Secure sets and defensive alliances faster algorithm and improved bounds. Amano, Kazuyuki; Oo, Kyaw May; Otach Author(s) Uehara, Ryuhei

Size: px
Start display at page:

Download "Secure sets and defensive alliances faster algorithm and improved bounds. Amano, Kazuyuki; Oo, Kyaw May; Otach Author(s) Uehara, Ryuhei"

Transcription

1 JAIST Reposi Title Secure sets an efensive alliances faster algorithm an improve bouns Amano, Kazuyuki; Oo, Kyaw May; Otach Author(s Uehara, Ryuhei Citation IEICE Transactions on Information an E98-D(3: Issue Date Type Journal Article Text version publisher URL Rights Copyright (C2015 IEICE. Kazuyuki Am Oo, Yota Otachi, an Ryuhei Uehara, Transactions on Information an Syst D(3, 2015, Description Japan Avance Institute of Science an

2 VOL. E98-D NO. 3 MARCH 2015 The usage of this PDF file must comply with the IEICE Provisions on Copyright. The author(s can istribute this PDF file for research an eucational (nonprofit purposes only. Distribution by anyone other than the author(s is prohibite.

3 486 IEICE TRANS. INF. & SYST., VOL.E98 D, NO.3 MARCH 2015 PAPER Special Section on Founations of Computer Science New Spirits in Theory of Computation an Algorithm Secure Sets an Defensive Alliances in Graphs: A Faster Algorithm an Improve Bouns Kazuyuki AMANO a, Member, Kyaw May OO b, Nonmember, Yota OTACHI c, an Ryuhei UEHARA, Members SUMMARY Secure sets an efensive alliances in graphs are stuie. They are sets of vertices that are safe in some senses. In this paper, we first present a fixe-parameter algorithm for fining a small secure set, whose running time is much faster than the previously known one. We then present improve boun on the smallest sizes of efensive alliances an secure sets for hypercubes. These results settle some open problems pause recently. key wors: secure set, efensive alliance, fixe-parameter tractability, hypercube 1. Introuction The concept of a efensive alliance in a graph is introuce by Kristiansen, Heetniemi, an Heetniemi [14]. Intuitively, a efensive alliance is a set of vertices that is safe from attacks by its neighborhoo. Later the concept of a secure set in a graph is introuce by Brigham, Dutton, an Heetniemi [1]. Roughly speaking, a secure set is a much safer set of vertices than a efensive alliance. As the reaers see from the formal efinitions in the next section, any secure set is a efensive alliance. The problem of fining a smallest secure set or a smallest efensive alliance is of interest. These concepts have been intensively stuie (see e.g. [1], [4], [5], [10], [14]. Recently, Isaak, Johnson, an Petrie [12], [16] have introuce fractional variants of secure sets. Jamieson, Heetniemi, an McRae [13] showe that the problem of eciing whether a graph has a efensive alliance of size at most given k is NP-complete. Fernau an Raible [9] showe that the problem is fixe-parameter tractable when parameterize by the size of a efensive alliance. Enciso an Dutton [6] later presente a fixeparameter algorithm with a better running time. To the best of our knowlege, the complexity of fining a smallest secure set is not known. It is known that given a Manuscript receive February 28, Manuscript revise June 28, The author is with the Depertment of Computer Science, Gunma University, Kiryu-shi, Japan. The author is with University of Computer Stuies, Yangon, No. 14/20, Than Lwin Roa, Bahan, Yangon, Myanmar. The authors are with School of Information Science, Japan Avance Institute of Science an Technology, Nomi-shi, Japan. a amano@cs.gunma-u.ac.jp b kmayoo19@gmail.com c otachi@jaist.ac.jp uehara@jaist.ac.jp DOI: /transinf.2014FCP0007 graph an a set of vertices, it is conp-complete to ecie whether the set is a secure set of the graph [3]. Enciso an Dutton [7] presente a fixe-parameter algorithm for solving the problem of eciing whether a given n-vertex graph has a secure set of size at most k in time O(2 k log 2k n. 1.1 Our Results In Sect. 3, we present a faster fixe-parameter algorithm with a running time of O(2 3k k 2 n for fining a secure set of size at most k. In Sect. 4, we present graph-theoretic contributions. For hypercubes, we first etermine exactly the efensive alliance number, an also the efensive alliance partition number as a corollary. We then generalize these results to Hamming graphs. Next we present a significantly improve lower boun of the security number of hypercubes. The previously known lower boun ue to Petrie [16] is 2 /2, an our lower boun is more than for large enough. 2. Preliminaries All graphs in this paper are finite, simple, an unirecte. For a graph G, we enote its vertex set an ege set by V(G an E(G, respectively. The (open neighborhoo N(v of a vertex v V(G istheset{u {u,v} E(G}. The egree of v V(G is N(v an enote by eg G (v. The close neighborhoo N[v]ofavertexv V(Gistheset{v} N(v. For a subset S V(G, we efine its close neighborhoo as N[S ] = v S N[v]. The subgraph inuce by S V(G is enote by G[S ]. The istance between u,v V(G, enote ist(u,v, is the length of a shortest u v path in G. The Cartesian prouct of graphs G an H, enote G H, is the graph with the vertex set V(G V(H an the ege set {{(g, h, (g, h } g V(G, {h, h } E(H} {{(g, h, (g, h} h V(H, {g, g } E(G}. Theth Cartesian power of a graph G, enote G, is efine as G 1 = G an G = G G 1 for 2. The Hamming graph K k is the th Cartesian power of the complete graph K k for some an k. The-imensional hypercube Q is the th Cartesian power of K 2 ; that is, Q = K 2. Let G be a graph. A non-empty set S V(G isa efensive alliance if for each s S, N[s] S N[s] \ S. The efensive alliance number a(g ofg is the size of a smallest efensive alliance of G. A non-empty set S V(G is a secure set if for each X S, N[X] S N[X]\S (see Copyright c 2015 The Institute of Electronics, Information an Communication Engineers

