d-separation: Strong Completeness of Semantics in Bayesian Network Inference

Size: px
Start display at page:

Download "d-separation: Strong Completeness of Semantics in Bayesian Network Inference"

Transcription

1 -Separation: Strong Completeness of Semantis in Bayesian Network Inferene Cory J. Butz 1,WenYan 1, an Aners L. Masen 2,3 1 Department of Computer Siene, University of Regina, Canaa {butz,yanwe111}@s.uregina.a 2 HUGIN EXPERT A/S, Aalborg, Denmark aners@hugin.om 3 Aalborg University, Department of Computer Siene, Denmark Abstrat. It is known that -separation an etermine the minimum amount of information neee to proess a query uring exat inferene in isrete Bayesian networks. Unfortunately, no pratial metho is known for etermining the semantis of the intermeiate fators onstrute uring inferene. Instea, all inferene algorithms are relegate to enoting the inferene proess in terms of potentials. In this theoretial paper, we give an algorithm, alle Semantis in Inferene (SI), that uses -separation to enote the semantis of every potential onstrute uring inferene. We show that SI possesses four salient features: polynomial time omplexity, sounness, ompleteness, an strong ompleteness. SI provies a better unerstaning of the theoretial founation of Bayesian networks an an be use for improve larity, as shown via an examination of Bayesian network literature. 1 Introution In [12], Pearl avoate the restoration of probabilisti methos in artifiial intelligene systems an explore the possibility of representing an manipulating probabilisti knowlege in graphial forms, latter alle Bayesian networks. When reounting the evelopment of Bayesian networks, Pearl [14] states that perhaps [12] mae its greatest immeiate impat through the notion of - separation. As a metho for eiing whih onitional inepenene relations are implie by the irete ayli graph of a Bayesian network, -separation provies the semantis neee for efining an haraterizing Bayesian networks. Observe that Pearl emphasizes the importane of -separation with respet to Bayesian network moeling. With respet to inferene, Pearl only states that - separation an etermine the minimum information neee for answering a query pose to a Bayesian network. No laim has ever been mae that -separation an also provie semantis uring Bayesian network inferene. Koller an Frieman [8] state that it is interesting to onsier the semantis of the potentials onstrute uring inferene. They mention that sometimes the probabilities are efine with respet to the joint istribution, but not at other times. As no pratial algorithm exists for eiing the semantis of inferene, all inferene algorithms enote the intermeiate fators onstrute uring inferene O. Zaïane an S. Zilles (Es.): Canaian AI 2013, LNAI 7884, pp , Springer-Verlag Berlin Heielberg 2013

2 14 C.J.Butz,W.Yan,anA.L.Masen as potentials. Potentials have no onstraints [8] meaning they o not have lear physial interpretation [4]. In this theoretial paper, we present Semantis in Inferene (SI), an algorithm for enoting semantis uring exat inferene in isrete Bayesian networks. SI works by introuing the notion of eviene normal form to organize how eah potential was onstrute. SI then eies semantis of the potential by performing one -separation test. Formal properties of the SI algorithm are obtaine, namely, polynomial time omplexity, sounness, ompleteness, an strong ompleteness. SI an be utilize for larity of exposition in Bayesian network literature, sine the semantis of potentials an now be artiulate. 2 Inferene Here we onsier only isrete Bayesian networks. U = {v 1,v 2,...,v n } is a finite set of ranom variables an eah v i U an take a value from a finite omain, om(v i ). Given X U, om(x) is the Cartesian prout of om(v i ), v i X. Apotential on om(x) is a funtion ψ on om(x) suh that ψ(x) 0 for eah x om(x), an at least one ψ(x) is positive. For brevity, we refer to ψ as a mapping on X rather than om(x). A potential p on U that sums to 1 is alle a joint probability istribution on U, enote p(u). A onitional probability table (CPT) for X given isjoint Y, enote ψ(x Y ), is a potential on XY that sums to 1, for eah onfiguration y om(y ). The unity-potential 1(v i )forv i is a funtion 1 mapping every element of om(v i ) to one. The unitypotential for a non-empty set X = {v 1,v 2,...,v k } of variables, enote 1(X), is efine as 1(X) =1(v 1 ) 1(v 2 ) 1(v k ). For simplifie notation, we may write {v 1,v 2,...,v k } as v 1,v 2,...,v k. A Bayesian network [13] is a pair (B,C). B enotes a irete ayli graph with vertex set U an C is a set of onitional probability tables (CPTs) {p(v i P (v i )) i =1, 2,...,n}, wherep (v i ) enotes the parents (immeiate preeessors) of v i B. The prout of CPTs in C is a joint probability istribution p(u). For example, the irete ayli graph in Figure 1 is alle the extene stuent Bayesian network (ESBN) [8]. We give CPTs in Table 1, where only binary variables are use in examples, an probabilities not shown an be obtaine by efinition. By the above, p(u) = p() p( ) p(i) p(g, i) p(h g, j). (1) We say X an Z are onitionally inepenent [16] given Y in p(u), enote I p (X, Y, Z), if given any x om(x), y om(y ), for all z om(z): p(x y, z) =p(x y), whenever p(y, z) > 0, where X, Y, Z U. Pearl [12] gave a metho, alle -separation, for etermining those inepenenies enoe in a irete ayli graph. The following is the efinition of -separation base on [8]. In a Bayesian network B, a trail (an unirete path) v 1,v 2,...,v n is ative given Y, if: (i) whenever we have a v-struture v i 1 v i v i+1,thenv i or one of its esenants are in Y ; (ii) no other noe along the trail is in Y.Notethatifv 1 or v n are in Y the trail is not ative.

