The Fourier Entropy Influence Conjecture for certain classes of Boolean functions

Size: px
Start display at page:

Download "The Fourier Entropy Influence Conjecture for certain classes of Boolean functions"

Transcription

1 The Fourier Entropy Influene Conjeture for ertain lasses of Boolean funtions Ryan O Donnell, John Wright, and Yuan Zhou Department of Computer Siene, Carnegie Mellon University Abstrat. In 996, Friedgut and Kalai made the Fourier Entropy Influene Conjeture: For every Boolean funtion f : {, } n {, } it holds that H[ f ] C I[f], where H[ f ] is the spetral entropy of f, I[f] is the total influene of f, and C is a universal onstant. In this work we verify the onjeture for symmetri funtions. More generally, we verify it for funtions with symmetry group S n S nd where d is onstant. We also verify the onjeture for funtions omputable by read-one deision trees. {odonnell,jswright,yuanzhou}@s.mu.edu. This researh performed while the first author was a member of the Shool of Mathematis, Institute for Advaned Study. Supported by NSF grants CCF and CCF , BSF grant 00877, and Sloan and Okawa fellowships.

2 Introdution The field of Fourier analysis of Boolean funtions f : {, } n {, } plays an important role in many areas of mathematis and omputer siene, inluding omplexity theory, learning theory, random graphs, soial hoie, inapproximability, arithmeti ombinatoris, oding theory, metri spaes, et. For a survey, see e.g. [7]. One of the most longstanding and important open problems in the field is the Fourier Entropy Influene (FEI Conjeture made by Friedgut and Kalai in 996 [6]: Fourier Entropy Influene (FEI Conjeture. C f, H[ f ] C I[f]. That is, f(s log f(s C f(s S. S [n] The quantity H[ f ] = f(s log f(s S [n] on the left is the spetral entropy or Fourier entropy of f. It ranges between 0 and n and measures how spread out f s Fourier spetrum is. The quantity I[f] = f(s S appearing on the right is the total influene or average sensitivity of f. It also ranges between 0 and n and measures how high up f s Fourier spetrum is. (For definitions of the terms used in this introdution, see Setion. The FEI Conjeture is superfiially similar to the well-known Logarithmi Sobolev Inequality [9] for the Boolean ube whih states that Ent[f ] I[f] holds for any f : {, } n R, where Ent[g] = E[g ln g] E[g] ln E[g]. However note that the FEI Conjeture requires f : {, } n {, } to be Boolean-valued, and it definitely fails for real-valued f.. Appliations of the onjeture Friedgut and Kalai s original motivation for the FEI Conjeture ame from the theory of random graphs. Suppose f represents a monotone graph property with Pr[f(G = ] = / when G G(v, / (here n = ( v. If we also onsider Pr[f(G = ] for G G(v, p, then the total influene I[f] equals the reiproal of the derivative of this quantity at p = /. Hene the property has sharp threshold if and only if I[f] is large. Friedgut and Kalai sought general onditions on f whih would fore I[f] to be large. They onjetured that having signifiant symmetry and hene, a spread-out Fourier spetrum was suh a property. The FEI Conjeture also easily implies the famed KKL Theorem []. To see this, first note that H[ f ] H [ f ] = min S {log f(s }, the min-entropy of f. Thus the FEI Conjeture is stritly stronger than the following: Fourier Min-Entropy Influene Conjeture C f f(s C I[f]. H [ f ] C I[f]. That is, S [n] suh that In partiular, for balaned f (i.e., E[f] = 0 = f( the above onjeture implies there is a nonempty S with f(s C I[f]. Sine Inf j [f] f(s for eah j S we onlude max{inf i [f]} C n max{inf i[f]} whene max{inf i [f]} Ω( C log n n, whih is KKL s onlusion. Indeed, by applying the above dedution just to the nonempty Fourier oeffiients it is straightforward to dedue I[f] C Var[f] log max i {Inf i [f]}, a strengthening of the KKL Theorem due to Talagrand [0]. We also remark that sine Inf i [f] = f({i} for monotone f, the KKL Theorem implies the Fourier Min-Entropy Influene Conjeture holds for monotone funtions. Finally, as emphasized by Klivans and oauthors [8, ], the FEI Conjeture is also important beause it implies a version of Mansour s Conjeture from 99.

3 Mansour s Conjeture [5]. ɛ > 0 K suh that if f : {, } n {, } is omputable by a DNF formula with m terms then by taking S to be the m K sets S for whih f(s is largest, S S f(s ɛ. In fat, Mansour onjetured more strongly that one may take K = O(log ɛ. It is well known [3] that if f is omputed by an m-term DNF then I[f] O(log m. Thus the Fourier Entropy Influene Conjeture would imply H[ f ] C O(log m, from whih it easily follows that one may take K = O(C/ɛ in Mansour s Conjeture. Mansour s Conjeture is important beause if it is true then the query algorithm of Gopalan, Kalai, and Klivans [7] would agnostially learn DNF formulas under the uniform distribution to any onstant auray in polynomial time. Establishing suh a result is a major open problem in omputational learning theory [8]. Further, suffiiently strong versions of Mansour s Conjeture would yield improved pseudorandom generators for DNF formulas; see, e.g., [, ] for more on this important open problem in pseudorandomness.. Prior work As far as we are aware, the result in [] showing that the FEI Conjeture holds for random DNFs is the only published progress on the FEI Conjeture sine it was posed. In this subsetion we ollet some observations related to the onjeture, all of whih were presumably known to Friedgut and Kalai and should be onsidered folklore. See also [] for additional reent disussion of the onjeture. The FEI Conjeture holds for the usual examples that arise in analysis of Boolean funtions Parities (for whih the onjeture is trivial, ANDs and ORs, Majority, Tribes [], and Inner- Produt-mod-. This may be established by diret alulation based on the known Fourier oeffiient formulas for these funtions (see [] for Majority and [6] for Tribes. By onsidering the AND and OR funtions it is easy to show that the onstant C must be at least. We an show that C = is neessary and suffiient for the Tribes funtions as well; smaller onstants suffie for Inner-Produt-mod- and Majority. The authors are also aware of an expliit family of funtions whih show the neessity of C 60/3.65. For a gross upper bound, it is not too hard to show that H[ f ] ( + log n I[f] + ; indeed, this will be shown in the ourse of the present paper. The FEI Conjeture tensorizes in the following sense: For f : {, } n {, } and M Z +, define f M {, } Mn {, } by f(x (,..., x (M = f(x ( f(x ( f(x (M. Then it s easy to hek that H[ f M ] = M H[ f ] and I[f] = M I[f]. This is of ourse onsistent with the FEI Conjeture; it also implies that the following weaker-looking onjeture is atually equivalent to FEI: for all f : {, } n {, }, H[ f ] C I[f] + o(n. To see the equivalene, given f : {, } n {, }, apply the above to f M, divide by M, and take the limit as M..3 Our results and approah In this work, we prove the FEI Conjeture for some lasses of Boolean funtions. Theorem. The FEI Conjeture holds for symmetri funtions, with C =.0. Although the lass of symmetri funtions is fairly small, there was sentiment that it might be a diffiult ase for FEI: for symmetri funtions, f(s = f(s whenever S = S and hene their Fourier spetrum is maximally spread out on eah level.

4 Our proof of Theorem uses the same high-level idea as in the well-known KKL Theorem []: namely, prove a ertain inequality for the disrete derivatives D i f of f, and then sum over i. In our ase, the key inequality we need for the derivatives is that they are very noise-sensitive: Theorem. Let g be a disrete derivative of a symmetri funtion f : {, } n+ {, }. Then / for all real n it holds that Stab [g] π n E[g ]. (For the notation used here, see Setion. Having established Theorem, it is not too hard to generalize it as follows: Theorem. The FEI Conjeture holds for d-part-symmetri funtions, with C =.0 + log d. A d-part-symmetri funtion is essentially a funtion with symmetry group of the form S n S nd. This theorem also generalizes the folklore fat that FEI holds (up to an additive onstant with C = O(log n, sine every funtion is n-part-symmetri. Finally, with an unrelated, diret indutive argument we show the following: Theorem 3. The FEI Conjeture holds for funtions omputable by read-one deision trees, with C =.88. Remark: In independent and onurrent work, the FEI Conjeture was verified for monotone symmetri funtions (a speial ase of Theorem and deision lists (a speial ase of Theorem 3 using different methods of proof []. Definitions and notation We use the notation N = {0,,,... }, Z + = N \ {0}, and [n] = {,,, n}. Throughout we write log for log ; for the natural logarithm we write ln. The expressions 0 log 0 and 0 log 0 are to be interpreted as 0.. Basis of Boolean Fourier analysis This paper is onerned with Boolean funtions f : {, } n R, espeially Boolean-valued funtions f : {, } n {, }. Every Boolean funtion f has a unique multilinear polynomial representation over R, f(x = f(s x i. i S S [n] This is known as the Fourier expansion of f, and the real numbers f(s are the Fourier oeffiients of f. We have the formula f(s = E[f(x i S x i]. (Here and throughout, expetation E[ ] is with respet to the uniform distribution of x on {, } n, unless otherwise speified. In partiular, f( = E[f]. An important basi fat about Fourier oeffiients is Parseval s identity: f(s S [n] = E[f(x ]. A onsequene of Parseval is that f(s S [n] = for Boolean-valued f. Thus the numbers f(s an be thought of as a probability distribution on the subsets of [n]. Given f : {, } n R and i [n], we define the disrete derivative D i f : {, } n R by D i f(x = f(x(i= f(x (i=, where x (i=b denotes (x,..., x i, b, x i+,..., x n. It holds that { 0 if i S, D i f(s = f(s {i} if i S;

