Use of patterns in n-tuple combinatorial generation

Size: px
Start display at page:

Download "Use of patterns in n-tuple combinatorial generation"

Transcription

1 Use of patterns in n-tuple combinatorial generation Dominik Zalewski Faculty of Mathematics and Computer Science UAM Otwarte Wykłady dla Doktorantów May 2007

2 Agenda 1 Applications Peer-to-peer networks Calendaring 2 Combinatorial generation Model Data structures Algorithms 3 Running time Theoretical analysis Experimental results

3 Bibliografia D. E. Knuth, The art of computer programming: Volume 4, Addison Wesley, D. L. Kreher and D. R. Stinson, Combinatorial algorithms: Generation, enumeration and search, CRC press LTC, Boca Raton, Florida, Dmitri Loguinov, Juan Casas, and Xiaoming Wang, Graph-theoretic analysis of structured peer-to-peer systems: routing distances and fault resilience, IEEE/ACM Trans. Netw. 13 (2005), no. 5, C. D. Savage, A survey of combinatorial gray codes, Paul Vixie, Cron manual, 1993.

4 Agenda 1 Applications Peer-to-peer networks Calendaring 2 Combinatorial generation Model Data structures Algorithms 3 Running time Theoretical analysis Experimental results

5 Chord definition Choose key space S, such that S = 2 m. Assign a random key k i S to every node in the network Order nodes such that they form cyclic list and k i < k i+1 Every node v keeps its routing table R v of size m, such that R i [j] stores address of node in distance 2 j from v

6 Chord searching

7 Distributed Hashtables Other structured peer-to-peer networks based on DHT use minimal-change topologies like n-cube Butterfly de Brujin graph What if someone wanted to visit some subset of nodes?

8 Distributed Hashtables Other structured peer-to-peer networks based on DHT use minimal-change topologies like n-cube Butterfly de Brujin graph What if someone wanted to visit some subset of nodes?

9 Agenda 1 Applications Peer-to-peer networks Calendaring 2 Combinatorial generation Model Data structures Algorithms 3 Running time Theoretical analysis Experimental results

10 Software Personal Information Mangement (PIM): Palm Desktop, Mozilla Google Calendar CRON

11 PIM pattern specification choose exclusively one of the patterns (granularity) choose start and end date

12 PIM views

13 CRON pattern specification 6 fields: year, month, dom, dow, hour, minute example:,, 1 15,, 0 23/2, 0 runs in background checking every minute if there is an event matching a pattern How to generate monthly view for CRON?

14 CRON pattern specification 6 fields: year, month, dom, dow, hour, minute example:,, 1 15,, 0 23/2, 0 runs in background checking every minute if there is an event matching a pattern How to generate monthly view for CRON?

15 Agenda 1 Applications Peer-to-peer networks Calendaring 2 Combinatorial generation Model Data structures Algorithms 3 Running time Theoretical analysis Experimental results

16 Sequence spaces Definition (Consecutive sequence space) Space Ω n is called consecutive sequence space iff for some n N, s j N, e j N we have Ω n = {(a n ) : s j a j e j, 1 j n, a j N}. Definition (Pattern sequence space) Space Ψ n is called pattern sequence space iff for some n N and characteristic functions χ = (χ n ), where χ j : N {0, 1} for all 1 j n, we have Ψ n = {(a n ) : χ j (a j ) = 1, 1 j n, a j N}.

17 Sequence spaces Definition (Consecutive sequence space) Space Ω n is called consecutive sequence space iff for some n N, s j N, e j N we have Ω n = {(a n ) : s j a j e j, 1 j n, a j N}. Definition (Pattern sequence space) Space Ψ n is called pattern sequence space iff for some n N and characteristic functions χ = (χ n ), where χ j : N {0, 1} for all 1 j n, we have Ψ n = {(a n ) : χ j (a j ) = 1, 1 j n, a j N}.

18 Sequence ranges Definition (Sequence range) A pair ((f n ), (t n )) is called sequence range iff (f n ) Ω n, (t n ) Ω n and (f n ) Ωn (t n ). Definition (Sequence space subrange) Sequence range ((f n ), (t n )) generates sequence space subrange Φn f,t for some sequence space Φ n where Φ f,t n = {(a n ) Φ n : (f n ) (a n ) (t n )} and by Φ n we may take pattern sequence space Ψ n or consecutive sequence space Ω n.

19 Sequence ranges Definition (Sequence range) A pair ((f n ), (t n )) is called sequence range iff (f n ) Ω n, (t n ) Ω n and (f n ) Ωn (t n ). Definition (Sequence space subrange) Sequence range ((f n ), (t n )) generates sequence space subrange Φn f,t for some sequence space Φ n where Φ f,t n = {(a n ) Φ n : (f n ) (a n ) (t n )} and by Φ n we may take pattern sequence space Ψ n or consecutive sequence space Ω n.

20 Not so easy task Definition (Pattern sequence rookie) Sequence (r n ) Ψ f,t n is called pattern sequence rookie iff (a n ) Ψ f,t n : (r n ) (a n ). Solution: find pattern sequence rookie!

21 Not so easy task Definition (Pattern sequence rookie) Sequence (r n ) Ψ f,t n is called pattern sequence rookie iff (a n ) Ψ f,t n : (r n ) (a n ). Solution: find pattern sequence rookie!

22 Agenda 1 Applications Peer-to-peer networks Calendaring 2 Combinatorial generation Model Data structures Algorithms 3 Running time Theoretical analysis Experimental results

23 Pattern Definition (Pattern) Let Γ = (Γ n ) be a pattern defined as (Γ j ) = supp{χ j } for all 1 j n. Definition (Filtered pattern) For sequence range ((f n ), (t n )) we define Γ f = (Γ f n) to be a filtered pattern, where Γ f j = Γ j {f j,..., } for all 1 j n.