3 Strong Completeness of Semantis in Bayesian Network Inferene 15 i g s h l j Fig. 1. The irete ayli graph of ESBN Table 1. CPTs for the ESBN in Figure 1 p() p( ) i g p(g, i) i p(i) g l p(l g) g j h p(h g,j) s l j p(j s, l) i s p(s i) We say that X an Z are -separate given Y in B, enote I B (X, Y, Z), if there is no ative trail between any variable v X an v Z given Y. In inferene, p(x E = e) is the most ommon query type, whih are useful for many reasoning patterns, inluing explanation, preition, interausal reasoning, an many more [8]. Here, X an E are isjoint subsets of U, ane is observe taking value e. We esribe a basi algorithm for omputing p(x E = e), alle variable elimination (VE), first put forth in [17]. We o not onsier alternative approahes to inferene suh as onitioning [6] an join tree propagation [1,2,10]. Inferene involves the elimination of variables. Algorithm 1, alle sum-out (SO), eliminates a single variable v from a set Φ of potentials [8], an returns the resulting set of potentials. The algorithm ollet-relevant simply returns those potentials in Φ involving variable v. Algorithm 1. SO(v,Φ) Ψ = ollet-relevant(v,φ) ψ = the prout of all potentials in Ψ τ = v ψ return (Φ Ψ) {τ}

4 16 C.J.Butz,W.Yan,anA.L.Masen SO uses Lemma 1, whih means that potentials not involving the variable being eliminate an be ignore. Lemma 1. [15] If ψ 1 is a potential on W an ψ 2 is a potential on Z, then the marginalization of ψ 1 ψ 2 onto W is the same as ψ 1 multiplie with the marginalization of ψ 2 onto W Z, wherew, Z U. The eviene potential for E = e, enote 1(E = e), assigns probability 1 to the single value e of E an probability 0 to all other values of E. Hene, for a variable v observe taking value λ an v {v i } P (v i ), the prout p(v i P (v i )) 1(v = λ) keeps only those onfigurations agreeing with v = λ. Algorithm 2, taken from [8], omputes p(x E = e) from a isrete Bayesian network B. VE alls SO to eliminate variables one by one. More speifially, in Algorithm 2, Φ is the set C of CPTs for B, X is a list of query variables, E is a list of observe variables, e is the orresponing list of observe values, an σ is an elimination orering for variables U XE,whereXE enotes X E. Algorithm 2. VE(Φ, X, E, e, σ) Multiply eviene potentials with appropriate CPTs While σ is not empty Remove the first variable v from σ Φ = sum-out(v, Φ) p(x, E = e) = the prout of all potentials ψ Φ return p(x, E = e)/ X p(x, E = e) As in [8], suppose the observe eviene for the ESBN is i =1anh =0an the query is p(j h = 0,i = 1). The weighte-min-fill algorithm [8] an yiel σ =(,, l, s, g). VE first inorporates the eviene: ψ(i =1) = p(i) 1(i =1), ψ(, g, i =1) = p(g, i) 1(i =1), ψ(i =1,s) = p(s i) 1(i =1), ψ(g, h =0,j) = p(h g, j) 1(h =0). To eliminate, the SO algorithm omputes ψ() = p() p( ). SO omputes the following to eliminate ψ(g, i =1) = ψ() ψ(, g, i =1). To eliminate l, ψ(g, j, s) = l p(l g) p(j l, s).