5 i.e,. D i ats on the Fourier expansion as formal differentiation. The influene of i on f is Inf i [f] = E[(D i f ] = S i f(s. In the partiular ase that f is Boolean-valued, the derivative D i f is {, 0, }-valued and we have the ombinatorial interpretation Inf i [f] = Pr[f(x (i= f(x (i= ]. The total influene of f : {, } n R is I[f] = Inf i [f] = f(s S. i= For 0 ρ, we say that x, y {, } n are a pair of ρ-orrelated random strings if x is distributed uniformly randomly on {, } n and y is formed by setting y i = x i with probability + ρ, y i = x i with probability ρ, independently for eah i [n]. We may now define the noise stability of f at ρ and give its Fourier formula: Stab ρ [f] = S [n] E [f(xf(y] = x,y ρ-orrelated S [n] f(s ρ S. We often stratify the Fourier oeffiients into levels; the level of S is simply S. We define the weight of f at level k to be W k [f] = S =k f(s. Thus I[f] = W k [f] k, Stab ρ [f] = W k [f]ρ k. Finally, given a random variable or probability distribution we write H[ ] for its (binary Shannon entropy. Hene for f : {, } n {, }, H[ f ] = f(s S [n] log, alled the Fourier f(s entropy, or spetral entropy, of f. Thus the Fourier Entropy Influene Conjeture may be stated as follows: there is a universal onstant C suh that H[ f ] C I[f] holds for all Boolean-valued funtions f.. Some Boolean funtion lasses We will all a funtion f : {, } n R symmetri if it is invariant under any permutation of the oordinates [n]. Equivalently, f is symmetri if the value of f(x depends only the Hamming weight of x, defined to be #{i [n] : x i = }. In this ase we may identify f with the funtion f : {0,,..., n} R whose value at s equals f(x for any x of Hamming weight s. We generalize the notion to that of d-part-symmetri funtions, d Z +. We say the funtion f : {, } n R is d-part-symmetri if there is a partition [n] = V V V d suh that f is invariant under any permutation of the oordinates in any part V i. Equivalently, f is d-partsymmetri if its symmetry group is isomorphi to S n S nd for numbers n + + n d = n. Note that a symmetri funtion is -part-symmetri, and every funtion f : {, } n R is n- part-symmetri. We also generalize the notion of Fourier levels for d-part-symmetri funtions. Suppose f is d-part-symmetri with respet to the partition [n] = V V d, where V i = n i. Then f(s depends only on the numbers S V,..., S V d. We onsider all possible suh sequenes k {0,,..., n } {0,,..., n } {0,,..., n d },

6 and say that S [n] is at multi-level k if S V i = k i for eah i [d]. We also use the notation k = k + k + + k d, W k [f] = S at multi-level k f(s, so I[f] = k Wk [f] k. Finally, we reall the definition of deision trees. We may define the notion as follows. We say that f : {, } n {, } is omputable as a depth-0 deision tree if it is onstantly or. We indutively say that it is omputable as a depth-d deision tree if there is a oordinate i [n] suh that { f 0 (x if x i =, f(x = f (x if x i =, where f 0 and f are omputable by depth-(d deision trees. We further say that the deisiontree omputation is read-one if f 0 and f depend on disjoint sets of oordinates and are themselves indutively read-one. 3 Symmetri and d-part-symmetri funtions In this setion we prove Theorems and, establishing the FEI Conjeture for symmetri and O(-part-symmetri funtions. Although Theorem stritly generalizes Theorem, we prefer to prove Theorem separately and then generalize it afterward. When f : {, } n {, } is symmetri we have f(s = W k [f]/ ( n k whenever S = k. Hene H[ f ] = W k [f] log (n k W k [f] = ( n W k [f] log k Thus Theorem is an immediate onsequene of the following two theorems: + W k [f] log W k [f]. ( Theorem. Let f : {, } n {, } be a symmetri funtion. Then n Wk [f] log ( n k C I[f], where C = ln ( + e π 9.0. Theorem 5. Let f : {, } n {, } be any funtion, not neessarily symmetri. Then n Wk [f] log W k [f] 3 I[f]. We prove these theorems in the subsequent subsetions of the paper, following whih we give the extension to d-part-symmetri funtions. 3. Theorem : Derivatives of symmetri funtions are noise-sensitive We begin with an easy lemma. Lemma. Let p,..., p m be a nonnegative unimodal sequene; i.e., there exists k [m] suh that p,..., p k is a nondereasing sequene and p k,..., p m is a noninreasing sequene. Let g : [m] {, 0, } have the property that the sets g ( and g ( are interleaving. Then m i= p ig(i max{p i }.

7 Proof. It is without loss of generality to assume that g is never 0; for otherwise, we an restrit attention to the indies i i i l where g has value ±, noting that p i,..., p il is still a unimodal sequene. Now if m the result is trivial. Otherwise, hoose k [m ] suh that at least one of p k, p k+ equals max{p i }. By negating g if neessary we may assume that g(k =, g(k + =. We omplete the proof by showing p k+ m i= p ig(i p k. For the upper bound, unimodality implies p k+ p k+ p k+3 ; hene m i=k+ p ig(i = ( p k+ + p k+ + ( p k+3 + p k+ + 0 (regardless of whether this ends on p m or +p m. Similarly, we must have k i=0 p ig(i 0. Combining these, we obtain that m i= p ig(i p k as laimed. The proof of the lower bound m i= p ig(i p k+ is similar. We now show the key theorem stated in Setion.3 on the noise sensitivity of symmetri derivatives. Theorem 6. Let g be a disrete derivative of a symmetri funtion f : {, } n+ {, }. / Then for all real n it holds that Stab [g] π n E[g ]. Proof. Let (x, y be a ( n -orrelated pair of random strings in {, }n. We will show that E[g(y x] / π, independent of x. ( Sine g is {, 0, }-valued, it will follow from ( that Stab [g] = E[g(xg(y] / π E[ g(x ] = / π E[g ], n as required. To show ( we first observe that given x of Hamming weight s, the Hamming weight t of y is distributed as the sum of two independent binomial random variables, t Bin(s, n and t Bin(n s, n. Being the sum of independent Bernoulli random variables, it is well known [3] that t has a unimodal probability distribution. Sine g is a derivative of a symmetri Booleanvalued funtion, it is itself symmetri; hene we may identify it with a funtion g : {0,,..., n} {, 0, }. Further, beause f is {, }-valued, g must have the property that g ( and g ( are interleaving subsets of {0,,..., n}. Thus ( follows from Lemma assuming that max i {Pr[t = i]} / π. To show this, we may assume without loss of generality that s n/. Then max i {Pr[t = i]} max{pr[t = i]} i πs( n n π n n = / π where the seond inequality is the basi estimate max i {Pr[Bin(m, p] = i} whih πmp( p uses Stirling s formula (see [5, Ch. VII.3]. We an now give the proof of Theorem. Proof. (Theorem. Using ( n k ( en k k for all k n we have ( ( n W k [f] log W k [f]k log(e + W k [f]k log n k k = I[f] + ln k= and hene it suffies to show k= k= W k [f]k ln n k k= W k [f]k ln n k e π I[f]. (3

