Lifting Private Information Retrieval from Two to any Number of Messages

Size: px
Start display at page:

Download "Lifting Private Information Retrieval from Two to any Number of Messages"

Transcription

1 Lifting Pivate Infomation Retieval fom Two to any umbe of Messages Rafael G.L. D Oliveia, Salim El Rouayheb ECE, Rutges Univesity, Piscataway, J s: d746@scaletmail.utges.edu, salim.elouayheb@utges.edu axiv: v2 [cs.it] 29 May 2018 Abstact We study pivate infomation etieval (PIR) on coded data with possibly colluding seves. Devising PIR schemes with optimal download ate in the case of collusion and coded data is still open in geneal. We povide a lifting opeation that can tansfom what we call one-shot PIR schemes fo two messages into schemes fo any numbe of messages. We apply this lifting opeation on existing PIR schemes and descibe two immediate implications. Fist, we obtain novel PIR schemes with impoved download ate in the case of MDS coded data and seve collusion. Second, we povide a simplified desciption of existing optimal PIR schemes on eplicated data as lifted secet shaing based PIR. I. ITRODUCTIO We conside the poblem of designing pivate infomation etieval (PIR) schemes on coded data stoed on multiple seves that can possibly collude. In this setting, a use wants to download a message fom a seve with M messages while evealing no infomation, in an infomation-theoetic sense, about which message it is inteested in. The database is eplicated on seves, o in geneal, could be stoed using an easue code, typically a Maximum Distance Sepaable (MDS) code 1. These seves could possibly collude to gain infomation about the identity of the use s etieved message. The PIR poblem was fist intoduced and studied in [1], [2] and was followed up by a lage body of wok (e.g. [] [8]). The model thee assumes the database to be eplicated and focuses on PIR schemes with efficient total communication ate, i.e., upload and download. Motivated by big data applications and ecent advances in the theoy of codes fo distibuted stoage, thee has been a gowing inteest in designing PIR schemes that can quey data that is stoed in coded fom and not just eplicated. Fo this setting, the assumption has been that the messages being etieved ae vey lage (compaed to the queies) and theefoe the focus has been on designing PIR schemes that minimize the download ate. Despite significant ecent pogess, the poblem of chaacteizing the optimal PIR download ate (called PIR capacity) in the case of coded data and seve collusion emains open in geneal. Related wok: When the data is eplicated, the poblem of finding the PIR capacity, i.e., minimum download ate, is essentially solved. It was shown in [4] and [5] that the PIR capacity is (1+T/ +T 2 / 2 + +T / ) 1, whee is the numbe of seves, T is the numbe of colluding This wok was suppoted in pat by SF Gant CCF The assumption hee is that messages ae divided into chunks which ae encoded sepaately into n coded chunks using the same code. seves and M is the numbe of messages. Capacity achieving PIR schemes wee also pesented in [4] and [5]. When the data is coded and stoed on a lage numbe of seves (exponential in the numbe of messages), it was shown in [9] that downloading one exta bit is enough to achieve pivacy. In [10], the authos deived bounds on the tadeoff between stoage cost and download cost fo linea coded data and studied popeties of PIR schemes on MDS data. Explicit constuctions of efficient PIR scheme on MDS data wee fist pesented in [11] fo both collusions and no collusions. Impoved PIR schemes fo MDS coded data with collusions wee pesented in [12]. PIR schemes fo geneal linea codes, not necessaily MDS, wee studied in [1]. The PIR capacity fo MDS coded data and no collusion was detemined in [14], and emains unknown fo the case of collusions. Contibutions: We intoduce what we efe to as a lifting opeation that tansfoms a class of one-shot linea PIR schemes that can etieve pivately one out of a total of two messages, into geneal PIR schemes on any numbe of messages. In the liteatue, the majoity of PIR schemes on coded data, such as those in [11] and [12], ae one-shot schemes. Fist, we descibe a efinement opeation on these schemes that impoves thei ate fo two messages. Then, we descibe how the efined vesion can be lifted to any numbe of messages. Finally, we apply the lifting opeation on existing PIR schemes and descibe two immediate implications: Applying the lifting opeation to the schemes pesented in [11] and [12], we obtain novel PIR schemes with impoved download ate fo MDS coded data and seve collusion. The capacity achieving PIR schemes on eplicated data in [4] and [5] can be seen as lifted secet shaing. II. SETTIG A set of M messages, {W 1, W 2,..., W M } F L q, ae stoed on seves each using an (, K)-MDS code. We denote by W j i F L/K q, the data about W j stoed on seve i. seve 1 seve 2 seve W 1 W1 1 W2 1 W 1 W 2 W1 2 W2 2 W W M W1 M W2 M W M Since the code is MDS, each W j is detemined by any K- subset of {W j 1,..., W j }.

2 The data on seve i is D i = (Wi 1,..., W i M ) F ML/K q. A linea quey (fom now on we omit the tem linea) is a vecto q F ML/K q. When a use sends a quey q to a seve i, this seve answes back with the inne poduct D i, q F q. The poblem of pivate infomation etieval can be stated infomally as follows: A use wishes to download a file W m without leaking any infomation about m to any of the seves whee at most T of them may collude. The goal is fo the use to achieve this while minimizing the download ate. The messages W 1, W 2,..., W M ae assumed to be independent and unifomly distibuted elements of F L q. The use is inteested in a message W m. The index of this message, m, is chosen unifomly at andom fom the set {1, 2,..., M}. A PIR scheme is a set of queies fo each possible desied message W m. We denote a scheme by Q = {Q 1,..., Q M } whee Q m = {Q m 1,..., Q m } is the set of queies which the use will send to each seve when they wish to etieve W m. So, if the use is inteested in W m, Q m i denotes the set of queies sent to seve i. The set of answes, A = {A 1,..., A M }, is defined analogously. A PIR scheme should satisfy two popeties: 1) Coectness: H(W m A m ) = 0. 2) T -Pivacy: I( j J Q m j ; m) = 0, fo evey J [M] such that J = T, whee [M] = {1,..., M}. Coectness guaantees that the use will be able to etieve the message of inteest. T -Pivacy guaantees that no T colluding seves will gain any infomation on the message in which the use is inteested. Definition 1. Let M messages be stoed using an (, K)- MDS code on seves. An (, K, T, M)-PIR scheme is a scheme which satisfies coectness and T -Pivacy. ote that T -Pivacy implies in Q 1 = Q i fo evey i, i.e., the numbe of queies does not depend on the desied message. Definition 2. The PIR ate of an (, K, T, M)-PIR scheme Q is R Q = L Q 1. III. OE-SHOT SCHEMES In this section, we intoduce the notion of a one-shot scheme, which captues the majoity of the schemes in the liteatue. Without loss of geneality, we assume that the use is inteested in etieving the fist message. We denote by V 1 = {a F ML/K q : i > L/K a i = 0}, the subspace of queies which only quey the fist message. Definition. An (, K, T, M)-one-shot PIR scheme of codimension is an (, K, T, M)-PIR scheme whee each seve is queied exactly once and in the following way. Seve 1 Seve Seve + 1 Seve q 1 q q +1 + a 1 q + a TABLE I: Quey stuctue fo a one-shot scheme. The queies in Table I satisfy the following popeties: 1) Any collection of T queies fom q 1,..., q F ML/K q is unifomly and independently distibuted. 2) The a 1,..., a V 1 ae such that the esponses D +1, a 1,..., D, a ae linealy independent. ) Fo i >, the esponse D i, q i is a linea combination of D 1, q 1,..., D, q. Popety 1 ensues pivacy. Popeties 2 and ensue coectness. Poposition 1. Let Q be an (, K, T, M)-one-shot scheme of co-dimension. Then, its ate is given by R Q = = 1. Poof. Since fo evey i >, D i, q i is a linea combination of D 1, q 1,..., D, q, the use can etieve the linealy independent D +1, a 1,..., D, a. Technically, must be divisible by L. When this does not occu, the one-shot scheme must be epeated lcm(, L) times 2. This, howeve, does not change the ate of the scheme. We pesent an example of a one-shot scheme fom [11]. Example 1. Suppose the messages ae stoed using a (4, 2)- MDS code ove F in the following way: Seve 1 Seve 2 Seve Seve 4 W 1 W1 1 W2 1 W1 1 + W2 1 W W2 1 W 2 W1 2 W2 2 W1 2 + W2 2 W W W M W1 M W2 M W1 M + W2 M W1 M + 2W2 M Suppose the use is inteested in the fist message and wants 2-pivacy, i.e., at most 2 seves can collude. The following is a (4, 2, 2, M)-one-shot scheme taken fom [11]. Seve 1 Seve 2 Seve Seve 4 Queies q 1 q 2 q q 4 + e 1 Responses D 1, q 1 D 2, q 2 D, q D 4, q 4 TABLE II: Quey and esponse stuctue fo Example 1. The queies in Table II satisfy the following popeties: The queies q 1, q 2 F ML/K q ae unifomly and independently distibuted. We have q = q 1 + q 2 and q 4 = q 1 + 2q 2. The quey e 1 V 1 coesponds to the queies (in this case thee is only = 1 quey) a 1,..., a in Table I, and is the fist vecto of the standad basis of F ML/K q, i.e, e 1 only has enty 1 in the fist coodinate and 0 on all the othe coodinates. This scheme is pivate since fo any two seves the queies ae unifomly and independently distibuted. To etieve D 4, e 1 the use uses the following identity: D 4, q 4 = D 1, q D 2, q D, q. (1) 2 We denote the least common multiple of and K by lcm(, L).