24 Pattern Definition (Pattern) Let Γ = (Γ n ) be a pattern defined as (Γ j ) = supp{χ j } for all 1 j n. Definition (Filtered pattern) For sequence range ((f n ), (t n )) we define Γ f = (Γ f n) to be a filtered pattern, where Γ f j = Γ j {f j,..., } for all 1 j n.

25 Agenda 1 Applications Peer-to-peer networks Calendaring 2 Combinatorial generation Model Data structures Algorithms 3 Running time Theoretical analysis Experimental results

26 Naive generate Algorithm 2.1: NAIVEGENERATE((f n ), (t n ), (χ n )) global ε (c n ) (f n ) (1) while (c n ) (t n ) (2) if χ((c n )) 1 (3) do then output ((c n )) (4) (c n ) (c n ) ε (5)

27 JSUCCESSOR() Algorithm 2.2: JSUCCESSOR(j, (c n ), (Γ n )) global (λ n ) i j while i > 0 and λ i = Γ i (1) do i i 1 if i = 0 then return ( undefined ) (s n ) (c n ) (2) λ i λ i + 1 s i Γ i,λi for k { i + 1 to j (3) λk = 1 do s k Γ k,1 return ((s n )) (4)

28 More definitions Definition (Favorite subsequence) Subsequence (u j ) = (u 1, u 2,..., u j ) for 1 j n is called favorite subsequence of sequence space subrange Ψ f,t n iff (u j ) is a pattern sequence rookie of sequence space subrange Ψ f,t j.

29 Favorite subsequence lemma Lemma If (u j 1 ) Ψ f,t,t j 1 is a favorite subsequence of Ψf n for 1 < j n and pattern sequence rookie (r n ) Ψ f n,t exists then: (T1) (u 1, u 2,..., u j 1, Γ f j,1, Γ j+1,1, Γ j+2,1,..., Γ n,1 ) is a pattern sequence rookie of Ψ f n,t when f j < Γ f j,1, (T2) (v 1, v 2,..., v j 1, Γ j,1, Γ j+1,1,..., Γ n,1 ) is a pattern sequence rookie of Ψ f n,t when Γ f j,1 does not exist, where (v j 1) Ψ f,t j 1 is a successor of (u j 1 ) Ψ f,t j 1, (R) (u 1, u 2,..., u j 1, Γ f,t j,1 ) Ψf j is a favorite subsequence of Ψ f n,t when f j = Γ f j,1. If j = 1 and pattern sequence rookie (r n ) Ψ f n,t,t ) is a favorite subsequence of Ψf (Γ f 1,1 n. exists, then

30 Auxiliary array (λ f ) Definition { 0, (Γ λ f f j = j ) = z : Γ j,z = Γ f j,1, (Γf j )

31 GETFIRST() Algorithm 2.3: GETFIRST((f n ), (t n ), (Γ n )) for j 1 to n if λ f j = 0 { (rn ) JSUCCESSOR(j 1, (r then n ), (Γ n )) break r j Γ j,λ f do j λ j λ f j if f j < Γ j,λ f { j j j + 1 then break for i j to n do r i Γ i,1 return ((r n ))

32 GETFIRST() validity Theorem Algorithm GETFIRST() returns pattern sequence rookie (r n ) of sequence space subrange Ψ f,t n, if (r n ) exists.

33 Pattern generate Algorithm 2.4: PATTERNGENERATE((f n ), (t n ), (Γ n )) (c n ) GETFIRST((f n ), (t n ), (Γ n )) while { (c n ) undefined output ((cn )) do (c n ) JSUCCESSOR(n, (c n ), (Γ n ))

34 Agenda 1 Applications Peer-to-peer networks Calendaring 2 Combinatorial generation Model Data structures Algorithms 3 Running time Theoretical analysis Experimental results

35 Granularity Definition (Pattern granularity) Let us take sequence range ((f n ), (t n )) and pattern Γ. We define pattern granularity as gran(γ) = Ψf,t n Ω f,t n

36 Naive generate running time Algorithm 3.1: NAIVEGENERATE((f n ), (t n ), (χ n )) global ε (c n ) (f n ) (1) while (c n ) (t n ) (2) if χ((c n )) 1 (3) do then output ((c n )) (4) (c n ) (c n ) ε (5) 1,t O(n Ωf n ) = O(n 1,t Ωf n ) ε ε

37 Pattern generate running time Algorithm 3.2: PATTERNGENERATE((f n ), (t n ), (Γ n )) (c n ) GETFIRST((f n ), (t n ), (Γ n )) while { (c n ) undefined output ((cn )) do (c n ) JSUCCESSOR(n, (c n ), (Γ n )) O(n log n + n gran(γ n ) Ω f,t n ) = O(n gran(γ n ) Ω f,t n ).

38 Agenda 1 Applications Peer-to-peer networks Calendaring 2 Combinatorial generation Model Data structures Algorithms 3 Running time Theoretical analysis Experimental results

39

40 Ω f n,t T h t h T min t min ms 1.53ms 2.94ms 1.7ms ms 3.12ms 4.33ms 3.35ms ms 4.99ms 6.18ms 5.49ms 1h 2.22ms 8.79ms 10.25ms 10.11ms 2h 2.44ms 16.4ms 17.79ms 18.48ms 4h 2.75ms 31.79ms 33.3ms 35.6ms 8h 3.96ms 62.54ms 63.68ms 70.5ms 16h 4.9ms ms ms ms 1m ms m ms m ms m y y y

41 Summary Define RANK() and UNRANK() for lexicographic ordering Define all algorithms for minimal-change ordering Apply to peer-to-peer structured networks

42 Summary Define RANK() and UNRANK() for lexicographic ordering Define all algorithms for minimal-change ordering Apply to peer-to-peer structured networks