8 Let g be any derivative of f; say g = D n f. By symmetry of f, the right side of (3 is e π n E[g ]. As for the left side, for k [n] we have W k [g] = S [n ] S =k ĝ(s = S [n] S =k,s n f(s = k n Wk [f]. Hene the left side of (3 is n k= nwk [g] ln n k. Thus after dividing by n we see that (3 is equivalent to n W k n [g] ln k + e E[g ]. ( π Using the approximation ln m + γ + m m n n W k n [g] ln k + W k [g] j=k+ j = m j= j ln m + γ + m j= j j W k [g] exp( one may obtain j= j Stab [g], j where in the last step we used that exp( ( j k for all k j. We may now apply Theorem 6 with = n j to obtain W k [g] ln n k + exp( j= j π j n E[g ] e π E[g ], using n j= j n. Thus we have verified ( and ompleted the proof. 3. Theorem 5: Spetral level entropy versus influene In this setion we establish Theorem 5. We begin with a well-known fat about maximum entropy whih we prove for ompleteness: Proposition. Let K be a random variable supported on Z +. Then H[K] E[K]. Proof. For k Z + write p k = Pr[K = k], and let G be a Geometri( random variable. Then by the nonnegativity of binary relative entropy, 0 D(K G = p k log p k = H[P ] + (/ k k= p k log( k = E[K] H[K]. We will also need a simple orollary of the edge-isoperimetri inequality for {, } n. Proposition. Let f : {, } n {, } and write W 0 [f] = ɛ. Then I[f] ɛ log(/ɛ + ɛ. Proof. By negating f if neessary we may assume E[f] 0. We think of f as the indiator of a subset A {0, } n ; the density of this set is p = + E[f] = ɛ /. It follows from the edge-isoperimetri inequality [0, 9, ] that I[f], whih is n times the size of A s edge-boundary, is at least p log(/p. It is then elementary to hek that ( ɛ log( ɛ ɛ log(/ɛ+ɛ, as required. We an now establish Theorem 5. k=

9 Proof. (Theorem 5. Write W 0 [f] = ɛ. We may assume ɛ > 0 else the result is trivial. Then W k [f] log W k [f] W k [f] log + ɛ (as ( ɛ log W k [f] ɛ ln ɛ ɛ k 0 = ɛ k 0 ɛ k 0 W k [f] ɛ W k [f] ɛ ɛ log W k + ɛ log (/ɛ + ɛ [f] k + I[f] = 3 I[f], where the last inequality used Propositions and. 3.3 Theorem : extension to d-part-symmetri funtions We show now how to extend the proof of Theorem to obtain Theorem, the FEI Conjeture for d-part-symmetri funtions. Suppose then that f is d-part-symmetri with respet to the partition [n] = V V d, where V i = n i, and reall the multi-level index notation k from Setion.. Sine f(s = W k [f]/ d i= H[ f ] = ( ni k i whenever S is at multi-level k, we have d W k [f] log i= k ( ni k i + k W k [f] log W k [f], similarly to (. Sine I[f] = d W k [f] k = W k [f] k i k i= k we an prove Theorem by establishing the following two generalizations of Theorems and 5: Theorem 7. Let f : {, } V V d {, } be invariant under permutations of the oordinates in V i. Then k Wk [f] log ( n i k i C k Wk [f] k i, where C = ln ( + e π 9.0. Theorem 8. Let f : {, } V V d {, } be any funtion, not neessarily with any symmetries. Then k Wk [f] log (3 + log d I[f]. W k [f] We begin by proving Theorem 7. Proof. (Theorem 7. We assume i = d without loss of generality and write V d = V V d. For y {, } V d we define f y : {, } V d {, } by f y (z = f(y, z; the funtion f y is symmetri for eah y by assumption. Applying Theorem to eah f y and then taking expetations we obtain Now n d k =0 E y [ W k [f y ] ] = E y [ W k [f y ] ] log S V d S =k ( nd k C E y [ fy (S ] = S V d S =k n d k =0 E y [ W k [f y ] ] k. (5 T V d f(t S = k : k d =k W k [f] where the middle equality is an easy exerise using Parseval. Substituting this into (5 yields the desired inequality.

10 As for Theorem 8, its proof is essentially idential to that of Theorem 5, using the following generalization of Proposition 3: Proposition 3. Let K be a random variable supported on N d \ {0} and write L = K. Then H[K] ( + log d E[L]. Proof. Using the hain rule for entropy as well as Proposition, we have H[K] = H[L] + H[K L] E[L] + Pr[L = l] H[K L = l]. (6 Given L = l there are preisely ( l+d d possibilities for K; hene ( l + d H[K L = l] log = l log ( l+d d l log ( +d d = l log d. (7 d l The seond inequality here follows from the tehnial Lemma below. The proof is ompleted by substituting (7 into (6. Here we give the tehnial lemma used in the previous proof. Lemma. For eah N the funtion l log ( l+ is a dereasing funtion of l on Z+. Proof. We wish to show that for all l Z +, l ln ( l+ l+ ln ( l++ (l + ln ( l+ [ (l++ ( l+ l= ( l ln l++ / ( l+ ] l ( l+ ( l+ l+ ( l++ ( + l l+ l. This last inequality is easily shown by indution on l: if one multiplies both sides by ( + l+ one obtains ( l++ ( + l+ l+ whih exeeds ( + l+ l+ as required for the indution step. Proving the onjeture for read-one deision trees In this setion we prove Theorem 3, establishing the Fourier Entropy Influene Conjeture with onstant C.88 for funtions omputable by read-one deision trees. We begin with a tehnial lemma. Lemma 3. Let µ 0, µ [, ]. Define Then g(µ 0, µ = ( µ 0 +µ ( log ( µ 0 +µ + µ0 µ ( log µ µ 0 µ + 0 log µ µ 0 log. µ g(µ 0, µ C( µ 0µ (8 holds for some universal onstant C. The onstant C =.88 suffies. Proof. Note that g is unhanged when either of its arguments is negated. Sine the right side of (8 only dereases when µ 0 and µ have the same sign, we may assume both are nonnegative. By symmetry we may further assume 0 µ µ 0. Write µ = rµ 0 where r [0, ]. Simple manipulation shows that g(µ 0, µ = g(µ 0, rµ 0 = h(rµ 0,

11 where Thus it remains to show that h(r = r log r ( r log r + ( + r log( + r. h(rµ 0 C( rµ 0 ( rc h(rµ 0 C (9 holds for all µ 0, r [0, ] for some C. Assuming we take C, the right side of the seond inequality in (9 will be nonnegative; hene, it holds if and only it holds for µ 0 =. Putting µ 0 = into the first inequality in (9, we see that it suffies for C to be an upper bound on l(r = h(r r. Plainly, l is a ontinuous funtion on (0, with l(0+ = 0. It is also easy to hek that l( = 0. It follows that l is uniformly bounded on [0, ]; i.e., there is a universal C suh that l(r C for all r [0, ]. Numerially, one may hek that l(r.88. We may now prove Theorem 3 with C equal to the onstant from Lemma 3. Proof. (Theorem 3. The proof is by indution on the depth d of the deision tree. In the base ase, d = 0, the funtion f is onstant and so H[ f ] C I[f] holds trivially. For the general ase, assume without loss of generality that the root of the tree queries oordinate n. Let f 0 and f be the subfuntions omputed by the x n = and x n = subtrees, respetively. Sine the deision tree is read-one, the funtions f 0 and f depend on disjoint sets of the oordinates from [n ], say J 0 and J. In partiular, if we write µ i = E[f i ] = f i ( for i = 0,, then E[f 0 f ] = µ 0 µ. Also, f 0 and f are omputable by read-one deision trees of depth d ; hene we may later apply the indution hypothesis to them. Our task is now to prove H[ f ] C I[f] for f. For any Boolean funtion f whose subfuntions based on x n are f 0 and f, it holds that I[f] = Inf n [f] + I[f 0] + I[f ]. In our ase, Inf n [f] = Pr[f 0 f ] = E[f 0f ] = µ 0µ. Thus As for H[ f ], we have f(x = + x n I[f] = µ 0µ + I[f 0] + I[f ]. (0 f 0 (x + x n f (x = (f 0(x + f (x + x n(f 0 (x f (x. It follows that the Fourier oeffiients of f, whih are indexed by S J 0 J {n}, are given by (µ 0 + µ if S =, f(s = (µ 0 µ if S = {n}, f i (S if S J i, ( i f i (T if S = T {n}, T J i. Note that for eah S J i, we have the quantity f i (S ourring twie in the squared Fourier spetrum of f. We may therefore ompute H[ f ] = ( µ 0 +µ ( log ( µ 0 +µ + µ0 µ ( log µ 0 µ + i=0, =S J i f i (S log f i (S. (

