Introduction Consider a set of jobs that are created in an on-line fashion and should be assigned to disks. Each job has a weight which is the frequen

Size: px
Start display at page:

Download "Introduction Consider a set of jobs that are created in an on-line fashion and should be assigned to disks. Each job has a weight which is the frequen"

Transcription

1 Ancient and new algorithms for load balancing in the L norm Adi Avidor Yossi Azar y Jir Sgall z July 7, 997 Abstract We consider the on-line load balancing roblem where there are m identical machines (servers) and a sequence of jobs. The jobs arrive one by one and should be assigned to one of the machines in an online fashion. The goal is to minimize the sum over all machines of the squares of the loads, instead of the traditional maximum load. We show that for the sum of the squares the greedy algorithm erforms within 4=3 of the otimum, and no on-line algorithm achieves a better cometitive ratio. Interestingly, we show that the erformance of greedy is not monotone in the number of machines. More secically, the cometitive ratio is 4=3 for any number of machines divisible by 3 but strictly less than 4=3 in all the other cases (although it aroaches 4=3 for large number of machines). To rove that greedy is otimal, we show a the lower bound of 4=3 for any algorithm for 3 machines. Surrisingly, we rovide a new on-line algorithm that erforms within 4=3 of the otimum, for some xed > 0, for any suciently large number of machines. This imlies that the asymtotic cometitive ratio of our new algorithm is strictly better than the cometitive ratio of any ossible on-line algorithm. Such henomena is not known to occur for the classic maximum load roblem. Minimizing the sum of the squares is equivalent to minimizing the load vector with resect to the L 2 norm. We extend our techniques and analyze the exact cometitive ratio of greedy with resect to the L norm. This ratio turns out to be 2 ( ln ). We show that greedy is otimal for two machines but design an algorithm whose asymtotic cometitive ratio is better than the ratio of greedy. Deartment of Comuter Science, Tel Aviv University. adi@math.tau.ac.il. y Deartment of Comuter Science, Tel-Aviv University. azar@math.tau.ac.il. Research suorted in art by Alon Fellowshi and by the Israel Science Foundation administered by the Israel Academy of Sciences. z sgall@math.cas.cz. Mathematical Institute, AV CR, Zitna 25, 5 67 Praha, Czech Reublic; artially suorted by grant A09602 of AV CR. 0

2 Introduction Consider a set of jobs that are created in an on-line fashion and should be assigned to disks. Each job has a weight which is the frequency access to the disk. Dene the load on a disk to be the sum of the weights of jobs assign to it. If we would like to minimize the maximum delay of an access request of a job to the disk than it is equivalent to minimize the maximum load on a disk. However, in many cases the more aroriate goal would be to minimize the average delay of all access requests [6]. That is equivalent to minimizing the sum of the squares of the loads, since the delay of an access request is roortional to the load on the disk. That motivates us to dene the following machine load balancing roblem. We are given m arallel identical machines and a number of indeendent jobs (tasks) arriving one by one at arbitrary times. Each job has an associated weight and should be assigned immediately to exactly one of the machines based only on the revious jobs without any knowledge on the future jobs. The load of a machine is the sum of the weights of the jobs assigned to it. The cost of an assignment for an inut sequence of jobs is the sum of the squares of the machines' load vector (after all jobs are assigned). The goal of an assignment algorithm is to assign all the jobs while minimizing the cost. We measure the erformance of an on-line algorithm by its cometitive ratio. An on-line algorithm is c-cometitive if for each inut the cost of the assignment roduced by the algorithm is at most c time larger than the cost of the otimal assignment. We show that for minimizing the sum of the squares of loads the greedy algorithm is 4-cometitive over any number of machines. We also show that no on-line algorithm can 3 achieve a better ratio than 4 for all m which imlies that greedy may be considered as 3 an otimal algorithm. Interestingly, the cometitive ratio of the greedy algorithm is not monotone in the number of machines. It is exactly 4 for m 0 (mod 3) but strictly 3 smaller than 4 for m 6 0 (mod 3). However, the asymtotic cometitive ratio, which 3 is the limit of the cometitive ratio for m!, is 4. More recisely, for any > 0 there is 3 some M such that for all m M the cometitive ratio of greedy is at least 4=3. The reason that the greedy algorithm is otimal if we allow any number of machines is that we roof a lower bound of 4 on any on-line algorithm for 3 machines. The greedy algorithm is 3 also otimal for 2 and 4 machines, in both cases the cometitive ratio is 3 + 5=4 :3090. Surrisingly, we rovide a new on-line algorithm with cometitive ratio 4=3, for some xed > 0, for any suciently large number of machines. This imlies that the asymtotic cometitive ratio of our new algorithm is strictly better than the cometitive ratio of any ossible on-line algorithm and strictly better than the asymtotic cometitive ratio of greedy. Such henomena is not known to occur for the classic makesan roblem. In fact it is conjectured in [7] that the cometitive ratio for the makesan is monotone increasing with the number of the machines. Also we are not aware of a natural on-line roblem whose cometitive ratio is dierent than the asymtotic cometitive ratio (in articular it should be non-monotone). We also consider the general L norm (for any > ). Note that minimizing the sum of the squares is equivalent to minimizing the L 2 norm of the load vector. We can also dene the cost to be the L norm of the machines' load vector for any >. In articular, minimizing the L norm recisely means minimizing the maximum load. By using the triangle inequality, it is not hard to show that for any L norm the worst case erformance

3 of the greedy algorithm is at most 2. We determine the exact worst case erformance of the greedy algorithm over an arbitrary number of machines. We show that this erformance is 2 ( ln ). Then we resent a lower bound of 3 ( 2 ) for any on-line assignment algorithm for any xed number of machines. We show that for any > the greedy algorithm is otimal for 2 machines. In contrast, we design an algorithm whose asymtotic cometitive ratio is strictly better than the asymtotic cometitive ratio of greedy. The case = (i.e., L ) is the classic ancient roblem of scheduling jobs on identical machines minimizing the makesan (or maximum load). Graham [] showed that the greedy load balancing algorithm is 2 m cometitive in this case. The greedy algorithm is otimal only for m 3, for any m > 3 better algorithms exist [9, 7]. Bartal et al. [5] were the rst to show an algorithm whose cometitive ratio is below 2 for some constant > 0 and arbitrary m. Very recently, Albers [] designed :923 cometitive algorithm and showed a lower bound of :852. Chandra and Wong [6] were the rst to consider the roblem of minimizing the sum of the squares of the machines load vector. Cody and Coman [8], in their study of lacing a set of records on a sectored drum to minimize the average latency, considered essentially the same minimization roblem. In [6] it is shown that if the jobs arrive in non-increasing weights order then the greedy algorithm is 25 of the otimal assignment in the worst case. 24 This result was slightly imroved by Leung and Wei [2]. Chandra and Wong [6] also considered the the general L norm (for any > ) and showed that the greedy algorithm on the sorted items achieves a constant erformance bound. The constant deends on and grows to 3 when grows to. 2 O-line scheduling/load balancing with resect to the L norm has been considered in [2]. The o-line minimization roblem is known to be NP-hard in the strong sense [0]. Alon et al. [2] rovided a olynomial aroximation scheme for scheduling jobs with resect to the L norm for any >. An examle in which the otimal assignment for the sum of the squares is dierent than the otimal assignment in the L norm is also given in [2]. Results on load balancing for the unrelated machines with resect to the L norm and L 2 (and L ) norm aear in [3, 4]. The cometitive ratio for unrelated machines is much worse (()) than the trivial bounds for identical machines and the techniques used are totally dierent. 2 Denitions and reliminaries In the load balancing roblem we are given m identical machines (servers) and a nite sequence of jobs (tasks). Each job j has a weight w j 0. A schedule S is an assignment which assigns each job j to a single machine i, i m. For every schedule S, the load of machine i, denoted L i (S), is the sum of weights of all jobs assigned to i in S. The vector of loads is L(S) = (L (S); : : : ; L m (S)). An assignment algorithm is an algorithm which for an inut sequence roduces a schedule which assigns every job in to one of the m machines. An on-line assignment algorithm must assign a job j at its arrival to a machine based only on the revious jobs and their assignments; the decision is made without any knowledge about future job arrivals. Our measure of cost is the L 2