4 AMANO et al.: SECURE SETS AND DEFENSIVE ALLIANCES 487 [1]. The security number s(g ofg is the size of a smallest secure set of G. Clearly, a(g s(g for any graph G. 3. A Faster Fixe-Parameter Algorithm for Secure Sets Recall that the running time of the algorithm by Enciso an Dutton [7] is O(2 k log 2k n, where n is the number of vertices of G. Here we present an improve O(2 3k k 2 n-time algorithm. Theorem 3.1. The problem of eciing whether s(g k can be solve in time O(2 3k k 2 n. Proof. For any S V(G, the following claims follows from the efinitions (see [7]: Claim 3.2. If N[S ] > 2k, then there is no secure set S that satisfies S S an S k. Claim 3.3. If S S is a minimal secure set, then there is a vertex u S \ S such that u N[S ] \ S. Now we escribe our algorithm. See Algorithm 1. We first guess a vertex v V(G, an call Fin({v}, to fin a secure set containing v. ForS V(G an F N[S ]\S,the proceure Fin(S, F fins a secure set S of size at most k such that S S an F S =. IfS itself is secure, then Fin(S, F outputs S an stops. Assume S is not secure an there is a minimal secure set S S with S kan S F =. Clearly, S < k. Since F N[S ] \ S,wehave F S k. By Claim 3.2, N[S ] 2k. Hence, if not all the conitions are satisfie, then there is no such S. If all the conitions are satisfie, the proceure recursively fins such S. If S exists, then there is a vertex u S \ S such that u N[S ] \ (S F by Claim 3.3. Moreover, if u N[S ] \ (S F, then either u S \ S or u N[S ] \ S hols. We a u into S in the former case an into F in the latter case. To check both cases, we call Fin(S {u}, F an Fin(S, F {u}. Algorithm 1 Fin a secure set of G with size at most k. 1: for all v V(G o 2: Fin({v}, 3: proceure Fin(S, F 4: if Secure(S then 5: Output S, an stop. 6: if S < k an F kan N[S ] 2kthen 7: u := a vertex in N[S ] \ (S F 8: Fin(S {u}, F 9: Fin(S, F {u} 10: proceure Secure(S 11: for all X S o 12: if N[X] S < N[X] \ S then 13: return false 14: return true Next we show the running time. We first have n branches corresponing to the calls of Fin({v}, for all v V(G. Each call of Fin(S, F has no or two branches that correspon to the calls of Fin(S {u}, F an Fin(S, F {u} if S < k, F k, an N[S ] 2k. Therefore, the search-tree has epth at most 2k in which the root has n chilren, an other inner noes have two chilren for each. Thus it has at most 1 + n 2k 1 2i 2 2k n noes. Since the algorithm takes O(2 k k 2 time for checking whether S is secure for each noe of the search-tree, the total running time is O(2 3k k 2 n. 4. Improve Bouns for Hypercubes 4.1 Defensive Alliances in Hypercubes The efensive alliance partition number of G, ψ a (G, is efine to be the maximum number of sets in a partition of V(G such that each set is a efensive alliance [14]. Eroh an Gera [8] showe that ψ a (Q 2 /2, an aske whether the boun is tight. In this section, we first answer the question affirmatively. We then generalize the result to show similar results for Hamming graphs. The first result is an almost irect consequence of the following beautiful proposition. Proposition 4.1 (Chung, Fürei, Graham, an Seymour [2]. If G is a subgraph of a hypercube with average egree s, then V(G 2 s. Theorem 4.2. For any, a(q = 2 /2. Proof. Eroh an Gera [8] showe that a(q 2 /2. Thus we only show the lower boun. Let S be a efensive alliance of Q an v S. Since N[v] S N[v]\S an = N[v] S + N[v]\S 1, it follows that eg Q [S ](v = N[v] S 1 ( 1/2 = /2. Hence the average egree of Q [S ]is at least /2. Now, by Proposition 4.1, S 2 /2. The theorem above implies that ψ a (Q 2 /2 /2 = 2 /2. Combining this fact with the lower boun of Eroh an Gera [8], we have the following answer. Corollary 4.3. For any, ψ a (Q = 2 /2. Now we generalize the result. For Hamming graphs, the following fact is known. Proposition 4.4 (Squier, Torrence, an Vogt [17]. If G is a subgraph of K k with n vertices an m eges, then 2m (k 1n log k n. The proposition above can be seen as a generalization of Proposition 4.1. Corollary 4.5. If G is a subgraph of K k with average egree s, then V(G k s/(k 1. Proof. Assume that G has n vertices an m eges. Then s = 2m/n. By Proposition 4.4, 2m (k 1n log k n. Diviing each sie by (k 1n, we obtain s/(k 1 log k n. This implies k s/(k 1 n.

5 488 Theorem 4.6. For any an k, k /2 a(k k k /2. Proof. First observe that K k is (k 1-regular. To show the upper boun, take a subgraph isomorphic to K /2 k. Each vertex in the subgraph has (k 1 /2 neighbors in the subgraph, an (k 1 /2 neighbors outsie of the subgraph. Thus the vertex set of the subgraph, which is of size k /2, is a efensive alliance. Let S be a efensive alliance of K k.bythesameway as the one in the proof of Theorem 4.2, we can show that the egree of v S is at least (k 1/2. By Corollary 4.5, S k (k 1/2 /(k 1 k /2. Corollary 4.7. For any an k, k /2 ψ a (K k k /2. Proof. The upper boun ψ a (K k k /2 immeiately follows from the lower boun a(k k k /2 in Theorem 4.6, because ψ a (G V(G /a(g for any graph G. The lower boun ψ a (K k k /2 follows from the construction of size k /2 efensive alliances in the proof of Theorem 4.6. The vertices with fixe first /2 coorinates inuce K /2 k. Thus we can partition K k into k /2 isomorphic copies of K /2 k. 4.2 Secure Sets of Hypercubes Petrie [16] showe that 2 /2 s(q 2 1, an aske whether the bouns can be improve. In this section we present an improve lower boun on s(q which is roughly We only use the simple fact that S is not secure if S < N[S ] \ S. Harper [11] showe that the breath-first search orering gives sets S that minimize N[S ] \ S. Using this result, we show that S < N[S ] \ S for any S V(Q with 1 S ( ( 2/3 i. The following proposition follows from Program an Theorem 1 in Harper s paper [11]. Proposition 4.8 (Harper [11]. For any positive integer k 2, there exist a set S V(Q, a vertex u 0 V(Q, an an integer r, such that S = k, N[S ] \ S = min T V(Q, T =k N[T] \ T, an {v ist(u 0,v r} S {v ist(u 0,v r + 1}. Theorem 4.9. For 2, it hols that s(q > ( 2/3 ( i. Proof. First, we show a property of a partial sum over binomial coefficients. Claim For 2, ( r ( i < r+1 for r ( 2/3. We prove the claim by inuction on r. The case of r = 0 clearly hols. Assume ( r 1 ( i < r for some r with 1 r ( 2/3. The assumption r ( 2/3 implies r + 1 2r 1. Therefore, it hols that ( r 1 i < 1 2r 1 = r r + 1 r + 1 1, ( r which implies that r 1 ( < i IEICE TRANS. INF. & SYST., VOL.E98 D, NO.3 MARCH 2015 ( ( ( r r r = r + 1 (. r Thus we have ( r ( i < r+1. Next, by using Proposition 4.8 an Claim 4.10, we can show the following. Claim For any subset S V(Q, if S, then N[S ] \ S > S. ( 2/3 ( i To prove the claim, let k ( ( 2/3 i.lets, u0, an r be the set, the vertex, an the integer in Proposition 4.8, respectively. Recall that {v ist(u 0,v = i} = ( i. Obviously, r ( 2/3. Hence, by Claim 4.10, we have ( r ( i < ( r+1.ifk = r i, then S = {v ist(u0,v r} an N[S ] \ S = {v ist(u 0,v = r + 1}. Thus, the claim hols in this case. In the following, we will focus on the case where k > ( r i. In this case, it hols that r ( 2/3 1 ( 5/3. Let S i S, ist(u 0,v = i}. Clearly, S = S r+1 + r = {v v ( ( < S r+1 +. (1 i r + 1 Let i = (N[S ] \ S {v ist(u 0,v = i}. Then N[S ] \ S = r+1 + r+2. Since S r is exactly the set {v ist(u 0,v = r}, it follows r+1 = ( r+1 Sr+1. Therefore, by (1, S < r S r+1. Now it suffices to show that 2 S r+1 r+2. For any v S r+1, N[v] r+2 = r 1. On the other han, for any v r+2, N[v] S r+1 r + 2. Thus, if F is the set of eges between S r+1 an r+2, then ( r 1 S r+1 = F (r + 2 r+2, which implies (( r 1/(r + 2 S r+1 r+2. Since r ( 5/3 means 2 ( r 1/(r+2, we have 2 S r+1 r+2. Claim 4.11 implies that there is no secure set of size at most ( ( 2/3 i. Therefore, the theorem follows. To see that the lower boun above is a significant improvement, we now show that ( ( 2/3 i > for large enough. (An explicit lower boun will be given in the proof. To this en, we nee the following lower boun of binomial coefficients. Proposition 4.12 (Mitzenmacher an Upfal [15, Corollary 9.3]. For 0 q 1/2, ( 2 H(q q + 1, where H(q is the binary entropy function H(q = q lg q (1 qlg(1 q. Corollary s(q > for large enough.