12 We simplify the expression on the right in (: = i=0, =S J i f i (S log f i (S Substituting ( into ( yields i=0, = i=0, = µ i log µ i ( µ i log µ i i=0, µ i log µ i + S J i fi (S log f i (S + H[ f i ] + log + i=0, H[ f i ]. ( H[ f ] = g(µ 0, µ + H[ f 0 ] + H[ f ], (3 where g(µ 0, µ is the funtion from Lemma 3. Using this lemma along with the indution hypothesis on f 0 and f, we obtain from (3 that H[ f ] C( µ 0µ + C I[f 0] + C I[f ] = C I[f], where we used (0. The indution is omplete. Remark: The above proof tehnique an be extended to handle the more general lass of reursively read-one funtions (as defined in [8]. It seems that one an show C = 9 suffies for this lass; however, a formal proof would require proving a numerial lemma muh more diffiult than Lemma 3. Details will appear elsewhere. 5 Closing remarks As the general Fourier Entropy Influene Conjeture seems diffiult to resolve, one may try to prove it for additional interesting lasses of Boolean funtions. For example, Wan has suggested linear threshold funtions as a possibly tratable ase []. One may also try takling the Fourier Min- Entropy Influene Conjeture first (or the slightly stronger onsequene that S s.t. f(s C I[f]/ Var[f]. However this will already likely require stronger tools than the ones used in this paper. The reason is that as mentioned in Setion., this onjeture implies the KKL Theorem, and there is no known proof of KKL whih avoids the Hyperontrative or Logarithmi Sobolev Inequalities. Aknowledgments. The authors would like to thank Roo Servedio, Li-Yang Tan, and Andrew Wan for sharing their insights on the Entropy Influene Conjeture. Referenes. Mihael Ben-Or and Nathan Linial. Colletive oin flipping. In Silvio Miali, editor, Randomness and Computation. Aademi Press, New York, Arthur Bernstein. Maximally onneted arrays on the n-ube. SIAM Journal on Applied Mathematis, pages 85 89, Ravi Boppana. The average sensitivity of bounded-depth iruits. Information Proessing Letters, 63(5:57 6, Anindya De, Omid Etesami, Lua Trevisan, and Madhur Tulsiani. Improved pseudorandom generators for depth iruits. In Proeedings of the th Annual International Workshop on Randomized Tehniques in Computation, pages 50 57, 00.

13 5. William Feller. An introdution to probability theory and its appliations, volume. Wiley, 3rd edition, Ehud Friedgut and Gil Kalai. Every monotone graph property has a sharp threshold. Proeedings of the Amerian Mathematial Soiety, (0: , Parikshit Gopalan, Adam Kalai, and Adam Klivans. Agnostially learning deision trees. In Proeedings of the 0th Annual ACM Symposium on Theory of Computing, pages , Parikshit Gopalan, Adam Kalai, and Adam Klivans. A query algorithm for agnostially learning DNF? In Proeedings of the st Annual Conferene on Learning Theory, pages 55 56, Leonard Gross. Logarithmi Sobolev inequalities. Amerian Journal of Mathematis, 97(:06 083, Lawrene Harper. Optimal assignments of numbers to verties. Journal of the Soiety for Industrial and Applied Mathematis, (:3 35, 96.. Jeff Kahn, Gil Kalai, and Nathan Linial. The influene of variables on Boolean funtions. In Proeedings of the 9th Annual IEEE Symposium on Foundations of Computer Siene, pages 68 80, Gil Kalai. The entropy/influene onjeture. Posted on Terene Tao s What s new blog, Julian Keilson and Hans Gerber. Some results for disrete unimodality. Journal of the Amerian Statistial Assoiation, 66(33: , 97.. Adam Klivans, Homin Lee, and Andrew Wan. Mansours Conjeture is true for random DNF formulas. In Eletroni Colloquium on Computational Complexity TR0-03, Yishay Mansour. Learning boolean funtions via the Fourier Transform. In Vwani Royhowdhury, Kai-Yeung Siu, and Alon Orlitsky, editors, Theoretial Advanes in Neural Computation and Learning, hapter, pages 39. Kluwer Aademi Publishers, Yishay Mansour. An O(n log log n learning algorithm for DNF under the uniform distribution. Journal of Computer and System Sienes, 50(3:53 550, Ryan O Donnell. Some topis in analysis of boolean funtions. In Proeedings of the 0th Annual ACM Symposium on Theory of Computing, pages , Ryan O Donnell, Mihael Saks, Oded Shramm, and Roo Servedio. Every deision tree has an influential variable. In Proeedings of the 6th Annual IEEE Symposium on Foundations of Computer Siene, pages 3 39, Kenneth Steiglitz and Arthur Bernstein. Optimal binary oding of ordered numbers. Journal of the Soiety for Industrial and Applied Mathematis, 3(: 3, Mihel Talagrand. On Russo s approximate zero-one law. Annals of Probability, (3: , 99.. Robert Titsworth. Correlation properties of yli sequenes. PhD thesis, California Institute of Tehnology, 96.. Andrew Wan, 00. Talk at the Center for Computational Intratability.

Methods of evaluating tests

Methods of evaluating tests Methods of evaluating tests Let X,, 1 Xn be i.i.d. Bernoulli( p ). Then 5 j= 1 j ( 5, ) T = X Binomial p. We test 1 H : p vs. 1 1 H : p>. We saw that a LRT is 1 if t k* φ ( x ) =. otherwise (t is the observed

More information

Complexity of Regularization RBF Networks

Complexity of Regularization RBF Networks Complexity of Regularization RBF Networks Mark A Kon Department of Mathematis and Statistis Boston University Boston, MA 02215 mkon@buedu Leszek Plaskota Institute of Applied Mathematis University of Warsaw

More information

Chapter 8 Hypothesis Testing

Chapter 8 Hypothesis Testing Leture 5 for BST 63: Statistial Theory II Kui Zhang, Spring Chapter 8 Hypothesis Testing Setion 8 Introdution Definition 8 A hypothesis is a statement about a population parameter Definition 8 The two

More information

On Component Order Edge Reliability and the Existence of Uniformly Most Reliable Unicycles

On Component Order Edge Reliability and the Existence of Uniformly Most Reliable Unicycles Daniel Gross, Lakshmi Iswara, L. William Kazmierzak, Kristi Luttrell, John T. Saoman, Charles Suffel On Component Order Edge Reliability and the Existene of Uniformly Most Reliable Uniyles DANIEL GROSS

More information

A Characterization of Wavelet Convergence in Sobolev Spaces

A Characterization of Wavelet Convergence in Sobolev Spaces A Charaterization of Wavelet Convergene in Sobolev Spaes Mark A. Kon 1 oston University Louise Arakelian Raphael Howard University Dediated to Prof. Robert Carroll on the oasion of his 70th birthday. Abstrat

More information

Packing Plane Spanning Trees into a Point Set

Packing Plane Spanning Trees into a Point Set Paking Plane Spanning Trees into a Point Set Ahmad Biniaz Alfredo Garía Abstrat Let P be a set of n points in the plane in general position. We show that at least n/3 plane spanning trees an be paked into

More information

Upper Bounds on Fourier Entropy

Upper Bounds on Fourier Entropy Upper Bounds on Fourier Entropy Sourav Chakraborty 1, Raghav Kulkarni 2, Satyanarayana V. Lokam 3, and Nitin Saurabh 4 1 Chennai Mathematical Institute, Chennai, India sourav@cmi.ac.in 2 Centre for Quantum

More information

Hankel Optimal Model Order Reduction 1

Hankel Optimal Model Order Reduction 1 Massahusetts Institute of Tehnology Department of Eletrial Engineering and Computer Siene 6.245: MULTIVARIABLE CONTROL SYSTEMS by A. Megretski Hankel Optimal Model Order Redution 1 This leture overs both

More information

Modal Horn Logics Have Interpolation

Modal Horn Logics Have Interpolation Modal Horn Logis Have Interpolation Marus Kraht Department of Linguistis, UCLA PO Box 951543 405 Hilgard Avenue Los Angeles, CA 90095-1543 USA kraht@humnet.ula.de Abstrat We shall show that the polymodal

More information

Maximum Entropy and Exponential Families

Maximum Entropy and Exponential Families Maximum Entropy and Exponential Families April 9, 209 Abstrat The goal of this note is to derive the exponential form of probability distribution from more basi onsiderations, in partiular Entropy. It