3 With this we have one linea combination of W 1, the fist coodinate of W 1 1 +W 1 2. Repeating this lcm(, L) times, we obtain enough combinations to decode W 1. To etieve 1 unit of the message the use has to download 4 units. Theefoe, the ate of the PIR scheme is R = 1/4, which could have also been obtained fom Poposition 1. IV. THE REFIEMET LEMMA The ate of a one-shot scheme is independent of the numbe of messages. In this section, we show how to efine a one-shot scheme to obtain a bette ate fo the case of two messages. Analogous to V 1, we denote by V 2 = {b F ML/K q : i < L/K + 1 o i > 2L/K b i = 0} the subspace of queies which only quey the second message. Lemma 1 (The Refinement Lemma). Let Q be a one-shot scheme of co-dimension, with ate. Then, thee exists an (, K, T, 2)-PIR scheme, Q, with ate R Q = + >. Poof. We constuct Q in the following way. Seve 1 Seve Seve + 1 Seve a 1 a a +1 + b +1 a + b b 1 b TABLE III: Quey stuctue fo Q. The queies in Table III satisfy the following popeties: The queies a i V 1 and b i V 2. Each quey b i is chosen with distibution induced by the quey q i of the one-shot scheme Q. Any subset of size T of D 1, b 1,..., D, b is linealy independent 4. Fo i, a i is chosen with distibution identical to b i. Fo i >, a i is chosen such that the set of esponses D 1, a 1,..., D, a is linealy independent 4. Pivacy is inheited fom the one-shot scheme by andomizing the ode in which the queies to a seve ae sent. The following is also inheited fom the one-shot scheme: Fo i >, D i, b i is a linea combination of D 1, b 1,..., D, b. Thus, the use can etieve the linealy independent D 1, a 1,..., D, a. We now apply the efinement lemma to Example 1. Example 2. Conside Example 1 but with two messages. Applying the efinement lemma, we get the following scheme. Seve 1 Seve 2 Seve Seve 4 a 1 a 2 a a 4 + b 4 b 1 b 2 b TABLE IV: Quey stuctue of the efinement of Table II. The queies in Table IV satisfy the following popeties: The queies a i V 1 and b i V 2. A pobability distibution on F ML/K q induces a pobability distibution on V 2 F ML/K q. 4 Fo lage fields this occus with high pobability. The queies b 1 and b 2 ae unifomly and independently distibuted and ae linealy independent. We have b = b 1 + b 2 and b 4 = b 1 + 2b 2. The queies a 1 and a 2 ae unifomly and independently distibuted and ae linealy independent. We have a = a 1 + a 2 and a 4 = a 1 + a 2. Pivacy is inheited fom the one-shot scheme. To etieve D 4, a 4 we use the following identity (inheited fom (1) in the one-shot scheme): D 4, b 4 = D 1, b D 2, b D, b. The choice a 4 = a 1 + a 2 is done so that the set of esponses D 1, a 1,..., D 4, a 4 is linealy independent. As pe Lemma 1, the ate of this scheme is R = 4/7, lage than the ate of 1/4 in Example 1. Remak 1. The scheme in Example 1 is defined ove the field F. Howeve, the efinement of this scheme in Example 2 equies a lage field since we need the coefficient in a 4 = a 1 + a 2 so that the set { D 1, a 1,..., D 4, a 4 } is linealy independent. In ou schemes, we will assume that the base field is lage enough. V. THE LIFTIG THEOREM In this section, we pesent ou main esult in Theoem 1. We show how to extend, by means of a lifting opeation, the efined scheme on two messages to any numbe of messages. Infomally, the lifting opeation consists of two steps: a symmetization step, and a way of dealing with leftove queies that esult fom the symmetization. We also intoduce a symbolic matix epesentation fo PIR schemes which simplifies ou analysis. A. An Example of the Lifting Opeation We denote by V j = {b F ML/K q : i < (j 1)L/K + 1 o i > jl/k b i = 0}, the subspace of queies which only quey the j-th message. Definition 4. A k-quey is a sum of k queies, each belonging to a diffeent V j, j [M]. So, fo example, if a V 1, b V 2, and c V, then a is a 1-quey, a + b is a 2-quey, and a + b + c is a -quey. Conside the scheme in Example 2. We epesent the stuctue of this scheme by means of the following matix: S 2 = ( ). (2) Each column of S 2 coesponds to a seve. A 1 in column i epesents sending all possible combinations of 1-queies of evey message to seve i, and a 2 epesents sending all combinations of 2-queies of evey message to seve i. We call this matix the symbolic matix of the scheme. The co-dimension = tells us that fo evey = ones thee is = 1 twos in the symbolic matix. Given the intepetation above, the symbolic matix S 2 can be eadily applied to obtain the stuctue of a PIR scheme fo