4 norm. Hence the cost of a schedule S is dened as kl(s)k = mx i=! (L i (S)) : Note that we can reorder the machines with no change in the cost. The otimal cost, denoted OPT(S), is the minimal cost of a schedule S 0 which assigns the same jobs as S; this schedule can be comuted by an oine algorithm which knows all the jobs in advance. We measure the erformance of our algorithms by the cometitive ratio. For a xed >, the cometitive ratio of a schedule S is dened as C(S) = kl(s)k =OPT(S) (utting 0=0 = to handle the emty schedule). Let A be an on-line assignment algorithm. The cometitive ratio of A over a xed number m of machines is dened as C A;m = sufc(s) j S is a schedule roduced by A on m machinesg: The cometitive ratio of A over an arbitrary number of machines is dened as C A = sufc A;m j m g: The revious denitions cover also the case when we measure the the sum of the squares of loads, since then the cost is (kl(s)k 2 ) 2. Consequently, the cometitive ratios w.r.t. the sum of the squares of loads are equal to C 2 (S), C 2 A;m and C2 A w.r.t. the L 2 norm. Now we dene the notion of a shae of a schedule, which is an abstraction of a schedule where for every machine, all jobs assigned to it excet for one are relaced by very small jobs with the same total load. In general it may be imossible to roduce such a schedule by the same algorithm as the original one. Nevertheless, the concet of a shae, is very useful for roving uer bounds on the cometitive ratio, since the otimal assignment may imrove (by artitioning the jobs) while the cost of the assignment does not change. Hence a shae is a essimistic estimate of a schedule. A shae characterizes each machine by two numbers, a i is the total load of the small jobs, and u i is (a lower bound on) the weight of one large jobs. Formally a shae is a air R = (a; u), where a and u are vectors of m nonnegative reals. The vector of loads of a shae is dened as L(R) = a + u. The shae R = (a; u) is a shae of a schedule S if L(R) = L(S) and for every i m with u i > 0 there exists a job with weight w j u i assigned to the machine i in S. The otimal cost of a shae R is the inmum of the otimal costs of all schedules S with the shae R, formally OPT(R) = inffopt(s) j R is a shae of Sg. As we shall see, the inmum can be relaced by a minimum. The cometitive ratio of a shae R is C(R) = kl(r)k =OPT(R). It is ossible to comute the otimal cost of the shae R = (a; u) exlicitly. It is the cost of a schedule in which some big jobs are scheduled each on a searate machine and the rest of the jobs are balanced evenly on the rest of the machines. Let the machines be ordered so that u i are nondecreasing. For l m let h l = ( P m i= a i + P r i= u i )=l. Let k be the largest l such that h l u l (k is always dened, since h u ). We dene the height of the shae to be h(r) = h k. It is easy to see that a good candidate for an otimal schedule for the shae R is to ut on each machine one job of size exactly u i and divide a i into a few jobs so that they can be 3

5 balanced exactly on the k machines; then the load vector is (h k ; : : : ; h k ; u k+ ; : : : ; u m ). See the Figures and 2 for examles where a i = for all i. Next, we show that this really is the otimal schedule. k m m h Figure : A shae R. Figure 2: Otimal assignment of R Lemma 2. Let h = h(r). Then OPT(R) = k(h; : : : ; h; u k+ ; : : : ; u m )k. Proof: We have seen above that there exists a schedule which achieves this value. remains to rove that for any schedule S with shae R, the cost kl(s)k is at least the bound in the statement of the lemma. The case of h(r) = 0 is trivial since the equality holds. Otherwise let h = h(r) and let k be such that h = h k in the revious denition. From the denition of h(r) it follows that h < u i for every i > k (otherwise we would have chosen larger k). For i > k, let j i be a job assigned to i in S with weight at least u i (it exists, since u i > 0). Let S 0 be the otimal schedule for the jobs in S. First, S 0 has a machine with load at most h: there are at least k machines on which no job j i, i > k, is scheduled, and their total load is at most kh. Second, if S 0 is otimal, then for any i > k, no other job is assigned to the same machine as the job j i : Assume that the job j i is scheduled on a machine with the load b > 0 of other jobs. We know that there is a machine with load c h < u i w ji. However, if we relace the two machines with loads c and b+w ji by two machines with load b+c and w ji, the total cost decreases due to the convexity of the function x. Consequently, after a renumbering of the machines, the vector of loads L = L(S 0 ) satises L i u i for each i > k and P m i= L i = hk + P m i=k+ u i. Using convexity again, the cost of any such schedule is at least k(h; : : : ; h; u k+ ; : : : ; u m )k. 3 The greedy algorithm In this section we determine the cometitive ratio of the greedy algorithm dened below. Algorithm Greedy: Uon arrival of a job j assign it to the machine with the current minimum load (ties are broken arbitrarily). To bound the erformance of Greedy, we show that each schedule can be relaced by a very secial shae so that the cometitive ratio does not decrease. Comuting the 4 It

6 cometitive ratio is then shown to be equivalent to comuting a maximum of a certain function over the reals. A shae R = (a; u) is called at if all the comonents of a are the same. Abusing notation, we then denote by a both the value of the comonent and the vector of m such comonents. (For an examle of a at shae, see Figure.) Lemma 3. Let S be a schedule obtained by Greedy. which is a shae of S. Then there exists a at shae R Proof: Let L = L(S) be the vector of loads of S; w.l.o.g. assume that L is the smallest comonent of L. We claim that the at shae (a; u), where a = L and u i = L i a, is a shae of S. Clearly the loads are the same. Consider a machine with u i > 0. Let j be the last job assigned to the machine i. At the time of its assignment, the load of the machine i must have been at most a, as otherwise Greedy would have scheduled j on the machine. Hence w j L i a = u i. Lemma 3.2 Let R = (a; u) be a at shae. Then there exists a at shae R 0 = (a 0 ; u 0 ) such that C(R) C(R 0 ) and for any i, u 0 i = 0 or u0 i h(r0 ). Proof: Assume that 0 < u < h = h(r). We claim that there exists a at shae R 0 such that kl(r 0 )k kl(r)k, OPT(R 0 ) = OPT(R), h(r 0 ) = h, u 0 is either 0 or h, and the other comonents of the vector u 0 remain unchanged. Alying this claim inductively nishes the roof of the lemma. To rove the claim, we dene two candidate shaes and rove that one of them satises all the conditions. Let R 0 = (a 0 ; u 0 ) and R 00 = (a 00 ; u 00 ), where u 0 = (0; u 2 ; : : : ; u m ), a 0 = a + u =m, u 00 = (h; u 2 ; : : : ; u m ), and a 00 = a (h u )=m. It is easy to verify that a 00 0, OPT(R 0 ) = OPT(R 00 ) = OPT(R), and h(r 0 ) = h(r 00 ) = h. Moreover, L(R) = h u L(R 0 ) + u h h L(R00 ); i.e., the old vector of loads is a weighted average of the two new vectors of the loads. From the convexity of the function x it follows that (kl(r)k ) h u (kl(r 0 )k ) + u h h (kl(r00 )k ) : Hence either kl(r)k kl(r 0 )k or kl(r)k kl(r 00 )k, and the claim is roved. Lemma 3.3 Let k m and let R = (a; u) be a at shae such that u i h(r) for i = ; : : : ; k. Then there exists x such that for R 0 = (; (x; : : : ; x; u k+ ; : : : ; u m )), it holds that C(R) C(R 0 ), OPT(R 0 ) = OPT(R), h(r 0 ) = h(r), and x h(r 0 ). Proof: Let x be the th ower mean of u i, i k, i.e., x = ( P k i= u i =k)=. Clearly x is at least the minimum of u ; : : : ; u k, hence the otimal schedule changes only in the load of the machines with these single jobs and x h(r) = h(r 0 ). The contribution of the k big jobs to (OPT(R)) is P k i= u i, and their contribution to (OPT(R0 )) is kx. These contributions are the same and hence the otimal cost does not change. It remains to rove 5

7 that kl(r 0 )k kl(r)k. Comaring the contribution of the rst k machines, we need to rove that kx i= (a + u i ) k(a + x) : We aly Minkowski inequality (the triangle inequality for the L norm) to the vectors (a; : : : ; a) and (u ; : : : ; u k ) and obtain kx i= (a + u i )! = k = a + kx i= Raising the inequality to th ower nishes the roof. u i! = = k = (a + x): The above lemmas imly that in order to nd the cometitive ratio of the greedy algorithm we need to solve a restricted otimization roblem. Dene the function f (x; ) = ( )( + x) + ( )x + Theorem 3.4 The cometitive ratios of the greedy algorithm are C Greedy;m = suff (x; M=m) = j 0 x; M = 0 : : : ; m g; C Greedy = suff (x; ) = j 0 x; 0 g: Proof: Let u(x; M; m) be a vector with m M comonents with value x and M zeros, and let R = (; u(x; M; m)) be the corresonding at shae. The function f is dened so that f(x; M=m) = = C(R) if x h(r). If x < h(r), the denominator of f is the th ower of the cost of a valid but not otimal schedule, hence f(x; M=m) = < C(R) in this case. By the above lemmas for every schedule S generated by Greedy there exists x and M such that the at shae R = (; u(x; M; m)) satises C(S) C(R) and x > h = h(r): First aly Lemma 3. to obtain a at shae of S; by Lemma 2.. the cometitive ratio can only increase. Next aly Lemma 3.2 and Lemma 3.3 to obtain a at shae (a; u) with u of the desired form. Last, normalize the shae so that a =, i.e., ut R = (; u=a) (if a = 0, the greedy schedule is otimal). From the construction it follows that x > h = m=m and M < m. Hence C(R) = f(x; M=m) =. This roves the uer bounds. To rove the lower bound for a xed m, it is sucient, given x and M, to nd a sequence with the same cost ratio as that of the shae R = (; u(x; M; m)). From the denition of R it follows that h(r) = m=m. The sequence of mm jobs with weight =M followed by m M jobs of weight x has the desired ratio. For unrestricted m, given x and, x a sequence of rational numbers M i =m i converging to. The result now follows from the lower bound for xed m, since f is continuous. In the Theorem A. in the aendix we rove that the suremum of f (x; ), x > 0, 0 < <, is achieved at a unique oint, moreover we give a method to comute the suremum and hence the cometitive ratio. Here we state the results for the most interesting case of sum of squares, i.e., evaluating CGreedy 2 for = 2. 6