More information

Discrete Bessel functions and partial difference equations

Discrete Bessel functions and partial difference equations Disrete Bessel funtions and partial differene equations Antonín Slavík Charles University, Faulty of Mathematis and Physis, Sokolovská 83, 186 75 Praha 8, Czeh Republi E-mail: slavik@karlin.mff.uni.z Abstrat

More information

Nonreversibility of Multiple Unicast Networks

Nonreversibility of Multiple Unicast Networks Nonreversibility of Multiple Uniast Networks Randall Dougherty and Kenneth Zeger September 27, 2005 Abstrat We prove that for any finite direted ayli network, there exists a orresponding multiple uniast

More information

Control Theory association of mathematics and engineering

Control Theory association of mathematics and engineering Control Theory assoiation of mathematis and engineering Wojieh Mitkowski Krzysztof Oprzedkiewiz Department of Automatis AGH Univ. of Siene & Tehnology, Craow, Poland, Abstrat In this paper a methodology

More information

Computer Science 786S - Statistical Methods in Natural Language Processing and Data Analysis Page 1

Computer Science 786S - Statistical Methods in Natural Language Processing and Data Analysis Page 1 Computer Siene 786S - Statistial Methods in Natural Language Proessing and Data Analysis Page 1 Hypothesis Testing A statistial hypothesis is a statement about the nature of the distribution of a random

More information

max min z i i=1 x j k s.t. j=1 x j j:i T j

max min z i i=1 x j k s.t. j=1 x j j:i T j AM 221: Advaned Optimization Spring 2016 Prof. Yaron Singer Leture 22 April 18th 1 Overview In this leture, we will study the pipage rounding tehnique whih is a deterministi rounding proedure that an be

More information

Journal of Inequalities in Pure and Applied Mathematics

Journal of Inequalities in Pure and Applied Mathematics Journal of Inequalities in Pure and Applied Mathematis A NEW ARRANGEMENT INEQUALITY MOHAMMAD JAVAHERI University of Oregon Department of Mathematis Fenton Hall, Eugene, OR 97403. EMail: javaheri@uoregon.edu

More information

Ordered fields and the ultrafilter theorem

Ordered fields and the ultrafilter theorem F U N D A M E N T A MATHEMATICAE 59 (999) Ordered fields and the ultrafilter theorem by R. B e r r (Dortmund), F. D e l o n (Paris) and J. S h m i d (Dortmund) Abstrat. We prove that on the basis of ZF

More information

ON THE LEAST PRIMITIVE ROOT EXPRESSIBLE AS A SUM OF TWO SQUARES

ON THE LEAST PRIMITIVE ROOT EXPRESSIBLE AS A SUM OF TWO SQUARES #A55 INTEGERS 3 (203) ON THE LEAST PRIMITIVE ROOT EPRESSIBLE AS A SUM OF TWO SQUARES Christopher Ambrose Mathematishes Institut, Georg-August Universität Göttingen, Göttingen, Deutshland ambrose@uni-math.gwdg.de

More information

CMSC 451: Lecture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017

CMSC 451: Lecture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017 CMSC 451: Leture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017 Reading: Chapt 11 of KT and Set 54 of DPV Set Cover: An important lass of optimization problems involves overing a ertain domain,

More information

The Hanging Chain. John McCuan. January 19, 2006

The Hanging Chain. John McCuan. January 19, 2006 The Hanging Chain John MCuan January 19, 2006 1 Introdution We onsider a hain of length L attahed to two points (a, u a and (b, u b in the plane. It is assumed that the hain hangs in the plane under a

More information

Sensitivity Analysis in Markov Networks

Sensitivity Analysis in Markov Networks Sensitivity Analysis in Markov Networks Hei Chan and Adnan Darwihe Computer Siene Department University of California, Los Angeles Los Angeles, CA 90095 {hei,darwihe}@s.ula.edu Abstrat This paper explores

More information

A Functional Representation of Fuzzy Preferences

A Functional Representation of Fuzzy Preferences Theoretial Eonomis Letters, 017, 7, 13- http://wwwsirporg/journal/tel ISSN Online: 16-086 ISSN Print: 16-078 A Funtional Representation of Fuzzy Preferenes Susheng Wang Department of Eonomis, Hong Kong

More information

Estimating the probability law of the codelength as a function of the approximation error in image compression

Estimating the probability law of the codelength as a function of the approximation error in image compression Estimating the probability law of the odelength as a funtion of the approximation error in image ompression François Malgouyres Marh 7, 2007 Abstrat After some reolletions on ompression of images using

More information

A Noisy-Influence Regularity Lemma for Boolean Functions Chris Jones

A Noisy-Influence Regularity Lemma for Boolean Functions Chris Jones A Noisy-Influence Regularity Lemma for Boolean Functions Chris Jones Abstract We present a regularity lemma for Boolean functions f : {, } n {, } based on noisy influence, a measure of how locally correlated

More information

EDGE-DISJOINT CLIQUES IN GRAPHS WITH HIGH MINIMUM DEGREE

EDGE-DISJOINT CLIQUES IN GRAPHS WITH HIGH MINIMUM DEGREE EDGE-DISJOINT CLIQUES IN GRAPHS WITH HIGH MINIMUM DEGREE RAPHAEL YUSTER Abstrat For a graph G and a fixed integer k 3, let ν k G) denote the maximum number of pairwise edge-disjoint opies of K k in G For

More information

LECTURE NOTES FOR , FALL 2004

LECTURE NOTES FOR , FALL 2004 LECTURE NOTES FOR 18.155, FALL 2004 83 12. Cone support and wavefront set In disussing the singular support of a tempered distibution above, notie that singsupp(u) = only implies that u C (R n ), not as

More information

A Queueing Model for Call Blending in Call Centers

A Queueing Model for Call Blending in Call Centers A Queueing Model for Call Blending in Call Centers Sandjai Bhulai and Ger Koole Vrije Universiteit Amsterdam Faulty of Sienes De Boelelaan 1081a 1081 HV Amsterdam The Netherlands E-mail: {sbhulai, koole}@s.vu.nl

More information

Frequency hopping does not increase anti-jamming resilience of wireless channels

Frequency hopping does not increase anti-jamming resilience of wireless channels Frequeny hopping does not inrease anti-jamming resiliene of wireless hannels Moritz Wiese and Panos Papadimitratos Networed Systems Seurity Group KTH Royal Institute of Tehnology, Stoholm, Sweden {moritzw,

More information

Lyapunov Exponents of Second Order Linear Systems

Lyapunov Exponents of Second Order Linear Systems Reent Researhes in Computational Intelligene and Information Seurity Lyapunov Exponents of Seond Order Linear Systems ADAM CZORNIK and ALEKSANDER NAWRAT Department of Automati Control Silesian Tehnial

More information

Array Design for Superresolution Direction-Finding Algorithms

Array Design for Superresolution Direction-Finding Algorithms Array Design for Superresolution Diretion-Finding Algorithms Naushad Hussein Dowlut BEng, ACGI, AMIEE Athanassios Manikas PhD, DIC, AMIEE, MIEEE Department of Eletrial Eletroni Engineering Imperial College

More information

arxiv:cond-mat/ v1 [cond-mat.stat-mech] 16 Aug 2004

arxiv:cond-mat/ v1 [cond-mat.stat-mech] 16 Aug 2004 Computational omplexity and fundamental limitations to fermioni quantum Monte Carlo simulations arxiv:ond-mat/0408370v1 [ond-mat.stat-meh] 16 Aug 2004 Matthias Troyer, 1 Uwe-Jens Wiese 2 1 Theoretishe

More information

V. Interacting Particles

V. Interacting Particles V. Interating Partiles V.A The Cumulant Expansion The examples studied in the previous setion involve non-interating partiles. It is preisely the lak of interations that renders these problems exatly solvable.