4 any numbe of messages M. Fo M =, the stuctue is as follows. seve 1 seve 2 seve seve 4 a 1 a 2 a a 4 + b 4 b 1 b 2 b a 5 + c 4 c 1 c 2 c b 5 + c 5 TABLE V: Quey stuctue fo M = in Example 1 as implied by the symbolic matix in (2). The elationships between the queies in Table V is taken fom the one-shot scheme and satisfy the following popeties: The a i V 1, b i V 2, and c i V. The a s and b s ae chosen as in Example 2. The c s ae chosen analogously to the b s. The exta leftove tem b 5 + c 5 is chosen unifomly and independent and diffeent fom zeo. The scheme in Table V has ate 5/12. In this scheme, the ole of b 5 + c 5 is to achieve pivacy and does not contibute to the decoding pocess. In this sense, it can be seen as a leftove quey of the symmetization. By epeating the scheme = times, each one shifted to the left, so that the leftove queies appea in diffeent seves, we can apply the same idea in the one-shot scheme to the leftove queies, as shown in Table VI. Thus, we impove the ate fom 5/12 to 16/7. seve 1 seve 2 seve seve 4 a 1 a 2 a a 4 + b 4 b 1 b 2 b a 5 + c 4 c 1 c 2 c b 5 + c 5 a 7 a 8 a 9 + b 9 a 6 b 7 b 8 a 10 + c 9 b 6 c 7 c 8 b 10 + c 10 c 6 a 1 a 14 + b 14 a 11 a 12 b 1 a 15 + c 14 b 11 b 12 c 1 b 15 + c 15 c 11 c 12 a 16 + b 16 + c 16 TABLE VI: Quey stuctue fo the lifted scheme. The queies in Table VI satisfy the following popeties: The scheme is sepaated into fou ounds. In each of the fist thee ounds the queies behave as in Table V, but shifted to the left so that the leftove queies appea in diffeent seves. But now, b 16 + c 16, b 15 + c 15, b 10 + c 10, and b 5 + c 5 ae chosen analogously to the one-shot scheme. Moe pecisely, b 16 + c 16 and b 15 + c 15 ae unifomly and independently distibuted and ae linealy independent, and b 10 + c 10 = (b 16 + c 16 ) + (b 15 + c 15 ) b 5 + c 5 = (b 16 + c 16 ) + 2(b 15 + c 15 ). In this way, D 1, a 16 can be etieved using the following identity (analogous to Example 2): D 1, b 16 + c 16 = 2 D 2, b 15 + c D, b 10 + c 10 D 1, b 5 + c 5 This scheme can be epesented by the following matix 5. S = The scheme fo M = messages was constucted ecusively using the one fo 2 messages. It is this ecusive opeation that we call lifting. The main idea behind the lifting opeation is that = enties with value k geneate = 1 enty with value k + 1 in the symbolic matix. Lifting S to S 4 follows the same pocedue: epeat S = times, each one shifted to the left, to poduce = 1 4-quey. As a esult, we obtain the following symbolic matix. S 4 = 4 The queies ae to be chosen analogously to the pevious examples which we descibe igoously in the next subsection. B. The Symbolic Matix and the Lifting Opeation Definition 5. Let Q be a one-shot scheme with co-dimension. A symbolic matix S M fo Q is defined ecusively as follows. {}}{{}}{ S 2 = ( 1,..., 1, 2,..., 2) () S M+1 = lift(s M ) (4) The lifting opeation is defined as, S M σ(s M ) lift(s M ) =., σ 1 (S M ) A whee σ(s M ) shifts the columns of S M to the left and A is a matix which we will descibe late in detail. Fomally, σ(s M )(i, j) = S M (i, j + 1) fo 1 j n 1 and σ(s M )(i, n) = S M (i, 1). Hee, σ(s M )(i, j) is the enty in the i-ow and j-th column of the matix σ(s M ). The matix A is constucted as follows: We fist define an odeing 6,, on (i, j) 2 by (i, j) (i, j ) if eithe i < i o i = i and j < j. 5 We omit zeos in ou symbolic matices. 6 This is known in the liteatue as a lexicogaphical ode.

5 Let B = {(i, j) : S M (i, j) = M} = {b 1,..., b #(M,SM )} such that i < j implies in b i b j, whee Define #(k, A) = {(i, j) [n] [m] : A ij = k}. τ(i, j) = { (i + ows(sm ), j 1) if j > 1, (i + ows(s M ), ) if j = 1, whee ows(s M ) is the numbe of ows in S M. Define the auxiliay sets B i = {b i, τ(b i ),..., τ 1 (b i )} and c(b i ) = {j : (i, j) B i ). Then, A is defined as { 0 if j c(bi ), A i,j = M + 1 if j / c(b i ). As an example, we show how S 4 in Section V-A is constucted in tems of S. In this case, = and the matix A consists of a single ow. S 4 = 4 S σ(s ) σ 2 (S ) Tanslation fom symbolic matix to PIR scheme. Each enty k of a symbolic matix S M epesents ( ) M k k-queies, one fo evey combination of k messages. The queies ae taken analogously to the queies in the one-shot scheme. This is done by making the queies epesented by B i = {b i, τ(b i ),..., τ 1 (b i )} to geneate the queies epesented by {(i, j) : A i,j = M + 1}. To find the ate of the lifted scheme we need to count the numbe of enties in the symbolic matix of a specific value. Poposition 2. Let S M be the symbolic matix of a one-shot scheme with co-dimension. Then, ( ) k 1 #(k, S M ) = 1 k M Poof. It follows fom the lifting opeation that #(k, S M ) = #(k 1, S M ) ( ) k 1 = #(1, S M ) ( ) k 1 =. A Theoem 1. Let Q be a one-shot scheme of co-dimension. Then, efining and lifting Q gives an (, K, T, M)-PIR scheme Q with ate R Q ( ) = M M = ( 1 ( ) M ). Poof. Given the one shot-scheme Q, we apply the efinement lemma to obtain a scheme with symbolic matix S 2 as in (). The scheme Q is defined as the one with symbolic matix S M = lift M 2 (S 2 ) as in (4). 7 Pivacy and coectness of the scheme follow diectly fom the pivacy and coectness of the one-shot scheme. ext, we calculate the ate R Q = L. Each enty k of Q 1 S M coesponds to ( M k ) k-queies, one fo each combination of k messages. Thus, using Poposition 2, M ( ) Q 1 M = #(k, S M ) k M ( ) k 1 ( ) M = k = M M To find L we need to count the queies which quey W 1. The numbe of k-queies which quey W 1 is ( k 1 ). Thus, M ( ) M 1 L = #(k, S M ) k 1 M ( ) k 1 ( ) M 1 = k 1 = Theefoe, R Q = ( ) M M. VI. REFIIG AD LIFTIG KOW SCHEMES In this section, we efine and lift known one-shot schemes fom the liteatue. We fist efine and lift the scheme descibed in Theoem of [15]. In ou notation, this scheme is a one-shot scheme with co-dimension = K +T K. Theoem 2. Refining and lifting the scheme pesented in Theoem of [15] gives an (, K, T, M)-PIR scheme Q with R Q = ( + T ).(K) (K) M (K + T ) M. (5) ext, we efine and lift the scheme in [12]. In ou notation, this scheme has co-dimension = K + T 1. Thus, we 7 The powe in the expession lift M 2 (S 2 ) denotes functional composition.