6 AMANO et al.: SECURE SETS AND DEFENSIVE ALLIANCES 489 Proof. We prove the statement for 652. By Theorem 4.9, it suffices to show that ( ( 2/3 > for 652. Observe that ( 5/3 > 0.33 since > 500, an hence ( ( ( > ( 2/3 ( 5/ , where the last inequality follows from Proposition 4.12 an the fact that H(0.33 > Thus ( ( 2/3 + 1 > It ( is easy to verify that 1.01 > + 1for 652. Hence ( 2/3 > In a similar way, one can show that for any ɛ>0, there is an integer 0 such that for 0, s(q > 2 (H(1/3 ɛ. Note that we nee ifferent argument to show a significantly better lower boun since H(1/3 = <0.92. [15] M. Mitzenmacher an E. Upfal, Probability an computing: Ranomize algorithms an probabilistic analysis, Cambrige University Press, [16] C. Petrie, (F, I-security in graphs, Discrete Appl. Math., vol.162, pp , [17] R. Squier, B. Torrence, an A. Vogt, The number of eges in a subgraph of a Hamming graph, Appl. Math. Lett., vol.14, pp , Kazuyuki Amano receive his M.E. an D.E. egrees in information sciences from Tohoku University in 1993 an 1996, respectively. Presently, he is a professor in Department of Computer Science, Gunma University, Kiryu, Japan. His research interests inclue the theory of computation an combinatorics. Acknowlegments This research was partially supporte by JSPS KAKENHI Grant Numbers , , , an by MEXT KAKENHI Grant Numbers , References [1] R.C. Brigham, R.D. Dutton, an S.T. Heetniemi, Security in graphs, Discrete Appl. Math., vol.155, pp , [2] F.R.K. Chung, Z. Fürei, R.L. Graham, an P.D. Seymour, On inuce subgraphs of the cube, J. Comb. Theory, Ser. A, vol.49, pp , [3] R.D. Dutton, The evolution of a har graph theory problem secure sets, A course material of COT 6410: Computational Complexity, University of Central Floria, Available at [4] R.D. Dutton, On a graph s security number, Discrete Math., vol.309, pp , [5] R.D. Dutton, R. Lee, an R.C. Brigham, Bouns on a graph s security number, Discrete Appl. Math., vol.156, pp , [6] R.I. Enciso an R.D. Dutton, Algorithms for efensive alliance problems, Available at renciso/da.pf [7] R.I. Enciso an R.D. Dutton, Parameterize complexity of secure sets, Congr. Numer., vol.189, pp , [8] L. Eroh an R. Gera, Alliance partition number in graphs, Ars Comb., vol.103, pp , [9] H. Fernau an D. Raible, Alliances in graphs: A complexitytheoretic stuy, SOFSEM (2, pp.61 70, [10] G.H. Fricke, L.M. Lawson, T.W. Haynes, S.M. Heetniemi, an S.T. Heetniemi, A note on efensive alliances in graphs, Bull. Inst. Combin. Appl., vol.38, pp.37 41, [11] L.H. Harper, Optimal numberings an isoperimetric problems on graphs, J. Combin. Theory, vol.1, pp , [12] G. Isaak, P. Johnson, an C. Petrie, Integer an fractional security in graphs, Discrete Appl. Math., vol.160, pp , [13] L.H. Jamieson, S.T. Heetniemi, an A.A. McRae, The algorithmic complexity of alliances in graphs, J. Combin. Math. Combin. Comput., vol.68, pp , [14] P. Kristiansen, S.M. Heetniemi, an S.T. Heetniemi, Alliances in graphs, J. Combin. Math. Combin. Comput., vol.48, pp , Kyaw May Oo receive her B.Sc. in Mathematics from Yangon University; M.I.Sc. from Institute of Computer Science an Technology (ICST; an Ph.D. in Information Science from University of Computer Stuies, Yangon (UCSY, Myanmar in 1994, 1996, an 2007 respectively. Currently, she is an associate professor in the Department of Computational Mathematics, UCSY, Myanmar. Her research interests inclue graph theory, an ata mining. Yota Otachi is an assistant professor of Japan Avance Institute of Science an Technology. He receive B.E., M.E., an Ph.D. egrees from Gunma University in 2005, 2007, an 2010, respectively. His research interests inclue graph algorithms, graph theory, an complexity theory. Ryuhei Uehara receive B.E., M.E., an Ph.D. egrees from the University of Electro- Communications, Japan, in 1989, 1991, an 1998, respectively. He was a researcher in CANON Inc. uring In 1993, he joine Tokyo Woman s Christian University as an assistant professor. He was a lecturer uring , an an associate professor uring at Komazawa University. He move to Japan Avance Institute of Science an Technology (JAIST in 2004 as an associate professor, an since 2011, he has been a professor in School of Information Science. His research interests inclue computational complexity, algorithms, an ata structures, especially, ranomize algorithms, approximation algorithms, graph algorithms, an algorithmic graph theory. He is a member of EATCS, ACM, an IEEE.