43 Summary Define RANK() and UNRANK() for lexicographic ordering Define all algorithms for minimal-change ordering Apply to peer-to-peer structured networks

Combinatorial algorithms

Combinatorial algorithms Combinatorial algorithms computing subset rank and unrank, Gray codes, k-element subset rank and unrank, computing permutation rank and unrank Jiří Vyskočil, Radek Mařík 2012 Combinatorial Generation definition:

More information

Robert E. Kennedy Curtis N. Cooper. Central Missouri State University Warrensburg, Missouri

Robert E. Kennedy Curtis N. Cooper. Central Missouri State University Warrensburg, Missouri THE STATISTICS OF THE SMALLEST SPACE ON A LOTTERY TICKET by Robert E Kennedy Curtis N Cooper Central Missouri State University Warrensburg Missouri Introduction A day hardly goes by without hearing that

More information

Constant Time Generation of Set Partitions

Constant Time Generation of Set Partitions 930 PAPER Special Section on Selected Papers from the 17th Workshop on Circuits and Systems in Karuizawa Constant Time Generation of Set Partitions Shin-ichiro KAWANO a) and Shin-ichi NAKANO b), Members

More information

On Superposition of Heterogeneous Edge Processes in Dynamic Random Graphs

On Superposition of Heterogeneous Edge Processes in Dynamic Random Graphs On Superposition of Heterogeneous Edge Processes in Dynamic Random Graphs Zhongmei Yao (Univerity of Dayton) Daren B.H. Cline (Texas A&M University) Dmitri Loguinov (Texas A&M University) IEEE INFOCOM

More information

De Bruijn Sequences for the Binary Strings with Maximum Density

De Bruijn Sequences for the Binary Strings with Maximum Density De Bruijn Sequences for the Binary Strings with Maximum Density Joe Sawada 1, Brett Stevens 2, and Aaron Williams 2 1 jsawada@uoguelph.ca School of Computer Science, University of Guelph, CANADA 2 brett@math.carleton.ca

More information

Fast Searching for Andrews Curtis Trivializations

Fast Searching for Andrews Curtis Trivializations Fast Searching for Andrews Curtis Trivializations R. Sean Bowman and Stephen B. McCaul CONTENTS 1. Introduction 2. Breadth-First Search 3. Experiments and Discussion 4. Conclusion Acknowledgments References

More information

Week 4-5: Generating Permutations and Combinations

Week 4-5: Generating Permutations and Combinations Week 4-5: Generating Permutations and Combinations February 27, 2017 1 Generating Permutations We have learned that there are n! permutations of {1, 2,...,n}. It is important in many instances to generate

More information

A lower bound for the maximum topological entropy of 4k + 2 cycles of interval maps

A lower bound for the maximum topological entropy of 4k + 2 cycles of interval maps A lower bound for the maximum topological entropy of 4k + 2 cycles of interval maps Lluís Alsedà in collaboration with D. Juher and D. King to appear in Experimental Mathematics Departament de Matemàtiques

More information

Generating Permutations and Combinations

Generating Permutations and Combinations Generating Permutations and Combinations March 0, 005 Generating Permutations We have learned that there are n! permutations of {,,, n} It is important in many instances to generate a list of such permutations

More information

Alternative Combinatorial Gray Codes

Alternative Combinatorial Gray Codes Alternative Combinatorial Gray Codes Cormier-Iijima, Samuel sciyoshi@gmail.com December 17, 2010 Abstract Gray codes have numerous applications in a variety of fields, including error correction, encryption,

More information

Hanoi Graphs and Some Classical Numbers

Hanoi Graphs and Some Classical Numbers Hanoi Graphs and Some Classical Numbers Sandi Klavžar Uroš Milutinović Ciril Petr Abstract The Hanoi graphs Hp n model the p-pegs n-discs Tower of Hanoi problem(s). It was previously known that Stirling

More information

The Complexity of a Reliable Distributed System

The Complexity of a Reliable Distributed System The Complexity of a Reliable Distributed System Rachid Guerraoui EPFL Alexandre Maurer EPFL Abstract Studying the complexity of distributed algorithms typically boils down to evaluating how the number

More information

Fixed-Density Necklaces and Lyndon Words in Cool-lex Order

Fixed-Density Necklaces and Lyndon Words in Cool-lex Order Fixed-Density Necklaces and Lyndon Words in Cool-lex Order J. Sawada A. Williams July 6, 2009 Abstract This paper creates a simple Gray code for fixed-density binary necklaces and Lyndon words. The Gray

More information

Enumerating Binary Strings

Enumerating Binary Strings International Mathematical Forum, Vol. 7, 2012, no. 38, 1865-1876 Enumerating Binary Strings without r-runs of Ones M. A. Nyblom School of Mathematics and Geospatial Science RMIT University Melbourne,

More information

Minimal enumerations of subsets of a nite set and the middle level problem

Minimal enumerations of subsets of a nite set and the middle level problem Discrete Applied Mathematics 114 (2001) 109 114 Minimal enumerations of subsets of a nite set and the middle level problem A.A. Evdokimov, A.L. Perezhogin 1 Sobolev Institute of Mathematics, Novosibirsk

More information

Polya theory (With a radar application motivation)

Polya theory (With a radar application motivation) Polya theory (With a radar application motivation) Daniel Zwillinger, PhD 5 April 200 Sudbury --623 telephone 4 660 Daniel I Zwillinger@raytheon.com http://www.az-tec.com/zwillinger/talks/2000405/ http://nesystemsengineering.rsc.ray.com/training/memo.polya.pdf

More information

Unranked Tree Automata with Sibling Equalities and Disequalities

Unranked Tree Automata with Sibling Equalities and Disequalities Unranked Tree Automata with Sibling Equalities and Disequalities Wong Karianto Christof Löding Lehrstuhl für Informatik 7, RWTH Aachen, Germany 34th International Colloquium, ICALP 2007 Xu Gao (NFS) Unranked

