Probabilistic analysis of the asymmetric digital search trees

Size: px
Start display at page:

Download "Probabilistic analysis of the asymmetric digital search trees"

Transcription

1 Int. J. Nonlinear Anal. Appl No. 2, ISSN: electronic Probabilistic analysis of the asymmetric digital search trees R. Kazemi a,, M. Q. Vahidi-Asl b a Department of Statistics, Imam Khomeini International University, Qazvin, Iran b Department of Statistics, Shahid Beheshti University, Tehran, Iran Communicated by M. Madadi Abstract In this paper, by applying three functional operators the previous results on the Poisson variance of the external profile in digital search trees will be improved. We study the profile built over n binary strings generated by a memoryless source with unequal probabilities of symbols and use a combinatorial approach for studying the Poissonized variance, since the probability distribution of the profile is unnown. Keywords: Digital Search Tree; Profile; Functional Operators; Poisson Variance MSC: Primary 05C05; Secondary 60F Introduction Digital trees lie tries or digital search trees are important in many computer science applications lie data compression, pattern matching or hashing. For example, the popular Lempel-Ziv compression scheme is strongly related to digital search trees. Digital trees have been widely studied in the literature. The motivation for studying the profiles of such trees is multifold. Of course, digital trees are used in various applications. For example, the profile represents the number of phrases of length in the Lempel-Ziv 78 built over n phrases. Second, the profile is a fine shape measure closely connected to many other cost measures height, saturation level, depth, path length, etc.. And finally, the related analytical problems are mathematically challenging and lead to interesting distributional results [3]. Digital search trees are intended for the same ind of problems as binary search trees. However, they are not constructed from the total order structure of the eys for the data stored in the internal nodes of the tree but from digital representations or binary sequences which serve as eys. Corresponding author addresses: r.azemi@sci.iiu.ac.ir R. Kazemi, m-vahidi@sbu.ac.ir M. Q. Vahidi-Asl Received: June 2014 Revised: June 2015

2 162 Kazemi, Vahidi-Asl Figure 1: A digital search tree built on eight strings s 1,..., s 8. In a digital search tree strings are directly stored in internal nodes. More precisely, the root contains the first string and the next string occupies the right or the left child of the root depending on whether its first symbol is 0 or 1. The remaining strings are stored in available nodes which are directly attached to nodes already existing in the tree external nodes. A digital search tree with n internal nodes is completed with n 1 external nodes. These external nodes can be seen as those positions the next item can be stored. The resulting tree is then a complete binary tree with the external nodes as leaves. The search for an available node follows the prefix structure of a new string [2]. Figure 1 shows a digital search tree built on eight strings s 1,..., s 8 i.e., s 1 = 0..., s 2 = 1..., s 3 = 01..., s 4 = 11..., etc. with internal ovals and external squares nodes, respectively. In this paper, we are concerned with probabilistic properties of the external profile defined as the number of external nodes at the same distance from the root. It is a function of the number of strings stored in a tree and the distance from the root. We write B n, for the external profile. Actually we study the external profile built over n binary strings generated by a memoryless source with unequal probabilities of symbols asymmetric case, that is, we assume each string is a binary independently and identically distributed i.i.d. sequence with p being the probability of a 1 and q = 1 p 0 < p < q < 1. Definition 1.1. Let X n be a sequence of integer random variable and X N its corresponding Poisson driven sequence, N is a Poisson random variable with mean z. Let Gz, u = Eu X N = n 0 EuXn zn n! e z be its Poisson transform. The Poisson variance is introduced as V z = G uz, 1 G uz, 1 G uz, 1 2, G uz, 1 and G uz, 1 denote respectively the first and the second derivative of Gz, u with respect to u at u = The Previous Results In the following, we first review the main equations and results described in [2]. Let B n, denotes the random number of external nodes at level in a digital search tree built over n strings generated

3 Probabilistic analysis of the asymmetric digital search trees No. 2, by a memoryless source with parameter q > p = 1 q. We recall the initial conditions { 1, for n = 0 B n,0 = 0, for n 1. The probability generating function of the external profile, P n, u = Eu B n,, satisfies the following recurrence relation n n P n1, u = p j q n j P j j, 1 up n j, 1 u, 2.1 j=0 with initial conditions P 0, u = 1 for 1, P 0,0 u = u, P n,0 u = 1 for n 1. The corresponding exponential generating function G x, u = n 0 P n, u xn n! fulfills the following functional recurrence x G x, u = G 1 px, ug 1 qx, u, 1, 2.2 with initial conditions G 0 x, u = u e x 1 and G 0, u = 1 1. By taing derivatives with respect to u and setting u = 1 we obtain for the exponential generating function E 1 x = EB n, xn n! n 0 the following functional recurrence E 1 x = e qx E 1 1 px epx E 1 1 qx, 2.3 with initial conditions E 1 0 x = 1 and E 1 0 = 0 1. The Poisson transform of E1 x, namely 1 x = e x EB n, xn n! = e x E 1 x, 0 n 0 translates recurrence 2.3 into 1 x 1 x = 1 1 px 1 1 qx, 1, 2.4 with initial conditions 1 0 x = e x and 1 0 = 0 1. Similarly, by taing second derivatives with respect to u and setting u = 1 we obtain for the exponential generating function E 2 x = EBn, 2 xn n! n 0 the following functional recurrence E 2 x = e qx E 2 1 px epx E 2 1 qx 2E1 1 pxe1 1 qx, 2.5

4 164 Kazemi, Vahidi-Asl with initial conditions E 2 0 x = 1 and E 2 0 = 0 1. Furthermore, the Poisson transform of x, namely E 2 2 x = e x EBn, 2 xn n! = e x E 2 x, 0 n 0 translates recurrence 2.5 into 2 x 2 x = 2 1 px 2 1 qx w x, 1, 2.6 w x = px 1 1 qx, 2 0 x = e x and 2 0 = 0 1. By induction it is easy to prove that 2 x can be represented as finite linear combinations of functions of the form e pl 1 q l 2 x with l 1, l 2 0, and of products of two of these functions. Hence, the Mellin transform of 2 x, 2 s = 0 2 xxs 1 dx. exists for all s with Rs > 0 see [1]. Since B n, = 0 for > n it follows that E 2 x = Ox as x 0 which ensures that 2 s actually exists for s with Rs >. Let us now express 2 s as 2 s = ΓsF 2 s, Γs is the Euler gamma function. By definition, we now that F 2 s is the finite linear combinations of functions a s with certain values of a. Thus, F 2 s is an entire function. Furthermore 2.6 translates into H 2 s = 1 Γs F s F s 1 = T sf 1 w xx s 1 dx, s H2 s, and F 2 0 s = 1. Note that 2.7 does not only hold for Rs > the Mellin transform exists. Since F 2 s continues analytically to an entire function, 2.7 holds for all s, too. The inhomogeneous part in 2.7 is very large compared to the order of magnitude of the homogeneous equation F s F s 1 = T sf 1 s, 0, 2.8 for the first moment. Since F 1 s behaves geometrically as T s it seems that the term F 1 1 s 1 is negligible compared to the other two terms in 2.8. This phenomenon will also occur for F 2 s and F s. We introduce the so-called Poisson variance 2, V x := 2 x 1 x which should be a good approximation for the variance of the profile [3]. By 2.4 and 2.6, V x satisfies V x V x = V 1 px V 1 qx 1 2, x 2.9