8 Theorem 3.5 For = 2 the erformance of Greedy is: CGreedy 2 = 4; 3 CGreedy;m 2 = 4 3 for m 0 (mod 3); CGreedy;m 2 < 4 for m 6 0 (mod 3); 3 CGreedy;m 2 = 3+ 5 :3090 for m = 2; 4: 4 Proof: According to Theorem A., the suremum of f 2 is achieved at x = 3, = 2=3, and C 2 Greedy = f 2(x; ) = 4=3. The claim for m divisible by 3 is true, since the suremum of f 2 is achieved for M = 2m=3. The claim for m not divisible by 3 is true, since the suremum of f is unique, and M=m 6= 2=3 if m is not divisible by 3. The last claim is obtained by maximizing the function f 2 (x; =2) for m = 2 and additionally f 2 (x; =4) and f 2 (x; 3=4) for m = 4. The calculus leads to simle quadratic equations, which give the otimal solution x = + 5 and M = m=2. Details are omitted. 4 Lower Bounds In this section we rove that for = 2 Greedy is otimal for xed m = 2; 3; 4, and hence also for arbitrary m (since the worst erformance of Greedy is achieved for m = 3). In Theorem 4.2 we give weaker lower bounds for m > 4, and in Aendix C we rove some bounds for general. Theorem 4. For any on-line assignment algorithm A, C 2 A C 2 A;3 4=3 and C2 A;2 ; C 2 A;4 (3 + 5)=4 :3090. Proof: Consider the sequence (; ; ; 3; 3; 3; 2) for 3 machines. First the 3 jobs of weight arrive. If the algorithm A assigns two or more jobs with weight on the same machine, it does not get any other job. Its cost is at least 5, the otimal cost is 3, and we are done. Otherwise, A assigns on every machine one job with weight. Now the next 3 jobs of weight 3 arrive. If A assigns two or more of these jobs on the same machine, is does not get any other job. Its cost is at least ( ) 2 + ( + 3) 2 + 2, whereas the otimum cost is which again yields a ratio greater than 4=3. Otherwise all machines have load 4 before the last job of weight 2 arrives. The cost of A on the full sequence is (2 + 4) , whereas the otimum cost is (3 + 3) 2 + ( ) 2, which yields a ratio of 4=3. Consider the sequences (; ; + 5) for m = 2 and (; ; ; ; + 5; + 5) for m = 4. If the algorithm assigns two jobs of weight to the same machine, the ratio is at least 3=2 > (3 + 5)=4. Otherwise together with the large job(s) we get a ratio of (3 + 5)=4. Theorem 4.2 For any number of machines m 2 and any on-line assignment algorithm A, C 2 A;m 5 :236: Proof: Denote = 5=2 0:8. We assume that m is even. The roof for m which is odd is similar and omitted in this abstract. Consider the sequence of m jobs of weight followed by m=2 jobs of weight + 5. At the beginning m jobs of size arrive. Let l be 7

9 Figure 3: Best on-line assignment of the rst m jobs with l emty machines Figure 4: Best on-line assignment of all the jobs with l emty machines the number of emty machines after the on-line algorithm assigns the m jobs of size. An examle of the best such assignment is shown in gure 3. First we assume m l m. In this case the cost of the on-line algorithm is at least 2 l (m 2l) 2 whereas the cost of otimum is m 2. This yields a ratio of at least +2l=m +2 = 5 which comletes the roof of this case. Since any assignment for l m=2 results in a cost greater than the assignment for l = m=2 we may assume l < m. Now the next m=2 jobs of weight 5 + arrive. An examle of the best on-line assignment for these jobs is shown in gure 4. The cometitive ratio of the algorithm is at least l (m=2 l) (2 + 5) 2 + (m=2 l) 2 + l ( 5 + ) 2 m=2 ( 5 + ) 2 + m=2 ( + ) 2 : Since l=m <, the cometitive ratio is at least (( ) )=(5 + 5) = 5. 5 A better algorithm Our algorithm uses the same intuition as the algorithms better than greedy for the classical makesan scheduling roblem [5, ]. Namely, instead of trying to balance all the machines, we maintain a constant fraction of the machines that are reserved for large jobs. In our case we schedule the small jobs on the remaining machines greedily. We dene an algorithm A(t; ) for any t > 0 and 0 < <. The choice of t and clearly inuences the erformance of the algorithm. However, since the exact analysis is beyond our current techniques, we are not trying to otimize them. Algorithm A(t; ): Let k = bmc. Before an arrival of a job, reorder the machines so that the loads are non-decreasing; let L k+ be the (k +)th smallest load. Uon arrival of a job j with weight w, if w tl k+, schedule the job on machine, otherwise schedule it on machine k +. Theorem 5. For every, there exist m 0, t,, and > 0 such that for any m > m 0, C A(t;);m C Greedy. The roof of Theorem 5. occuies the rest of this section and has the following structure. First, in Lemma 5.2 we rove that if the cometitive ratio of a at shae is very close to C Greedy, then the shae must look very similar to the unique worst case examle for Greedy found in Theorem 3.4. This is intuitively clear, but the recise roof is technical. We give the roof of Lemma 5.2 in Aendix D. Using this lemma we rove that for suciently 8

10 small, in any schedule S roduced by the algorithm such that C(S) is close to C Greedy, there must be many machines with load at least + t. Lemma 5.3 shows that in such a case there are k jobs with large load that are scheduled on machines with the load of remaining jobs at most y < ; here we use the crucial roerties of the algorithm. Last, we show that the existence of such k jobs, together with reviously established conditions, imlies that the cometitive ratio is bounded away from C Greedy. Let and x be the unique maximum of the function f (x; ) from the analysis of the greedy algorithm, Theorem A.. Fix constants t and h such that = < h < t < x ; such constants exist, since we have roved that x >. Fix a constant y <, such that H = y( + t) > h > =. Such y clearly exists. Note that it follows that yt >. Lemma 5.2 There exist constants ; B; > 0 and m such that for every m > m, if Q = (; v) is a at shae satisfying C(Q) C Greedy, then h(q) h, (OPT(Q)) Bm, and there are at least m machines with L i (Q) + t. Fix the constants ; B; and m so that the revious lemma holds. Now consider a schedule S generated by the algorithm A(t; ). W.l.o.g. we assume that the (k + )st smallest load is. (If it is 0, then the S is the otimal schedule. Otherwise multily all the weights by an aroriate constant; this does not change the behavior of the algorithm). Dene a shae Q = (b; v) by bi = minf; L i (S)g and v i = L i (S) b i. For each i, when the last job was scheduled on the machine i, the load was at most, therefore Q is a shae of S and C(S) C( Q). Now let Q = (; v) be a at shae corresonding to Q. We want to show that C(Q) is close to C( Q) for a suciently small. The load vector of Q is the same as L( Q) excet that the load of k machines increased to. Clearly kl(q)k kl( Q)k. Adding the extra load of at most k increases in the otimal schedule load of some machines to h(q). This contributes to (OPT(Q)) at most k(h(q)), since the derivative of x is increasing. Using also the facts that m(h(q)) (OPT(Q)) and h(q), we obtain (OPT(Q)) (OPT( Q)) k(h(q)) k(opt(q)) mh(q) or OPT(Q) OPT( Q)=( ) =. Fix some 2 < and ut = Assume that C(S) C Greedy 2 and <. It follows that (OPT(Q)) CGreedy C Greedy 2 : C(Q) C( Q)( ) = C(S)( ) = (C Greedy 2 )( ) = = C Greedy : Hence Q satises the assumtions of Lemma 5.2, and, in articular, there must be l = m machines with load L i (S) = L i (Q) + t. Lemma 5.3 For any l 0 and any schedule S generated by the algorithm A(t; ) (normalized as above), if there are l + k machines with L i (S) + t, then there exists z and a shae R = (a; u) of S such that the machines are artitioned into k \small" machines with z a i and u i = 0, l \bad" machines with a i = z and u i t + z, k \good" machines with a i = y and u i yt, and m l 2k \ordinary" machines with a i = and u i arbitrary. 9