More information

HILLE-KNESER TYPE CRITERIA FOR SECOND-ORDER DYNAMIC EQUATIONS ON TIME SCALES

HILLE-KNESER TYPE CRITERIA FOR SECOND-ORDER DYNAMIC EQUATIONS ON TIME SCALES HILLE-KNESER TYPE CRITERIA FOR SECOND-ORDER DYNAMIC EQUATIONS ON TIME SCALES L ERBE, A PETERSON AND S H SAKER Abstrat In this paper, we onsider the pair of seond-order dynami equations rt)x ) ) + pt)x

More information

Sufficient Conditions for a Flexible Manufacturing System to be Deadlocked

Sufficient Conditions for a Flexible Manufacturing System to be Deadlocked Paper 0, INT 0 Suffiient Conditions for a Flexile Manufaturing System to e Deadloked Paul E Deering, PhD Department of Engineering Tehnology and Management Ohio University deering@ohioedu Astrat In reent

More information

ON A PROCESS DERIVED FROM A FILTERED POISSON PROCESS

ON A PROCESS DERIVED FROM A FILTERED POISSON PROCESS ON A PROCESS DERIVED FROM A FILTERED POISSON PROCESS MARIO LEFEBVRE and JEAN-LUC GUILBAULT A ontinuous-time and ontinuous-state stohasti proess, denoted by {Xt), t }, is defined from a proess known as

More information

Physics 523, General Relativity Homework 4 Due Wednesday, 25 th October 2006

Physics 523, General Relativity Homework 4 Due Wednesday, 25 th October 2006 Physis 523, General Relativity Homework 4 Due Wednesday, 25 th Otober 2006 Jaob Lewis Bourjaily Problem Reall that the worldline of a ontinuously aelerated observer in flat spae relative to some inertial

More information

Tight bounds for selfish and greedy load balancing

Tight bounds for selfish and greedy load balancing Tight bounds for selfish and greedy load balaning Ioannis Caragiannis Mihele Flammini Christos Kaklamanis Panagiotis Kanellopoulos Lua Mosardelli Deember, 009 Abstrat We study the load balaning problem

More information

The Effectiveness of the Linear Hull Effect

The Effectiveness of the Linear Hull Effect The Effetiveness of the Linear Hull Effet S. Murphy Tehnial Report RHUL MA 009 9 6 Otober 009 Department of Mathematis Royal Holloway, University of London Egham, Surrey TW0 0EX, England http://www.rhul.a.uk/mathematis/tehreports

More information

Word of Mass: The Relationship between Mass Media and Word-of-Mouth

Word of Mass: The Relationship between Mass Media and Word-of-Mouth Word of Mass: The Relationship between Mass Media and Word-of-Mouth Roman Chuhay Preliminary version Marh 6, 015 Abstrat This paper studies the optimal priing and advertising strategies of a firm in the

More information

Moments and Wavelets in Signal Estimation

Moments and Wavelets in Signal Estimation Moments and Wavelets in Signal Estimation Edward J. Wegman 1 Center for Computational Statistis George Mason University Hung T. Le 2 International usiness Mahines Abstrat: The problem of generalized nonparametri

More information

Counting Idempotent Relations

Counting Idempotent Relations Counting Idempotent Relations Beriht-Nr. 2008-15 Florian Kammüller ISSN 1436-9915 2 Abstrat This artile introdues and motivates idempotent relations. It summarizes haraterizations of idempotents and their

More information

SECOND HANKEL DETERMINANT PROBLEM FOR SOME ANALYTIC FUNCTION CLASSES WITH CONNECTED K-FIBONACCI NUMBERS

SECOND HANKEL DETERMINANT PROBLEM FOR SOME ANALYTIC FUNCTION CLASSES WITH CONNECTED K-FIBONACCI NUMBERS Ata Universitatis Apulensis ISSN: 15-539 http://www.uab.ro/auajournal/ No. 5/01 pp. 161-17 doi: 10.1711/j.aua.01.5.11 SECOND HANKEL DETERMINANT PROBLEM FOR SOME ANALYTIC FUNCTION CLASSES WITH CONNECTED

More information

Rigorous prediction of quadratic hyperchaotic attractors of the plane

Rigorous prediction of quadratic hyperchaotic attractors of the plane Rigorous predition of quadrati hyperhaoti attrators of the plane Zeraoulia Elhadj 1, J. C. Sprott 2 1 Department of Mathematis, University of Tébéssa, 12000), Algeria. E-mail: zeraoulia@mail.univ-tebessa.dz

More information

Gog and GOGAm pentagons

Gog and GOGAm pentagons Gog and GOGAm pentagons Philippe Biane, Hayat Cheballah To ite this version: Philippe Biane, Hayat Cheballah. Gog and GOGAm pentagons. Journal of Combinatorial Theory, Series A, Elsevier, 06, .

More information

Research Article Approximation of Analytic Functions by Solutions of Cauchy-Euler Equation

Research Article Approximation of Analytic Functions by Solutions of Cauchy-Euler Equation Funtion Spaes Volume 2016, Artile ID 7874061, 5 pages http://d.doi.org/10.1155/2016/7874061 Researh Artile Approimation of Analyti Funtions by Solutions of Cauhy-Euler Equation Soon-Mo Jung Mathematis

More information

arxiv:math/ v4 [math.ca] 29 Jul 2006

arxiv:math/ v4 [math.ca] 29 Jul 2006 arxiv:math/0109v4 [math.ca] 9 Jul 006 Contiguous relations of hypergeometri series Raimundas Vidūnas University of Amsterdam Abstrat The 15 Gauss ontiguous relations for F 1 hypergeometri series imply

More information

UNIVERSAL POISSON AND NORMAL LIMIT THEOREMS IN GRAPH COLORING PROBLEMS WITH CONNECTIONS TO EXTREMAL COMBINATORICS

UNIVERSAL POISSON AND NORMAL LIMIT THEOREMS IN GRAPH COLORING PROBLEMS WITH CONNECTIONS TO EXTREMAL COMBINATORICS UNIVERSAL POISSON AND NORMAL LIMIT THEOREMS IN GRAPH COLORING PROBLEMS WITH CONNECTIONS TO EXTREMAL COMBINATORICS BHASWAR B. BHATTACHARYA, PERSI DIACONIS, AND SUMIT MUKHERJEE Abstrat. This paper proves

More information

Stability of alternate dual frames

Stability of alternate dual frames Stability of alternate dual frames Ali Akbar Arefijamaal Abstrat. The stability of frames under perturbations, whih is important in appliations, is studied by many authors. It is worthwhile to onsider

More information

Coefficients of the Inverse of Strongly Starlike Functions

Coefficients of the Inverse of Strongly Starlike Functions BULLETIN of the MALAYSIAN MATHEMATICAL SCIENCES SOCIETY Bull. Malaysian Math. S. So. (Seond Series) 6 (00) 6 7 Coeffiients of the Inverse of Strongly Starlie Funtions ROSIHAN M. ALI Shool of Mathematial

More information

THE NUMBER FIELD SIEVE FOR INTEGERS OF LOW WEIGHT

THE NUMBER FIELD SIEVE FOR INTEGERS OF LOW WEIGHT MATHEMATICS OF COMPUTATION Volume 79, Number 269, January 2010, Pages 583 602 S 0025-5718(09)02198-X Artile eletronially published on July 27, 2009 THE NUMBER FIELD SIEVE FOR INTEGERS OF LOW WEIGHT OLIVER

More information

The First Integral Method for Solving a System of Nonlinear Partial Differential Equations

The First Integral Method for Solving a System of Nonlinear Partial Differential Equations ISSN 179-889 (print), 179-897 (online) International Journal of Nonlinear Siene Vol.5(008) No.,pp.111-119 The First Integral Method for Solving a System of Nonlinear Partial Differential Equations Ahmed

More information

Optimization of Statistical Decisions for Age Replacement Problems via a New Pivotal Quantity Averaging Approach

Optimization of Statistical Decisions for Age Replacement Problems via a New Pivotal Quantity Averaging Approach Amerian Journal of heoretial and Applied tatistis 6; 5(-): -8 Published online January 7, 6 (http://www.sienepublishinggroup.om/j/ajtas) doi:.648/j.ajtas.s.65.4 IN: 36-8999 (Print); IN: 36-96 (Online)

More information

The Second Postulate of Euclid and the Hyperbolic Geometry

The Second Postulate of Euclid and the Hyperbolic Geometry 1 The Seond Postulate of Eulid and the Hyperboli Geometry Yuriy N. Zayko Department of Applied Informatis, Faulty of Publi Administration, Russian Presidential Aademy of National Eonomy and Publi Administration,

More information

(q) -convergence. Comenius University, Bratislava, Slovakia

(q) -convergence.   Comenius University, Bratislava, Slovakia Annales Mathematiae et Informatiae 38 (2011) pp. 27 36 http://ami.ektf.hu On I (q) -onvergene J. Gogola a, M. Mačaj b, T. Visnyai b a University of Eonomis, Bratislava, Slovakia e-mail: gogola@euba.sk

More information

arxiv: v2 [math.pr] 9 Dec 2016

arxiv: v2 [math.pr] 9 Dec 2016 Omnithermal Perfet Simulation for Multi-server Queues Stephen B. Connor 3th Deember 206 arxiv:60.0602v2 [math.pr] 9 De 206 Abstrat A number of perfet simulation algorithms for multi-server First Come First

More information

Some recent developments in probability distributions

Some recent developments in probability distributions Proeedings 59th ISI World Statistis Congress, 25-30 August 2013, Hong Kong (Session STS084) p.2873 Some reent developments in probability distributions Felix Famoye *1, Carl Lee 1, and Ayman Alzaatreh

More information

Super edge-magic total labeling of a tree

Super edge-magic total labeling of a tree Super edge-magi total labeling of a tree K. Ali, M. Hussain, A. Razzaq Department of Mathematis, COMSATS Institute of Information Tehnology, Lahore, Pakistan. {akashifali, mhmaths, asimrzq}@gmail.om Abstrat.