Ramsey numbers of some bipartite graphs versus complete graphs

Ramsey numbers of some bipartite graphs versus complete graphs Ramsey numbers of some bipartite graphs versus complete graphs Tao Jiang, Michael Salerno Miami University, Oxfor, OH 45056, USA Abstract. The Ramsey number r(h, K n ) is the smallest positive integer

More information

Lower bounds on Locality Sensitive Hashing

Lower bounds on Locality Sensitive Hashing Lower bouns on Locality Sensitive Hashing Rajeev Motwani Assaf Naor Rina Panigrahy Abstract Given a metric space (X, X ), c 1, r > 0, an p, q [0, 1], a istribution over mappings H : X N is calle a (r,

More information

Chromatic number for a generalization of Cartesian product graphs

Chromatic number for a generalization of Cartesian product graphs Chromatic number for a generalization of Cartesian prouct graphs Daniel Král Douglas B. West Abstract Let G be a class of graphs. The -fol gri over G, enote G, is the family of graphs obtaine from -imensional

More information

The chromatic number of graph powers

The chromatic number of graph powers Combinatorics, Probability an Computing (19XX) 00, 000 000. c 19XX Cambrige University Press Printe in the Unite Kingom The chromatic number of graph powers N O G A A L O N 1 an B O J A N M O H A R 1 Department

More information

Combinatorica 9(1)(1989) A New Lower Bound for Snake-in-the-Box Codes. Jerzy Wojciechowski. AMS subject classification 1980: 05 C 35, 94 B 25

Combinatorica 9(1)(1989) A New Lower Bound for Snake-in-the-Box Codes. Jerzy Wojciechowski. AMS subject classification 1980: 05 C 35, 94 B 25 Combinatorica 9(1)(1989)91 99 A New Lower Boun for Snake-in-the-Box Coes Jerzy Wojciechowski Department of Pure Mathematics an Mathematical Statistics, University of Cambrige, 16 Mill Lane, Cambrige, CB2

More information

Lower Bounds for the Smoothed Number of Pareto optimal Solutions

Lower Bounds for the Smoothed Number of Pareto optimal Solutions Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.

More information

Lecture 5. Symmetric Shearer s Lemma

Lecture 5. Symmetric Shearer s Lemma Stanfor University Spring 208 Math 233: Non-constructive methos in combinatorics Instructor: Jan Vonrák Lecture ate: January 23, 208 Original scribe: Erik Bates Lecture 5 Symmetric Shearer s Lemma Here

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

Asymptotic determination of edge-bandwidth of multidimensional grids and Hamming graphs

Asymptotic determination of edge-bandwidth of multidimensional grids and Hamming graphs Asymptotic etermination of ege-banwith of multiimensional gris an Hamming graphs Reza Akhtar Tao Jiang Zevi Miller. Revise on May 7, 007 Abstract The ege-banwith B (G) of a graph G is the banwith of the

More information

Acute sets in Euclidean spaces

Acute sets in Euclidean spaces Acute sets in Eucliean spaces Viktor Harangi April, 011 Abstract A finite set H in R is calle an acute set if any angle etermine by three points of H is acute. We examine the maximal carinality α() of

More information

The Study of Secure-dominating Set of Graph Products

The Study of Secure-dominating Set of Graph Products The Study of Secure-dominating Set of Graph Products Hung-Ming Chang Department of Mathematics National Kaohsiung Normal University Advisor: Hsin-Hao Lai August, 014 Outline 1 Introduction Preliminary

More information

Two formulas for the Euler ϕ-function

Two formulas for the Euler ϕ-function Two formulas for the Euler ϕ-function Robert Frieman A multiplication formula for ϕ(n) The first formula we want to prove is the following: Theorem 1. If n 1 an n 2 are relatively prime positive integers,

More information

TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH

TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH English NUMERICAL MATHEMATICS Vol14, No1 Series A Journal of Chinese Universities Feb 2005 TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH He Ming( Λ) Michael K Ng(Ξ ) Abstract We

More information

6 General properties of an autonomous system of two first order ODE

6 General properties of an autonomous system of two first order ODE 6 General properties of an autonomous system of two first orer ODE Here we embark on stuying the autonomous system of two first orer ifferential equations of the form ẋ 1 = f 1 (, x 2 ), ẋ 2 = f 2 (, x

More information

Agmon Kolmogorov Inequalities on l 2 (Z d )

Agmon Kolmogorov Inequalities on l 2 (Z d ) Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,

More information

REVISTA INVESTIGACIÓN OPERACIONAL VOL. 37, NO. 2, , 2016

REVISTA INVESTIGACIÓN OPERACIONAL VOL. 37, NO. 2, , 2016 REVISTA INVESTIGACIÓN OPERACIONAL VOL. 37, NO., 115-13, 016 COMPUTING THE STRONG ALLIANCE POLYNOMIAL OF A GRAPH W. Carballosa,, J. C. Hernández-Gómez,, O. Rosario, and Y. Torres-Nuñez, Cátedra CONACYT,

More information

Discrete Mathematics

Discrete Mathematics Discrete Mathematics 309 (009) 86 869 Contents lists available at ScienceDirect Discrete Mathematics journal homepage: wwwelseviercom/locate/isc Profile vectors in the lattice of subspaces Dániel Gerbner

More information

On Pathos Lict Subdivision of a Tree

On Pathos Lict Subdivision of a Tree International J.Math. Combin. Vol.4 (010), 100-107 On Pathos Lict Subivision of a Tree Keerthi G.Mirajkar an Iramma M.Kaakol (Department of Mathematics, Karnatak Arts College, Dharwa-580 001, Karnataka,

More information

Exact distance graphs of product graphs

Exact distance graphs of product graphs Exact istance graphs of prouct graphs Boštjan Brešar a,b Nicolas Gastineau c Sani Klavžar a,b, Olivier Togni c August 31, 2018 a Faculty of Natural Sciences an Mathematics, University of Maribor, Slovenia

More information

Proof of SPNs as Mixture of Trees

Proof of SPNs as Mixture of Trees A Proof of SPNs as Mixture of Trees Theorem 1. If T is an inuce SPN from a complete an ecomposable SPN S, then T is a tree that is complete an ecomposable. Proof. Argue by contraiction that T is not a

More information

A Sketch of Menshikov s Theorem

A Sketch of Menshikov s Theorem A Sketch of Menshikov s Theorem Thomas Bao March 14, 2010 Abstract Let Λ be an infinite, locally finite oriente multi-graph with C Λ finite an strongly connecte, an let p

More information

On the minimum distance of elliptic curve codes

On the minimum distance of elliptic curve codes On the minimum istance of elliptic curve coes Jiyou Li Department of Mathematics Shanghai Jiao Tong University Shanghai PRChina Email: lijiyou@sjtueucn Daqing Wan Department of Mathematics University of