6 obtain the fist PIR scheme to achieve the ate conjectued to be optimal 8 in [12] fo MDS coded data with collusions. Theoem. Refining and lifting the scheme pesented in [12] gives an (, K, T, M)-PIR scheme, Q, with ( K T + 1) R Q = M (K + T 1) M = 1 K+T 1 1 ( ) K+T 1 M. (6) The ate of the scheme in Theoem 2 (5) is uppe bounded by the ate of the scheme in Theoem (6), with equality when eithe K = 1 o = K + T. ow, we conside the case of eplicated data (K = 1) on seves with at most T collusions. A T -theshold linea secet shaing scheme [17] can be tansfomed into the following one-shot PIR scheme. Seve 1... Seve T Seve T Seve q 1 q T q T +1 + a 1 q + a T [12] R. Feij-Hollanti, O. W. Gnilke, C. Hollanti, and D. A. Kapuk, Pivate infomation etieval fom coded databases with colluding seves, SIAM Jounal on Applied Algeba and Geomety, vol. 1, no. 1, pp , [1] S. Kuma, E. Rosnes, and A. G. i Amat, Pivate infomation etieval in distibuted stoage systems using an abitay linea code, in Infomation Theoy (ISIT), 2017 IEEE Intenational Symposium on, pp , IEEE, [14] K. Banawan and S. Ulukus, The capacity of pivate infomation etieval fom coded databases, axiv pepint axiv: , [15] R. Tajeddine, O. W. Gnilke, and S. E. Rouayheb, Pivate infomation etieval fom mds coded data in distibuted stoage systems, IEEE Tansactions on Infomation Theoy, pp. 1 1, [16] H. Sun and S. A. Jafa, Pivate infomation etieval fom mds coded data with colluding seves: Settling a conjectue by feij-hollanti et al., IEEE Tansactions on Infomation Theoy, vol. 64, pp , Feb [17] R. Came, I. B. Damgåd, and J. B. ielsen, Secue Multipaty Computation and Secet Shaing. Cambidge, England: Cambidge Univesity Pess, Theoem 4. Refining and lifting a T -theshold linea secet shaing scheme gives an (, 1, T, M)-PIR scheme Q with capacity-achieving ate ( T ) R Q = M T M. This scheme has the same capacity achieving ate as the scheme pesented in [5] but with less queies. REFERECES [1] B. Cho, O. Goldeich, E. Kushilevitz, and M. Sudan, Pivate infomation etieval, in IEEE Symposium on Foundations of Compute Science, pp , [2] B. Cho, E. Kushilevitz, O. Goldeich, and M. Sudan, Pivate infomation etieval, Jounal of the ACM (JACM), vol. 45, no. 6, pp , [] W. Gasach, A suvey on pivate infomation etieval, The Bulletin of the EATCS, vol. 82, no , p. 1, [4] H. Sun and S. A. Jafa, The capacity of pivate infomation etieval, axiv pepint axiv: , [5] H. Sun and S. A. Jafa, The capacity of obust pivate infomation etieval with colluding databases, axiv pepint axiv: , [6] S. Yekhanin, Pivate infomation etieval, Communications of the ACM, vol. 5, no. 4, pp. 68 7, [7] A. Beimel and Y. Ishai, Infomation-theoetic pivate infomation etieval: A unified constuction, in Automata, Languages and Pogamming, pp , Spinge, [8] A. Beimel, Y. Ishai, E. Kushilevitz, and J.-F. Raymond, Beaking the o(n 1/(2k 1) ) baie fo infomation-theoetic pivate infomation etieval, in The 4d Annual IEEE Symposium on Foundations of Compute Science, Poceedings., pp , IEEE, [9]. Shah, K. Rashmi, and K. Ramchandan, One exta bit of download ensues pefectly pivate infomation etieval, in 2014 IEEE Intenational Symposium on Infomation Theoy, pp , IEEE, [10] T. Chan, S.-W. Ho, and H. Yamamoto, Pivate infomation etieval fo coded stoage, in 2015 IEEE Intenational Symposium on Infomation Theoy (ISIT), pp , IEEE, June [11] R. Tajeddine and S. El Rouayheb, Pivate infomation etieval fom mds coded data in distibuted stoage systems, in Infomation Theoy (ISIT), 2016 IEEE Intenational Symposium on, pp , IEEE, The optimality of the ate in (6) was dispoven in [16] fo some paametes. Fo the emaining ange of paametes, the PIR schemes obtained hee in Theoem, though efining and lifting, achieve the best ates known so fa in the liteatue.

New problems in universal algebraic geometry illustrated by boolean equations

New problems in universal algebraic geometry illustrated by boolean equations New poblems in univesal algebaic geomety illustated by boolean equations axiv:1611.00152v2 [math.ra] 25 Nov 2016 Atem N. Shevlyakov Novembe 28, 2016 Abstact We discuss new poblems in univesal algebaic

More information

A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES

A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES AGU Intenational Jounal of Science and Technology A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES Ritu Ahuja Depatment of Mathematics Khalsa College fo Women, Civil Lines, Ludhiana-141001, Punjab, (India)

More information

arxiv: v1 [math.co] 1 Apr 2011

arxiv: v1 [math.co] 1 Apr 2011 Weight enumeation of codes fom finite spaces Relinde Juius Octobe 23, 2018 axiv:1104.0172v1 [math.co] 1 Ap 2011 Abstact We study the genealized and extended weight enumeato of the - ay Simplex code and

More information

Chapter 5 Linear Equations: Basic Theory and Practice

Chapter 5 Linear Equations: Basic Theory and Practice Chapte 5 inea Equations: Basic Theoy and actice In this chapte and the next, we ae inteested in the linea algebaic equation AX = b, (5-1) whee A is an m n matix, X is an n 1 vecto to be solved fo, and

More information

Probablistically Checkable Proofs

Probablistically Checkable Proofs Lectue 12 Pobablistically Checkable Poofs May 13, 2004 Lectue: Paul Beame Notes: Chis Re 12.1 Pobablisitically Checkable Poofs Oveview We know that IP = PSPACE. This means thee is an inteactive potocol

More information

arxiv: v1 [math.co] 4 May 2017

arxiv: v1 [math.co] 4 May 2017 On The Numbe Of Unlabeled Bipatite Gaphs Abdullah Atmaca and A Yavuz Ouç axiv:7050800v [mathco] 4 May 207 Abstact This pape solves a poblem that was stated by M A Haison in 973 [] This poblem, that has

More information

Rate Splitting is Approximately Optimal for Fading Gaussian Interference Channels

Rate Splitting is Approximately Optimal for Fading Gaussian Interference Channels Rate Splitting is Appoximately Optimal fo Fading Gaussian Intefeence Channels Joyson Sebastian, Can Kaakus, Suhas Diggavi, I-Hsiang Wang Abstact In this pape, we study the -use Gaussian intefeence-channel

More information

Geometry of the homogeneous and isotropic spaces

Geometry of the homogeneous and isotropic spaces Geomety of the homogeneous and isotopic spaces H. Sonoda Septembe 2000; last evised Octobe 2009 Abstact We summaize the aspects of the geomety of the homogeneous and isotopic spaces which ae most elevant

More information

Information Retrieval Advanced IR models. Luca Bondi

Information Retrieval Advanced IR models. Luca Bondi Advanced IR models Luca Bondi Advanced IR models 2 (LSI) Pobabilistic Latent Semantic Analysis (plsa) Vecto Space Model 3 Stating point: Vecto Space Model Documents and queies epesented as vectos in the

More information

Fractional Zero Forcing via Three-color Forcing Games

Fractional Zero Forcing via Three-color Forcing Games Factional Zeo Focing via Thee-colo Focing Games Leslie Hogben Kevin F. Palmowski David E. Robeson Michael Young May 13, 2015 Abstact An -fold analogue of the positive semidefinite zeo focing pocess that

More information

Multiple Criteria Secretary Problem: A New Approach

Multiple Criteria Secretary Problem: A New Approach J. Stat. Appl. Po. 3, o., 9-38 (04 9 Jounal of Statistics Applications & Pobability An Intenational Jounal http://dx.doi.og/0.785/jsap/0303 Multiple Citeia Secetay Poblem: A ew Appoach Alaka Padhye, and

More information

Construction and Analysis of Boolean Functions of 2t + 1 Variables with Maximum Algebraic Immunity

Construction and Analysis of Boolean Functions of 2t + 1 Variables with Maximum Algebraic Immunity Constuction and Analysis of Boolean Functions of 2t + 1 Vaiables with Maximum Algebaic Immunity Na Li and Wen-Feng Qi Depatment of Applied Mathematics, Zhengzhou Infomation Engineeing Univesity, Zhengzhou,

More information

4/18/2005. Statistical Learning Theory

4/18/2005. Statistical Learning Theory Statistical Leaning Theoy Statistical Leaning Theoy A model of supevised leaning consists of: a Envionment - Supplying a vecto x with a fixed but unknown pdf F x (x b Teache. It povides a desied esponse

More information

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0},

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0}, ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION E. J. IONASCU and A. A. STANCU Abstact. We ae inteested in constucting concete independent events in puely atomic pobability

More information

A NEW VARIABLE STIFFNESS SPRING USING A PRESTRESSED MECHANISM

A NEW VARIABLE STIFFNESS SPRING USING A PRESTRESSED MECHANISM Poceedings of the ASME 2010 Intenational Design Engineeing Technical Confeences & Computes and Infomation in Engineeing Confeence IDETC/CIE 2010 August 15-18, 2010, Monteal, Quebec, Canada DETC2010-28496

More information

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012 Stanfod Univesity CS59Q: Quantum Computing Handout 8 Luca Tevisan Octobe 8, 0 Lectue 8 In which we use the quantum Fouie tansfom to solve the peiod-finding poblem. The Peiod Finding Poblem Let f : {0,...,

More information

Do Managers Do Good With Other People s Money? Online Appendix

Do Managers Do Good With Other People s Money? Online Appendix Do Manages Do Good With Othe People s Money? Online Appendix Ing-Haw Cheng Haison Hong Kelly Shue Abstact This is the Online Appendix fo Cheng, Hong and Shue 2013) containing details of the model. Datmouth

More information

10/04/18. P [P(x)] 1 negl(n).