11 Proof: Let c i be the load of the machine i before the last job scheduled on it. We will construct R so that always a i c i and u i = L i a i. This imlies that R is a shae of S. Let z be the smallest load in S. For the k machines with smallest load we ut a i = L i. These are the small machines. By the roerties of the algorithm, no job was so far assigned to a machine with load more than, hence every remaining machine can be assigned a i = and be an ordinary one. If L i + t, then the last job assigned to i has weight at least t, therefore according to the algorithm it was assigned to a machine with the smallest load at some revious time. Hence c i z and we may assign a i = z making this machine bad. It remains to nd the k good machines. If c i y for all machines with L i + t, we choose k of them and make them good by utting a i = y. Otherwise at some time a big job was assigned on a machine with load at least y. Hence at time the load of all machines was at least y. Let 0 be the rst time when the (k + )st smallest load was at least y. At that time all the k smallest loads were strictly less than y. Hence between time 0 and, the algorithm scheduled k jobs on the k small machines. These jobs have size at least ty, by the condition in the algorithm. Furthermore, no other jobs were scheduled on these machines later, as ty >. Hence these k machines have c i y and can be made good. Some of them may be the machines with L i + t, however, we still have at least l machines that can be made bad. Let the shae R and the value z be as in Lemma 5.3 and let the shae Q be the same as before Lemma 5.3. To nish the roof of Theorem 5., we show that for suitable arameters OPT(R) is signicantly larger than OPT(Q). The otimal schedule for R is obtained from the otimal schedule for Q so that we (i) move weight at least l( z) from the machines with load h = h(q) to the big jobs from the bad machines, which have weight at least t, (ii) move weight at least k( + y) from the machines with load h to the big jobs from the good machines, which have weight at least H = y( + t), and (iii) remove a weight of at most k( z) (corresonding to the small machines) from machines with load h. Since H t, we are always moving the weight from machines with load at most h to machines with load H and using the fact that the derivative of x is nondecreasing, we bound the resulting dierence as follows: (OPT(R)) (OPT(Q)) (l( z) + k( y)) (H h ) k( z) h ( z)m((h h ) h ) + bmc( y)(h h ): Since ; ; H; h are constants and h satises h h < H, we can choose suciently small so that the rst term is always ositive. Then, for suciently large m, the second term is at least "m for some " > 0. Hence, using (OPT(Q)) Bm, we obtain and (OPT(R)) (OPT(Q)) + "m (OPT(Q)) ( + "=B) C(S) C(R) = kl(r)k OPT(R) for a suciently small > 0. kl(q)k OPT(Q)( + "=B) = C Greedy ( + "=B) = C Greedy 0

12 References [] S. Albers. Better bounds for on-line scheduling. In Proc. 29th ACM Sym. on Theory of Comuting, 997. To aear. [2] N. Alon, Y. Azar, G. Woeginger, and T. Yadid. Aroximation schemes for scheduling. In Proc. 8th ACM-SIAM Sym. on Discrete Algorithms, 997. To aear. [3] J. Asnes, Y. Azar, A. Fiat, S. Plotkin, and O. Waarts. On-line load balancing with alications to machine scheduling and virtual circuit routing. In Proc. 25th ACM Symosium on the Theory of Comuting, ages 623{63, 993. [4] B. Awerbuch, Y. Azar, E. Grove, M. Kao, P. Krishnan, and J. Vitter. Load balancing in the l norm. In Proc. 36th IEEE Sym. on Found. of Com. Science, ages 383{39, 995. [5] Yair Bartal, Amos Fiat, Howard Karlo, and R. Vorha. New algorithms for an ancient scheduling roblem. In Proc. 24th ACM Sym. on Theory of Comuting, 992. [6] A.K. Chandra and C.K. Wong. Worst-case analysis of a lacement algorithm related to storage allocation. SIAM Journal on Comuting, 4(3):249{263, 975. [7] B. Chen, A. van Vliet, and G. Woeginger. New lower and uer bounds for on-line scheduling. Oerations Research Letters, 6:22{230, 994. [8] R.A. Cody and E.G. Coman, Jr. Record allocation for minimizing exected retrieval costs on crum-like storage devices. J. Assoc. Comut. Mach., 23():03{5, January 976. [9] G. Galambos and G. Woeginger. An on-line scheduling heuristic with better worst case ratio than graham's list scheduling. Siam Journal on Comuting, 22(2):349{355, 993. [0] M.R. Garey and D.S. Johnson. Comuters and Intractability. W.H. Freeman and Comany, San Francisco, 979. [] R.L. Graham. Bounds for certain multirocessor anomalies. Bell System Technical Journal, 45:563{58, 966. [2] J.Y.T. Leung and W.D. Wei. Tighter bounds on a heuristic for a artition roblem. Information Processing Letters, 56:5{57, 995.

13 Aendix A Cometitive Ratio of Greedy Theorem A. Dene: G = f(x; ) 2 R 2 j 0 < x; 0 < < g = ( ) and the system of equations S, S : ( x = (+x) x = Then, the suremum of f (x; ) over x > 0, 0 < < is achieved as a unique maximum in G. The maximum is achieved at the unique oint which is the solution to the system S in the region G. Furthermore, the value of the cometitive ratio is C Greedy = + x where x is the unique solution of the system S in G. Proof: It is easy to verify that f (0; ) = ( > ; 0 ) lim f (x; ) x! 0<< = ( > ) lim f (x; )!0 + = 0 x>0 f (x; ) = and therefore, the suremum of the function f (x; ) is achieved as a local maximum in G. Since the function f (x; ) has derivatives in G, the oint that achieves the maximum is a solution of the system = = 0: In lemma A.2, we rove this system of equations imlies the system S, i.e., x = ; : ( + x) () x = : (2) Next we rove that the solution to the system S in G is unique. Denote: Clearly, LHS(x) = x RHS(x) = ( + x) 2

14 LHS(0) = RHS(0) In ( ; ), the function LHS(x) is linear, whereas RHS(x) is convex 0 > LHS 0 (0) > RHS 0 (0) and therefore equation () has a unique solution for x in (0; ), which imlies the system S has a unique solution in G. Thus, f (x; ) has a unique maximum in G. By lemma A.2 its value is + x, which comletes the roof. Lemma A.2 For > and (x; ) 2 G the system of equations = 0 x = x = f (x; = 0 ( + x) + x : Proof: Denote: M = ( )( + x) + (3) N = ( )x + : (4) Clearly f = M N, = 0 ) f = M N = ( ) ( + x) (6) = ( + x) + = (( + x) ) = ( ) x (7) = x + ( ) = (x + ( ) ) Substituting the above derivatives in equation () gives ( + x) x = ( + x) x + ( ) : 3

15 Solving for we get or, = x ( + x) ( ) ( + x) (8) x = ( + x) : (9) ( ) ( + x) Substituting equations (3), (4), (6), (7) in equation () gives ( + x) + x + = ( + x) x which yields, = x ( + x) : Substituting equation (9) gives or, = = = ( + x) ( ) ( + x) ( + x) ( ) ( + x) ( + x) ( + x) = : (0) ( + x) Substituting equation (0) in equation (8) gives ( + x) = x ( + x) ( ) ( + x) or, Raising to the ower of ( ) (( + x) ) x (( + x) ) = : we get = ( ) = ( + x) x ( + x) : 4

16 which is equivalent to x = ( + x) : Substituting the last equation in equation (0) yields = ( ( x)) = ( ) x = x or, Furthermore, by (5) x = : f (x; ) = (x; ) ( ) ( + x) ( ) x + x which comletes the roof. B Aroximating C Greedy Lemma B. + 2 < for >. Proof: Denote: If 2, s() = + 2 for > ln t() = for > : 2 and therefore s() = + ( ) 2 < 2 + = 2 + : 5

17 Otherwise, < < 2. For all z 2 R, z e z e and therefore ds d = ln 2 ln + 2 t() = ln e t() = ln e < 0: The last inequality holds since 2 < e ln 2, for < < 2. Therefore s() in monotone decreasing in (; 2). Since, lim! + s() = the roof of the lemma is comleted. For > denote: g (x) = ( + x) for (0; ): For a xed >, dene (a n ) n=0, (b n ) n=0 by a 0 =, a n+ = g(a n ) and b 0 =, b n+ = g(b n ). Lemma B.2 a 0 < a < : : : : : : < a n < a n+ < x < b n+ < b n < : : : : : : < b < b 0 and lim n! a n = lim n! b n = x : Proof: Lemma B. claims that 2 + < for >. Therefore, a 0 < b 0 a 0 = < 2 = a b = < b 0 : By the roof of Theorem A. the equation x = g (x) has a unique solution in (0; ). In addition, g (x) is continuous and monotone increasing in (0; ). As a consequence, we may derive the desired result. The following theorem may be derived by using lemma B.2. Theorem B.3 C Greedy = 2 ln : 6