5 Probabilistic analysis of the asymmetric digital search trees No. 2, with initial condition V 0 x = e x 1 e x and V 0 = 0 1. The Mellin transform of V x is then given as V s = 0 V xx s 1 dx, and again, we can use a factorization of the form V s = ΓsF s, V s and F s can be written in terms of 1 s, 2 s, F 1 2 s, and F s respectively. In particular, 2.9 translates into F s F s 1 = T sf 1 s H s, 0, 2.10 H s = 1 Γs 0 1 x 2x s 1 dx and also F 0 s = 1 2 s. We also observe that F r = 0 for > r, since ΓsF s is the Mellin transform of V x that exists for Rs >. We will use this property. The inhomogeneous part of 2.10 i.e., H s does not dependent on p and q in comparison with the inhomogeneous part of the functional-differential equation satisfied by variance of the profile see Section 2.1 in [2] for details: page 6. Thus asymptotic analysis of the variance done there through Poissonized variance is not a precise analysis. In other words, the analytic function arising there Ds, w [2, Lemma 4] is not completely explicit. Let I be an identity operator and A[f]s = j 0 fs jt s j for some function f. Kazemi and Vahidi-Asl [2] showed the following results: Lemma 2.1. The function fs, w = 0 F sw can be represented as fs, w = Ds, wgs, w, the functions gs, w = I wa 1 s and Ds, w is analytic for w < 1/T Rs/ Theorem 2.2. Let V x denote the Poisson variance of the profile in unbalanced digital search trees with underlying probabilities 0 < p < q = 1 p. Let and n be positive integers such that / log n satisfies log 1 p 1 ε / log n log 1 q 1 ε. Then uniformly V n = L ρ n,, log p/q p n p ρ n, q ρ n, n ρ n, 2πβρn, 1 1 O, 2.11 ρ n, = ρ/ log n and Lρ, x is a non-zero periodic function with period 1 in x. The function Lρ, x can be represented as Lρ, x = j Z fρ it jγρ it j e 2jπix, fs has the form fs = gs 1, 1/T sds, 1/T s.

6 166 Kazemi, Vahidi-Asl Lemma 2.3. For every real interval [a, b] there exist 0, γ > 0 and ε > 0 such that F s = fst s 1 O e γ, 2.12 uniformly for all s with Rs [a, b], Is 2lπ logq/p ε for some integer l and 0, fs = Ds, 1/T sgs 1, 1/T s is an analytic function that satisfies f r = 0 for r = 1, 2,... and is bounded in this region. Furthermore, if Is 2lπ logq/p > ε for for all integers l, then we have uniformly for Rs [a, b]. and In Theorem 3.4 below we show that fs = F l rw l T s l h 1s, 1/T s s T r.t A r, 1/T s T s F l rw l T s l h 2s, 1/T s s T r.t B r, 1/T s T s η A r, w = h 1 r, w B r, w = h 2 r, w F s = O T Rs e γ, wt r 1 wt r η h 2 r, w 1 wt r η h 1 r, w. 1 wt r 2.14 In this function all parts are explicit and are analytic for w < T Rs η 1 see [2] for h 1 s, w and Lemma 3.3 for h 2 s, w. We obtain an explicit solution of 2.10 by introducing two proper functional operators: C[f]s = fs j, j 0 D[f]s = wt s j fs j, w 1 wt s j η j 1 for some function f and η > 0. Set R s = A [1]s, H l s = C[H l 1 ]s C[H l 1 ]c, T,l s = A [ H l ]s, Gs, w = H sw, 0 1 wt s η, 1 wt s for all, l 1.

7 Probabilistic analysis of the asymmetric digital search trees No. 2, The New Results Lemma 3.1. Suppose fs, w = 0 F sw. Then for all 1 and complex s, ns, w = gc, wgs, w fs, wgc, w = gs, w ns, w, 3.1 I wa 1 [ H ]s I wa 1 [ H ]c 1 w gc, wi wa 1 [G]s, w Proof. See Appendix A. gs, wi wa 1 [G]c, w, w Remar 3.2. The proof of 3.1 maes use of the fact that F c = 0 for 1. However, we also have F r = 0 for > r [2]. In particular, if we set s = r in 3.1 we find that and consequently f r, wgc, w = g r, w n r, w fs, wg r, w n r, w = gs, w ns, w F l rw l. First of all, we have the following result by convolution of Laplace transform [2]: 1 H s = 1 2x x s 1 dx Γs 0 1 = 1 ci Γs 1 t 1 s tdt 2πi c i C ci dt t s t Γt Γs t 1 T Rt 1T Rs t 1 Γs c i CT c 1 2 Rt = c = Rs t, 2 Rs = CT 1 c = Rs 2 2,, C T Rs η 3.3 for constants C and C and for some η > 0. Lemma 3.3. There exists a function h 2 s, w that is analytic for all w and s satisfying such that wt s n η 1, for all n 1, ns, w = h 2 s, w 1 wt s η. 3.4 Thus, ns, w has a meromorphic continuation w 0 = 1/T s η is a polar singularity.

8 168 Kazemi, Vahidi-Asl Proof. By definition of H s and 3.3, ns, w converges absolutely and represents an analytic function, since T s j T s maxpq j for j 0. Also I wa[ns,.]s = rs, w, rs, w = Gs, w H s H c 1 w 1 Gs, wmc, w Gc, wgs, w. If we substitute ns, w by then For convenience, set V s j, w = h 2 s, w = D[h 2 ]s h 2 s, w 1 wt s η, 1 wt s η rs, w. 1 wt s wt s j wt s η.1, j 1. 1 wt s j η 1 wt s By induction it follows that D [1]s = V s j 1, wv s j 1 j 2, w j 1 0 j 2 0 j 0 V s j 1 j, w Hence, n 1 = n V s n, w. n 1 1 n 1 = 1 n 2 = 2 D [1]s n n 1 1 V s n, w n n 2 2 V s n, w V s n 1, w. n 1 1 n 2 1 V s n 1, wv s n 2, w n 1 =1 V s n 1, wv s n 2, w n 1 1 n 1 1 V s n 1, w Using the fact that T s n = Oq n, it follows directly that the series S := V s n, w = wt s n 1 wt s η 1 wt s n η 1 wt s, n 1 n 1 converges if wt s n η 1 for all n 1 and 1 wt s. Let now 0 be any value such that n 0 V s n, w 1 2,

9 Probabilistic analysis of the asymmetric digital search trees No. 2, Then we have for all 0, 1 2S D [1]s 0. 2 Since rs, w C1 wt Rs η 1 and [ ] h 2 s, w = D [1]s 0 thus h 2 s, w 22S 0 C for constant C. 1 wt s η rs, w, 1 wt s Theorem 3.4. For every real interval [a, b] there exist 0, γ > 0 and ε > 0 such that F s = fst s 1 O e γ 3.5 uniformly for all s with Rs [a, b], Is 2lπ logq/p ε for some integer l and 0, fs is an analytic function that satisfies f r = 0 for r = 1, 2,.... Furthermore, if Is 2lπ logq/p > ε for for all integers l then we have uniformly for Rs [a, b] fs described in Proof. Let h 1 s, w = j 1 1/1 wt s j [2]. We have fs, w = = = F s = O T s e γ. 3.6 F l rw l gs, w ns, w g r, w n r, w F l rw l gs, w g r, w n r, w F l rw l ns, w n r, w n r, w F l rw l h 1s, w 1 wt r A r, w 1 wt s F l rw l h 2s, w 1 wt r η B r, w 1 wt s η = f 1 s, w f 2 s, w. 3.7 Suppose first that s > r 1 for some integer r 0 but s is not a positive integer. The function h 1 s, w is analytic for w < 1/T s 1. It also follows that h 1 s, w is non-zero for real 0 < w < 1/T s 1 and that h 1 r, w is analytic and non-zero for 0 < w < 1/T r 1. Hence, w 0 = 1/T s is a singular point of f 1 s, w. Since F s = V s/γs it follows that all values F s have the same sign. Hence, the radius of convergence of the series fs, w equals w 0 = 1/T s. In a next step we show that f 1 s, w has no other singularities on the radius of convergence w = 1/T s. Since all terms in f 1 s, w, that is, r F l rw l, h 1 s, w, A r, w, 1 wt r, and 1 wt s are analytic for w < 1/T s ε, a singularity of f 1 s, w can only be induced by a zero of A r, w. Suppose first that A r, w has a zero w 1 with w 1 < 1/T s. Since A r, w 0