10/04/18. P [P(x)] 1 negl(n). Mastemath, Sping 208 Into to Lattice lgs & Cypto Lectue 0 0/04/8 Lectues: D. Dadush, L. Ducas Scibe: K. de Boe Intoduction In this lectue, we will teat two main pats. Duing the fist pat we continue the

More information

ASTR415: Problem Set #6

ASTR415: Problem Set #6 ASTR45: Poblem Set #6 Cuan D. Muhlbege Univesity of Mayland (Dated: May 7, 27) Using existing implementations of the leapfog and Runge-Kutta methods fo solving coupled odinay diffeential equations, seveal

More information

As is natural, our Aerospace Structures will be described in a Euclidean three-dimensional space R 3.

As is natural, our Aerospace Structures will be described in a Euclidean three-dimensional space R 3. Appendix A Vecto Algeba As is natual, ou Aeospace Stuctues will be descibed in a Euclidean thee-dimensional space R 3. A.1 Vectos A vecto is used to epesent quantities that have both magnitude and diection.

More information

Upper Bounds for Tura n Numbers. Alexander Sidorenko

Upper Bounds for Tura n Numbers. Alexander Sidorenko jounal of combinatoial theoy, Seies A 77, 134147 (1997) aticle no. TA962739 Uppe Bounds fo Tua n Numbes Alexande Sidoenko Couant Institute of Mathematical Sciences, New Yok Univesity, 251 Mece Steet, New

More information

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE THE p-adic VALUATION OF STIRLING NUMBERS ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE Abstact. Let p > 2 be a pime. The p-adic valuation of Stiling numbes of the

More information

A Converse to Low-Rank Matrix Completion

A Converse to Low-Rank Matrix Completion A Convese to Low-Rank Matix Completion Daniel L. Pimentel-Alacón, Robet D. Nowak Univesity of Wisconsin-Madison Abstact In many pactical applications, one is given a subset Ω of the enties in a d N data

More information

Encapsulation theory: the transformation equations of absolute information hiding.

Encapsulation theory: the transformation equations of absolute information hiding. 1 Encapsulation theoy: the tansfomation equations of absolute infomation hiding. Edmund Kiwan * www.edmundkiwan.com Abstact This pape descibes how the potential coupling of a set vaies as the set is tansfomed,

More information

Relating Branching Program Size and. Formula Size over the Full Binary Basis. FB Informatik, LS II, Univ. Dortmund, Dortmund, Germany

Relating Branching Program Size and. Formula Size over the Full Binary Basis. FB Informatik, LS II, Univ. Dortmund, Dortmund, Germany Relating Banching Pogam Size and omula Size ove the ull Binay Basis Matin Saueho y Ingo Wegene y Ralph Wechne z y B Infomatik, LS II, Univ. Dotmund, 44 Dotmund, Gemany z ankfut, Gemany sauehof/wegene@ls.cs.uni-dotmund.de

More information

Compactly Supported Radial Basis Functions

Compactly Supported Radial Basis Functions Chapte 4 Compactly Suppoted Radial Basis Functions As we saw ealie, compactly suppoted functions Φ that ae tuly stictly conditionally positive definite of ode m > do not exist The compact suppot automatically

More information

On Combination Networks with Cache-aided Relays and Users

On Combination Networks with Cache-aided Relays and Users On Combination Netwoks with Cache-aided Relays and Uses Kai Wan, Daniela Tuninetti Pablo Piantanida, Mingyue Ji, L2S CentaleSupélec-CNRS-Univesité Pais-Sud, Gif-su-Yvette 91190, Fance, {kai.wan, pablo.piantanida}@l2s.centalesupelec.f

More information

Quasi-Randomness and the Distribution of Copies of a Fixed Graph

Quasi-Randomness and the Distribution of Copies of a Fixed Graph Quasi-Randomness and the Distibution of Copies of a Fixed Gaph Asaf Shapia Abstact We show that if a gaph G has the popety that all subsets of vetices of size n/4 contain the coect numbe of tiangles one

More information

On the Locality of Codeword Symbols

On the Locality of Codeword Symbols On the Locality of Codewod Symbols Paikshit Gopalan Micosoft Reseach paik@micosoft.com Cheng Huang Micosoft Reseach chengh@micosoft.com Segey Yekhanin Micosoft Reseach yekhanin@micosoft.com Huseyin Simitci

More information

Binary Codes with Locality for Multiple Erasures Having Short Block Length

Binary Codes with Locality for Multiple Erasures Having Short Block Length Binay Codes with Locality fo Multiple Easues Having Shot Bloc Length S. B. Balaji, K. P. Pasanth and P. Vijay Kuma, Fellow, IEEE Depatment of Electical Communication Engineeing, Indian Institute of Science,

More information

On the ratio of maximum and minimum degree in maximal intersecting families

On the ratio of maximum and minimum degree in maximal intersecting families On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Mach 6, 013 Abstact To study how balanced o unbalanced a maximal intesecting

More information

Chapter 3: Theory of Modular Arithmetic 38

Chapter 3: Theory of Modular Arithmetic 38 Chapte 3: Theoy of Modula Aithmetic 38 Section D Chinese Remainde Theoem By the end of this section you will be able to pove the Chinese Remainde Theoem apply this theoem to solve simultaneous linea conguences

More information

6 PROBABILITY GENERATING FUNCTIONS

6 PROBABILITY GENERATING FUNCTIONS 6 PROBABILITY GENERATING FUNCTIONS Cetain deivations pesented in this couse have been somewhat heavy on algeba. Fo example, detemining the expectation of the Binomial distibution (page 5.1 tuned out to

More information

To Feel a Force Chapter 7 Static equilibrium - torque and friction

To Feel a Force Chapter 7 Static equilibrium - torque and friction To eel a oce Chapte 7 Chapte 7: Static fiction, toque and static equilibium A. Review of foce vectos Between the eath and a small mass, gavitational foces of equal magnitude and opposite diection act on

More information

Likelihood vs. Information in Aligning Biopolymer Sequences. UCSD Technical Report CS Timothy L. Bailey

Likelihood vs. Information in Aligning Biopolymer Sequences. UCSD Technical Report CS Timothy L. Bailey Likelihood vs. Infomation in Aligning Biopolyme Sequences UCSD Technical Repot CS93-318 Timothy L. Bailey Depatment of Compute Science and Engineeing Univesity of Califonia, San Diego 1 Febuay, 1993 ABSTRACT:

More information

Physics 2A Chapter 10 - Moment of Inertia Fall 2018

Physics 2A Chapter 10 - Moment of Inertia Fall 2018 Physics Chapte 0 - oment of netia Fall 08 The moment of inetia of a otating object is a measue of its otational inetia in the same way that the mass of an object is a measue of its inetia fo linea motion.