5 Strong Completeness of Semantis in Bayesian Network Inferene 17 SO omputes the following when eliminating s, ψ(g, i =1,j) = ψ(i =1,s) ψ(g, j, s). (2) s For g, SO an ompute: ψ(g, i =1,j) ψ(g, i =1) ψ(g, h =0,j) g = ψ(g, i =1,j) ψ(g, h =0,i=1,j) (3) g = ψ(h =0,i=1,j). Next, VE multiplies all remaining potentials as p(h =0,i=1,j) = ψ(i =1) ψ(h =0,i=1,j). Finally, VE answers the query by p(j h =0,i=1) = p(h =0,i=1,j) p(h =0,i=1,j). j 3 Unerstaning Semantis We review the urrent limite unerstaning of semantis in inferene. Kjaerulff an Masen [7] suggest that in working with probabilisti networks it is onvenient to enote istributions as potentials. In fat, the use of potentials is built into the stanar inferene algorithms (see the SO an VE algorithms, for instane). For example, suppose query p(j) is pose to the ESBN [8]. Even without eviene being onsiere, the initial step of VE is to regar CPTs as potentials, i.e., p(u) is fatorize as p(u) = ψ() ψ(, ) ψ(i) ψ(g, h, j). (4) By omparing (1) an (4), it is lear that semantis are estroye even before the CPTs in omputer memory are moifie. The notation use for potentials oes not onvey the semanti meaning of the probabilities omprising the potential. Darwihe [6] asribes meaning uring inferene by representing eah potential by what we will all eviene expane form, exept that prouts involving eviene potentials are taken. Let ψ be any potential onstrute by VE. The eviene expane form of ψ, enote F (ψ), is the unique expression efining how ψ was built using the multipliation an marginalization operators on the Bayesian network CPTs together with any appropriate eviene potentials.

6 18 C.J.Butz,W.Yan,anA.L.Masen For example, onsier potential ψ(g, i =1,j)in(2).F (ψ(g, i =1,j)), the eviene expane form, an be easily obtaine in a reursive manner as follows: ψ(i =1,s) ψ(g, j, s) s = s ψ(i =1,s) ( l (p(l g) p(j l, s))) (5) = s ((p(s i) 1(i =1)) ( l (p(l g) p(j l, s)))). Heneforth, parentheses are unerstoo an may not be shown. Unfortunately, the expane form by itself oes not iretly artiulate semantis. By semantis, wemeanthat a CPTψ(X Y ) onstrute by VE s manipulation of Bayesian network CPTs is not neessarily equal to the CPT p(x Y ) obtaine from the efine joint probability istribution p(u). For instane, it an be verifie that in the ESBN, p(h g, j) p(g, i) p() p( ) (6) proues the CPT ψ(g, h i, j) in Table 2 (left). In ontrast, the CPT p(g, h i, j) built from the joint istribution p(u) in(1)is shown in Table 2(right). Table 2. (left) CPT ψ(g,h i, j) built by (6). (right) CPT p(g,h i, j) built from p(u) in (1). i j g h ψ(g,h i, j) i j g h p(g,h i, j) Semantis in inferene are not well unerstoo. In their omprehensive an highly reommene text, Koller an Frieman [8] onsier the semantis of potential ψ(b,, ) built by eliminating variable a from the Bayesian network B in Figure 2 (left): ψ(b,, ) = a p(a) p(b a) p( a, ). (7)

7 Strong Completeness of Semantis in Bayesian Network Inferene 19 Koller an Frieman [8] inorretly state p(b, ) ψ(b,, ). (8) While this laim is almost always true, there are a few exeptions to refute it. For one ounter-example, eliminating variable a using the CPTs in Table 3 yiels: p(b, ) = ψ(b,, ). (9) Koller an Frieman [8] also state it must neessarily be the ase that p (b, ) = ψ(b,, ), (10) where p (U) is efine by a ifferent Bayesian network B - the one given in Figure 2 (right). Our objetive is to stipulate semantis in the urrent Bayesian network B - the one on whih inferene is being onute. a a b b Fig. 2. Bayesian networks B (left) an B (right) Table 3. Exeptional CPTs for B in Figure 2 (left) a p(a) a b p(b a) b p( b) a p( a, ) CPT Struture It is instrutive to review that, when eviene is not onsiere, eah potential built by VE is a CPT. A topologial orering [8] is an orering of the variables in a Bayesian network B so that for every ar (v i,v j )inb, v i preees v j in. For example, i g s l j h is a topologial orering of the irete ayli graph in Figure 1, but i g h l j s is not. Reall this feature of Bayesian networks, p(u) = p(v i P (v i )). v i U This an be establishe by showing 1 = p(v i P (v i )). U v i U More generally, we have the following two lemmas.