More information

Sharp Thresholds. Zachary Hamaker. March 15, 2010

Sharp Thresholds. Zachary Hamaker. March 15, 2010 Sharp Threshols Zachary Hamaker March 15, 2010 Abstract The Kolmogorov Zero-One law states that for tail events on infinite-imensional probability spaces, the probability must be either zero or one. Behavior

More information

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes Leaving Ranomness to Nature: -Dimensional Prouct Coes through the lens of Generalize-LDPC coes Tavor Baharav, Kannan Ramchanran Dept. of Electrical Engineering an Computer Sciences, U.C. Berkeley {tavorb,

More information

A new proof of the sharpness of the phase transition for Bernoulli percolation on Z d

A new proof of the sharpness of the phase transition for Bernoulli percolation on Z d A new proof of the sharpness of the phase transition for Bernoulli percolation on Z Hugo Duminil-Copin an Vincent Tassion October 8, 205 Abstract We provie a new proof of the sharpness of the phase transition

More information

On colour-blind distinguishing colour pallets in regular graphs

On colour-blind distinguishing colour pallets in regular graphs J Comb Optim (2014 28:348 357 DOI 10.1007/s10878-012-9556-x On colour-blin istinguishing colour pallets in regular graphs Jakub Przybyło Publishe online: 25 October 2012 The Author(s 2012. This article

More information

A Note on Exact Solutions to Linear Differential Equations by the Matrix Exponential

A Note on Exact Solutions to Linear Differential Equations by the Matrix Exponential Avances in Applie Mathematics an Mechanics Av. Appl. Math. Mech. Vol. 1 No. 4 pp. 573-580 DOI: 10.4208/aamm.09-m0946 August 2009 A Note on Exact Solutions to Linear Differential Equations by the Matrix

More information

12.11 Laplace s Equation in Cylindrical and

12.11 Laplace s Equation in Cylindrical and SEC. 2. Laplace s Equation in Cylinrical an Spherical Coorinates. Potential 593 2. Laplace s Equation in Cylinrical an Spherical Coorinates. Potential One of the most important PDEs in physics an engineering

More information

Upper and Lower Bounds on ε-approximate Degree of AND n and OR n Using Chebyshev Polynomials

Upper and Lower Bounds on ε-approximate Degree of AND n and OR n Using Chebyshev Polynomials Upper an Lower Bouns on ε-approximate Degree of AND n an OR n Using Chebyshev Polynomials Mrinalkanti Ghosh, Rachit Nimavat December 11, 016 1 Introuction The notion of approximate egree was first introuce

More information

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012 CS-6 Theory Gems November 8, 0 Lecture Lecturer: Alesaner Mąry Scribes: Alhussein Fawzi, Dorina Thanou Introuction Toay, we will briefly iscuss an important technique in probability theory measure concentration

More information

Article On the Additively Weighted Harary Index of Some Composite Graphs

Article On the Additively Weighted Harary Index of Some Composite Graphs mathematics Article On the Aitively Weighte Harary Inex of Some Composite Graphs Behrooz Khosravi * an Elnaz Ramezani Department of Pure Mathematics, Faculty of Mathematics an Computer Science, Amirkabir

More information

Permanent vs. Determinant

Permanent vs. Determinant Permanent vs. Determinant Frank Ban Introuction A major problem in theoretical computer science is the Permanent vs. Determinant problem. It asks: given an n by n matrix of ineterminates A = (a i,j ) an

More information

arxiv: v1 [math.co] 15 Sep 2015

arxiv: v1 [math.co] 15 Sep 2015 Circular coloring of signe graphs Yingli Kang, Eckhar Steffen arxiv:1509.04488v1 [math.co] 15 Sep 015 Abstract Let k, ( k) be two positive integers. We generalize the well stuie notions of (k, )-colorings

More information

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Ashish Goel Michael Kapralov Sanjeev Khanna Abstract We consier the well-stuie problem of fining a perfect matching in -regular bipartite

More information

Hilbert functions and Betti numbers of reverse lexicographic ideals in the exterior algebra

Hilbert functions and Betti numbers of reverse lexicographic ideals in the exterior algebra Turk J Math 36 (2012), 366 375. c TÜBİTAK oi:10.3906/mat-1102-21 Hilbert functions an Betti numbers of reverse lexicographic ieals in the exterior algebra Marilena Crupi, Carmela Ferró Abstract Let K be

More information

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations Diophantine Approximations: Examining the Farey Process an its Metho on Proucing Best Approximations Kelly Bowen Introuction When a person hears the phrase irrational number, one oes not think of anything

More information

arxiv: v1 [math.co] 13 Dec 2017

arxiv: v1 [math.co] 13 Dec 2017 The List Linear Arboricity of Graphs arxiv:7.05006v [math.co] 3 Dec 07 Ringi Kim Department of Mathematical Sciences KAIST Daejeon South Korea 344 an Luke Postle Department of Combinatorics an Optimization

More information

NEERAJ KUMAR AND K. SENTHIL KUMAR. 1. Introduction. Theorem 1 motivate us to ask the following:

NEERAJ KUMAR AND K. SENTHIL KUMAR. 1. Introduction. Theorem 1 motivate us to ask the following: NOTE ON VANISHING POWER SUMS OF ROOTS OF UNITY NEERAJ KUMAR AND K. SENTHIL KUMAR Abstract. For xe positive integers m an l, we give a complete list of integers n for which their exist mth complex roots

More information

Lecture 22. Lecturer: Michel X. Goemans Scribe: Alantha Newman (2004), Ankur Moitra (2009)

Lecture 22. Lecturer: Michel X. Goemans Scribe: Alantha Newman (2004), Ankur Moitra (2009) 8.438 Avance Combinatorial Optimization Lecture Lecturer: Michel X. Goemans Scribe: Alantha Newman (004), Ankur Moitra (009) MultiFlows an Disjoint Paths Here we will survey a number of variants of isjoint

More information

IMFM Institute of Mathematics, Physics and Mechanics Jadranska 19, 1000 Ljubljana, Slovenia. Preprint series Vol. 50 (2012), 1173 ISSN

IMFM Institute of Mathematics, Physics and Mechanics Jadranska 19, 1000 Ljubljana, Slovenia. Preprint series Vol. 50 (2012), 1173 ISSN IMFM Institute of Mathematics, Physics an Mechanics Jaransa 19, 1000 Ljubljana, Slovenia Preprint series Vol. 50 (2012), 1173 ISSN 2232-2094 PARITY INDEX OF BINARY WORDS AND POWERS OF PRIME WORDS Alesanar

More information

d-dimensional Arrangement Revisited

d-dimensional Arrangement Revisited -Dimensional Arrangement Revisite Daniel Rotter Jens Vygen Research Institute for Discrete Mathematics University of Bonn Revise version: April 5, 013 Abstract We revisit the -imensional arrangement problem

More information

Similar Operators and a Functional Calculus for the First-Order Linear Differential Operator

