo one ower of into similar
More informationTHE SET CHROMATIC NUMBER OF RANDOM GRAPHS
THE SET CHROMATIC NUMBER OF RANDOM GRAPHS ANDRZEJ DUDEK, DIETER MITSCHE, AND PAWE L PRA LAT Abstract. In this aer we study the set chromatic number of a random grah G(n, ) for a wide range of = (n). We
More informationAn Analysis of TCP over Random Access Satellite Links
An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance
More informationAlmost 4000 years ago, Babylonians had discovered the following approximation to. x 2 dy 2 =1, (5.0.2)
Chater 5 Pell s Equation One of the earliest issues graled with in number theory is the fact that geometric quantities are often not rational. For instance, if we take a right triangle with two side lengths
More informationBayesian inference & Markov chain Monte Carlo. Note 1: Many slides for this lecture were kindly provided by Paul Lewis and Mark Holder
Bayesian inference & Markov chain Monte Carlo Note 1: Many slides for this lecture were kindly rovided by Paul Lewis and Mark Holder Note 2: Paul Lewis has written nice software for demonstrating Markov
More informationProof: We follow thearoach develoed in [4]. We adot a useful but non-intuitive notion of time; a bin with z balls at time t receives its next ball at
A Scaling Result for Exlosive Processes M. Mitzenmacher Λ J. Sencer We consider the following balls and bins model, as described in [, 4]. Balls are sequentially thrown into bins so that the robability
More informationAnalysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks
Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their
More informationAn Investigation on the Numerical Ill-conditioning of Hybrid State Estimators
An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical
More informationA randomized sorting algorithm on the BSP model
A randomized sorting algorithm on the BSP model Alexandros V. Gerbessiotis a, Constantinos J. Siniolakis b a CS Deartment, New Jersey Institute of Technology, Newark, NJ 07102, USA b The American College
More informationSAS for Bayesian Mediation Analysis
Paer 1569-2014 SAS for Bayesian Mediation Analysis Miočević Milica, Arizona State University; David P. MacKinnon, Arizona State University ABSTRACT Recent statistical mediation analysis research focuses
More informationMATH 250: THE DISTRIBUTION OF PRIMES. ζ(s) = n s,
MATH 50: THE DISTRIBUTION OF PRIMES ROBERT J. LEMKE OLIVER For s R, define the function ζs) by. Euler s work on rimes ζs) = which converges if s > and diverges if s. In fact, though we will not exloit
More informationMulti-Operation Multi-Machine Scheduling
Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job
More informationSIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING. Ruhul SARKER. Xin YAO
Yugoslav Journal of Oerations Research 13 (003), Number, 45-59 SIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING Ruhul SARKER School of Comuter Science, The University of New South Wales, ADFA,
More informationUniversal Finite Memory Coding of Binary Sequences
Deartment of Electrical Engineering Systems Universal Finite Memory Coding of Binary Sequences Thesis submitted towards the degree of Master of Science in Electrical and Electronic Engineering in Tel-Aviv
More informationECE 6960: Adv. Random Processes & Applications Lecture Notes, Fall 2010
ECE 6960: Adv. Random Processes & Alications Lecture Notes, Fall 2010 Lecture 16 Today: (1) Markov Processes, (2) Markov Chains, (3) State Classification Intro Please turn in H 6 today. Read Chater 11,
More informationBrownian Motion and Random Prime Factorization
Brownian Motion and Random Prime Factorization Kendrick Tang June 4, 202 Contents Introduction 2 2 Brownian Motion 2 2. Develoing Brownian Motion.................... 2 2.. Measure Saces and Borel Sigma-Algebras.........
More informationStatistical Multiplexing Gain of Link Scheduling Algorithms in QoS Networks (Short Version)
1 Statistical Multilexing Gain of Link Scheduling Algorithms in QoS Networks (Short Version) Technical Reort: University of Virginia, CS-99-23, July 1999 Robert Boorstyn Almut Burchard Jörg Liebeherr y
More informationA New Method of DDB Logical Structure Synthesis Using Distributed Tabu Search
A New Method of DDB Logical Structure Synthesis Using Distributed Tabu Search Eduard Babkin and Margarita Karunina 2, National Research University Higher School of Economics Det of nformation Systems and
More informationPreconditioning techniques for Newton s method for the incompressible Navier Stokes equations
Preconditioning techniques for Newton s method for the incomressible Navier Stokes equations H. C. ELMAN 1, D. LOGHIN 2 and A. J. WATHEN 3 1 Deartment of Comuter Science, University of Maryland, College
More informationSUPER-GEOMETRIC CONVERGENCE OF A SPECTRAL ELEMENT METHOD FOR EIGENVALUE PROBLEMS WITH JUMP COEFFICIENTS *
Journal of Comutational Mathematics Vol.8, No.,, 48 48. htt://www.global-sci.org/jcm doi:.48/jcm.9.-m6 SUPER-GEOMETRIC CONVERGENCE OF A SPECTRAL ELEMENT METHOD FOR EIGENVALUE PROBLEMS WITH JUMP COEFFICIENTS
More informationLinear diophantine equations for discrete tomography
Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,
More informationLower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data
Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment
More informationElliptic Curves and Cryptography
Ellitic Curves and Crytograhy Background in Ellitic Curves We'll now turn to the fascinating theory of ellitic curves. For simlicity, we'll restrict our discussion to ellitic curves over Z, where is a
More information