8 20 C.J.Butz,W.Yan,anA.L.Masen Lemma 2. [3] Consier a Bayesian network (B,C) on U. Given any nonempty subset X of U, v i X p(v i P (v i )) is a CPT ψ(x P (X)), wherep (X) = ( vi XP (v i )) X. Lemma 3. [3] When eviene is not onsiere, eah potential onstrute by VE is a CPT. Lemma 3 an be seen as first applying Lemma 1 on the eviene expane form of a potential built by VE, keeping in min E =, an then applying Lemma 2. For example, onsier the potential ψ built by (6), whih is alreay in eviene expane form. By applying Lemma 1, p(h g, j) p(g, i) p() p( ). (11) By Lemma 2, ψ(g, h i, j) = ψ(,, g, h i, j), Thus, the potential ψ built by (6) is, in fat, a CPT ψ(g, h i, j), in Table 2 (left). 5 Denoting Semantis The eviene expane form F (ψ) of any potential ψ onstrute by VE is in eviene normal form, if F (ψ) is written as γ N, where γ is the prout of 1 an all eviene potentials in F (ψ), an N is the same fatorization as F (ψ) exept without prouts involving eviene potentials. Reall ψ(g, h =0,i=1,j) in (3). The eviene expane form F (ψ) is p(h g, j) 1(h =0) p(g, i) 1(i =1) p() p( ), (12) an the eviene normal form γ N is 1(h =0,i=1) p(h g, j) p(g, i) p() p( ), (13) namely, γ =1(h =0,i=1)anN is (6). Lemma 4. The eviene expane form F (ψ) of any potential ψ onstrute by VE always an be equivalently written in normal form, i.e., F (ψ) =γ N. Proof. Sine eviene variables are never marginalize in VE, the laim follows from Lemma 1.

9 Strong Completeness of Semantis in Bayesian Network Inferene 21 Observe that, by Lemma 3, N in eviene normal form is a CPT. We may enote eviene normal form γ N simply as N with eviene γ unerstoo, sine γ only serves to selet onfigurations of N agreeing with the eviene. We now turn to enoting semantis. To unerstan when N = p(x Y ) in eviene normal form, some terminology is neee. A path from v 1 to v n is a sequene v 1,v 2,...,v n with ars (v i,v i+1 ) in B, i =1,...,n 1. With respet to a variable v i, we efine three sets: (i) the anestors of v i, enote A(v i ), are those variables having a path to v i ; (ii) the esenants of v i, enote D(v i ), are those variables to whih v i has a path; an, (iii) the hilren of v i are those variables v j suh that ar (v i,v j )isinb. The anestors of a set X U are efine as A(X) =( vi XA(v i )) X. The esenants D(X) are efine similarly. I B (X, Y, Z) means an inepenene statement I(X, Y, Z) [13] hols in B by -separation, where X, Y, Z U. We now give the Semantis in Inferene (SI) algorithm, whih uses -separation to enote the semantis of any potential ψ built by VE on B. Eah potential ψ onstrute by VE is represente in eviene normal form ψ(x Y ). If the semantis of B ensure the ψ(x Y )=p(x Y ), then ψ is enote as p B (X Y ); otherwise, it is enote as φ B (X Y ). S is the set of variables marginalize in F (ψ). A(XS)an D(XS) are ompute from the transitive losure, enote T,ofB [5]. Algorithm 3. SI(ψ) Compute the eviene expane form F (ψ) ofψ Compute the eviene normal form γ N of F (ψ) Compute the CPT struture ψ(x Y )of N Compute Z = A(XS) D(XS) Compute X 1 = X P (Z) if I B (X 1,,Y)holsinB by -separation return p B (X Y ) else return φ B (X Y ) Reall ψ(g, i =1,j) in (2). The eviene expane form is (6). Its eviene normal form γ N is γ =1(i =1)anN = ψ(j g, i). Now X = {j}, Y = {g, i} an S = {l, s}. By the transitive losure T of the ESBN, A(XS)={,, i, g} an D(XS)={h}. Hene, Z =, P (Z) =, anx 1 =. Trivially, I B (X 1,,Y) hols. Thus, SI enotes ψ(g, i =1,j) in (2) as p B (j g, i =1). Now onsier ψ(g, h = 0,i= 1,j) in (3). The eviene expane form is (12). The eviene normal form γ N is (13). Here N = ψ(g, h i, j), as seen in (6). With X = {g, h}, Y = {i, j} an S = {, }, fromt on the ESBN we have A({,, g, h}) ={i, j, l, s} an D({,, g, h}) ={j, l}. Thus,Z = {j, l}, giving P (Z) ={g, s} an X 1 = {g}. Now,I B (X 1,,Y) oes not hol. Thereby, SI enotes ψ(g, h =0,i=1,j) in (3) as φ B (g, h =0 i =1,j). In this example, there is a path from XS = {,, g, h} to XS through Z = {j, l}, starting at X 1 = {g}. With X 1 = {g} an Y = {i, j}, wefouson I B (g,,ij). Note that when eiing semantis of ψ(x Y ), the inepenene