18 Proof: Lemma B.2 imlies that a < x < b and therefore we get the following aroximation to x Lemma B. easily imlies that < x < : 2 < + 2 : 2 By theorem 3.4 and the aroximation to x we get and ( + ) < CGreedy < + Since a x = + x ln a + O(x 2 ln a), C Greedy = = = = e ln ln e + + O 2 2! ln + O! + O ln2 2 < : ln2 2!! Hence, = 2 ln e ln e = 2 = 2 = 2!! + O ln2 2 + O ln2 2!! 0 ln e ln + O( ln2 )) 2 ln e ln 4e + O ln2 2! + O ln2 : 2 + O ln (2 ln e!! ln 2 ln + O 2 C Greedy = 2 ln : AA + O( ln2 )) 2 2 7

19 It can be easily shown that when decreases to, x increases to the x + - the unique solution in (0; ) to the equation ln( + x) = x e, and the cometitive ratio decreases to. In addition, when decreases to, x decreases to and the cometitive ratio increases to 2. Figure 5 shows the cometitive ratio, x,, x for various u to four decimal digits recision. Calculations are based on the sequences (a n ) n=0, (b n ) n=0. The last column shows the number of iteration required to satisfy the desired recision for all entrances in the table. C Greedy x x No. of Iterations & & % x + & + = x e + % e % % 2 & % & Figure 5: Aroximation of the cometitive ratio for various Exerimental results shows that C Greedy is monotone in. In fact that can be easily (but technically) roved for 0. Similarly to the aroximation of C Greedy, an aroximation for C Greedy;2, i.e., the cometitive ratio of Greedy for 2 machines, can be evaluated. Figure 6 shows the cometitive ratio and the solution to equation () for various u to four decimal digits recision. Again, the last column shows the number of iteration required to satisfy the desired recision for all entrances in the table. 8

20 C Greedy x No. of Iterations & & % 2( + 2) % % 3 2 & 2 Figure 6: Aroximation of the cometitive ratio over two machines for various C General C. Two Machines Theorem C. The cometitive ratio of Greedy for two machines is C Greedy;2 = su x0 + ( + x) 2 + x ; where x 2 (0; ) is the unique solution of the equation x ( + ( + x) ) = 2 : () Proof: For x 0 dene: u (x) = + ( + x) 2 + x v (x) = x ( + ( + x) ): 9

21 By theorem 3.4, + ( + x) C Greedy;2 = su x0 2 + x = su u (x) : x0 Since u (0) = 2 and lim x! u (x) =, u (x) achieves its maximum in (0; ). Hence, x - the maximum of u (x) in (0; ), satises u 0 (x ) = 0. The last equation is equivalent to the equation v (x) = 2. Since v 0 (x) > 0 for x > 0, the equation v (x) = 0 (or u 0 (x) = 0) has a unique solution in (0; ). Theorem C.2 For any > the cometitive ratio of any on-line algorithm over two machines is at least C Greedy;2. Proof: Consider the sequence (; ; x). If the on-line algorithm assigns the rst two jobs on the same machine, it does not get another job and it roduces a cost of 2 ( )=. It is easy to show by convexity arguments of the function y that for all x 0 and therefore + ( + x) (2 + x) 2 + x x 2 + ( + x) 2 + x 2 : Hence, by theorem C. we are done. Otherwise, the last job is given to the on-line algorithm. The resulted assignment of the sequence is the same as the worst case examle of Greedy, and we are done again. C.2 Lower Bound for general > Similarly to theorem 4.2 a lower bound for general > and arbitrary number m 2 of machines can be roved. The lower bound deends on and grows to 3 as grows to. 2 Theorem C.3 For any > the cometitive ratio of any on-line algorithm A over m 2 of machines satises C A;m c = 3 2! 3 2 ( + ( 3 4 ) + ) Proof: Similarly to the roof of theorem 4.2. Denote = c 2 2 : It can be easily seen that < 2 sequence of jobs (; : : : : : : : : : : : : : : : ; ; 2; : : : ; 2): = 3 2 : for >. W.l.o.g m is even. Consider the following {z } m {z } m=2 20

22 Let l be the number of idle machines after the on-line algorithm assigns the rst m jobs. Assume m l m (see gure 3 for a similar examle). In this case the ratio is at least 2 l 2 + (m 2l) m = + (2 2) which is at least c. Since any assignment for l m results in a cost greater than the assignment for l = m 2 2 we may assume l < m < m. In this case the cost of the otimum is 2 2m=, whereas the best assignment for the on-line algorithm (see gure 4 for a similar examle) yields a cost of l m l + l m 2 m l 3 + l 2 : This cost is at least 2m = c, and therefore the roof is comleted. D The roof of Lemma 5.2 Lemma 5.2 says that if the cometitive ratio of a at shae is very close to C Greedy, then the shae must look very similar to the worst case examle for Greedy found in Theorem 3.4. This is intuitively clear, since the worst case examle is unique by Theorem A., however, the recise formulation and roof are a bit tedious; in articular we have to reexamine the transformations from Lemma 3.2 and Lemma 3.3. Lemma D. (5.2) There exist constants ; B; > 0 and m such that for every m > m, if Q = (; v) is a at shae satisfying C(Q) C Greedy, then h(q) h, (OPT(Q)) Bm, and there are at least m machines with L i (Q) + t. Proof: Fix x > 0 such that t < x x and such that = h <. Now choose such that (f (x; )) = C Greedy imlies jx x j x and j j. Such a exists since f is continuous and has a unique maximum (and f! for x! ). Let Q be a shae from the assumtion of the lemma, let h = h(q). Now we transform Q as follows. First, if there are machines i; i 0 with 0 < v i v i 0 < h, we decrease v i and increase v i 0 by the same amount maxfv i ; h v i 0g. This does not change the load vector of the otimal schedule, and the value of the modied shae can only increase due to convexity of x. We continue this rocess until there is at most one machine with 0 < v i < h. Next we aly Lemma 3.2 and then Lemma 3.3. As a result we obtain a at shae Q 0 = (a; v 0 ) such that all nonzero comonents of v 0 are the same, h(q 0 ) = h, OPT(Q 0 ) = OPT(Q), C(Q 0 ) C(Q), and h=m a +h=m. The bound on a follows since a can change only in Lemma 3.2, and this is alied only to one machine with 0 < v i < h. (In fact, this is the reason why we need to aly a dierent transformation if there are two or more such machines.) The cometitive ratio of Q 0 is bounded by C Greedy C(Q) C(Q 0 ) f (x=a; a=h) for x equal to the non-zero comonents of v 0. By the choice of, jx=a x j x and ja=h j. Choose m 0 2 such that = h =m 0. Now it follows that h =m a h m h ; 2

23 hence h h. Put B = 2 ( + x + x ). By the choice of m 0 it also follows that a 2. Hence (OPT(Q)) = (OPT(Q 0 )) m(a + x) m(a + a(x + x )) mb: Let l be the number of machines with L i (Q) + t. It remains to rove that l m for suitable constant. First we rove that we can assume that all the loads are bounded by some constant. Given a number s > h, let Q 00 = (; v 00 ) be dened by vi 00 = minfs; v i g. Note that vi 00 t for exactly l machines. Let (a; b) = ((a + b) a ) =. Let v i = s +. If we change only this v i, (kl(q)k ) decreases by (s + ; ) and (OPT(Q)) decreases by (s; ). A standard calculation shows that lim su (s + ; ) = : s! >0 (s; ) Hence for suciently large s and arbitrary > 0 (s + ; ) (s; ) C Greedy : Fix such s. Now it follows that C(Q 00 ) C Greedy, since C(Q) C Greedy, and the ratio of the dierences in each ste is at most C Greedy. Now construct Q 000 = (a 000 ; v 000 ) from Q 00 by the same transformations as Q 0 from Q. Let x be the resulting common value of all non-zero comonents of v 000. Since C(Q 000 ) C Greedy, it must be the case that x=a 000 x. Since a 000 h=m, we have x t for some constant t > t and suciently large m; x m m 0 aroriately. Examining the transformations, x is the th ower mean of l numbers uer-bounded by s and m l numbers uer-bounded by t. Since x t > t, l m for some constant. 22

On-line Bin-Stretching. Yossi Azar y Oded Regev z. Abstract. We are given a sequence of items that can be packed into m unit size bins.