10 170 Kazemi, Vahidi-Asl for 0 < w < 1/T r 1 it follows that w 1 1/T r and w 1 1/T r η. If we assume that r F l rw l 1 0, then w = w 1 must be a zero of h 1 s, w. We slightly decrease s to s γ for some γ > 0 such that s γ is not a positive integer such that h 1 s γ, w 1 0. Then the zero w = w 1 of A r, w would induce a singularity w 1 of f 1 s, w with w 1 < 1/T s although its radius of convergence is 1/T s γ > 1/T s > w 1. This leads to a contradiction. Hence, if A r, w 1 = 0 for some w 1 with w 1 < 1/T s, then we also have r F l rw l 1 = 0. Actually, it also follows that the order of the zeroes are the same. The above considerations also show that if w = w 1 is a zero of A r, w with w 1 < 1/T r 1, then w 1 is also a zero of r F l rw l 1 = 0 of the same order. Namely, if w 1 < 1/T r 1 then there exists a non-integral real number s > r 1 with w 1 < 1/T s and we proceed as above. This property shows that the only singularity of f 1 s, w is given by w = 1/T s if s > r 1 is real but not an integer. This singularity is a polar singularity of order 1. Hence, by using Cauchy s formula for a contour of integration on the circle w = e γ /T s and the residue theorem it follows that [1] [w ]f 1 s, w = f 1 st s O T se γ, 3.8 f 1 s = F l rt s l h 1s, 1/T s 1 T r. A r, 1/T s T s These estimates are uniform for s contained in a compact interval [a, b] r 1, r for some non-negative integer r or in a compact interval [a, b] contained in the positive real line. Furthermore, we get the same result if s is sufficiently close to the real axis. Thus, if a Rs b and Is ε for some sufficiently small ε > 0, then we obtain 3.8. Here we have also used the fact that f 1 s 0 in this range. Next, suppose that s is real or sufficiently close to the real axis and close to a negative integer r, say r γ s r γ for some γ > 0. Here we use the representation f 1 s, w = = F l rw l h 1s, w 1 wt r A r, w 1 wt s F l rw h 1s, w A r, w 1 wt r A r, w 1 wt s F l rw l1 T s T r F l rw. 1 wt s Now if we subtract the finite sum r F l rw, then we can safely multiply by Γs that is singular at s = r and obtain Γs Γs h 1 s, w A r, w F sw = F l rw A r, w >r =0 1 wt r 1 wt s Γs l1 F l rw T s T r. 1 wt s

11 Probabilistic analysis of the asymmetric digital search trees No. 2, We again use the fact that the function r F l rw l /A r, w is analytic for w < 1/T r 1 and observe that w = 1/T s is a polar singularity. By applying Cauchy s formula we obtain for > r similar to the above Γs[w ]f 1 s, w = F l rt s l 1 T r T s Γs h 1 s, 1/T s A r, 1/T s A r, 1/T s F l rt s l 1 Γs T s T r O T se γ. Thus, we have actually proved 3.8 for > r and we also observe that f 1 r = 0. Since T s2πil/ logq/p = T s for integer l, it follows that w = 1/T s is a polar singularity of f 1 s, w if Is 2πil/ logq/p < ε for some integer l. Thus, 3.8 follows also for s in this range. Finally, if Is 2πil/ logq/p > ε for some integer l, then there exists γ > 0 such that T s < e 2γ T Rs. Hence it follows that f 1 s, w is regular for w < e 2γ /T Rs. Thus, for a contour of integration on the circle w = e γ /T Rs in Cauchy s formula we obtain [w ]f 1 s, w = O T Rs e γ. It should be clear that this estimate is uniform if Rs varies in a finite interval [a, b]. Since f 2 s, w only has a polar singularity w = 1/T s η of order 1, thus for a contour of integration on the circle w = e γ /T s η, f 2 s = [w ]f 2 s, w = f 2 st s O T s ηe γ, If Is 2πil/ logq/p > ε, then [w ]f 2 s, w = O T Rs η e γ. F l rt s l h 2s, 1/T s 1 T r η. B r, 1/T s T s η It is obvious that w 0 = 1/T s is a dominant singularity of fs, w. Thus for every real interval [a, b] there exist 0, γ > 0 and ε > 0 such that F s = [w ]fs, w = fst s 1 O e γ, fs = f 1 s f 2 s = F l rw l T s l h 1s, 1/T s s T r.t A r, 1/T s T s F l rw l T s l h 2s, 1/T s s T r.t B r, 1/T s T s η

12 172 Kazemi, Vahidi-Asl uniformly for all s with Rs [a, b], Is 2lπ logq/p ε for some integer l and 0, fs is an analytic function that satisfies f r = 0 for r = 1, 2,.... Furthermore, if Is 2lπ logq/p > ε for all integers l then we have uniformly for Rs [a, b]. F s = O T Rs e γ By the above discussion, we now that F s and V s = ΓsF s behave asymptotically as T s. Thus we are in a situation similar to the analysis of the previous article [2] but here the analytic function fs introduced in the above theorem is completely explicit. References [1] F. Flajolet and R. Sedgewic, Analytic Combinatorics, Cambridge University Press. Cambridge, [2] R. Kazemi and M.Q. Vahidi-Asl, The Variance of the Profile in Digita Search Trees, Discrete Math. Theor. Comput. Sci [3] W. Szpanowsi, Average Case Analysis of Algorithms on Sequences. John Wiley, New Yor, Appendix A Proof.[Proof of Lemma 3.1] It is obvious that and 1 ns, w = R l c H l sw j 1 Thus it is enough to show that 1 T l,l s T l,l c w R j ct l j,l s R j st l j,l c fs, wgc, w = 0 w F l sr l cw. 1 1 F s = R s F l sr l c R l c H l s 1 T l,l s T l,l c 2 j 1 R j ct l j,l s R j st l j,l c. We will prove this relation by induction. Certainly, it is satisfied for = 0. Now suppose that it holds for some 0. Thus 1 F 1 s = R 1 s R 1 c R l cf l1 s 1 R l c H 1 l1 s R l ca[ H 1 l ]s R l ca[ H l ]c 1 T l1,l s T l1,l c

13 Probabilistic analysis of the asymmetric digital search trees No. 2, R 1 st l,l c R 1 ct l,l c j 1 j 1 j 1 = R 1 s R j ct l j1,l s R j1 st l j,l c 2 j 1 R j1 ct l j,l c H 1 s R 1 l cf l s R j ct l j1,l c R l c H 1 l s 1 R l ca[ H 1 l ]s R l ca[ H l ]c T l1,l s T l1,l c 1 1 R 1 st l,l c R 1 ct l,l c A[ H ]s A[ H ]c 1 j 1 R j ct l j1,l s R l ca[ H l ]s 2 1 R 1 ct l,l c R l ca[ H l ]c 1 l=2 j 1 R j st 1 l j,l c R 1 st l,l c. Now by removing the same expressions the proof is completed.