Similar Operators and a Functional Calculus for the First-Order Linear Differential Operator Avances in Applie Mathematics, 9 47 999 Article ID aama.998.067, available online at http: www.iealibrary.com on Similar Operators an a Functional Calculus for the First-Orer Linear Differential Operator

More information

A note on asymptotic formulae for one-dimensional network flow problems Carlos F. Daganzo and Karen R. Smilowitz

A note on asymptotic formulae for one-dimensional network flow problems Carlos F. Daganzo and Karen R. Smilowitz A note on asymptotic formulae for one-imensional network flow problems Carlos F. Daganzo an Karen R. Smilowitz (to appear in Annals of Operations Research) Abstract This note evelops asymptotic formulae

More information

Iterated Point-Line Configurations Grow Doubly-Exponentially

Iterated Point-Line Configurations Grow Doubly-Exponentially Iterate Point-Line Configurations Grow Doubly-Exponentially Joshua Cooper an Mark Walters July 9, 008 Abstract Begin with a set of four points in the real plane in general position. A to this collection

More information

arxiv: v1 [math.co] 29 May 2009

arxiv: v1 [math.co] 29 May 2009 arxiv:0905.4913v1 [math.co] 29 May 2009 simple Havel-Hakimi type algorithm to realize graphical egree sequences of irecte graphs Péter L. Erős an István Miklós. Rényi Institute of Mathematics, Hungarian

More information

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013 Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing

More information

ALL GRAPHS WITH PAIRED-DOMINATION NUMBER TWO LESS THAN THEIR ORDER. Włodzimierz Ulatowski

ALL GRAPHS WITH PAIRED-DOMINATION NUMBER TWO LESS THAN THEIR ORDER. Włodzimierz Ulatowski Opuscula Math. 33, no. 4 (2013), 763 783 http://dx.doi.org/10.7494/opmath.2013.33.4.763 Opuscula Mathematica ALL GRAPHS WITH PAIRED-DOMINATION NUMBER TWO LESS THAN THEIR ORDER Włodzimierz Ulatowski Communicated

More information

International Journal of Pure and Applied Mathematics Volume 35 No , ON PYTHAGOREAN QUADRUPLES Edray Goins 1, Alain Togbé 2

International Journal of Pure and Applied Mathematics Volume 35 No , ON PYTHAGOREAN QUADRUPLES Edray Goins 1, Alain Togbé 2 International Journal of Pure an Applie Mathematics Volume 35 No. 3 007, 365-374 ON PYTHAGOREAN QUADRUPLES Eray Goins 1, Alain Togbé 1 Department of Mathematics Purue University 150 North University Street,

More information

Unit vectors with non-negative inner products

Unit vectors with non-negative inner products Unit vectors with non-negative inner proucts Bos, A.; Seiel, J.J. Publishe: 01/01/1980 Document Version Publisher s PDF, also known as Version of Recor (inclues final page, issue an volume numbers) Please

More information

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy,

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy, NOTES ON EULER-BOOLE SUMMATION JONATHAN M BORWEIN, NEIL J CALKIN, AND DANTE MANNA Abstract We stuy a connection between Euler-MacLaurin Summation an Boole Summation suggeste in an AMM note from 196, which

More information

A PAC-Bayesian Approach to Spectrally-Normalized Margin Bounds for Neural Networks

A PAC-Bayesian Approach to Spectrally-Normalized Margin Bounds for Neural Networks A PAC-Bayesian Approach to Spectrally-Normalize Margin Bouns for Neural Networks Behnam Neyshabur, Srinah Bhojanapalli, Davi McAllester, Nathan Srebro Toyota Technological Institute at Chicago {bneyshabur,

More information

On the number of isolated eigenvalues of a pair of particles in a quantum wire

On the number of isolated eigenvalues of a pair of particles in a quantum wire On the number of isolate eigenvalues of a pair of particles in a quantum wire arxiv:1812.11804v1 [math-ph] 31 Dec 2018 Joachim Kerner 1 Department of Mathematics an Computer Science FernUniversität in

More information

The planar Chain Rule and the Differential Equation for the planar Logarithms

The planar Chain Rule and the Differential Equation for the planar Logarithms arxiv:math/0502377v1 [math.ra] 17 Feb 2005 The planar Chain Rule an the Differential Equation for the planar Logarithms L. Gerritzen (29.09.2004) Abstract A planar monomial is by efinition an isomorphism

More information

Lecture notes on Witt vectors

Lecture notes on Witt vectors Lecture notes on Witt vectors Lars Hesselholt The purpose of these notes is to give a self-containe introuction to Witt vectors. We cover both the classical p-typical Witt vectors of Teichmüller an Witt

More information

The eccentric-distance sum of some graphs

The eccentric-distance sum of some graphs Electronic Journal of Graph Theory an Applications 5 (1) (017), 51 6 The eccentric-istance sum of some graphs Pamapriya P., Veena Matha Department of Stuies in Mathematics University of Mysore, Manasagangotri

More information

arxiv: v1 [math.co] 27 Nov 2018

arxiv: v1 [math.co] 27 Nov 2018 FURTHER RESULTS ON THE INDUCIBILITY OF -ARY TREES AUDACE A. V. DOSSOU-OLORY AND STEPHAN WAGNER arxiv:1811.11235v1 [math.co] 27 Nov 2018 Abstract. For a -ary tree every vertex has outegree between 2 an

More information

Attribute Reduction and Information Granularity *

Attribute Reduction and Information Granularity * ttribute Reuction an nformation Granularity * Li-hong Wang School of Computer Engineering an Science, Shanghai University, Shanghai, 200072, P.R.C School of Computer Science an Technology, Yantai University,

More information

Lecture 2 Lagrangian formulation of classical mechanics Mechanics

Lecture 2 Lagrangian formulation of classical mechanics Mechanics Lecture Lagrangian formulation of classical mechanics 70.00 Mechanics Principle of stationary action MATH-GA To specify a motion uniquely in classical mechanics, it suffices to give, at some time t 0,

More information

Tractability results for weighted Banach spaces of smooth functions

Tractability results for weighted Banach spaces of smooth functions Tractability results for weighte Banach spaces of smooth functions Markus Weimar Mathematisches Institut, Universität Jena Ernst-Abbe-Platz 2, 07740 Jena, Germany email: markus.weimar@uni-jena.e March

More information

FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS. 1. Introduction

FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS. 1. Introduction FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS ALINA BUCUR, CHANTAL DAVID, BROOKE FEIGON, MATILDE LALÍN 1 Introuction In this note, we stuy the fluctuations in the number

More information

An Improved Algorithm for Parameterized Edge Dominating Set Problem

An Improved Algorithm for Parameterized Edge Dominating Set Problem An Improved Algorithm for Parameterized Edge Dominating Set Problem Ken Iwaide and Hiroshi Nagamochi Department of Applied Mathematics and Physics, Graduate School of Informatics, Kyoto University, Japan,