On-line Bin-Stretching. Yossi Azar y Oded Regev z. Abstract. We are given a sequence of items that can be packed into m unit size bins. On-line Bin-Stretching Yossi Azar y Oded Regev z Abstract We are given a sequence of items that can be packed into m unit size bins. In the classical bin packing problem we x the size of the bins and try

More information

immediately, without knowledge of the jobs that arrive later The jobs cannot be preempted, ie, once a job is scheduled (assigned to a machine), it can

immediately, without knowledge of the jobs that arrive later The jobs cannot be preempted, ie, once a job is scheduled (assigned to a machine), it can A Lower Bound for Randomized On-Line Multiprocessor Scheduling Jir Sgall Abstract We signicantly improve the previous lower bounds on the performance of randomized algorithms for on-line scheduling jobs

More information

On the performance of greedy algorithms for energy minimization

On the performance of greedy algorithms for energy minimization On the erformance of greedy algorithms for energy minimization Anne Benoit, Paul Renaud-Goud, Yves Robert To cite this version: Anne Benoit, Paul Renaud-Goud, Yves Robert On the erformance of greedy algorithms

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th 18.415/6.854 Advanced Algorithms ovember 7, 1996 Euclidean TSP (art I) Lecturer: Michel X. Goemans MIT These notes are based on scribe notes by Marios Paaefthymiou and Mike Klugerman. 1 Euclidean TSP Consider

More information

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables Imroved Bounds on Bell Numbers and on Moments of Sums of Random Variables Daniel Berend Tamir Tassa Abstract We rovide bounds for moments of sums of sequences of indeendent random variables. Concentrating

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information

S. ABERS Vohra [3] then gave an algorithm that is.986-competitive, for all m 70. Karger, Phillips and Torng [] generalized the algorithm and proved a

S. ABERS Vohra [3] then gave an algorithm that is.986-competitive, for all m 70. Karger, Phillips and Torng [] generalized the algorithm and proved a BETTER BOUNDS FOR ONINE SCHEDUING SUSANNE ABERS y Abstract. We study a classical problem in online scheduling. A sequence of jobs must be scheduled on m identical parallel machines. As each job arrives,

More information

HENSEL S LEMMA KEITH CONRAD

HENSEL S LEMMA KEITH CONRAD HENSEL S LEMMA KEITH CONRAD 1. Introduction In the -adic integers, congruences are aroximations: for a and b in Z, a b mod n is the same as a b 1/ n. Turning information modulo one ower of into similar

More information

Multi-Operation Multi-Machine Scheduling

Multi-Operation Multi-Machine Scheduling Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job

More information

bound of (1 + p 37)=6 1: Finally, we present a randomized non-preemptive 8 -competitive algorithm for m = 2 7 machines and prove that this is op

bound of (1 + p 37)=6 1: Finally, we present a randomized non-preemptive 8 -competitive algorithm for m = 2 7 machines and prove that this is op Semi-online scheduling with decreasing job sizes Steve Seiden Jir Sgall y Gerhard Woeginger z October 27, 1998 Abstract We investigate the problem of semi-online scheduling jobs on m identical parallel

More information

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS #A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,

More information

Approximation Schemes for Scheduling on Parallel Machines

Approximation Schemes for Scheduling on Parallel Machines Approximation Schemes for Scheduling on Parallel Machines Noga Alon Yossi Azar Gerhard J. Woeginger Tal Yadid Abstract We discuss scheduling problems with m identical machines and n jobs where each job

More information

On a Markov Game with Incomplete Information

On a Markov Game with Incomplete Information On a Markov Game with Incomlete Information Johannes Hörner, Dinah Rosenberg y, Eilon Solan z and Nicolas Vieille x{ January 24, 26 Abstract We consider an examle of a Markov game with lack of information

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

CSC165H, Mathematical expression and reasoning for computer science week 12

CSC165H, Mathematical expression and reasoning for computer science week 12 CSC165H, Mathematical exression and reasoning for comuter science week 1 nd December 005 Gary Baumgartner and Danny Hea hea@cs.toronto.edu SF4306A 416-978-5899 htt//www.cs.toronto.edu/~hea/165/s005/index.shtml

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

On the Chvatál-Complexity of Knapsack Problems

On the Chvatál-Complexity of Knapsack Problems R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

The Fekete Szegő theorem with splitting conditions: Part I

The Fekete Szegő theorem with splitting conditions: Part I ACTA ARITHMETICA XCIII.2 (2000) The Fekete Szegő theorem with slitting conditions: Part I by Robert Rumely (Athens, GA) A classical theorem of Fekete and Szegő [4] says that if E is a comact set in the

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)

More information

2 K. ENTACHER 2 Generalized Haar function systems In the following we x an arbitrary integer base b 2. For the notations and denitions of generalized

2 K. ENTACHER 2 Generalized Haar function systems In the following we x an arbitrary integer base b 2. For the notations and denitions of generalized BIT 38 :2 (998), 283{292. QUASI-MONTE CARLO METHODS FOR NUMERICAL INTEGRATION OF MULTIVARIATE HAAR SERIES II KARL ENTACHER y Deartment of Mathematics, University of Salzburg, Hellbrunnerstr. 34 A-52 Salzburg,

More information

Elementary theory of L p spaces

Elementary theory of L p spaces CHAPTER 3 Elementary theory of L saces 3.1 Convexity. Jensen, Hölder, Minkowski inequality. We begin with two definitions. A set A R d is said to be convex if, for any x 0, x 1 2 A x = x 0 + (x 1 x 0 )

More information

CERIAS Tech Report The period of the Bell numbers modulo a prime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education

CERIAS Tech Report The period of the Bell numbers modulo a prime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education CERIAS Tech Reort 2010-01 The eriod of the Bell numbers modulo a rime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education and Research Information Assurance and Security Purdue University,

More information

The inverse Goldbach problem

The inverse Goldbach problem 1 The inverse Goldbach roblem by Christian Elsholtz Submission Setember 7, 2000 (this version includes galley corrections). Aeared in Mathematika 2001. Abstract We imrove the uer and lower bounds of the

More information

Best approximation by linear combinations of characteristic functions of half-spaces

Best approximation by linear combinations of characteristic functions of half-spaces Best aroximation by linear combinations of characteristic functions of half-saces Paul C. Kainen Deartment of Mathematics Georgetown University Washington, D.C. 20057-1233, USA Věra Kůrková Institute of

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

MATH 361: NUMBER THEORY EIGHTH LECTURE

MATH 361: NUMBER THEORY EIGHTH LECTURE MATH 361: NUMBER THEORY EIGHTH LECTURE 1. Quadratic Recirocity: Introduction Quadratic recirocity is the first result of modern number theory. Lagrange conjectured it in the late 1700 s, but it was first

More information

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces Abstract and Alied Analysis Volume 2012, Article ID 264103, 11 ages doi:10.1155/2012/264103 Research Article An iterative Algorithm for Hemicontractive Maings in Banach Saces Youli Yu, 1 Zhitao Wu, 2 and

More information

Statics and dynamics: some elementary concepts

Statics and dynamics: some elementary concepts 1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and

More information

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various

More information

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies Online Aendix to Accomany AComarisonof Traditional and Oen-Access Aointment Scheduling Policies Lawrence W. Robinson Johnson Graduate School of Management Cornell University Ithaca, NY 14853-6201 lwr2@cornell.edu

More information

substantial literature on emirical likelihood indicating that it is widely viewed as a desirable and natural aroach to statistical inference in a vari

substantial literature on emirical likelihood indicating that it is widely viewed as a desirable and natural aroach to statistical inference in a vari Condence tubes for multile quantile lots via emirical likelihood John H.J. Einmahl Eindhoven University of Technology Ian W. McKeague Florida State University May 7, 998 Abstract The nonarametric emirical

More information

Correspondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R.

Correspondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R. 1 Corresondence Between Fractal-Wavelet Transforms and Iterated Function Systems With Grey Level Mas F. Mendivil and E.R. Vrscay Deartment of Alied Mathematics Faculty of Mathematics University of Waterloo

More information

New Schedulability Test Conditions for Non-preemptive Scheduling on Multiprocessor Platforms

New Schedulability Test Conditions for Non-preemptive Scheduling on Multiprocessor Platforms New Schedulability Test Conditions for Non-reemtive Scheduling on Multirocessor Platforms Technical Reort May 2008 Nan Guan 1, Wang Yi 2, Zonghua Gu 3 and Ge Yu 1 1 Northeastern University, Shenyang, China

More information

SUM x. 2x y x. x y x/2. (i)

SUM x. 2x y x. x y x/2. (i) Approximate Majorization and Fair Online Load Balancing Ashish Goel Adam Meyerson y Serge Plotkin z July 7, 2000 Abstract This paper relates the notion of fairness in online routing and load balancing

More information

Cubic Sieve Congruence of the Discrete Logarithm Problem, and Fractional Part Sequences

Cubic Sieve Congruence of the Discrete Logarithm Problem, and Fractional Part Sequences Cubic Sieve Congruence of the Discrete Logarithm Problem, and Fractional Part Sequences Srinivas Vivek University of Luxembourg, Luxembourg C. E. Veni Madhavan Deartment of Comuter Science and Automation,

More information

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1)