The Moments of the Profile in Random Binary Digital Trees

The Moments of the Profile in Random Binary Digital Trees Journal of mathematics and computer science 6(2013)176-190 The Moments of the Profile in Random Binary Digital Trees Ramin Kazemi and Saeid Delavar Department of Statistics, Imam Khomeini International

More information

Math 259: Introduction to Analytic Number Theory More about the Gamma function

Math 259: Introduction to Analytic Number Theory More about the Gamma function Math 59: Introduction to Analytic Number Theory More about the Gamma function We collect some more facts about Γs as a function of a complex variable that will figure in our treatment of ζs and Ls, χ.

More information

Digital search trees JASS

Digital search trees JASS Digital search trees Analysis of different digital trees with Rice s integrals. JASS Nicolai v. Hoyningen-Huene 28.3.2004 28.3.2004 JASS 04 - Digital search trees 1 content Tree Digital search tree: Definition

More information

ROSENA R.X. DU AND HELMUT PRODINGER. Dedicated to Philippe Flajolet ( )

ROSENA R.X. DU AND HELMUT PRODINGER. Dedicated to Philippe Flajolet ( ) ON PROTECTED NODES IN DIGITAL SEARCH TREES ROSENA R.X. DU AND HELMUT PRODINGER Dedicated to Philippe Flajolet (98 2) Abstract. Recently, 2-protected nodes were studied in the context of ordered trees and

More information

Recall that the Fourier transform (also known as characteristic function) of a random variable always exists, given by. e itx f(x)dx.

Recall that the Fourier transform (also known as characteristic function) of a random variable always exists, given by. e itx f(x)dx. I am going to talk about algebraic calculations of random variables: i.e. how to add, subtract, multiply, divide random variables. A main disadvantage is that complex analysis is used often, but I will

More information

Asymptotic and Exact Poissonized Variance in the Analysis of Random Digital Trees (joint with Hsien-Kuei Hwang and Vytas Zacharovas)

Asymptotic and Exact Poissonized Variance in the Analysis of Random Digital Trees (joint with Hsien-Kuei Hwang and Vytas Zacharovas) Asymptotic and Exact Poissonized Variance in the Analysis of Random Digital Trees (joint with Hsien-Kuei Hwang and Vytas Zacharovas) Michael Fuchs Institute of Applied Mathematics National Chiao Tung University

More information

7 Asymptotics for Meromorphic Functions

7 Asymptotics for Meromorphic Functions Lecture G jacques@ucsd.edu 7 Asymptotics for Meromorphic Functions Hadamard s Theorem gives a broad description of the exponential growth of coefficients in power series, but the notion of exponential

More information

A Master Theorem for Discrete Divide and Conquer Recurrences

A Master Theorem for Discrete Divide and Conquer Recurrences A Master Theorem for Discrete Divide and Conquer Recurrences Wojciech Szpankowski Department of Computer Science Purdue University W. Lafayette, IN 47907 January 20, 2011 NSF CSoI SODA, 2011 Research supported

More information

Exponential Distribution and Poisson Process

Exponential Distribution and Poisson Process Exponential Distribution and Poisson Process Stochastic Processes - Lecture Notes Fatih Cavdur to accompany Introduction to Probability Models by Sheldon M. Ross Fall 215 Outline Introduction Exponential

More information

Riemann integral and volume are generalized to unbounded functions and sets. is an admissible set, and its volume is a Riemann integral, 1l E,

Riemann integral and volume are generalized to unbounded functions and sets. is an admissible set, and its volume is a Riemann integral, 1l E, Tel Aviv University, 26 Analysis-III 9 9 Improper integral 9a Introduction....................... 9 9b Positive integrands................... 9c Special functions gamma and beta......... 4 9d Change of

More information

The Expected Profile of Digital Search Trees

The Expected Profile of Digital Search Trees The Expected Profile of Digital Search Trees March 24, 2011 Michael Drmota Wojciech Szpankowski Inst. für Diskrete Mathematik und Geometrie Department of Computer Science TU Wien Purdue University A-1040

More information

The Subtree Size Profile of Bucket Recursive Trees

The Subtree Size Profile of Bucket Recursive Trees Iranian Journal of Mathematical Sciences and Informatics Vol., No. (206, pp - DOI: 0.7508/ijmsi.206.0.00 The Subtree Size Profile of Bucket Recursive Trees Ramin Kazemi Department of Statistics, Imam Khomeini

More information

Digital Trees and Memoryless Sources: from Arithmetics to Analysis

Digital Trees and Memoryless Sources: from Arithmetics to Analysis Digital Trees and Memoryless Sources: from Arithmetics to Analysis Philippe Flajolet, Mathieu Roux, Brigitte Vallée AofA 2010, Wien 1 What is a digital tree, aka TRIE? = a data structure for dynamic dictionaries

More information

k-protected VERTICES IN BINARY SEARCH TREES

k-protected VERTICES IN BINARY SEARCH TREES k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from

More information

On the parity of the Wiener index

On the parity of the Wiener index On the parity of the Wiener index Stephan Wagner Department of Mathematical Sciences, Stellenbosch University, Stellenbosch 7602, South Africa Hua Wang Department of Mathematics, University of Florida,

More information

A Master Theorem for Discrete Divide and Conquer Recurrences. Dedicated to PHILIPPE FLAJOLET

A Master Theorem for Discrete Divide and Conquer Recurrences. Dedicated to PHILIPPE FLAJOLET A Master Theorem for Discrete Divide and Conquer Recurrences Wojciech Szpankowski Department of Computer Science Purdue University U.S.A. September 6, 2012 Uniwersytet Jagieloński, Kraków, 2012 Dedicated

More information

Multiple Choice Tries and Distributed Hash Tables

Multiple Choice Tries and Distributed Hash Tables Multiple Choice Tries and Distributed Hash Tables Luc Devroye and Gabor Lugosi and Gahyun Park and W. Szpankowski January 3, 2007 McGill University, Montreal, Canada U. Pompeu Fabra, Barcelona, Spain U.

More information

A FIXED POINT THEOREM FOR GENERALIZED NONEXPANSIVE MULTIVALUED MAPPINGS

A FIXED POINT THEOREM FOR GENERALIZED NONEXPANSIVE MULTIVALUED MAPPINGS Fixed Point Theory, (0), No., 4-46 http://www.math.ubbcluj.ro/ nodeacj/sfptcj.html A FIXED POINT THEOREM FOR GENERALIZED NONEXPANSIVE MULTIVALUED MAPPINGS A. ABKAR AND M. ESLAMIAN Department of Mathematics,

More information

String Complexity. Dedicated to Svante Janson for his 60 Birthday

String Complexity. Dedicated to Svante Janson for his 60 Birthday String Complexity Wojciech Szpankowski Purdue University W. Lafayette, IN 47907 June 1, 2015 Dedicated to Svante Janson for his 60 Birthday Outline 1. Working with Svante 2. String Complexity 3. Joint

More information

First, let me recall the formula I want to prove. Again, ψ is the function. ψ(x) = n<x

First, let me recall the formula I want to prove. Again, ψ is the function. ψ(x) = n<x 8.785: Analytic Number heory, MI, spring 007 (K.S. Kedlaya) von Mangoldt s formula In this unit, we derive von Mangoldt s formula estimating ψ(x) x in terms of the critical zeroes of the Riemann zeta function.