More information

Regular tree languages definable in FO and in FO mod

Regular tree languages definable in FO and in FO mod Regular tree languages efinable in FO an in FO mo Michael Beneikt Luc Segoufin Abstract We consier regular languages of labele trees. We give an effective characterization of the regular languages over

More information

Large Triangles in the d-dimensional Unit-Cube (Extended Abstract)

Large Triangles in the d-dimensional Unit-Cube (Extended Abstract) Large Triangles in the -Dimensional Unit-Cube Extene Abstract) Hanno Lefmann Fakultät für Informatik, TU Chemnitz, D-0907 Chemnitz, Germany lefmann@informatik.tu-chemnitz.e Abstract. We consier a variant

More information

ON DOMINATING THE CARTESIAN PRODUCT OF A GRAPH AND K 2. Bert L. Hartnell

ON DOMINATING THE CARTESIAN PRODUCT OF A GRAPH AND K 2. Bert L. Hartnell Discussiones Mathematicae Graph Theory 24 (2004 ) 389 402 ON DOMINATING THE CARTESIAN PRODUCT OF A GRAPH AND K 2 Bert L. Hartnell Saint Mary s University Halifax, Nova Scotia, Canada B3H 3C3 e-mail: bert.hartnell@smu.ca

More information

GLOBAL MINUS DOMINATION IN GRAPHS. Communicated by Manouchehr Zaker. 1. Introduction

GLOBAL MINUS DOMINATION IN GRAPHS. Communicated by Manouchehr Zaker. 1. Introduction Transactions on Combinatorics ISSN (print): 2251-8657, ISSN (on-line): 2251-8665 Vol. 3 No. 2 (2014), pp. 35-44. c 2014 University of Isfahan www.combinatorics.ir www.ui.ac.ir GLOBAL MINUS DOMINATION IN

More information

Equilibrium in Queues Under Unknown Service Times and Service Value

Equilibrium in Queues Under Unknown Service Times and Service Value University of Pennsylvania ScholarlyCommons Finance Papers Wharton Faculty Research 1-2014 Equilibrium in Queues Uner Unknown Service Times an Service Value Laurens Debo Senthil K. Veeraraghavan University

More information

One-dimensional I test and direction vector I test with array references by induction variable

One-dimensional I test and direction vector I test with array references by induction variable Int. J. High Performance Computing an Networking, Vol. 3, No. 4, 2005 219 One-imensional I test an irection vector I test with array references by inuction variable Minyi Guo School of Computer Science

More information

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments 2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor

More information

DECOMPOSITION OF POLYNOMIALS AND APPROXIMATE ROOTS

DECOMPOSITION OF POLYNOMIALS AND APPROXIMATE ROOTS DECOMPOSITION OF POLYNOMIALS AND APPROXIMATE ROOTS ARNAUD BODIN Abstract. We state a kin of Eucliian ivision theorem: given a polynomial P (x) an a ivisor of the egree of P, there exist polynomials h(x),

More information

Robustness and Perturbations of Minimal Bases

Robustness and Perturbations of Minimal Bases Robustness an Perturbations of Minimal Bases Paul Van Dooren an Froilán M Dopico December 9, 2016 Abstract Polynomial minimal bases of rational vector subspaces are a classical concept that plays an important

More information

arxiv: v4 [math.pr] 27 Jul 2016

arxiv: v4 [math.pr] 27 Jul 2016 The Asymptotic Distribution of the Determinant of a Ranom Correlation Matrix arxiv:309768v4 mathpr] 7 Jul 06 AM Hanea a, & GF Nane b a Centre of xcellence for Biosecurity Risk Analysis, University of Melbourne,

More information

CMSC 858F: Algorithmic Game Theory Fall 2010 BGP and Interdomain Routing

CMSC 858F: Algorithmic Game Theory Fall 2010 BGP and Interdomain Routing CMSC 858F: Algorithmic Game Theory Fall 2010 BGP an Interomain Routing Instructor: Mohamma T. Hajiaghayi Scribe: Yuk Hei Chan November 3, 2010 1 Overview In this lecture, we cover BGP (Borer Gateway Protocol)

More information

Notes on Lie Groups, Lie algebras, and the Exponentiation Map Mitchell Faulk

Notes on Lie Groups, Lie algebras, and the Exponentiation Map Mitchell Faulk Notes on Lie Groups, Lie algebras, an the Exponentiation Map Mitchell Faulk 1. Preliminaries. In these notes, we concern ourselves with special objects calle matrix Lie groups an their corresponing Lie

More information

CHARACTERIZATION OF PSL(3,Q) BY NSE

CHARACTERIZATION OF PSL(3,Q) BY NSE CHARACTERIZATION OF PSL(,Q) BY NSE S. ASGARY an N. AHANJIDEH Communicate by Alexanru Buium Let G be a group an π e(g) be the set of element orers of G. Suppose that k π e(g) an m k is the number of elements

More information

Anti-Slide. Regular Paper. Kazuyuki Amano 1,a) Shin-ichi Nakano 1,b) Koichi Yamazaki 1,c) 1. Introduction

Anti-Slide. Regular Paper. Kazuyuki Amano 1,a) Shin-ichi Nakano 1,b) Koichi Yamazaki 1,c) 1. Introduction [DOI: 10.2197/ipsjjip.23.252] Regular Paper Anti-Slide Kazuyuki Amano 1,a) Shin-ichi Nakano 1,b) Koichi Yamazaki 1,c) Received: July 31, 2014, Accepted: January 7, 2015 Abstract: The anti-slide packing

More information

The Wiener Index of Trees with Prescribed Diameter

The Wiener Index of Trees with Prescribed Diameter 011 1 15 4 ± Dec., 011 Operations Research Transactions Vol.15 No.4 The Wiener Inex of Trees with Prescribe Diameter XING Baohua 1 CAI Gaixiang 1 Abstract The Wiener inex W(G) of a graph G is efine as

More information

7.1 Support Vector Machine

7.1 Support Vector Machine 67577 Intro. to Machine Learning Fall semester, 006/7 Lecture 7: Support Vector Machines an Kernel Functions II Lecturer: Amnon Shashua Scribe: Amnon Shashua 7. Support Vector Machine We return now to

More information

On the enumeration of partitions with summands in arithmetic progression

On the enumeration of partitions with summands in arithmetic progression AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 8 (003), Pages 149 159 On the enumeration of partitions with summans in arithmetic progression M. A. Nyblom C. Evans Department of Mathematics an Statistics

More information

On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography

On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography Christophe Doche Department of Computing Macquarie University, Australia christophe.oche@mq.eu.au. Abstract. The

More information

Linear Algebra- Review And Beyond. Lecture 3

Linear Algebra- Review And Beyond. Lecture 3 Linear Algebra- Review An Beyon Lecture 3 This lecture gives a wie range of materials relate to matrix. Matrix is the core of linear algebra, an it s useful in many other fiels. 1 Matrix Matrix is the

More information

McMaster University. Advanced Optimization Laboratory. Title: The Central Path Visits all the Vertices of the Klee-Minty Cube.