10 22 C.J.Butz,W.Yan,anA.L.Masen to be teste is I B (X 1,,Y) an not I B (XS,Y,A(XSY)). In Figure 2 (left), I B (ab,, ) hols, but p(b, ) ψ(b, ) in (8) is possible. 6 Theoretial Founation We present four salient features of SI. Only the proofs of time omplexity an strong ompleteness are shown ue to spae onsierations. Theorem 1. Let ψ be any potential built by VE uring exat inferene in a isrete Bayesian network with n variables. Then the time omplexity of the SI algorithm to etermine the semantis of ψ is O(n 3 ). Proof. As ψ may require n 1 multipliations an n marginalizations, omputing F (ψ) takes2n steps. The normal form γ N an be eie in linear time, as an the CPT struture ψ(x Y )ofn. The transitive losure T of the irete ayli graph an be ompute in O(n 3 )[5].LetXS be a set of k variables, 1 k n. ThenA(XS)anD(XS) eah an be ompute in O(k n). Now Z an X 1 eah an be ompute in O(n 2 ). Testing I B (X 1,,Y) is linear in the size of B [6]. Thus, the semantis of ψ an be etermine by SI in O(n 3 ). Theorem 2. In a Bayesian network (B,C) efining a joint istribution p(u), suppose VE omputes a potential ψ whose eviene normal form is γ N. IfSI enotes the semantis of N as p B (X Y ), thenn = p(x Y ). Theorem 2 guarantees that if SI enotes the semantis of a VE potential ψ as γ p B (X Y ), then ψ = γ p(x Y ). Reall potential ψ(g, i =1,j) in (2). As illustrate in Table 4, Theorem 2 ensures that ψ(g, i =1,j)isequaltop(j g, i = 1), sine SI enotes it as p B (j g, i =1). Table 4. Potential ψ(g,i = 1,j)in(2)is p(j g,i = 1) i g j p B(j g,i =1) ψ(g,i = 1,j) = p(j g,i = 1) = With respet to inferene, the question of ompleteness is this. Can SI etermine the semantis of every VE potential efine with respet to the joint istribution? The answer is no. Theorem 3. In a Bayesian network B on U, suppose VE omputes a potential ψ whose eviene normal form is γ N. If SI enotes the semantis of N as φ B (X Y ), there exists a set C of CPTs for B efining a joint istribution p(u) suh that N p(x Y ).