More information

Ch 5.7: Series Solutions Near a Regular Singular Point, Part II

Ch 5.7: Series Solutions Near a Regular Singular Point, Part II Ch 5.7: Series Solutions Near a Regular Singular Point, Part II! Recall from Section 5.6 (Part I): The point x 0 = 0 is a regular singular point of with and corresponding Euler Equation! We assume solutions

More information

Characteristic Functions and the Central Limit Theorem

Characteristic Functions and the Central Limit Theorem Chapter 6 Characteristic Functions and the Central Limit Theorem 6.1 Characteristic Functions 6.1.1 Transforms and Characteristic Functions. There are several transforms or generating functions used in

More information

DIFFERENTIAL CRITERIA FOR POSITIVE DEFINITENESS

DIFFERENTIAL CRITERIA FOR POSITIVE DEFINITENESS PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volume, Number, Pages S -9939(XX)- DIFFERENTIAL CRITERIA FOR POSITIVE DEFINITENESS J. A. PALMER Abstract. We show how the Mellin transform can be used to

More information

Failure of the Raikov Theorem for Free Random Variables

Failure of the Raikov Theorem for Free Random Variables Failure of the Raikov Theorem for Free Random Variables Florent Benaych-Georges DMA, École Normale Supérieure, 45 rue d Ulm, 75230 Paris Cedex 05 e-mail: benaych@dma.ens.fr http://www.dma.ens.fr/ benaych

More information

DS-GA 1002 Lecture notes 2 Fall Random variables

DS-GA 1002 Lecture notes 2 Fall Random variables DS-GA 12 Lecture notes 2 Fall 216 1 Introduction Random variables Random variables are a fundamental tool in probabilistic modeling. They allow us to model numerical quantities that are uncertain: the

More information

Fourier transforms, Generalised functions and Greens functions

Fourier transforms, Generalised functions and Greens functions Fourier transforms, Generalised functions and Greens functions T. Johnson 2015-01-23 Electromagnetic Processes In Dispersive Media, Lecture 2 - T. Johnson 1 Motivation A big part of this course concerns

More information

NOTES ON RIEMANN S ZETA FUNCTION. Γ(z) = t z 1 e t dt

NOTES ON RIEMANN S ZETA FUNCTION. Γ(z) = t z 1 e t dt NOTES ON RIEMANN S ZETA FUNCTION DRAGAN MILIČIĆ. Gamma function.. Definition of the Gamma function. The integral Γz = t z e t dt is well-defined and defines a holomorphic function in the right half-plane

More information

Analysis of the ruin probability using Laplace transforms and Karamata Tauberian theorems

Analysis of the ruin probability using Laplace transforms and Karamata Tauberian theorems Analysis of the ruin probability using Laplace transforms and Karamata Tauberian theorems Corina Constantinescu and Enrique Thomann Abstract The classical result of Cramer-Lundberg states that if the rate

More information

ẋ = f(x, y), ẏ = g(x, y), (x, y) D, can only have periodic solutions if (f,g) changes sign in D or if (f,g)=0in D.

ẋ = f(x, y), ẏ = g(x, y), (x, y) D, can only have periodic solutions if (f,g) changes sign in D or if (f,g)=0in D. 4 Periodic Solutions We have shown that in the case of an autonomous equation the periodic solutions correspond with closed orbits in phase-space. Autonomous two-dimensional systems with phase-space R

More information

1 The functional equation for ζ

1 The functional equation for ζ 18.785: Analytic Number Theory, MIT, spring 27 (K.S. Kedlaya) The functional equation for the Riemann zeta function In this unit, we establish the functional equation property for the Riemann zeta function,

More information

Nontrivial Solutions for Boundary Value Problems of Nonlinear Differential Equation

Nontrivial Solutions for Boundary Value Problems of Nonlinear Differential Equation Advances in Dynamical Systems and Applications ISSN 973-532, Volume 6, Number 2, pp. 24 254 (2 http://campus.mst.edu/adsa Nontrivial Solutions for Boundary Value Problems of Nonlinear Differential Equation

More information

AVERAGE-CASE ANALYSIS OF COUSINS IN m-ary TRIES

AVERAGE-CASE ANALYSIS OF COUSINS IN m-ary TRIES J. Appl. Prob. 45, 888 9 (28) Printed in England Applied Probability Trust 28 AVERAGE-CASE ANALYSIS OF COUSINS IN m-ary TRIES HOSAM M. MAHMOUD, The George Washington University MARK DANIEL WARD, Purdue

More information

On the periodic logistic equation

On the periodic logistic equation On the periodic logistic equation Ziyad AlSharawi a,1 and James Angelos a, a Central Michigan University, Mount Pleasant, MI 48858 Abstract We show that the p-periodic logistic equation x n+1 = µ n mod

More information

Some functional inequalities in variable exponent spaces with a more generalization of uniform continuity condition

Some functional inequalities in variable exponent spaces with a more generalization of uniform continuity condition Int. J. Nonlinear Anal. Appl. 7 26) No. 2, 29-38 ISSN: 28-6822 electronic) http://dx.doi.org/.2275/ijnaa.26.439 Some functional inequalities in variable exponent spaces with a more generalization of uniform

More information

MOMENTS OF HYPERGEOMETRIC HURWITZ ZETA FUNCTIONS

MOMENTS OF HYPERGEOMETRIC HURWITZ ZETA FUNCTIONS MOMENTS OF HYPERGEOMETRIC HURWITZ ZETA FUNCTIONS ABDUL HASSEN AND HIEU D. NGUYEN Abstract. This paper investigates a generalization the classical Hurwitz zeta function. It is shown that many of the properties

More information

Asymptotics of the Eulerian numbers revisited: a large deviation analysis

Asymptotics of the Eulerian numbers revisited: a large deviation analysis Asymptotics of the Eulerian numbers revisited: a large deviation analysis Guy Louchard November 204 Abstract Using the Saddle point method and multiseries expansions we obtain from the generating function

More information

GENERATING SERIES FOR IRREDUCIBLE POLYNOMIALS OVER FINITE FIELDS

GENERATING SERIES FOR IRREDUCIBLE POLYNOMIALS OVER FINITE FIELDS GENERATING SERIES FOR IRREDUCIBLE POLYNOMIALS OVER FINITE FIELDS ARNAUD BODIN Abstract. We count the number of irreducible polynomials in several variables of a given degree over a finite field. The results

More information

Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.

Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements. Lecture: Hélène Barcelo Analytic Combinatorics ECCO 202, Bogotá Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.. Tuesday, June 2, 202 Combinatorics is the study of finite structures that

More information

MATH 722, COMPLEX ANALYSIS, SPRING 2009 PART 5

MATH 722, COMPLEX ANALYSIS, SPRING 2009 PART 5 MATH 722, COMPLEX ANALYSIS, SPRING 2009 PART 5.. The Arzela-Ascoli Theorem.. The Riemann mapping theorem Let X be a metric space, and let F be a family of continuous complex-valued functions on X. We have

More information

Extremal Statistics on Non-Crossing Configurations

Extremal Statistics on Non-Crossing Configurations Extremal Statistics on Non-Crossing Configurations Michael Drmota Anna de Mier Marc Noy Abstract We analye extremal statistics in non-crossing configurations on the n vertices of a convex polygon. We prove

More information

Chapter 6. Characteristic functions

Chapter 6. Characteristic functions Chapter 6 Characteristic functions We define the characteristic function of a random variable X by ' X (t) E e x for t R. Note that ' X (t) R e x P X (dx). So if X and Y have the same law, they have the

More information

Polyexponentials. Khristo N. Boyadzhiev Ohio Northern University Departnment of Mathematics Ada, OH

Polyexponentials. Khristo N. Boyadzhiev Ohio Northern University Departnment of Mathematics Ada, OH Polyexponentials Khristo N. Boyadzhiev Ohio Northern University Departnment of Mathematics Ada, OH 45810 k-boyadzhiev@onu.edu 1. Introduction. The polylogarithmic function [15] (1.1) and the more general