More information

Vanishing lines in generalized Adams spectral sequences are generic

Vanishing lines in generalized Adams spectral sequences are generic ISSN 364-0380 (on line) 465-3060 (pinted) 55 Geomety & Topology Volume 3 (999) 55 65 Published: 2 July 999 G G G G T T T G T T T G T G T GG TT G G G G GG T T T TT Vanishing lines in genealized Adams spectal

More information

Syntactical content of nite approximations of partial algebras 1 Wiktor Bartol Inst. Matematyki, Uniw. Warszawski, Warszawa (Poland)

Syntactical content of nite approximations of partial algebras 1 Wiktor Bartol Inst. Matematyki, Uniw. Warszawski, Warszawa (Poland) Syntactical content of nite appoximations of patial algebas 1 Wikto Batol Inst. Matematyki, Uniw. Waszawski, 02-097 Waszawa (Poland) batol@mimuw.edu.pl Xavie Caicedo Dep. Matematicas, Univ. de los Andes,

More information

arxiv: v2 [physics.data-an] 15 Jul 2015

arxiv: v2 [physics.data-an] 15 Jul 2015 Limitation of the Least Squae Method in the Evaluation of Dimension of Factal Bownian Motions BINGQIANG QIAO,, SIMING LIU, OUDUN ZENG, XIANG LI, and BENZONG DAI Depatment of Physics, Yunnan Univesity,

More information

arxiv: v1 [physics.pop-ph] 3 Jun 2013

arxiv: v1 [physics.pop-ph] 3 Jun 2013 A note on the electostatic enegy of two point chages axiv:1306.0401v1 [physics.pop-ph] 3 Jun 013 A C Tot Instituto de Física Univesidade Fedeal do io de Janeio Caixa Postal 68.58; CEP 1941-97 io de Janeio,

More information

On the Quasi-inverse of a Non-square Matrix: An Infinite Solution

On the Quasi-inverse of a Non-square Matrix: An Infinite Solution Applied Mathematical Sciences, Vol 11, 2017, no 27, 1337-1351 HIKARI Ltd, wwwm-hikaicom https://doiog/1012988/ams20177273 On the Quasi-invese of a Non-squae Matix: An Infinite Solution Ruben D Codeo J

More information

B. Spherical Wave Propagation

B. Spherical Wave Propagation 11/8/007 Spheical Wave Popagation notes 1/1 B. Spheical Wave Popagation Evey antenna launches a spheical wave, thus its powe density educes as a function of 1, whee is the distance fom the antenna. We

More information

A Bijective Approach to the Permutational Power of a Priority Queue

A Bijective Approach to the Permutational Power of a Priority Queue A Bijective Appoach to the Pemutational Powe of a Pioity Queue Ia M. Gessel Kuang-Yeh Wang Depatment of Mathematics Bandeis Univesity Waltham, MA 02254-9110 Abstact A pioity queue tansfoms an input pemutation

More information

HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS?

HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS? 6th INTERNATIONAL MULTIDISCIPLINARY CONFERENCE HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS? Cecília Sitkuné Göömbei College of Nyíegyháza Hungay Abstact: The

More information

3.1 Random variables

3.1 Random variables 3 Chapte III Random Vaiables 3 Random vaiables A sample space S may be difficult to descibe if the elements of S ae not numbes discuss how we can use a ule by which an element s of S may be associated

More information

PROBLEM SET #1 SOLUTIONS by Robert A. DiStasio Jr.

PROBLEM SET #1 SOLUTIONS by Robert A. DiStasio Jr. POBLM S # SOLUIONS by obet A. DiStasio J. Q. he Bon-Oppenheime appoximation is the standad way of appoximating the gound state of a molecula system. Wite down the conditions that detemine the tonic and

More information

Gradient-based Neural Network for Online Solution of Lyapunov Matrix Equation with Li Activation Function

Gradient-based Neural Network for Online Solution of Lyapunov Matrix Equation with Li Activation Function Intenational Confeence on Infomation echnology and Management Innovation (ICIMI 05) Gadient-based Neual Netwok fo Online Solution of Lyapunov Matix Equation with Li Activation unction Shiheng Wang, Shidong

More information

Pushdown Automata (PDAs)

Pushdown Automata (PDAs) CHAPTER 2 Context-Fee Languages Contents Context-Fee Gammas definitions, examples, designing, ambiguity, Chomsky nomal fom Pushdown Automata definitions, examples, euivalence with context-fee gammas Non-Context-Fee

More information

F-IF Logistic Growth Model, Abstract Version

F-IF Logistic Growth Model, Abstract Version F-IF Logistic Gowth Model, Abstact Vesion Alignments to Content Standads: F-IFB4 Task An impotant example of a model often used in biology o ecology to model population gowth is called the logistic gowth

More information

Duality between Statical and Kinematical Engineering Systems

Duality between Statical and Kinematical Engineering Systems Pape 00, Civil-Comp Ltd., Stiling, Scotland Poceedings of the Sixth Intenational Confeence on Computational Stuctues Technology, B.H.V. Topping and Z. Bittna (Editos), Civil-Comp Pess, Stiling, Scotland.

More information

On the ratio of maximum and minimum degree in maximal intersecting families

On the ratio of maximum and minimum degree in maximal intersecting families On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Septembe 5, 011 Abstact To study how balanced o unbalanced a maximal intesecting

More information

SOME GENERAL NUMERICAL RADIUS INEQUALITIES FOR THE OFF-DIAGONAL PARTS OF 2 2 OPERATOR MATRICES

SOME GENERAL NUMERICAL RADIUS INEQUALITIES FOR THE OFF-DIAGONAL PARTS OF 2 2 OPERATOR MATRICES italian jounal of pue and applied mathematics n. 35 015 (433 44) 433 SOME GENERAL NUMERICAL RADIUS INEQUALITIES FOR THE OFF-DIAGONAL PARTS OF OPERATOR MATRICES Watheq Bani-Domi Depatment of Mathematics

More information

Key Establishment Protocols. Cryptography CS 507 Erkay Savas Sabanci University

Key Establishment Protocols. Cryptography CS 507 Erkay Savas Sabanci University Key Establishment Potocols Cyptogaphy CS 507 Ekay Savas Sabanci Univesity ekays@sabanciuniv.edu Key distibution poblem Secuity of the keys Even if the cyptogaphic algoithms & potocols ae cyptogaphically

More information

arxiv: v2 [math.ag] 4 Jul 2012

arxiv: v2 [math.ag] 4 Jul 2012 SOME EXAMPLES OF VECTOR BUNDLES IN THE BASE LOCUS OF THE GENERALIZED THETA DIVISOR axiv:0707.2326v2 [math.ag] 4 Jul 2012 SEBASTIAN CASALAINA-MARTIN, TAWANDA GWENA, AND MONTSERRAT TEIXIDOR I BIGAS Abstact.

More information

Analytical time-optimal trajectories for an omni-directional vehicle

Analytical time-optimal trajectories for an omni-directional vehicle Analytical time-optimal tajectoies fo an omni-diectional vehicle Weifu Wang and Devin J. Balkcom Abstact We pesent the fist analytical solution method fo finding a time-optimal tajectoy between any given

More information

6 Matrix Concentration Bounds

6 Matrix Concentration Bounds 6 Matix Concentation Bounds Concentation bounds ae inequalities that bound pobabilities of deviations by a andom vaiable fom some value, often its mean. Infomally, they show the pobability that a andom

More information

16 Modeling a Language by a Markov Process

16 Modeling a Language by a Markov Process K. Pommeening, Language Statistics 80 16 Modeling a Language by a Makov Pocess Fo deiving theoetical esults a common model of language is the intepetation of texts as esults of Makov pocesses. This model

More information

EQUI-PARTITIONING OF HIGHER-DIMENSIONAL HYPER-RECTANGULAR GRID GRAPHS

EQUI-PARTITIONING OF HIGHER-DIMENSIONAL HYPER-RECTANGULAR GRID GRAPHS EQUI-PARTITIONING OF HIGHER-DIMENSIONAL HYPER-RECTANGULAR GRID GRAPHS ATHULA GUNAWARDENA AND ROBERT R MEYER Abstact A d-dimensional gid gaph G is the gaph on a finite subset in the intege lattice Z d in

More information

Exploration of the three-person duel

Exploration of the three-person duel Exploation of the thee-peson duel Andy Paish 15 August 2006 1 The duel Pictue a duel: two shootes facing one anothe, taking tuns fiing at one anothe, each with a fixed pobability of hitting his opponent.