More information

Finite State Automata and Simple Conceptual Graphs with Binary Conceptual Relations

Finite State Automata and Simple Conceptual Graphs with Binary Conceptual Relations Finite State Automata and Simple Conceptual Graphs with Binary Conceptual Relations Galia Angelova and Stoyan Mihov Institute for Parallel Processing, Bulgarian Academy of Sciences 25A Acad. G. Bonchev

More information

Iterations of sum of powers of digits

Iterations of sum of powers of digits International Journal of Computer Discovered Mathematics (IJCDM) ISSN 2367-7775 c IJCDM November 2015, Volume 0, No.0, pp.21-26. Received 18 July 2015. Published on-line 15 September 2015 web: http://www.journal-1.eu/

More information

α-recursion Theory and Ordinal Computability

α-recursion Theory and Ordinal Computability α-recursion Theory and Ordinal Computability by Peter Koepke University of Bonn 1 3. 2. 2007 Abstract Motivated by a talk of S. D. Friedman at BIWOC we show that the α-recursive and α-recursively enumerable

More information

Antipodal Gray Codes

Antipodal Gray Codes Antipodal Gray Codes Charles E Killian, Carla D Savage,1 Department of Computer Science N C State University, Box 8206 Raleigh, NC 27695, USA Abstract An n-bit Gray code is a circular listing of the 2

More information

Synthetic Computability (Computability Theory without Computers)

Synthetic Computability (Computability Theory without Computers) Synthetic Computability (Computability Theory without Computers) Andrej Bauer Department of Mathematics and Physics University of Ljubljana Slovenia Gargnano, Lago di Garda, September 2006 What is synthetic

More information

m=1 . ( bzq; q2 ) k (zq 2 ; q 2 ) k . (1 + bzq4k 1 ) (1 + bzq 2k 1 ). Here and in what follows, we have made use of the standard notation (a) n = j=0

m=1 . ( bzq; q2 ) k (zq 2 ; q 2 ) k . (1 + bzq4k 1 ) (1 + bzq 2k 1 ). Here and in what follows, we have made use of the standard notation (a) n = j=0 PARTITIONS WITH NON-REPEATING ODD PARTS AND COMBINATORIAL IDENTITIES Krishnaswami Alladi* Abstract: Continuing our earlier work on partitions with non-repeating odd parts and q-hypergeometric identities,

More information

Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets

Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets Navid Nasr Esfahani, Ian Goldberg and Douglas R. Stinson David R. Cheriton School of Computer Science University of

More information

This article was originally published in a journal published by Elsevier, and the attached copy is provided by Elsevier for the author s benefit and for the benefit of the author s institution, for non-commercial

More information

Mix-Automatic Sequences

Mix-Automatic Sequences Mix-Automatic Sequences Jörg Endrullis 1, Clemens Grabmayer 2, and Dimitri Hendriks 1 1 VU University Amsterdam 2 Utrecht University Abstract. Mix-automatic sequences form a proper extension of the class

More information

Grand Dyck consecutive patterns avoiding binary words

Grand Dyck consecutive patterns avoiding binary words Grand Dyck consecutive patterns avoiding binary words A.Bernini S.Bilotta E.Pergola R.Pinzani UNIVERSITA DEGLI STUDI DI FIRENZE Dipartimento di Matematica e Informatica Permutation Patterns 203 A.Bernini

More information

A fast algorithm to generate necklaces with xed content

A fast algorithm to generate necklaces with xed content Theoretical Computer Science 301 (003) 477 489 www.elsevier.com/locate/tcs Note A fast algorithm to generate necklaces with xed content Joe Sawada 1 Department of Computer Science, University of Toronto,

More information

ARTICLE IN PRESS. Hanoi graphs and some classical numbers. Received 11 January 2005; received in revised form 20 April 2005

ARTICLE IN PRESS. Hanoi graphs and some classical numbers. Received 11 January 2005; received in revised form 20 April 2005 PROD. TYPE: COM PP: -8 (col.fig.: nil) EXMATH2002 DTD VER:.0. ED: Devanandh PAGN: Vijay -- SCAN: SGeetha Expo. Math. ( ) www.elsevier.de/exmath Hanoi graphs and some classical numbers Sandi Klavžar a,,

More information

Dominating Set. Chapter 26

Dominating Set. Chapter 26 Chapter 26 Dominating Set In this chapter we present another randomized algorithm that demonstrates the power of randomization to break symmetries. We study the problem of finding a small dominating set

More information

Dominating Set. Chapter Sequential Greedy Algorithm 294 CHAPTER 26. DOMINATING SET

Dominating Set. Chapter Sequential Greedy Algorithm 294 CHAPTER 26. DOMINATING SET 294 CHAPTER 26. DOMINATING SET 26.1 Sequential Greedy Algorithm Chapter 26 Dominating Set Intuitively, to end up with a small dominating set S, nodes in S need to cover as many neighbors as possible. It

More information

A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks

A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks Maura B. Paterson Department of Economics, Mathematics and Statistics Birkbeck, University of London Malet Street, London

More information

Asymptotic Analysis. Slides by Carl Kingsford. Jan. 27, AD Chapter 2

Asymptotic Analysis. Slides by Carl Kingsford. Jan. 27, AD Chapter 2 Asymptotic Analysis Slides by Carl Kingsford Jan. 27, 2014 AD Chapter 2 Independent Set Definition (Independent Set). Given a graph G = (V, E) an independent set is a set S V if no two nodes in S are joined

More information

On the Satisfiability of Two-Variable Logic over Data Words

On the Satisfiability of Two-Variable Logic over Data Words On the Satisfiability of Two-Variable Logic over Data Words Claire David, Leonid Libkin, and Tony Tan School of Informatics, University of Edinburgh Abstract. Data trees and data words have been studied