More information

MATH 311: COMPLEX ANALYSIS CONTOUR INTEGRALS LECTURE

MATH 311: COMPLEX ANALYSIS CONTOUR INTEGRALS LECTURE MATH 3: COMPLEX ANALYSIS CONTOUR INTEGRALS LECTURE Recall the Residue Theorem: Let be a simple closed loop, traversed counterclockwise. Let f be a function that is analytic on and meromorphic inside. Then

More information

are the q-versions of n, n! and . The falling factorial is (x) k = x(x 1)(x 2)... (x k + 1).

are the q-versions of n, n! and . The falling factorial is (x) k = x(x 1)(x 2)... (x k + 1). Lecture A jacques@ucsd.edu Notation: N, R, Z, F, C naturals, reals, integers, a field, complex numbers. p(n), S n,, b(n), s n, partition numbers, Stirling of the second ind, Bell numbers, Stirling of the

More information

Growing and Destroying Catalan Stanley Trees

Growing and Destroying Catalan Stanley Trees Discrete Mathematics and Theoretical Computer Science DMTCS vol. 20:1, 2018, #11 Growing and Destroying Catalan Stanley Trees Benjamin Hackl 1 Helmut Prodinger 2 arxiv:1704.03734v3 [math.co] 26 Feb 2018

More information

Source Coding. Master Universitario en Ingeniería de Telecomunicación. I. Santamaría Universidad de Cantabria

Source Coding. Master Universitario en Ingeniería de Telecomunicación. I. Santamaría Universidad de Cantabria Source Coding Master Universitario en Ingeniería de Telecomunicación I. Santamaría Universidad de Cantabria Contents Introduction Asymptotic Equipartition Property Optimal Codes (Huffman Coding) Universal

More information

X.9 Revisited, Cauchy s Formula for Contours

X.9 Revisited, Cauchy s Formula for Contours X.9 Revisited, Cauchy s Formula for Contours Let G C, G open. Let f be holomorphic on G. Let Γ be a simple contour with range(γ) G and int(γ) G. Then, for all z 0 int(γ), f (z 0 ) = 1 f (z) dz 2πi Γ z

More information

Algebraic aspects of some Riordan arrays related to binary words avoiding a pattern

Algebraic aspects of some Riordan arrays related to binary words avoiding a pattern Algebraic aspects of some Riordan arrays related to binary words avoiding a pattern D. Merlini and R. Sprugnoli Dipartimento di Sistemi e Informatica viale Morgagni 65, 5034, Firenze, Italia merlini@dsi.unifi.it,

More information

Bivariate Uniqueness in the Logistic Recursive Distributional Equation

Bivariate Uniqueness in the Logistic Recursive Distributional Equation Bivariate Uniqueness in the Logistic Recursive Distributional Equation Antar Bandyopadhyay Technical Report # 629 University of California Department of Statistics 367 Evans Hall # 3860 Berkeley CA 94720-3860

More information

Fibonacci and Lucas Identities the Golden Way

Fibonacci and Lucas Identities the Golden Way Fibonacci Lucas Identities the Golden Way Kunle Adegoe adegoe00@gmail.com arxiv:1810.12115v1 [math.nt] 25 Oct 2018 Department of Physics Engineering Physics, Obafemi Awolowo University, 220005 Ile-Ife,

More information

arxiv:math/ v1 [math.ca] 8 Nov 2003

arxiv:math/ v1 [math.ca] 8 Nov 2003 arxiv:math/0311126v1 [math.ca] 8 Nov 2003 PARTIAL SUMS OF HYPERGEOMETRIC SERIES OF UNIT ARGUMENT 1 WOLFGANG BÜHRING Abstract. The asymptotic behaviour of partial sums of generalized hypergeometric series

More information

A Note on Integral Transforms and Partial Differential Equations

A Note on Integral Transforms and Partial Differential Equations Applied Mathematical Sciences, Vol 4, 200, no 3, 09-8 A Note on Integral Transforms and Partial Differential Equations Adem Kılıçman and Hassan Eltayeb Department of Mathematics and Institute for Mathematical

More information

In 1826, Abel proved the following result for real power series. Let f(x) =

In 1826, Abel proved the following result for real power series. Let f(x) = Chapter 6 Tauberian theorems 6. Introduction In 826, Abel proved the following result for real power series. Let f(x) = n=0 a nx n be a power series with coefficients a n R that converges on the real interval

More information

SOME IDENTITIES FOR THE RIEMANN ZETA-FUNCTION II. Aleksandar Ivić

SOME IDENTITIES FOR THE RIEMANN ZETA-FUNCTION II. Aleksandar Ivić FACTA UNIVERSITATIS (NIŠ Ser. Math. Inform. 2 (25, 8 SOME IDENTITIES FOR THE RIEMANN ZETA-FUNCTION II Aleksandar Ivić Abstract. Several identities for the Riemann zeta-function ζ(s are proved. For eample,

More information

Analytic Information Theory: From Shannon to Knuth and Back. Knuth80: Piteaa, Sweden, 2018 Dedicated to Don E. Knuth

Analytic Information Theory: From Shannon to Knuth and Back. Knuth80: Piteaa, Sweden, 2018 Dedicated to Don E. Knuth Analytic Information Theory: From Shannon to Knuth and Back Wojciech Szpankowski Center for Science of Information Purdue University January 7, 2018 Knuth80: Piteaa, Sweden, 2018 Dedicated to Don E. Knuth

More information

From the Discrete to the Continuous, and Back... Philippe Flajolet INRIA, France

From the Discrete to the Continuous, and Back... Philippe Flajolet INRIA, France From the Discrete to the Continuous, and Back... Philippe Flajolet INRIA, France 1 Discrete structures in... Combinatorial mathematics Computer science: data structures & algorithms Information and communication

More information

AN EFFECTIVE METRIC ON C(H, K) WITH NORMAL STRUCTURE. Mona Nabiei (Received 23 June, 2015)

AN EFFECTIVE METRIC ON C(H, K) WITH NORMAL STRUCTURE. Mona Nabiei (Received 23 June, 2015) NEW ZEALAND JOURNAL OF MATHEMATICS Volume 46 (2016), 53-64 AN EFFECTIVE METRIC ON C(H, K) WITH NORMAL STRUCTURE Mona Nabiei (Received 23 June, 2015) Abstract. This study first defines a new metric with

More information

Exercises for Part 1

Exercises for Part 1 MATH200 Complex Analysis. Exercises for Part Exercises for Part The following exercises are provided for you to revise complex numbers. Exercise. Write the following expressions in the form x + iy, x,y

More information

Math 220A - Fall 2002 Homework 5 Solutions

Math 220A - Fall 2002 Homework 5 Solutions Math 0A - Fall 00 Homework 5 Solutions. Consider the initial-value problem for the hyperbolic equation u tt + u xt 0u xx 0 < x 0 u t (x, 0) ψ(x). Use energy methods to show that the domain of dependence

More information

INTRODUCTION TO REAL ANALYTIC GEOMETRY

INTRODUCTION TO REAL ANALYTIC GEOMETRY INTRODUCTION TO REAL ANALYTIC GEOMETRY KRZYSZTOF KURDYKA 1. Analytic functions in several variables 1.1. Summable families. Let (E, ) be a normed space over the field R or C, dim E

More information

Bernoulli Polynomials

Bernoulli Polynomials Chapter 4 Bernoulli Polynomials 4. Bernoulli Numbers The generating function for the Bernoulli numbers is x e x = n= B n n! xn. (4.) That is, we are to expand the left-hand side of this equation in powers

More information

Almost all trees have an even number of independent sets

Almost all trees have an even number of independent sets Almost all trees have an even number of independent sets Stephan G. Wagner Department of Mathematical Sciences Stellenbosch University Private Bag X1, Matieland 7602, South Africa swagner@sun.ac.za Submitted:

More information

Strong convergence of multi-step iterates with errors for generalized asymptotically quasi-nonexpansive mappings

Strong convergence of multi-step iterates with errors for generalized asymptotically quasi-nonexpansive mappings Palestine Journal of Mathematics Vol. 1 01, 50 64 Palestine Polytechnic University-PPU 01 Strong convergence of multi-step iterates with errors for generalized asymptotically quasi-nonexpansive mappings

More information

MATH 205C: STATIONARY PHASE LEMMA

MATH 205C: STATIONARY PHASE LEMMA MATH 205C: STATIONARY PHASE LEMMA For ω, consider an integral of the form I(ω) = e iωf(x) u(x) dx, where u Cc (R n ) complex valued, with support in a compact set K, and f C (R n ) real valued. Thus, I(ω)

More information

ASYMPTOTICS OF THE EULERIAN NUMBERS REVISITED: A LARGE DEVIATION ANALYSIS

ASYMPTOTICS OF THE EULERIAN NUMBERS REVISITED: A LARGE DEVIATION ANALYSIS ASYMPTOTICS OF THE EULERIAN NUMBERS REVISITED: A LARGE DEVIATION ANALYSIS GUY LOUCHARD ABSTRACT Using the Saddle point method and multiseries expansions we obtain from the generating function of the Eulerian

More information

Supplementary Notes for W. Rudin: Principles of Mathematical Analysis

Supplementary Notes for W. Rudin: Principles of Mathematical Analysis Supplementary Notes for W. Rudin: Principles of Mathematical Analysis SIGURDUR HELGASON In 8.00B it is customary to cover Chapters 7 in Rudin s book. Experience shows that this requires careful planning

More information

Explicit formulas for computing Bernoulli numbers of the second kind and Stirling numbers of the first kind

Explicit formulas for computing Bernoulli numbers of the second kind and Stirling numbers of the first kind Filomat 28:2 (24), 39 327 DOI.2298/FIL4239O Published by Faculty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Explicit formulas for computing Bernoulli

More information

Notes for Expansions/Series and Differential Equations

Notes for Expansions/Series and Differential Equations Notes for Expansions/Series and Differential Equations In the last discussion, we considered perturbation methods for constructing solutions/roots of algebraic equations. Three types of problems were illustrated

More information

Olga Boyko, Olga Martinyuk, and Vyacheslav Pivovarchik

Olga Boyko, Olga Martinyuk, and Vyacheslav Pivovarchik Opuscula Math. 36, no. 3 016), 301 314 http://dx.doi.org/10.7494/opmath.016.36.3.301 Opuscula Mathematica HIGHER ORDER NEVANLINNA FUNCTIONS AND THE INVERSE THREE SPECTRA PROBLEM Olga Boyo, Olga Martinyu,

More information

An introduction to Birkhoff normal form

An introduction to Birkhoff normal form An introduction to Birkhoff normal form Dario Bambusi Dipartimento di Matematica, Universitá di Milano via Saldini 50, 0133 Milano (Italy) 19.11.14 1 Introduction The aim of this note is to present an

More information

Formulas for probability theory and linear models SF2941

Formulas for probability theory and linear models SF2941 Formulas for probability theory and linear models SF2941 These pages + Appendix 2 of Gut) are permitted as assistance at the exam. 11 maj 2008 Selected formulae of probability Bivariate probability Transforms

More information

ON MORDELL-TORNHEIM AND OTHER MULTIPLE ZETA-FUNCTIONS. (m + n) s 3. n s 2

ON MORDELL-TORNHEIM AND OTHER MULTIPLE ZETA-FUNCTIONS. (m + n) s 3. n s 2 ON MORDELL-TORNHEIM AND OTHER MULTIPLE ZETA-FUNCTIONS KOHJI MATSUMOTO. Introduction In 950, Tornheim [4] introduced the double series m s n s 2 (m + n) s 3 (.) m= n= of three variables, and studied its

More information

EXTENDED RECIPROCAL ZETA FUNCTION AND AN ALTERNATE FORMULATION OF THE RIEMANN HYPOTHESIS. M. Aslam Chaudhry. Received May 18, 2007

EXTENDED RECIPROCAL ZETA FUNCTION AND AN ALTERNATE FORMULATION OF THE RIEMANN HYPOTHESIS. M. Aslam Chaudhry. Received May 18, 2007 Scientiae Mathematicae Japonicae Online, e-2009, 05 05 EXTENDED RECIPROCAL ZETA FUNCTION AND AN ALTERNATE FORMULATION OF THE RIEMANN HYPOTHESIS M. Aslam Chaudhry Received May 8, 2007 Abstract. We define

More information

Notes on the Riemann Zeta Function

Notes on the Riemann Zeta Function Notes on the Riemann Zeta Function March 9, 5 The Zeta Function. Definition and Analyticity The Riemann zeta function is defined for Re(s) > as follows: ζ(s) = n n s. The fact that this function is analytic

More information

arxiv: v1 [math.ca] 4 Oct 2017

arxiv: v1 [math.ca] 4 Oct 2017 ASYMPTOTICS OF SIGNED BERNOULLI CONVOLUTIONS SCALED BY MULTINACCI NUMBERS arxiv:1710.01780v1 [math.ca] 4 Oct 2017 XIANGHONG CHEN AND TIAN-YOU HU Abstract. We study the signed Bernoulli convolution ( ν

More information

Some approximation theorems in Math 522. I. Approximations of continuous functions by smooth functions

Some approximation theorems in Math 522. I. Approximations of continuous functions by smooth functions Some approximation theorems in Math 522 I. Approximations of continuous functions by smooth functions The goal is to approximate continuous functions vanishing at ± by smooth functions. In a previous homewor

More information

COUNTING WITH AB-BA=1

COUNTING WITH AB-BA=1 COUNTING WITH AB-BA=1 PHILIPPE FLAJOLET, ROCQUENCOURT & PAWEL BLASIAK, KRAKÓW COMBINATORIAL MODELS OF ANNIHILATION-CREATION ; IN PREP. (2010) 1 A. = + + B. = 2 Annihilation and Creation A = Annihilate

More information

BALANCING GAUSSIAN VECTORS. 1. Introduction

BALANCING GAUSSIAN VECTORS. 1. Introduction BALANCING GAUSSIAN VECTORS KEVIN P. COSTELLO Abstract. Let x 1,... x n be independent normally distributed vectors on R d. We determine the distribution function of the minimum norm of the 2 n vectors

More information

A Master Theorem for Discrete Divide and Conquer Recurrences

A Master Theorem for Discrete Divide and Conquer Recurrences A Master Theorem for Discrete Divide and Conquer Recurrences MICHAEL DRMOTA and WOJCIECH SZPANKOWSKI TU Wien and Purdue University Divide-and-conquer recurrences are one of the most studied equations in

More information

MARKOV CHAINS A finite state Markov chain is a sequence of discrete cv s from a finite alphabet where is a pmf on and for

MARKOV CHAINS A finite state Markov chain is a sequence of discrete cv s from a finite alphabet where is a pmf on and for MARKOV CHAINS A finite state Markov chain is a sequence S 0,S 1,... of discrete cv s from a finite alphabet S where q 0 (s) is a pmf on S 0 and for n 1, Q(s s ) = Pr(S n =s S n 1 =s ) = Pr(S n =s S n 1

More information

Department of Mathematics, University of California, Berkeley. GRADUATE PRELIMINARY EXAMINATION, Part A Fall Semester 2016

Department of Mathematics, University of California, Berkeley. GRADUATE PRELIMINARY EXAMINATION, Part A Fall Semester 2016 Department of Mathematics, University of California, Berkeley YOUR 1 OR 2 DIGIT EXAM NUMBER GRADUATE PRELIMINARY EXAMINATION, Part A Fall Semester 2016 1. Please write your 1- or 2-digit exam number on

More information

Handout 1 - Contour Integration

Handout 1 - Contour Integration Handout 1 - Contour Integration Will Matern September 19, 214 Abstract The purpose of this handout is to summarize what you need to know to solve the contour integration problems you will see in SBE 3.