More information

Analytical Solutions for Confined Aquifers with non constant Pumping using Computer Algebra

Analytical Solutions for Confined Aquifers with non constant Pumping using Computer Algebra Poceedings of the 006 IASME/SEAS Int. Conf. on ate Resouces, Hydaulics & Hydology, Chalkida, Geece, May -3, 006 (pp7-) Analytical Solutions fo Confined Aquifes with non constant Pumping using Compute Algeba

More information

Solution to HW 3, Ma 1a Fall 2016

Solution to HW 3, Ma 1a Fall 2016 Solution to HW 3, Ma a Fall 206 Section 2. Execise 2: Let C be a subset of the eal numbes consisting of those eal numbes x having the popety that evey digit in the decimal expansion of x is, 3, 5, o 7.

More information

Topic 4a Introduction to Root Finding & Bracketing Methods

Topic 4a Introduction to Root Finding & Bracketing Methods /8/18 Couse Instucto D. Raymond C. Rumpf Office: A 337 Phone: (915) 747 6958 E Mail: cumpf@utep.edu Topic 4a Intoduction to Root Finding & Backeting Methods EE 4386/531 Computational Methods in EE Outline

More information

Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matrix

Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matrix Jounal of Sciences, Islamic Republic of Ian (): - () Univesity of Tehan, ISSN - http://sciencesutaci Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matix H Ahsani

More information

Locality and Availability in Distributed Storage

Locality and Availability in Distributed Storage Locality and Availability in Distibuted Stoage Ankit Singh Rawat, Dimitis S. Papailiopoulos, Alexandos G. Dimakis, and Siam Vishwanath developed, each optimized fo a diffeent epai cost metic. Codes that

More information

Web-based Supplementary Materials for. Controlling False Discoveries in Multidimensional Directional Decisions, with

Web-based Supplementary Materials for. Controlling False Discoveries in Multidimensional Directional Decisions, with Web-based Supplementay Mateials fo Contolling False Discoveies in Multidimensional Diectional Decisions, with Applications to Gene Expession Data on Odeed Categoies Wenge Guo Biostatistics Banch, National

More information

Math 2263 Solutions for Spring 2003 Final Exam

Math 2263 Solutions for Spring 2003 Final Exam Math 6 Solutions fo Sping Final Exam ) A staightfowad appoach to finding the tangent plane to a suface at a point ( x, y, z ) would be to expess the cuve as an explicit function z = f ( x, y ), calculate

More information

Hydroelastic Analysis of a 1900 TEU Container Ship Using Finite Element and Boundary Element Methods

Hydroelastic Analysis of a 1900 TEU Container Ship Using Finite Element and Boundary Element Methods TEAM 2007, Sept. 10-13, 2007,Yokohama, Japan Hydoelastic Analysis of a 1900 TEU Containe Ship Using Finite Element and Bounday Element Methods Ahmet Egin 1)*, Levent Kaydıhan 2) and Bahadı Uğulu 3) 1)

More information

DonnishJournals

DonnishJournals DonnishJounals 041-1189 Donnish Jounal of Educational Reseach and Reviews. Vol 1(1) pp. 01-017 Novembe, 014. http:///dje Copyight 014 Donnish Jounals Oiginal Reseach Pape Vecto Analysis Using MAXIMA Savaş

More information

An Application of Fuzzy Linear System of Equations in Economic Sciences

An Application of Fuzzy Linear System of Equations in Economic Sciences Austalian Jounal of Basic and Applied Sciences, 5(7): 7-14, 2011 ISSN 1991-8178 An Application of Fuzzy Linea System of Equations in Economic Sciences 1 S.H. Nassei, 2 M. Abdi and 3 B. Khabii 1 Depatment

More information

Internet Appendix for A Bayesian Approach to Real Options: The Case of Distinguishing Between Temporary and Permanent Shocks

Internet Appendix for A Bayesian Approach to Real Options: The Case of Distinguishing Between Temporary and Permanent Shocks Intenet Appendix fo A Bayesian Appoach to Real Options: The Case of Distinguishing Between Tempoay and Pemanent Shocks Steven R. Genadie Gaduate School of Business, Stanfod Univesity Andey Malenko Gaduate

More information

Using Laplace Transform to Evaluate Improper Integrals Chii-Huei Yu

Using Laplace Transform to Evaluate Improper Integrals Chii-Huei Yu Available at https://edupediapublicationsog/jounals Volume 3 Issue 4 Febuay 216 Using Laplace Tansfom to Evaluate Impope Integals Chii-Huei Yu Depatment of Infomation Technology, Nan Jeon Univesity of

More information

Quaternion Based Inverse Kinematics for Industrial Robot Manipulators with Euler Wrist

Quaternion Based Inverse Kinematics for Industrial Robot Manipulators with Euler Wrist Quatenion Based Invese Kinematics fo Industial Robot Manipulatos with Eule Wist Yavuz Aydın Electonics and Compute Education Kocaeli Univesity Umuttepe Kocaeli Tukey yavuz_98@hotmailcom Seda Kucuk Electonics

More information

The VC-dimension of Unions: Learning, Geometry and Combinatorics

The VC-dimension of Unions: Learning, Geometry and Combinatorics The VC-dimension of Unions: Leaning, Geomety and Combinatoics Mónika Csikós Andey Kupavskii Nabil H. Mustafa Abstact The VC-dimension of a set system is a way to captue its complexity, and has been a key

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY Physics Department Physics 8.07: Electromagnetism II September 15, 2012 Prof. Alan Guth PROBLEM SET 2

MASSACHUSETTS INSTITUTE OF TECHNOLOGY Physics Department Physics 8.07: Electromagnetism II September 15, 2012 Prof. Alan Guth PROBLEM SET 2 MASSACHUSETTS INSTITUTE OF TECHNOLOGY Physics Depatment Physics 8.07: Electomagnetism II Septembe 5, 202 Pof. Alan Guth PROBLEM SET 2 DUE DATE: Monday, Septembe 24, 202. Eithe hand it in at the lectue,

More information

( ) [ ] [ ] [ ] δf φ = F φ+δφ F. xdx.

( ) [ ] [ ] [ ] δf φ = F φ+δφ F. xdx. 9. LAGRANGIAN OF THE ELECTROMAGNETIC FIELD In the pevious section the Lagangian and Hamiltonian of an ensemble of point paticles was developed. This appoach is based on a qt. This discete fomulation can

More information

I. CONSTRUCTION OF THE GREEN S FUNCTION

I. CONSTRUCTION OF THE GREEN S FUNCTION I. CONSTRUCTION OF THE GREEN S FUNCTION The Helmohltz equation in 4 dimensions is 4 + k G 4 x, x = δ 4 x x. In this equation, G is the Geen s function and 4 efes to the dimensionality. In the vey end,

More information

ONE-POINT CODES USING PLACES OF HIGHER DEGREE

ONE-POINT CODES USING PLACES OF HIGHER DEGREE ONE-POINT CODES USING PLACES OF HIGHER DEGREE GRETCHEN L. MATTHEWS AND TODD W. MICHEL DEPARTMENT OF MATHEMATICAL SCIENCES CLEMSON UNIVERSITY CLEMSON, SC 29634-0975 U.S.A. E-MAIL: GMATTHE@CLEMSON.EDU, TMICHEL@CLEMSON.EDU

More information

Encapsulation theory: radial encapsulation. Edmund Kirwan *

Encapsulation theory: radial encapsulation. Edmund Kirwan * Encapsulation theoy: adial encapsulation. Edmund Kiwan * www.edmundkiwan.com Abstact This pape intoduces the concept of adial encapsulation, wheeby dependencies ae constained to act fom subsets towads

More information

EM Boundary Value Problems

EM Boundary Value Problems EM Bounday Value Poblems 10/ 9 11/ By Ilekta chistidi & Lee, Seung-Hyun A. Geneal Desciption : Maxwell Equations & Loentz Foce We want to find the equations of motion of chaged paticles. The way to do