More information

A novel constant degree and constant congestion DHT scheme for peer-to-peer networks

A novel constant degree and constant congestion DHT scheme for peer-to-peer networks Science in China Ser. F Information Sciences 2005 Vol.48 No.4 421 436 421 A novel constant degree and constant congestion DHT scheme for peer-to-peer networks LI Dongsheng & LU Xicheng School of Computer,

More information

Divide-and-Conquer Algorithms Part Two

Divide-and-Conquer Algorithms Part Two Divide-and-Conquer Algorithms Part Two Recap from Last Time Divide-and-Conquer Algorithms A divide-and-conquer algorithm is one that works as follows: (Divide) Split the input apart into multiple smaller

More information

Axiomatic Decision Theory

Axiomatic Decision Theory Decision Theory Decision theory is about making choices It has a normative aspect what rational people should do... and a descriptive aspect what people do do Not surprisingly, it s been studied by economists,

More information

Pancycles and Hamiltonian-Connectedness of the Hierarchical Cubic Network

Pancycles and Hamiltonian-Connectedness of the Hierarchical Cubic Network Pancycles and Hamiltonian-Connectedness of the Hierarchical Cubic Network Jung-Sheng Fu Takming College, Taipei, TAIWAN jsfu@mail.takming.edu.tw Gen-Huey Chen Department of Computer Science and Information

More information

arxiv: v1 [math.co] 30 Mar 2010

arxiv: v1 [math.co] 30 Mar 2010 arxiv:1003.5939v1 [math.co] 30 Mar 2010 Generalized Fibonacci recurrences and the lex-least De Bruijn sequence Joshua Cooper April 1, 2010 Abstract Christine E. Heitsch The skew of a binary string is the

More information

COMS E F15. Lecture 22: Linearity Testing Sparse Fourier Transform

COMS E F15. Lecture 22: Linearity Testing Sparse Fourier Transform COMS E6998-9 F15 Lecture 22: Linearity Testing Sparse Fourier Transform 1 Administrivia, Plan Thu: no class. Happy Thanksgiving! Tue, Dec 1 st : Sergei Vassilvitskii (Google Research) on MapReduce model

More information

Vocabulary: I. Inverse Variation: Two variables x and y show inverse variation if they are related as. follows: where a 0

Vocabulary: I. Inverse Variation: Two variables x and y show inverse variation if they are related as. follows: where a 0 8.1: Model Inverse and Joint Variation I. Inverse Variation: Two variables x and y show inverse variation if they are related as follows: where a 0 * In this equation y is said to vary inversely with x.

More information

A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks

A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo 3rd Biennial Canadian Discrete

More information

A Logic Primer. Stavros Tripakis University of California, Berkeley. Stavros Tripakis (UC Berkeley) EE 144/244, Fall 2014 A Logic Primer 1 / 35

A Logic Primer. Stavros Tripakis University of California, Berkeley. Stavros Tripakis (UC Berkeley) EE 144/244, Fall 2014 A Logic Primer 1 / 35 EE 144/244: Fundamental Algorithms for System Modeling, Analysis, and Optimization Fall 2014 A Logic Primer Stavros Tripakis University of California, Berkeley Stavros Tripakis (UC Berkeley) EE 144/244,

More information

10.4 The Kruskal Katona theorem

10.4 The Kruskal Katona theorem 104 The Krusal Katona theorem 141 Example 1013 (Maximum weight traveling salesman problem We are given a complete directed graph with non-negative weights on edges, and we must find a maximum weight Hamiltonian

More information

ω-stable Theories: Introduction

ω-stable Theories: Introduction ω-stable Theories: Introduction 1 ω - Stable/Totally Transcendental Theories Throughout let T be a complete theory in a countable language L having infinite models. For an L-structure M and A M let Sn

More information

A SUMMATION FORMULA FOR SEQUENCES INVOLVING FLOOR AND CEILING FUNCTIONS

A SUMMATION FORMULA FOR SEQUENCES INVOLVING FLOOR AND CEILING FUNCTIONS ROCKY MOUNTAIN JOURNAL OF MATHEMATICS Volume 36, Number 5, 006 A SUMMATION FORMULA FOR SEQUENCES INVOLVING FLOOR AND CEILING FUNCTIONS M.A. NYBLOM ABSTRACT. A closed form expression for the Nth partial

More information

T Combinatorial algorithms. Combinatorial structures. T Combinatorial algorithms

T Combinatorial algorithms. Combinatorial structures. T Combinatorial algorithms T 79.5202 Combinatorial algorithms Harri Haanpää Laboratory for Theoretical Computer Science, TKK Spring 2007 Enumerating structures Enumerating subsets Permutations and enumerating them Integer partitions

More information

Minimal digraphs with given imbalance sequence

Minimal digraphs with given imbalance sequence Acta Univ. Sapientiae, Mathematica, 4, 1 (2012) 86 101 Minimal digraphs with given imbalance sequence Shariefuddin Pirzada University of Kashmir Department of Mathematics Srinagar, India email: sdpirzada@yahoo.co.in

More information

New Minimal Weight Representations for Left-to-Right Window Methods

New Minimal Weight Representations for Left-to-Right Window Methods New Minimal Weight Representations for Left-to-Right Window Methods James A. Muir 1 and Douglas R. Stinson 2 1 Department of Combinatorics and Optimization 2 School of Computer Science University of Waterloo

More information

REALCOMPACTNESS IN MAXIMAL AND SUBMAXIMAL SPACES.