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1) CERTAIN CLASSES OF FINITE SUMS THAT INVOLVE GENERALIZED FIBONACCI AND LUCAS NUMBERS The beautiful identity R.S. Melham Deartment of Mathematical Sciences, University of Technology, Sydney PO Box 23, Broadway,

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

By Evan Chen OTIS, Internal Use

By Evan Chen OTIS, Internal Use Solutions Notes for DNY-NTCONSTRUCT Evan Chen January 17, 018 1 Solution Notes to TSTST 015/5 Let ϕ(n) denote the number of ositive integers less than n that are relatively rime to n. Prove that there

More information

The Hasse Minkowski Theorem Lee Dicker University of Minnesota, REU Summer 2001

The Hasse Minkowski Theorem Lee Dicker University of Minnesota, REU Summer 2001 The Hasse Minkowski Theorem Lee Dicker University of Minnesota, REU Summer 2001 The Hasse-Minkowski Theorem rovides a characterization of the rational quadratic forms. What follows is a roof of the Hasse-Minkowski

More information

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS #A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS Ramy F. Taki ElDin Physics and Engineering Mathematics Deartment, Faculty of Engineering, Ain Shams University, Cairo, Egyt

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

SUMS OF TWO SQUARES PAIR CORRELATION & DISTRIBUTION IN SHORT INTERVALS

SUMS OF TWO SQUARES PAIR CORRELATION & DISTRIBUTION IN SHORT INTERVALS SUMS OF TWO SQUARES PAIR CORRELATION & DISTRIBUTION IN SHORT INTERVALS YOTAM SMILANSKY Abstract. In this work we show that based on a conjecture for the air correlation of integers reresentable as sums

More information

Approximation of the Euclidean Distance by Chamfer Distances

Approximation of the Euclidean Distance by Chamfer Distances Acta Cybernetica 0 (0 399 47. Aroximation of the Euclidean Distance by Chamfer Distances András Hajdu, Lajos Hajdu, and Robert Tijdeman Abstract Chamfer distances lay an imortant role in the theory of

More information

Strong Matching of Points with Geometric Shapes

Strong Matching of Points with Geometric Shapes Strong Matching of Points with Geometric Shaes Ahmad Biniaz Anil Maheshwari Michiel Smid School of Comuter Science, Carleton University, Ottawa, Canada December 9, 05 In memory of Ferran Hurtado. Abstract

More information

216 S. Chandrasearan and I.C.F. Isen Our results dier from those of Sun [14] in two asects: we assume that comuted eigenvalues or singular values are

216 S. Chandrasearan and I.C.F. Isen Our results dier from those of Sun [14] in two asects: we assume that comuted eigenvalues or singular values are Numer. Math. 68: 215{223 (1994) Numerische Mathemati c Sringer-Verlag 1994 Electronic Edition Bacward errors for eigenvalue and singular value decomositions? S. Chandrasearan??, I.C.F. Isen??? Deartment

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

Solvability and Number of Roots of Bi-Quadratic Equations over p adic Fields

Solvability and Number of Roots of Bi-Quadratic Equations over p adic Fields Malaysian Journal of Mathematical Sciences 10(S February: 15-35 (016 Secial Issue: The 3 rd International Conference on Mathematical Alications in Engineering 014 (ICMAE 14 MALAYSIAN JOURNAL OF MATHEMATICAL

More information

Notes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle

Notes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle McMaster University Advanced Otimization Laboratory Title: Notes on duality in second order and -order cone otimization Author: Erling D. Andersen, Cornelis Roos and Tamás Terlaky AdvOl-Reort No. 000/8

More information

On generalizing happy numbers to fractional base number systems

On generalizing happy numbers to fractional base number systems On generalizing hay numbers to fractional base number systems Enriue Treviño, Mikita Zhylinski October 17, 018 Abstract Let n be a ositive integer and S (n) be the sum of the suares of its digits. It is

More information

16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes

16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes Infinite Series 6.2 Introduction We extend the concet of a finite series, met in Section 6., to the situation in which the number of terms increase without bound. We define what is meant by an infinite

More information

Improvement on the Decay of Crossing Numbers

Improvement on the Decay of Crossing Numbers Grahs and Combinatorics 2013) 29:365 371 DOI 10.1007/s00373-012-1137-3 ORIGINAL PAPER Imrovement on the Decay of Crossing Numbers Jakub Černý Jan Kynčl Géza Tóth Received: 24 Aril 2007 / Revised: 1 November

More information

Sums of independent random variables

Sums of independent random variables 3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where

More information

Polynomial-Time Exact Schedulability Tests for Harmonic Real-Time Tasks

Polynomial-Time Exact Schedulability Tests for Harmonic Real-Time Tasks Polynomial-Time Exact Schedulability Tests for Harmonic Real-Time Tasks Vincenzo Bonifaci, Alberto Marchetti-Saccamela, Nicole Megow, Andreas Wiese Istituto di Analisi dei Sistemi ed Informatica Antonio

More information

ON POLYNOMIAL SELECTION FOR THE GENERAL NUMBER FIELD SIEVE

ON POLYNOMIAL SELECTION FOR THE GENERAL NUMBER FIELD SIEVE MATHEMATICS OF COMPUTATIO Volume 75, umber 256, October 26, Pages 237 247 S 25-5718(6)187-9 Article electronically ublished on June 28, 26 O POLYOMIAL SELECTIO FOR THE GEERAL UMBER FIELD SIEVE THORSTE

More information

Cryptanalysis of Pseudorandom Generators

Cryptanalysis of Pseudorandom Generators CSE 206A: Lattice Algorithms and Alications Fall 2017 Crytanalysis of Pseudorandom Generators Instructor: Daniele Micciancio UCSD CSE As a motivating alication for the study of lattice in crytograhy we

More information

New weighing matrices and orthogonal designs constructed using two sequences with zero autocorrelation function - a review

New weighing matrices and orthogonal designs constructed using two sequences with zero autocorrelation function - a review University of Wollongong Research Online Faculty of Informatics - Paers (Archive) Faculty of Engineering and Information Sciences 1999 New weighing matrices and orthogonal designs constructed using two

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

Radial Basis Function Networks: Algorithms

Radial Basis Function Networks: Algorithms Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.

More information

Chater Matrix Norms and Singular Value Decomosition Introduction In this lecture, we introduce the notion of a norm for matrices The singular value de

Chater Matrix Norms and Singular Value Decomosition Introduction In this lecture, we introduce the notion of a norm for matrices The singular value de Lectures on Dynamic Systems and Control Mohammed Dahleh Munther A Dahleh George Verghese Deartment of Electrical Engineering and Comuter Science Massachuasetts Institute of Technology c Chater Matrix Norms

More information

A Note on Guaranteed Sparse Recovery via l 1 -Minimization

A Note on Guaranteed Sparse Recovery via l 1 -Minimization A Note on Guaranteed Sarse Recovery via l -Minimization Simon Foucart, Université Pierre et Marie Curie Abstract It is roved that every s-sarse vector x C N can be recovered from the measurement vector

More information

On split sample and randomized confidence intervals for binomial proportions

On split sample and randomized confidence intervals for binomial proportions On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have

More information

LEIBNIZ SEMINORMS IN PROBABILITY SPACES

LEIBNIZ SEMINORMS IN PROBABILITY SPACES LEIBNIZ SEMINORMS IN PROBABILITY SPACES ÁDÁM BESENYEI AND ZOLTÁN LÉKA Abstract. In this aer we study the (strong) Leibniz roerty of centered moments of bounded random variables. We shall answer a question

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

Tibor Illes, Jiming Peng 2, Kees Roos, Tamas Terlaky Faculty of Information Technology and Systems Subfaculty of Technical Mathematics and Informatics

Tibor Illes, Jiming Peng 2, Kees Roos, Tamas Terlaky Faculty of Information Technology and Systems Subfaculty of Technical Mathematics and Informatics DELFT UNIVERSITY OF TECHNOLOGY REPORT 98{5 A Strongly Polynomial Rounding Procedure Yielding A Maximally Comlementary Solution for P () Linear Comlementarity Problems T. Illes, J. Peng, C. Roos, T. Terlaky

More information

Proof: We follow thearoach develoed in [4]. We adot a useful but non-intuitive notion of time; a bin with z balls at time t receives its next ball at

Proof: We follow thearoach develoed in [4]. We adot a useful but non-intuitive notion of time; a bin with z balls at time t receives its next ball at A Scaling Result for Exlosive Processes M. Mitzenmacher Λ J. Sencer We consider the following balls and bins model, as described in [, 4]. Balls are sequentially thrown into bins so that the robability

More information

Additive results for the generalized Drazin inverse in a Banach algebra

Additive results for the generalized Drazin inverse in a Banach algebra Additive results for the generalized Drazin inverse in a Banach algebra Dragana S. Cvetković-Ilić Dragan S. Djordjević and Yimin Wei* Abstract In this aer we investigate additive roerties of the generalized