McMaster University. Advanced Optimization Laboratory. Title: The Central Path Visits all the Vertices of the Klee-Minty Cube. McMaster University Avance Optimization Laboratory Title: The Central Path Visits all the Vertices of the Klee-Minty Cube Authors: Antoine Deza, Eissa Nematollahi, Reza Peyghami an Tamás Terlaky AvOl-Report

More information

A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees

A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees Yoshimi Egawa Department of Mathematical Information Science, Tokyo University of

More information

THE EXPLICIT EXPRESSION OF THE DRAZIN INVERSE OF SUMS OF TWO MATRICES AND ITS APPLICATION

THE EXPLICIT EXPRESSION OF THE DRAZIN INVERSE OF SUMS OF TWO MATRICES AND ITS APPLICATION italian journal of pure an applie mathematics n 33 04 (45 6) 45 THE EXPLICIT EXPRESSION OF THE DRAZIN INVERSE OF SUMS OF TWO MATRICES AND ITS APPLICATION Xiaoji Liu Liang Xu College of Science Guangxi

More information

Summary: Differentiation

Summary: Differentiation Techniques of Differentiation. Inverse Trigonometric functions The basic formulas (available in MF5 are: Summary: Differentiation ( sin ( cos The basic formula can be generalize as follows: Note: ( sin

More information

The Subtree Size Profile of Plane-oriented Recursive Trees

The Subtree Size Profile of Plane-oriented Recursive Trees The Subtree Size Profile of Plane-oriente Recursive Trees Michael FUCHS Department of Applie Mathematics National Chiao Tung University Hsinchu, 3, Taiwan Email: mfuchs@math.nctu.eu.tw Abstract In this

More information

Homotopy colimits in model categories. Marc Stephan

Homotopy colimits in model categories. Marc Stephan Homotopy colimits in moel categories Marc Stephan July 13, 2009 1 Introuction In [1], Dwyer an Spalinski construct the so-calle homotopy pushout functor, motivate by the following observation. In the category

More information

LEGENDRE TYPE FORMULA FOR PRIMES GENERATED BY QUADRATIC POLYNOMIALS

LEGENDRE TYPE FORMULA FOR PRIMES GENERATED BY QUADRATIC POLYNOMIALS Ann. Sci. Math. Québec 33 (2009), no 2, 115 123 LEGENDRE TYPE FORMULA FOR PRIMES GENERATED BY QUADRATIC POLYNOMIALS TAKASHI AGOH Deicate to Paulo Ribenboim on the occasion of his 80th birthay. RÉSUMÉ.

More information

Witt#5: Around the integrality criterion 9.93 [version 1.1 (21 April 2013), not completed, not proofread]

Witt#5: Around the integrality criterion 9.93 [version 1.1 (21 April 2013), not completed, not proofread] Witt vectors. Part 1 Michiel Hazewinkel Sienotes by Darij Grinberg Witt#5: Aroun the integrality criterion 9.93 [version 1.1 21 April 2013, not complete, not proofrea In [1, section 9.93, Hazewinkel states

More information

Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets

Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Proceeings of the 4th East-European Conference on Avances in Databases an Information Systems ADBIS) 200 Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Eleftherios Tiakas, Apostolos.

More information

Secure Connected Domination in a Graph

Secure Connected Domination in a Graph International Journal of Mathematical Analysis Vol. 8, 2014, no. 42, 2065-2074 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijma.2014.47221 Secure Connected Domination in a Graph Amerkhan G.

More information

u!i = a T u = 0. Then S satisfies

u!i = a T u = 0. Then S satisfies Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace

More information

PDE Notes, Lecture #11

PDE Notes, Lecture #11 PDE Notes, Lecture # from Professor Jalal Shatah s Lectures Febuary 9th, 2009 Sobolev Spaces Recall that for u L loc we can efine the weak erivative Du by Du, φ := udφ φ C0 If v L loc such that Du, φ =

More information

Chapter 2 Derivatives

Chapter 2 Derivatives Chapter Derivatives Section. An Intuitive Introuction to Derivatives Consier a function: Slope function: Derivative, f ' For each, the slope of f is the height of f ' Where f has a horizontal tangent line,

More information

arxiv: v2 [math.pr] 27 Nov 2018

arxiv: v2 [math.pr] 27 Nov 2018 Range an spee of rotor wals on trees arxiv:15.57v [math.pr] 7 Nov 1 Wilfrie Huss an Ecaterina Sava-Huss November, 1 Abstract We prove a law of large numbers for the range of rotor wals with ranom initial

More information

Applied Mathematics Letters

Applied Mathematics Letters Applied Mathematics Letters 23 (2010) 1295 1300 Contents lists available at ScienceDirect Applied Mathematics Letters journal homepage: www.elsevier.com/locate/aml The Roman domatic number of a graph S.M.

More information

A Path Planning Method Using Cubic Spiral with Curvature Constraint

A Path Planning Method Using Cubic Spiral with Curvature Constraint A Path Planning Metho Using Cubic Spiral with Curvature Constraint Tzu-Chen Liang an Jing-Sin Liu Institute of Information Science 0, Acaemia Sinica, Nankang, Taipei 5, Taiwan, R.O.C., Email: hartree@iis.sinica.eu.tw

More information

ACTIONS IN MODIFIED CATEGORIES OF INTEREST WITH APPLICATION TO CROSSED MODULES Dedicated to Teimuraz Pirashvili on his 60th birthday

ACTIONS IN MODIFIED CATEGORIES OF INTEREST WITH APPLICATION TO CROSSED MODULES Dedicated to Teimuraz Pirashvili on his 60th birthday Theory an Applications of Categories, Vol. 30, No. 25, 2015, pp. 882 908. ACTIONS IN MODIFIED CATEGORIES OF INTEREST WITH APPLICATION TO CROSSED MODULES Deicate to Teimuraz Pirashvili on his 60th birthay

More information

Technion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels.

Technion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels. Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Constraine Coes for Two-Dimensional Channels Keren Censor Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Technion

More information

Analogies and discrepancies between the vertex cover number and the weakly connected domination number of a graph

Analogies and discrepancies between the vertex cover number and the weakly connected domination number of a graph Analogies and discrepancies between the vertex cover number and the weakly connected domination number of a graph M. Lemańska a, J. A. Rodríguez-Velázquez b, Rolando Trujillo-Rasua c, a Department of Technical

More information

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS MARK SCHACHNER Abstract. When consiere as an algebraic space, the set of arithmetic functions equippe with the operations of pointwise aition an

More information