REALCOMPACTNESS IN MAXIMAL AND SUBMAXIMAL SPACES. REALCOMPACTNESS IN MAXIMAL AND SUBMAXIMAL SPACES. FERNANDO HERNÁNDEZ-HERNÁNDEZ, OLEG PAVLOV, PAUL J. SZEPTYCKI, AND ARTUR H. TOMITA Abstract. We study realcompactness in the classes of submaximal and maximal

More information

Sensitivity, Block Sensitivity and Certificate Complexity of Boolean Functions (Master s Thesis)

Sensitivity, Block Sensitivity and Certificate Complexity of Boolean Functions (Master s Thesis) Sensitivity, Block Sensitivity and Certificate Complexity of Boolean Functions (Master s Thesis) Sourav Chakraborty Thesis Advisor: László Babai February, 2005 Abstract We discuss several complexity measures

More information

Gray Codes and Overlap Cycles for Restricted Weight Words

Gray Codes and Overlap Cycles for Restricted Weight Words Gray Codes and Overlap Cycles for Restricted Weight Words Victoria Horan Air Force Research Laboratory Information Directorate Glenn Hurlbert School of Mathematical and Statistical Sciences Arizona State

More information

THE CHARACTERISTIC SEQUENCE OF A FIRST-ORDER FORMULA

THE CHARACTERISTIC SEQUENCE OF A FIRST-ORDER FORMULA THE CHARACTERISTIC SEQUENCE OF A FIRST-ORDER FORMULA M. E. MALLIARIS Abstract. For a first-order formula ϕ(x; y) we introduce and study the characteristic sequence P n : n < ω of hypergraphs defined by

More information

Solving the MWT. Recall the ILP for the MWT. We can obtain a solution to the MWT problem by solving the following ILP:

Solving the MWT. Recall the ILP for the MWT. We can obtain a solution to the MWT problem by solving the following ILP: Solving the MWT Recall the ILP for the MWT. We can obtain a solution to the MWT problem by solving the following ILP: max subject to e i E ω i x i e i C E x i {0, 1} x i C E 1 for all critical mixed cycles

More information

A Logic Primer. Stavros Tripakis University of California, Berkeley

A Logic Primer. Stavros Tripakis University of California, Berkeley EE 144/244: Fundamental Algorithms for System Modeling, Analysis, and Optimization Fall 2015 A Logic Primer Stavros Tripakis University of California, Berkeley Stavros Tripakis (UC Berkeley) EE 144/244,

More information

Algorithms for pattern involvement in permutations

Algorithms for pattern involvement in permutations Algorithms for pattern involvement in permutations M. H. Albert Department of Computer Science R. E. L. Aldred Department of Mathematics and Statistics M. D. Atkinson Department of Computer Science D.

More information

Pair dominating graphs

Pair dominating graphs Pair dominating graphs Paul Balister Béla Bollobás July 25, 2004 Department of Mathematical Sciences, University of Memphis, Memphis, TN 38152 USA Abstract An oriented graph dominates pairs if for every

More information

WARDROP EQUILIBRIA IN AN INFINITE NETWORK

WARDROP EQUILIBRIA IN AN INFINITE NETWORK LE MATEMATICHE Vol. LV (2000) Fasc. I, pp. 1728 WARDROP EQUILIBRIA IN AN INFINITE NETWORK BRUCE CALVERT In a nite network, there is a classical theory of trafc ow, which gives existence of a Wardrop equilibrium

More information

Element x in D is called the input or the independent variable of the function.

Element x in D is called the input or the independent variable of the function. P a g e 1 Chapter 1. Functions and Mathematical Models Definition: Function A function f defined on a collection D of numbers is a rule that assigns to each number x in D a specific number f(x) or y. We

More information

An Algebraic Approach to Network Coding

An Algebraic Approach to Network Coding An Algebraic Approach to July 30 31, 2009 Outline 1 2 a 3 Linear 4 Digital Communication Digital communication networks are integral parts of our lives these days; so, we want to know how to most effectively

More information

Internal Pattern Matching Queries in a Text and Applications

Internal Pattern Matching Queries in a Text and Applications Internal Pattern Matching Queries in a Text and Applications Tomasz Kociumaka Jakub Radoszewski Wojciech Rytter Tomasz Waleń Abstract We consider several types of internal queries: questions about subwords

More information

Small Group Divisible Steiner Quadruple Systems

Small Group Divisible Steiner Quadruple Systems Small Group Divisible Steiner Quadruple Systems Artem A. Zhuravlev, Melissa S. Keranen, Donald L. Kreher Department of Mathematical Sciences, Michigan Technological University Houghton, MI 49913-0402,

More information

The Steiner Quadruple Systems of Order 16

The Steiner Quadruple Systems of Order 16 The Steiner Quadruple Systems of Order 16 Petteri Kaski a,1, Patric R. J. Östergård b,2, Olli Pottonen b,2 a Helsinki Institute for Information Technology HIIT, Basic Research Unit, PO Box 68, 00014 University

More information

Conquering Edge Faults in a Butterfly with Automorphisms

Conquering Edge Faults in a Butterfly with Automorphisms International Conference on Theoretical and Mathematical Foundations of Computer Science (TMFCS-0) Conquering Edge Faults in a Butterfly with Automorphisms Meghanad D. Wagh and Khadidja Bendjilali Department

More information

Orthogonal arrays of strength three from regular 3-wise balanced designs

Orthogonal arrays of strength three from regular 3-wise balanced designs Orthogonal arrays of strength three from regular 3-wise balanced designs Charles J. Colbourn Computer Science University of Vermont Burlington, Vermont 05405 D. L. Kreher Mathematical Sciences Michigan

More information

A new Euler-Mahonian constructive bijection

A new Euler-Mahonian constructive bijection A new Euler-Mahonian constructive bijection Vincent Vajnovszki LE2I, Université de Bourgogne BP 47870, 21078 Dijon Cedex, France vvajnov@u-bourgogne.fr March 19, 2011 Abstract Using generating functions,

More information

Crystallizing the hypoplactic monoid

Crystallizing the hypoplactic monoid Crystallizing the hypoplactic monoid António Malheiro & Alan Cain CMA/FCT Universidade Nova de Lisboa July 4, 06 Acknowledgement: This work was supported by CMA within the project UID/MAT/0097/03 financed