More information

Basic Procedures for Common Problems

Basic Procedures for Common Problems Basic Procedures for Common Problems ECHE 550, Fall 2002 Steady State Multivariable Modeling and Control 1 Determine what variables are available to manipulate (inputs, u) and what variables are available

More information

Approximate Counting via the Poisson-Laplace-Mellin Method (joint with Chung-Kuei Lee and Helmut Prodinger)

Approximate Counting via the Poisson-Laplace-Mellin Method (joint with Chung-Kuei Lee and Helmut Prodinger) Approximate Counting via the Poisson-Laplace-Mellin Method (joint with Chung-Kuei Lee and Helmut Prodinger) Michael Fuchs Department of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan

More information

PRIME NUMBER THEOREM

PRIME NUMBER THEOREM PRIME NUMBER THEOREM RYAN LIU Abstract. Prime numbers have always been seen as the building blocks of all integers, but their behavior and distribution are often puzzling. The prime number theorem gives

More information

Bulletin of the Iranian Mathematical Society

Bulletin of the Iranian Mathematical Society ISSN: 117-6X (Print) ISSN: 1735-8515 (Online) Bulletin of the Iranian Mathematical Society Vol. 4 (14), No. 6, pp. 1491 154. Title: The locating chromatic number of the join of graphs Author(s): A. Behtoei

More information

Counting Palindromes According to r-runs of Ones Using Generating Functions

Counting Palindromes According to r-runs of Ones Using Generating Functions 3 47 6 3 Journal of Integer Sequences, Vol. 7 (04), Article 4.6. Counting Palindromes According to r-runs of Ones Using Generating Functions Helmut Prodinger Department of Mathematics Stellenbosch University

More information

Coding for Discrete Source

Coding for Discrete Source EGR 544 Communication Theory 3. Coding for Discrete Sources Z. Aliyazicioglu Electrical and Computer Engineering Department Cal Poly Pomona Coding for Discrete Source Coding Represent source data effectively

More information

LAW OF LARGE NUMBERS FOR THE SIRS EPIDEMIC

LAW OF LARGE NUMBERS FOR THE SIRS EPIDEMIC LAW OF LARGE NUMBERS FOR THE SIRS EPIDEMIC R. G. DOLGOARSHINNYKH Abstract. We establish law of large numbers for SIRS stochastic epidemic processes: as the population size increases the paths of SIRS epidemic

More information

Permutations with Inversions

Permutations with Inversions 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 4 2001, Article 01.2.4 Permutations with Inversions Barbara H. Margolius Cleveland State University Cleveland, Ohio 44115 Email address: b.margolius@csuohio.edu

More information

= 2e t e 2t + ( e 2t )e 3t = 2e t e t = e t. Math 20D Final Review

= 2e t e 2t + ( e 2t )e 3t = 2e t e t = e t. Math 20D Final Review Math D Final Review. Solve the differential equation in two ways, first using variation of parameters and then using undetermined coefficients: Corresponding homogenous equation: with characteristic equation

More information

Lecture 3. Mathematical methods in communication I. REMINDER. A. Convex Set. A set R is a convex set iff, x 1,x 2 R, θ, 0 θ 1, θx 1 + θx 2 R, (1)

Lecture 3. Mathematical methods in communication I. REMINDER. A. Convex Set. A set R is a convex set iff, x 1,x 2 R, θ, 0 θ 1, θx 1 + θx 2 R, (1) 3- Mathematical methods in communication Lecture 3 Lecturer: Haim Permuter Scribe: Yuval Carmel, Dima Khaykin, Ziv Goldfeld I. REMINDER A. Convex Set A set R is a convex set iff, x,x 2 R, θ, θ, θx + θx

More information

Successive Derivatives and Integer Sequences

Successive Derivatives and Integer Sequences 2 3 47 6 23 Journal of Integer Sequences, Vol 4 (20, Article 73 Successive Derivatives and Integer Sequences Rafael Jaimczu División Matemática Universidad Nacional de Luján Buenos Aires Argentina jaimczu@mailunlueduar

More information

) ) = γ. and P ( X. B(a, b) = Γ(a)Γ(b) Γ(a + b) ; (x + y, ) I J}. Then, (rx) a 1 (ry) b 1 e (x+y)r r 2 dxdy Γ(a)Γ(b) D

) ) = γ. and P ( X. B(a, b) = Γ(a)Γ(b) Γ(a + b) ; (x + y, ) I J}. Then, (rx) a 1 (ry) b 1 e (x+y)r r 2 dxdy Γ(a)Γ(b) D 3 Independent Random Variables II: Examples 3.1 Some functions of independent r.v. s. Let X 1, X 2,... be independent r.v. s with the known distributions. Then, one can compute the distribution of a r.v.

More information

Applications of Analytic Combinatorics in Mathematical Biology (joint with H. Chang, M. Drmota, E. Y. Jin, and Y.-W. Lee)

Applications of Analytic Combinatorics in Mathematical Biology (joint with H. Chang, M. Drmota, E. Y. Jin, and Y.-W. Lee) Applications of Analytic Combinatorics in Mathematical Biology (joint with H. Chang, M. Drmota, E. Y. Jin, and Y.-W. Lee) Michael Fuchs Department of Applied Mathematics National Chiao Tung University

More information

Optional Stopping Theorem Let X be a martingale and T be a stopping time such

Optional Stopping Theorem Let X be a martingale and T be a stopping time such Plan Counting, Renewal, and Point Processes 0. Finish FDR Example 1. The Basic Renewal Process 2. The Poisson Process Revisited 3. Variants and Extensions 4. Point Processes Reading: G&S: 7.1 7.3, 7.10

More information

1 Euler s idea: revisiting the infinitude of primes

1 Euler s idea: revisiting the infinitude of primes 8.785: Analytic Number Theory, MIT, spring 27 (K.S. Kedlaya) The prime number theorem Most of my handouts will come with exercises attached; see the web site for the due dates. (For example, these are

More information

Stochastic Volatility and Correction to the Heat Equation

Stochastic Volatility and Correction to the Heat Equation Stochastic Volatility and Correction to the Heat Equation Jean-Pierre Fouque, George Papanicolaou and Ronnie Sircar Abstract. From a probabilist s point of view the Twentieth Century has been a century

More information

Theorem [Mean Value Theorem for Harmonic Functions] Let u be harmonic on D(z 0, R). Then for any r (0, R), u(z 0 ) = 1 z z 0 r

Theorem [Mean Value Theorem for Harmonic Functions] Let u be harmonic on D(z 0, R). Then for any r (0, R), u(z 0 ) = 1 z z 0 r 2. A harmonic conjugate always exists locally: if u is a harmonic function in an open set U, then for any disk D(z 0, r) U, there is f, which is analytic in D(z 0, r) and satisfies that Re f u. Since such

More information

Existence of solution and solving the integro-differential equations system by the multi-wavelet Petrov-Galerkin method

Existence of solution and solving the integro-differential equations system by the multi-wavelet Petrov-Galerkin method Int. J. Nonlinear Anal. Appl. 7 (6) No., 7-8 ISSN: 8-68 (electronic) http://dx.doi.org/.75/ijnaa.5.37 Existence of solution and solving the integro-differential equations system by the multi-wavelet Petrov-Galerkin

More information