More information

15.12 Applications of Suffix Trees

15.12 Applications of Suffix Trees 248 Algorithms in Bioinformatis II, SoSe 07, ZBIT, D. Huson, May 14, 2007 15.12 Appliations of Suffix Trees 1. Searhing for exat patterns 2. Minimal unique substrings 3. Maximum unique mathes 4. Maximum

More information

a n z n, (1.1) As usual, we denote by S the subclass of A consisting of functions which are also univalent in U.

a n z n, (1.1) As usual, we denote by S the subclass of A consisting of functions which are also univalent in U. MATEMATIQKI VESNIK 65, 3 (2013), 373 382 September 2013 originalni nauqni rad researh paper CERTAIN SUFFICIENT CONDITIONS FOR A SUBCLASS OF ANALYTIC FUNCTIONS ASSOCIATED WITH HOHLOV OPERATOR S. Sivasubramanian,

More information

Millennium Relativity Acceleration Composition. The Relativistic Relationship between Acceleration and Uniform Motion

Millennium Relativity Acceleration Composition. The Relativistic Relationship between Acceleration and Uniform Motion Millennium Relativity Aeleration Composition he Relativisti Relationship between Aeleration and niform Motion Copyright 003 Joseph A. Rybzyk Abstrat he relativisti priniples developed throughout the six

More information

CSE 291: Fourier analysis Chapter 2: Social choice theory

CSE 291: Fourier analysis Chapter 2: Social choice theory CSE 91: Fourier analysis Chapter : Social choice theory 1 Basic definitions We can view a boolean function f : { 1, 1} n { 1, 1} as a means to aggregate votes in a -outcome election. Common examples are:

More information

Where as discussed previously we interpret solutions to this partial differential equation in the weak sense: b

Where as discussed previously we interpret solutions to this partial differential equation in the weak sense: b Consider the pure initial value problem for a homogeneous system of onservation laws with no soure terms in one spae dimension: Where as disussed previously we interpret solutions to this partial differential

More information

A Recursive Approach to the Kauffman Bracket

A Recursive Approach to the Kauffman Bracket Applied Mathematis, 204, 5, 2746-2755 Published Online Otober 204 in SiRes http://wwwsirporg/journal/am http://ddoiorg/04236/am20457262 A Reursive Approah to the Kauffman Braet Abdul Rauf Nizami, Mobeen

More information

On the density of languages representing finite set partitions

On the density of languages representing finite set partitions On the density of languages representing finite set partitions Nelma Moreira Rogério Reis Tehnial Report Series: DCC-04-07 Departamento de Ciênia de Computadores Fauldade de Ciênias & Laboratório de Inteligênia

More information

We will show that: that sends the element in π 1 (P {z 1, z 2, z 3, z 4 }) represented by l j to g j G.

We will show that: that sends the element in π 1 (P {z 1, z 2, z 3, z 4 }) represented by l j to g j G. 1. Introdution Square-tiled translation surfaes are lattie surfaes beause they are branhed overs of the flat torus with a single branhed point. Many non-square-tiled examples of lattie surfaes arise from

More information

Determination of the reaction order

Determination of the reaction order 5/7/07 A quote of the wee (or amel of the wee): Apply yourself. Get all the eduation you an, but then... do something. Don't just stand there, mae it happen. Lee Iaoa Physial Chemistry GTM/5 reation order

More information

Prediction on a Graph with a Perceptron

Prediction on a Graph with a Perceptron Predition on a Graph with a Pereptron Mark Herbster, Massimiliano Pontil Department of Computer Siene University College London Gower Street, London WC1E 6BT, England, UK {m.herbster, m.pontil}@s.ul.a.uk

More information

A Spatiotemporal Approach to Passive Sound Source Localization

A Spatiotemporal Approach to Passive Sound Source Localization A Spatiotemporal Approah Passive Sound Soure Loalization Pasi Pertilä, Mikko Parviainen, Teemu Korhonen and Ari Visa Institute of Signal Proessing Tampere University of Tehnology, P.O.Box 553, FIN-330,

More information

arxiv:gr-qc/ v2 6 Feb 2004

arxiv:gr-qc/ v2 6 Feb 2004 Hubble Red Shift and the Anomalous Aeleration of Pioneer 0 and arxiv:gr-q/0402024v2 6 Feb 2004 Kostadin Trenčevski Faulty of Natural Sienes and Mathematis, P.O.Box 62, 000 Skopje, Maedonia Abstrat It this

More information

Monomial strategies for concurrent reachability games and other stochastic games

Monomial strategies for concurrent reachability games and other stochastic games Monomial strategies for onurrent reahability games and other stohasti games Søren Kristoffer Stiil Frederisen and Peter Bro Miltersen Aarhus University Abstrat. We onsider two-player zero-sum finite but

More information

Some Properties on Nano Topology Induced by Graphs

Some Properties on Nano Topology Induced by Graphs AASCIT Journal of anosiene 2017; 3(4): 19-23 http://wwwaasitorg/journal/nanosiene ISS: 2381-1234 (Print); ISS: 2381-1242 (Online) Some Properties on ano Topology Indued by Graphs Arafa asef 1 Abd El Fattah

More information

Advanced Computational Fluid Dynamics AA215A Lecture 4

Advanced Computational Fluid Dynamics AA215A Lecture 4 Advaned Computational Fluid Dynamis AA5A Leture 4 Antony Jameson Winter Quarter,, Stanford, CA Abstrat Leture 4 overs analysis of the equations of gas dynamis Contents Analysis of the equations of gas

More information

JAST 2015 M.U.C. Women s College, Burdwan ISSN a peer reviewed multidisciplinary research journal Vol.-01, Issue- 01

JAST 2015 M.U.C. Women s College, Burdwan ISSN a peer reviewed multidisciplinary research journal Vol.-01, Issue- 01 JAST 05 M.U.C. Women s College, Burdwan ISSN 395-353 -a peer reviewed multidisiplinary researh journal Vol.-0, Issue- 0 On Type II Fuzzy Parameterized Soft Sets Pinaki Majumdar Department of Mathematis,

More information

Remark 4.1 Unlike Lyapunov theorems, LaSalle s theorem does not require the function V ( x ) to be positive definite.

Remark 4.1 Unlike Lyapunov theorems, LaSalle s theorem does not require the function V ( x ) to be positive definite. Leture Remark 4.1 Unlike Lyapunov theorems, LaSalle s theorem does not require the funtion V ( x ) to be positive definite. ost often, our interest will be to show that x( t) as t. For that we will need

More information

Coding for Random Projections and Approximate Near Neighbor Search

Coding for Random Projections and Approximate Near Neighbor Search Coding for Random Projetions and Approximate Near Neighbor Searh Ping Li Department of Statistis & Biostatistis Department of Computer Siene Rutgers University Pisataay, NJ 8854, USA pingli@stat.rutgers.edu

More information

General Closed-form Analytical Expressions of Air-gap Inductances for Surfacemounted Permanent Magnet and Induction Machines

General Closed-form Analytical Expressions of Air-gap Inductances for Surfacemounted Permanent Magnet and Induction Machines General Closed-form Analytial Expressions of Air-gap Indutanes for Surfaemounted Permanent Magnet and Indution Mahines Ronghai Qu, Member, IEEE Eletroni & Photoni Systems Tehnologies General Eletri Company

More information

3 Finish learning monotone Boolean functions

3 Finish learning monotone Boolean functions COMS 6998-3: Sub-Linear Algorithms in Learning and Testing Lecturer: Rocco Servedio Lecture 5: 02/19/2014 Spring 2014 Scribes: Dimitris Paidarakis 1 Last time Finished KM algorithm; Applications of KM

More information

Time Domain Method of Moments

Time Domain Method of Moments Time Domain Method of Moments Massahusetts Institute of Tehnology 6.635 leture notes 1 Introdution The Method of Moments (MoM) introdued in the previous leture is widely used for solving integral equations