More information

Helsinki University of Technology Laboratory for Theoretical Computer Science Research Reports 66

Helsinki University of Technology Laboratory for Theoretical Computer Science Research Reports 66 Helsinki University of Technology Laboratory for Theoretical Computer Science Research Reports 66 Teknillisen korkeakoulun tietojenkäsittelyteorian laboratorion tutkimusraportti 66 Espoo 2000 HUT-TCS-A66

More information

On Detecting Multiple Faults in Baseline Interconnection Networks

On Detecting Multiple Faults in Baseline Interconnection Networks On Detecting Multiple Faults in Baseline Interconnection Networks SHUN-SHII LIN 1 AND SHAN-TAI CHEN 2 1 National Taiwan Normal University, Taipei, Taiwan, ROC 2 Chung Cheng Institute of Technology, Tao-Yuan,

More information

Necklaces Pólya s Enumeration Theorem. Pólya Counting I. Gordon Royle. Semester 1, 2004

Necklaces Pólya s Enumeration Theorem. Pólya Counting I. Gordon Royle. Semester 1, 2004 Semester 1, 2004 George Pólya (1887 1985) George Polya discovered a powerful general method for enumerating the number of orbits of a group on particular configurations. This method became known as the

More information

Monotone Gray Codes and the Middle Levels Problem

Monotone Gray Codes and the Middle Levels Problem Monotone Gray Codes and the Middle Levels Problem Carla D. Savage Department of Computer Science North Carolina State University Raleigh, North Carolina 27695-8206 cds@adm.csc.ncsu.edu Peter Winkler Bellcore

More information

Expansion properties of a random regular graph after random vertex deletions

Expansion properties of a random regular graph after random vertex deletions Expansion properties of a random regular graph after random vertex deletions Catherine Greenhill School of Mathematics and Statistics The University of New South Wales Sydney NSW 05, Australia csg@unsw.edu.au

More information

CHAPTER 5. Interactive Turing Machines

CHAPTER 5. Interactive Turing Machines CHAPTER 5 Interactive Turing Machines The interactive Turing machine, which was introduced by Van Leeuwen and Wiedermann[28, 30], is an extension of the classical Turing machine model. It attempts to model

More information

GENERALIZING THE CLASSIC GREEDY AND NECKLACE CONSTRUCTIONS OF DE BRUIJN SEQUENCES AND UNIVERSAL CYCLES

GENERALIZING THE CLASSIC GREEDY AND NECKLACE CONSTRUCTIONS OF DE BRUIJN SEQUENCES AND UNIVERSAL CYCLES GENERALIZING THE CLASSIC GREEDY AND NECKLACE CONSTRUCTIONS OF DE BRUIJN SEQUENCES AND UNIVERSAL CYCLES JOE SAWADA, AARON WILLIAMS, AND DENNIS WONG Abstract. We present a class of languages that have an

More information

On the Sensitivity of Cyclically-Invariant Boolean Functions

On the Sensitivity of Cyclically-Invariant Boolean Functions On the Sensitivity of Cyclically-Invariant Boolean Functions Sourav Charaborty University of Chicago sourav@csuchicagoedu Abstract In this paper we construct a cyclically invariant Boolean function whose

More information

NP-Complete and Non-Computable Problems. COMP385 Dr. Ken Williams

NP-Complete and Non-Computable Problems. COMP385 Dr. Ken Williams NP-Complete and Non-Computable Problems COMP385 Dr. Ken Williams Start by doing what s necessary; then do what s possible; and suddenly you are doing the impossible. Francis of Assisi Our Goal Define classes

More information

CONGRUENCES FOR GENERALIZED FROBENIUS PARTITIONS WITH AN ARBITRARILY LARGE NUMBER OF COLORS

CONGRUENCES FOR GENERALIZED FROBENIUS PARTITIONS WITH AN ARBITRARILY LARGE NUMBER OF COLORS #A7 INTEGERS 14 (2014) CONGRUENCES FOR GENERALIZED FROBENIUS PARTITIONS WITH AN ARBITRARILY LARGE NUMBER OF COLORS Frank G. Garvan Department of Mathematics, University of Florida, Gainesville, Florida

More information

Optimal Routing in Chord

Optimal Routing in Chord Optimal Routing in Chord Prasanna Ganesan Gurmeet Singh Manku Astract We propose optimal routing algorithms for Chord [1], a popular topology for routing in peer-to-peer networks. Chord is an undirected

More information

Heuristics for The Whitehead Minimization Problem

Heuristics for The Whitehead Minimization Problem Heuristics for The Whitehead Minimization Problem R.M. Haralick, A.D. Miasnikov and A.G. Myasnikov November 11, 2004 Abstract In this paper we discuss several heuristic strategies which allow one to solve

More information

{a, b, c} {a, b} {a, c} {b, c} {a}

{a, b, c} {a, b} {a, c} {b, c} {a} Section 4.3 Order Relations A binary relation is an partial order if it transitive and antisymmetric. If R is a partial order over the set S, we also say, S is a partially ordered set or S is a poset.