More information

MULTILAYER PERCEPTRONS

MULTILAYER PERCEPTRONS Last updated: Nov 26, 2012 MULTILAYER PERCEPTRONS Outline 2 Combining Linea Classifies Leaning Paametes Outline 3 Combining Linea Classifies Leaning Paametes Implementing Logical Relations 4 AND and OR

More information

NOTE. Some New Bounds for Cover-Free Families

NOTE. Some New Bounds for Cover-Free Families Jounal of Combinatoial Theoy, Seies A 90, 224234 (2000) doi:10.1006jcta.1999.3036, available online at http:.idealibay.com on NOTE Some Ne Bounds fo Cove-Fee Families D. R. Stinson 1 and R. Wei Depatment

More information

JENSEN S INEQUALITY FOR DISTRIBUTIONS POSSESSING HIGHER MOMENTS, WITH APPLICATION TO SHARP BOUNDS FOR LAPLACE-STIELTJES TRANSFORMS

JENSEN S INEQUALITY FOR DISTRIBUTIONS POSSESSING HIGHER MOMENTS, WITH APPLICATION TO SHARP BOUNDS FOR LAPLACE-STIELTJES TRANSFORMS J. Austal. Math. Soc. Se. B 40(1998), 80 85 JENSEN S INEQUALITY FO DISTIBUTIONS POSSESSING HIGHE MOMENTS, WITH APPLICATION TO SHAP BOUNDS FO LAPLACE-STIELTJES TANSFOMS B. GULJAŠ 1,C.E.M.PEACE 2 and J.

More information

A Multivariate Normal Law for Turing s Formulae

A Multivariate Normal Law for Turing s Formulae A Multivaiate Nomal Law fo Tuing s Fomulae Zhiyi Zhang Depatment of Mathematics and Statistics Univesity of Noth Caolina at Chalotte Chalotte, NC 28223 Abstact This pape establishes a sufficient condition

More information

On Computing Optimal (Q, r) Replenishment Policies under Quantity Discounts

On Computing Optimal (Q, r) Replenishment Policies under Quantity Discounts Annals of Opeations Reseach manuscipt No. will be inseted by the edito) On Computing Optimal, ) Replenishment Policies unde uantity Discounts The all - units and incemental discount cases Michael N. Katehakis

More information

A New Design of Binary MDS Array Codes with Asymptotically Weak-Optimal Repair

A New Design of Binary MDS Array Codes with Asymptotically Weak-Optimal Repair IEEE TRANSACTIONS ON INFORMATION THEORY 1 A New Design of Binay MDS Aay Codes with Asymptotically Weak-Optimal Repai Hanxu Hou, Membe, IEEE, Yunghsiang S. Han, Fellow, IEEE, Patick P. C. Lee, Senio Membe,

More information

arxiv: v1 [math.nt] 12 May 2017

arxiv: v1 [math.nt] 12 May 2017 SEQUENCES OF CONSECUTIVE HAPPY NUMBERS IN NEGATIVE BASES HELEN G. GRUNDMAN AND PAMELA E. HARRIS axiv:1705.04648v1 [math.nt] 12 May 2017 ABSTRACT. Fo b 2 and e 2, let S e,b : Z Z 0 be the function taking

More information

The Substring Search Problem

The Substring Search Problem The Substing Seach Poblem One algoithm which is used in a vaiety of applications is the family of substing seach algoithms. These algoithms allow a use to detemine if, given two chaacte stings, one is

More information

Light Time Delay and Apparent Position

Light Time Delay and Apparent Position Light Time Delay and ppaent Position nalytical Gaphics, Inc. www.agi.com info@agi.com 610.981.8000 800.220.4785 Contents Intoduction... 3 Computing Light Time Delay... 3 Tansmission fom to... 4 Reception

More information

Fall 2014 Randomized Algorithms Oct 8, Lecture 3

Fall 2014 Randomized Algorithms Oct 8, Lecture 3 Fall 204 Randomized Algoithms Oct 8, 204 Lectue 3 Pof. Fiedich Eisenband Scibes: Floian Tamè In this lectue we will be concened with linea pogamming, in paticula Clakson s Las Vegas algoithm []. The main

More information

Lecture 25: Pairing Based Cryptography

Lecture 25: Pairing Based Cryptography 6.897 Special Topics in Cyptogaphy Instucto: Ran Canetti May 5, 2004 Lectue 25: Paiing Based Cyptogaphy Scibe: Ben Adida 1 Intoduction The field of Paiing Based Cyptogaphy has exploded ove the past 3 yeas

More information

CHAPTER 3. Section 1. Modeling Population Growth

CHAPTER 3. Section 1. Modeling Population Growth CHAPTER 3 Section 1. Modeling Population Gowth 1.1. The equation of the Malthusian model is Pt) = Ce t. Apply the initial condition P) = 1. Then 1 = Ce,oC = 1. Next apply the condition P1) = 3. Then 3

More information

An upper bound on the number of high-dimensional permutations

An upper bound on the number of high-dimensional permutations An uppe bound on the numbe of high-dimensional pemutations Nathan Linial Zu Luia Abstact What is the highe-dimensional analog of a pemutation? If we think of a pemutation as given by a pemutation matix,

More information

Deterministic vs Non-deterministic Graph Property Testing

Deterministic vs Non-deterministic Graph Property Testing Deteministic vs Non-deteministic Gaph Popety Testing Lio Gishboline Asaf Shapia Abstact A gaph popety P is said to be testable if one can check whethe a gaph is close o fa fom satisfying P using few andom

More information

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution Statistics Reseach Lettes Vol. Iss., Novembe Cental Coveage Bayes Pediction Intevals fo the Genealized Paeto Distibution Gyan Pakash Depatment of Community Medicine S. N. Medical College, Aga, U. P., India

More information

Temporal-Difference Learning

Temporal-Difference Learning .997 Decision-Making in Lage-Scale Systems Mach 17 MIT, Sping 004 Handout #17 Lectue Note 13 1 Tempoal-Diffeence Leaning We now conside the poblem of computing an appopiate paamete, so that, given an appoximation

More information

COLLAPSING WALLS THEOREM

COLLAPSING WALLS THEOREM COLLAPSING WALLS THEOREM IGOR PAK AND ROM PINCHASI Abstact. Let P R 3 be a pyamid with the base a convex polygon Q. We show that when othe faces ae collapsed (otated aound the edges onto the plane spanned

More information

Chem 453/544 Fall /08/03. Exam #1 Solutions

Chem 453/544 Fall /08/03. Exam #1 Solutions Chem 453/544 Fall 3 /8/3 Exam # Solutions. ( points) Use the genealized compessibility diagam povided on the last page to estimate ove what ange of pessues A at oom tempeatue confoms to the ideal gas law

More information

A scaling-up methodology for co-rotating twin-screw extruders

A scaling-up methodology for co-rotating twin-screw extruders A scaling-up methodology fo co-otating twin-scew extudes A. Gaspa-Cunha, J. A. Covas Institute fo Polymes and Composites/I3N, Univesity of Minho, Guimaães 4800-058, Potugal Abstact. Scaling-up of co-otating

More information

A Three-Dimensional Magnetic Force Solution Between Axially-Polarized Permanent-Magnet Cylinders for Different Magnetic Arrangements

A Three-Dimensional Magnetic Force Solution Between Axially-Polarized Permanent-Magnet Cylinders for Different Magnetic Arrangements Poceedings of the 213 Intenational Confeence on echanics, Fluids, Heat, Elasticity Electomagnetic Fields A Thee-Dimensional agnetic Foce Solution Between Axially-Polaied Pemanent-agnet Cylindes fo Diffeent

More information

Physics 235 Chapter 5. Chapter 5 Gravitation

Physics 235 Chapter 5. Chapter 5 Gravitation Chapte 5 Gavitation In this Chapte we will eview the popeties of the gavitational foce. The gavitational foce has been discussed in geat detail in you intoductoy physics couses, and we will pimaily focus

More information