More information

Quasi-Monte Carlo Algorithms for unbounded, weighted integration problems

Quasi-Monte Carlo Algorithms for unbounded, weighted integration problems Quasi-Monte Carlo Algorithms for unbounded, weighted integration problems Jürgen Hartinger Reinhold F. Kainhofer Robert F. Tihy Department of Mathematis, Graz University of Tehnology, Steyrergasse 30,

More information

THEORETICAL ANALYSIS OF EMPIRICAL RELATIONSHIPS FOR PARETO- DISTRIBUTED SCIENTOMETRIC DATA Vladimir Atanassov, Ekaterina Detcheva

THEORETICAL ANALYSIS OF EMPIRICAL RELATIONSHIPS FOR PARETO- DISTRIBUTED SCIENTOMETRIC DATA Vladimir Atanassov, Ekaterina Detcheva International Journal "Information Models and Analyses" Vol.1 / 2012 271 THEORETICAL ANALYSIS OF EMPIRICAL RELATIONSHIPS FOR PARETO- DISTRIBUTED SCIENTOMETRIC DATA Vladimir Atanassov, Ekaterina Detheva

More information

University of Groningen

University of Groningen University of Groningen Port Hamiltonian Formulation of Infinite Dimensional Systems II. Boundary Control by Interonnetion Mahelli, Alessandro; van der Shaft, Abraham; Melhiorri, Claudio Published in:

More information

arxiv: v2 [cs.dm] 4 May 2018

arxiv: v2 [cs.dm] 4 May 2018 Disrete Morse theory for the ollapsibility of supremum setions Balthazar Bauer INRIA, DIENS, PSL researh, CNRS, Paris, Frane Luas Isenmann LIRMM, Université de Montpellier, CNRS, Montpellier, Frane arxiv:1803.09577v2

More information

Assessing the Performance of a BCI: A Task-Oriented Approach

Assessing the Performance of a BCI: A Task-Oriented Approach Assessing the Performane of a BCI: A Task-Oriented Approah B. Dal Seno, L. Mainardi 2, M. Matteui Department of Eletronis and Information, IIT-Unit, Politenio di Milano, Italy 2 Department of Bioengineering,

More information

c-perfect Hashing Schemes for Binary Trees, with Applications to Parallel Memories

c-perfect Hashing Schemes for Binary Trees, with Applications to Parallel Memories -Perfet Hashing Shemes for Binary Trees, with Appliations to Parallel Memories (Extended Abstrat Gennaro Cordaso 1, Alberto Negro 1, Vittorio Sarano 1, and Arnold L.Rosenberg 2 1 Dipartimento di Informatia

More information

Probabilistic Graphical Models

Probabilistic Graphical Models Probabilisti Graphial Models David Sontag New York University Leture 12, April 19, 2012 Aknowledgement: Partially based on slides by Eri Xing at CMU and Andrew MCallum at UMass Amherst David Sontag (NYU)

More information

Differential Equations 8/24/2010

Differential Equations 8/24/2010 Differential Equations A Differential i Equation (DE) is an equation ontaining one or more derivatives of an unknown dependant d variable with respet to (wrt) one or more independent variables. Solution

More information

On the Licensing of Innovations under Strategic Delegation

On the Licensing of Innovations under Strategic Delegation On the Liensing of Innovations under Strategi Delegation Judy Hsu Institute of Finanial Management Nanhua University Taiwan and X. Henry Wang Department of Eonomis University of Missouri USA Abstrat This

More information

SQUARE ROOTS AND AND DIRECTIONS

SQUARE ROOTS AND AND DIRECTIONS SQUARE ROOS AND AND DIRECIONS We onstrut a lattie-like point set in the Eulidean plane that eluidates the relationship between the loal statistis of the frational parts of n and diretions in a shifted

More information

The shape of a hanging chain. a project in the calculus of variations

The shape of a hanging chain. a project in the calculus of variations The shape of a hanging hain a projet in the alulus of variations April 15, 218 2 Contents 1 Introdution 5 2 Analysis 7 2.1 Model............................... 7 2.2 Extremal graphs.........................

More information

Development of Fuzzy Extreme Value Theory. Populations

Development of Fuzzy Extreme Value Theory. Populations Applied Mathematial Sienes, Vol. 6, 0, no. 7, 58 5834 Development of Fuzzy Extreme Value Theory Control Charts Using α -uts for Sewed Populations Rungsarit Intaramo Department of Mathematis, Faulty of

More information

KRANNERT GRADUATE SCHOOL OF MANAGEMENT

KRANNERT GRADUATE SCHOOL OF MANAGEMENT KRANNERT GRADUATE SCHOOL OF MANAGEMENT Purdue University West Lafayette, Indiana A Comment on David and Goliath: An Analysis on Asymmetri Mixed-Strategy Games and Experimental Evidene by Emmanuel Dehenaux

More information

arxiv:physics/ v1 [physics.class-ph] 8 Aug 2003

arxiv:physics/ v1 [physics.class-ph] 8 Aug 2003 arxiv:physis/0308036v1 [physis.lass-ph] 8 Aug 003 On the meaning of Lorentz ovariane Lszl E. Szab Theoretial Physis Researh Group of the Hungarian Aademy of Sienes Department of History and Philosophy

More information

FINITE WORD LENGTH EFFECTS IN DSP

FINITE WORD LENGTH EFFECTS IN DSP FINITE WORD LENGTH EFFECTS IN DSP PREPARED BY GUIDED BY Snehal Gor Dr. Srianth T. ABSTRACT We now that omputers store numbers not with infinite preision but rather in some approximation that an be paed

More information

Wavetech, LLC. Ultrafast Pulses and GVD. John O Hara Created: Dec. 6, 2013

Wavetech, LLC. Ultrafast Pulses and GVD. John O Hara Created: Dec. 6, 2013 Ultrafast Pulses and GVD John O Hara Created: De. 6, 3 Introdution This doument overs the basi onepts of group veloity dispersion (GVD) and ultrafast pulse propagation in an optial fiber. Neessarily, it

More information

Bäcklund Transformations: Some Old and New Perspectives

Bäcklund Transformations: Some Old and New Perspectives Bäklund Transformations: Some Old and New Perspetives C. J. Papahristou *, A. N. Magoulas ** * Department of Physial Sienes, Helleni Naval Aademy, Piraeus 18539, Greee E-mail: papahristou@snd.edu.gr **

More information

the following action R of T on T n+1 : for each θ T, R θ : T n+1 T n+1 is defined by stated, we assume that all the curves in this paper are defined

the following action R of T on T n+1 : for each θ T, R θ : T n+1 T n+1 is defined by stated, we assume that all the curves in this paper are defined How should a snake turn on ie: A ase study of the asymptoti isoholonomi problem Jianghai Hu, Slobodan N. Simić, and Shankar Sastry Department of Eletrial Engineering and Computer Sienes University of California

More information

arxiv: v1 [math.co] 16 May 2016

arxiv: v1 [math.co] 16 May 2016 arxiv:165.4694v1 [math.co] 16 May 216 EHRHART POLYNOMIALS OF 3-DIMENSIONAL SIMPLE INTEGRAL CONVEX POLYTOPES YUSUKE SUYAMA Abstrat. We give an expliit formula on the Ehrhart polynomial of a 3- dimensional

More information

Boolean Functions: Influence, threshold and noise

Boolean Functions: Influence, threshold and noise Boolean Functions: Influence, threshold and noise Einstein Institute of Mathematics Hebrew University of Jerusalem Based on recent joint works with Jean Bourgain, Jeff Kahn, Guy Kindler, Nathan Keller,

More information

Lecture 7: Sampling/Projections for Least-squares Approximation, Cont. 7 Sampling/Projections for Least-squares Approximation, Cont.

Lecture 7: Sampling/Projections for Least-squares Approximation, Cont. 7 Sampling/Projections for Least-squares Approximation, Cont. Stat60/CS94: Randomized Algorithms for Matries and Data Leture 7-09/5/013 Leture 7: Sampling/Projetions for Least-squares Approximation, Cont. Leturer: Mihael Mahoney Sribe: Mihael Mahoney Warning: these

More information

arxiv: v1 [math.gt] 22 Nov 2018

arxiv: v1 [math.gt] 22 Nov 2018 SOME REMARKS ON THE CHORD INDEX ZHIYUN CHENG, HONGZHU GAO, AND MENGJIAN XU arxiv:1811.09061v1 [math.gt] 22 Nov 2018 ABSTRACT. In this paper we disuss how to define a hord index via smoothing a real rossing

More information