More information

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in

More information

A Competitive Algorithm for Minimizing Weighted Flow Time on Unrelated Machines with Speed Augmentation

A Competitive Algorithm for Minimizing Weighted Flow Time on Unrelated Machines with Speed Augmentation Cometitive lgorithm for Minimizing Weighted Flow Time on Unrelated Machines with Seed ugmentation Jivitej S. Chadha and Naveen Garg and mit Kumar and V. N. Muralidhara Comuter Science and Engineering Indian

More information

STRONG TYPE INEQUALITIES AND AN ALMOST-ORTHOGONALITY PRINCIPLE FOR FAMILIES OF MAXIMAL OPERATORS ALONG DIRECTIONS IN R 2

STRONG TYPE INEQUALITIES AND AN ALMOST-ORTHOGONALITY PRINCIPLE FOR FAMILIES OF MAXIMAL OPERATORS ALONG DIRECTIONS IN R 2 STRONG TYPE INEQUALITIES AND AN ALMOST-ORTHOGONALITY PRINCIPLE FOR FAMILIES OF MAXIMAL OPERATORS ALONG DIRECTIONS IN R 2 ANGELES ALFONSECA Abstract In this aer we rove an almost-orthogonality rincile for

More information

COMMUNICATION BETWEEN SHAREHOLDERS 1

COMMUNICATION BETWEEN SHAREHOLDERS 1 COMMUNICATION BTWN SHARHOLDRS 1 A B. O A : A D Lemma B.1. U to µ Z r 2 σ2 Z + σ2 X 2r ω 2 an additive constant that does not deend on a or θ, the agents ayoffs can be written as: 2r rθa ω2 + θ µ Y rcov

More information

Generalized Coiflets: A New Family of Orthonormal Wavelets

Generalized Coiflets: A New Family of Orthonormal Wavelets Generalized Coiflets A New Family of Orthonormal Wavelets Dong Wei, Alan C Bovik, and Brian L Evans Laboratory for Image and Video Engineering Deartment of Electrical and Comuter Engineering The University

More information

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley Elements of Asymtotic Theory James L. Powell Deartment of Economics University of California, Berkeley Objectives of Asymtotic Theory While exact results are available for, say, the distribution of the

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

A Social Welfare Optimal Sequential Allocation Procedure

A Social Welfare Optimal Sequential Allocation Procedure A Social Welfare Otimal Sequential Allocation Procedure Thomas Kalinowsi Universität Rostoc, Germany Nina Narodytsa and Toby Walsh NICTA and UNSW, Australia May 2, 201 Abstract We consider a simle sequential

More information

Intrinsic Approximation on Cantor-like Sets, a Problem of Mahler

Intrinsic Approximation on Cantor-like Sets, a Problem of Mahler Intrinsic Aroximation on Cantor-like Sets, a Problem of Mahler Ryan Broderick, Lior Fishman, Asaf Reich and Barak Weiss July 200 Abstract In 984, Kurt Mahler osed the following fundamental question: How

More information

Sets of Real Numbers

Sets of Real Numbers Chater 4 Sets of Real Numbers 4. The Integers Z and their Proerties In our revious discussions about sets and functions the set of integers Z served as a key examle. Its ubiquitousness comes from the fact

More information

arxiv: v1 [cs.gt] 2 Nov 2018

arxiv: v1 [cs.gt] 2 Nov 2018 Tight Aroximation Ratio of Anonymous Pricing Yaonan Jin Pinyan Lu Qi Qi Zhihao Gavin Tang Tao Xiao arxiv:8.763v [cs.gt] 2 Nov 28 Abstract We consider two canonical Bayesian mechanism design settings. In

More information

An Estimate For Heilbronn s Exponential Sum

An Estimate For Heilbronn s Exponential Sum An Estimate For Heilbronn s Exonential Sum D.R. Heath-Brown Magdalen College, Oxford For Heini Halberstam, on his retirement Let be a rime, and set e(x) = ex(2πix). Heilbronn s exonential sum is defined

More information

Matching Partition a Linked List and Its Optimization

Matching Partition a Linked List and Its Optimization Matching Partition a Linked List and Its Otimization Yijie Han Deartment of Comuter Science University of Kentucky Lexington, KY 40506 ABSTRACT We show the curve O( n log i + log (i) n + log i) for the

More information

arxiv: v2 [math.na] 6 Apr 2016

arxiv: v2 [math.na] 6 Apr 2016 Existence and otimality of strong stability reserving linear multiste methods: a duality-based aroach arxiv:504.03930v [math.na] 6 Ar 06 Adrián Németh January 9, 08 Abstract David I. Ketcheson We rove

More information

MAS 4203 Number Theory. M. Yotov

MAS 4203 Number Theory. M. Yotov MAS 4203 Number Theory M. Yotov June 15, 2017 These Notes were comiled by the author with the intent to be used by his students as a main text for the course MAS 4203 Number Theory taught at the Deartment

More information

Periodic scheduling 05/06/

Periodic scheduling 05/06/ Periodic scheduling T T or eriodic scheduling, the best that we can do is to design an algorithm which will always find a schedule if one exists. A scheduler is defined to be otimal iff it will find a

More information

Asymptotically Optimal Simulation Allocation under Dependent Sampling

Asymptotically Optimal Simulation Allocation under Dependent Sampling Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee

More information

Solution sheet ξi ξ < ξ i+1 0 otherwise ξ ξ i N i,p 1 (ξ) + where 0 0

Solution sheet ξi ξ < ξ i+1 0 otherwise ξ ξ i N i,p 1 (ξ) + where 0 0 Advanced Finite Elements MA5337 - WS7/8 Solution sheet This exercise sheets deals with B-slines and NURBS, which are the basis of isogeometric analysis as they will later relace the olynomial ansatz-functions

More information

QUADRATIC RECIPROCITY

QUADRATIC RECIPROCITY QUADRATIC RECIPROCIT POOJA PATEL Abstract. This aer is an self-contained exosition of the law of uadratic recirocity. We will give two roofs of the Chinese remainder theorem and a roof of uadratic recirocity.

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

Growth of L p Lebesgue constants for convex polyhedra and other regions

Growth of L p Lebesgue constants for convex polyhedra and other regions Growth of L Lebesgue constants for convex olyhedra and other regions J. Marshall Ash and Laura De Carli Abstract. For any convex olyhedron W in R m, (; ), and N, there are constants (W; ; m) and (W; ;

More information

AR PROCESSES AND SOURCES CAN BE RECONSTRUCTED FROM. Radu Balan, Alexander Jourjine, Justinian Rosca. Siemens Corporation Research

AR PROCESSES AND SOURCES CAN BE RECONSTRUCTED FROM. Radu Balan, Alexander Jourjine, Justinian Rosca. Siemens Corporation Research AR PROCESSES AND SOURCES CAN BE RECONSTRUCTED FROM DEGENERATE MIXTURES Radu Balan, Alexander Jourjine, Justinian Rosca Siemens Cororation Research 7 College Road East Princeton, NJ 8 fradu,jourjine,roscag@scr.siemens.com

More information

Coding Along Hermite Polynomials for Gaussian Noise Channels

Coding Along Hermite Polynomials for Gaussian Noise Channels Coding Along Hermite olynomials for Gaussian Noise Channels Emmanuel A. Abbe IG, EFL Lausanne, 1015 CH Email: emmanuel.abbe@efl.ch Lizhong Zheng LIDS, MIT Cambridge, MA 0139 Email: lizhong@mit.edu Abstract

More information

A note on the preferred hedge instrument

A note on the preferred hedge instrument ingnan University Digital Commons @ ingnan University ong ong Institute o Business tudies Working aer eries ong ong Institute o Business tudies 香港商學研究所 6-5 A note on the reerred hedge instrument Arthur

More information

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca

More information

CHAPTER 2: SMOOTH MAPS. 1. Introduction In this chapter we introduce smooth maps between manifolds, and some important

CHAPTER 2: SMOOTH MAPS. 1. Introduction In this chapter we introduce smooth maps between manifolds, and some important CHAPTER 2: SMOOTH MAPS DAVID GLICKENSTEIN 1. Introduction In this chater we introduce smooth mas between manifolds, and some imortant concets. De nition 1. A function f : M! R k is a smooth function if

More information

#A47 INTEGERS 15 (2015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS

#A47 INTEGERS 15 (2015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS #A47 INTEGERS 15 (015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS Mihai Ciu Simion Stoilow Institute of Mathematics of the Romanian Academy, Research Unit No. 5,

More information

t 0 Xt sup X t p c p inf t 0

t 0 Xt sup X t p c p inf t 0 SHARP MAXIMAL L -ESTIMATES FOR MARTINGALES RODRIGO BAÑUELOS AND ADAM OSȨKOWSKI ABSTRACT. Let X be a suermartingale starting from 0 which has only nonnegative jums. For each 0 < < we determine the best

More information