More information

Biswapped Networks and Their Topological Properties

Biswapped Networks and Their Topological Properties Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing Biswapped Networks and Their Topological Properties Wenjun Xiao, Weidong

More information

BIJECTIVE PROOFS FOR FIBONACCI IDENTITIES RELATED TO ZECKENDORF S THEOREM

BIJECTIVE PROOFS FOR FIBONACCI IDENTITIES RELATED TO ZECKENDORF S THEOREM BIJECTIVE PROOFS FOR FIBONACCI IDENTITIES RELATED TO ZECKENDORF S THEOREM Philip Matchett Wood Department of Mathematics, Rutgers University, Piscataway, NJ 08854 e-mail: matchett@math.rutgers.edu (Submitted

More information

Algorithmic Approach to Counting of Certain Types m-ary Partitions

Algorithmic Approach to Counting of Certain Types m-ary Partitions Algorithmic Approach to Counting of Certain Types m-ary Partitions Valentin P. Bakoev Abstract Partitions of integers of the type m n as a sum of powers of m (the so called m-ary partitions) and their

More information

König s Lemma and Kleene Tree

König s Lemma and Kleene Tree König s Lemma and Kleene Tree Andrej Bauer May 3, 2006 Abstract I present a basic result about Cantor space in the context of computability theory: the computable Cantor space is computably non-compact.

More information

The Coolest Way To Generate Combinations

The Coolest Way To Generate Combinations The Coolest Way To Generate Combinations Frank Ruskey and Aaron Williams Dept of Computer Science, University of Victoria Abstract We present a practical and elegant method for generating all (s, t)-combinations

More information

Fundamental Algorithms 11

Fundamental Algorithms 11 Technische Universität München WS 2013/14 Institut für Informatik Worksheet Scientific Computing in Computer Science 20.01.2014 Fundamental Algorithms 11 Exercise 1 Hypergraphs A hypergraph extends the

More information

1 The Algebraic Normal Form

1 The Algebraic Normal Form 1 The Algebraic Normal Form Boolean maps can be expressed by polynomials this is the algebraic normal form (ANF). The degree as a polynomial is a first obvious measure of nonlinearity linear (or affine)

More information

The constructible universe

The constructible universe The constructible universe In this set of notes I want to sketch Gödel s proof that CH is consistent with the other axioms of set theory. Gödel s argument goes well beyond this result; his identification

More information

Axioms of separation

Axioms of separation Axioms of separation These notes discuss the same topic as Sections 31, 32, 33, 34, 35, and also 7, 10 of Munkres book. Some notions (hereditarily normal, perfectly normal, collectionwise normal, monotonically

More information

REPORT DOCUMENTATION PAGE

REPORT DOCUMENTATION PAGE REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,

More information

VOTE FOR YOUR FAVORITE SODA BRAND!!

VOTE FOR YOUR FAVORITE SODA BRAND!! VOTE FOR YOUR FAVORITE SODA BRAND!! NUMBER OF VOTES 1000 995 990 985 980 975 970 965 960 955 950 PEPSI COCA-COLA STORE BRAND FAVORITE SODA NUMBER OF VOTES 1000 900 800 700 600 500 400 300 200 100 0 PEPSI

More information

AN INTRODUCTION TO COMPUTABILITY THEORY

AN INTRODUCTION TO COMPUTABILITY THEORY AN INTRODUCTION TO COMPUTABILITY THEORY CINDY CHUNG Abstract. This paper will give an introduction to the fundamentals of computability theory. Based on Robert Soare s textbook, The Art of Turing Computability:

More information

Exponential Growth. b.) What will the population be in 3 years?

Exponential Growth. b.) What will the population be in 3 years? 0 Eponential Growth y = a b a b Suppose your school has 4512 students this year. The student population is growing 2.5% each year. a.) Write an equation to model the student population. b.) What will the

More information

Ma/CS 6b Class 25: Error Correcting Codes 2

Ma/CS 6b Class 25: Error Correcting Codes 2 Ma/CS 6b Class 25: Error Correcting Codes 2 By Adam Sheffer Recall: Codes V n the set of binary sequences of length n. For example, V 3 = 000,001,010,011,100,101,110,111. Codes of length n are subsets

More information

Computational Complexity

Computational Complexity Computational Complexity S. V. N. Vishwanathan, Pinar Yanardag January 8, 016 1 Computational Complexity: What, Why, and How? Intuitively an algorithm is a well defined computational procedure that takes

More information

Massachusetts Institute of Technology 6.042J/18.062J, Fall 02: Mathematics for Computer Science Professor Albert Meyer and Dr.

Massachusetts Institute of Technology 6.042J/18.062J, Fall 02: Mathematics for Computer Science Professor Albert Meyer and Dr. Massachusetts Institute of Technology 6.042J/18.062J, Fall 02: Mathematics for Computer Science Professor Albert Meyer and Dr. Radhika Nagpal Quiz 1 Appendix Appendix Contents 1 Induction 2 2 Relations

More information

Enumerating Hamiltonian Cycles

Enumerating Hamiltonian Cycles Enumerating Hamiltonian Cycles Ville H. Pettersson Department of Communications and Networking Aalto University School of Electrical Engineering P.O. Box 13000, 00076 Aalto, Finland ville.pettersson@aalto.fi

More information

Keywords: Specification technique, expressive power, computation models, sequential algorithms, transition systems, Abstract State Machines

Keywords: Specification technique, expressive power, computation models, sequential algorithms, transition systems, Abstract State Machines Computing and Informatics, Vol. 22, 2003, 209 219 THE EXPRESSIVE POWER OF ABSTRACT-STATE MACHINES Wolfgang Reisig Institut für Informatik Humboldt Universität zu Berlin Unter den Linden 6 10099 Berlin,

More information

SIMPLE ALGORITHM FOR SORTING THE FIBONACCI STRING ROTATIONS

SIMPLE ALGORITHM FOR SORTING THE FIBONACCI STRING ROTATIONS SIMPLE ALGORITHM FOR SORTING THE FIBONACCI STRING ROTATIONS Manolis Christodoulakis 1, Costas S. Iliopoulos 1, Yoan José Pinzón Ardila 2 1 King s College London, Department of Computer Science London WC2R

More information

Theoretical Computer Science. Fault-free longest paths in star networks with conditional link faults

Theoretical Computer Science. Fault-free longest paths in star networks with conditional link faults Theoretical Computer Science 410 (2009) 766 775 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Fault-free longest paths in star networks

More information