11 Strong Completeness of Semantis in Bayesian Network Inferene 23 Theorem 3 states that whenever SI iniates that a potential is not efine with respet to the joint istribution, then this is true for at least one set of CPTs for the given Bayesian network. Reall one again ψ(g, h =0,i=1,j)in(3),whih SI enotes as φ B (g, h =0,l i =1,j). With respet to p(u) efine by the CPTs in Table 1, we have ψ(g, h =0,i=1,j) p(g, h =0 i =1,j). However, Theorem 3 an be mae signifiantly stronger. Lemma 5. [11] Exept for a measure zero set in the spae of all joint istributions p(u) efine by all isrete Bayesian networks (B,C), the inepenenies satisfie by p(u) are preisely those satisfie by -separation in B. 1 Lemma 5 says that for nearly all hoies C of CPTs for a Bayesian network B efining p(u), -separation perfetly haraterizes the inepenenies in p(u), i.e., for X, Y, Z U, I p (X, Y, Z) I B (X, Y, Z). Theorem 4. Exept for a measure zero set in the spae of all joint istributions p(u) efine by all isrete Bayesian networks (B,C), for any potential ψ built by VE, ψ = γ p(x Y ) SI enotes ψ as p B (X Y ), where γ N is the eviene normal form of ψ. Proof. ( ) Suppose VE onstruts a ψ whose eviene normal form is γ N an whose semantis are efine with respet to p(u). By ontraposition, suppose SI enotes N as φ B (X Y ). By SI, I B (X 1,,Y) oes not hol. Then, by Lemma 5, I p (X 1,,Y) oes not hol in essentially all possible p(u) efine over B. It follows that for eah suh p(u), γ p(x Y ) γ N. A ontraition to our initial assumption. Therefore, SI orretly enotes the potential ψ as p B (X Y ). ( ) Follows iretly from Theorem 2. Let B be any Bayesian network. Theorem 4 states that for nearly all hoies C of CPTs for B, the SI algorithm orretly enotes the semantis of potentials onstrute by VE uring exat inferene on B. 1 A set has measure zero if it is infinitesimally small relative to the overall spae [8].

12 24 C.J.Butz,W.Yan,anA.L.Masen 7 Conlusion We exten -separation s role from etermining the minimum amount of information neee to answer a query p(x E = e) [12] to also giving the semantis of the potentials onstrute when answering p(x E = e). Our results ontribute to a eeper unerstaning of Bayesian networks, sine semantis of VE s intermeiate fators are now artiulate with respet to the joint istribution. The main result (Theorem 4) showe that our SI algorithm orretly enotes the semantis of inferene in nearly all Bayesian networks. Future work will inlue applying the results here to ifferential semantis in Bayesian networks [6,9]. Referenes 1. Butz, C.J., Hua, S., Konkel, K., Yao, H.: Join Tree Propagation with Prioritize Messages. Networks 55(4), (2010) 2. Butz, C.J., Konkel, K., Lingras, P.: Join Tree Propagation Utilizing both Ar Reversal an Variable Elimination. Int. J. Approx. Reasoning 52(7), (2011) 3. Butz, C.J., Yan, W., Lingras, P., Yao, Y.Y.: The CPT Struture of Variable Elimination in Disrete Bayesian Networks. In: Ras, Z.W., Tsay, L.S. (es.) Avanes in Intelligent Information Systems. SCI, vol. 265, pp Springer, Heielberg (2010) 4. Castillo, E., Gutiérrez, J., Hai, A.: Expert Systems an Probabilisti Network Moels. Springer, New York (1997) 5. Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introution to Algorithms. MIT Press, Cambrige (2009) 6. Darwihe, A.: Moeling an Reasoning with Bayesian Networks. Cambrige University Press, New York (2009) 7. Kjaerulff, U.B., Masen, A.L.: Bayesian Networks an Influene Diagrams. Springer, New York (2008) 8. Koller, D., Frieman, N.: Probabilisti Graphial Moels: Priniples an Tehniques. MIT Press, Cambrige (2009) 9. Masen, A.L.: A Differential Semantis of Lazy AR Propagation. In: 21st Conferene on Unertainty in Artifiial Intelligene, pp Morgan Kaufmann, San Mateo (2005) 10. Masen, A.L.: Improvements to Message Computation in Lazy Propagation. Int. J. Approximate Reasoning 51(5), (2010) 11. Meek, C.: Strong Completeness an Faithfulness in Bayesian Networks. In: 11th Conferene on Unertainty in Artifiial Intelligene, pp Morgan Kaufmann, San Mateo (1995) 12. Pearl, J.: Fusion, Propagation an Struturing in Belief Networks. Artif. Intell. 29, (1986) 13. Pearl, J.: Probabilisti Reasoning in Intelligent Systems: Networks of Plausible Inferene. Morgan Kaufmann, San Franiso (1988) 14. Pearl, J.: Belief Networks Revisite. Artif. Intell. 59, (1993) 15. Shafer, G.: Probabilisti Expert Systems. SIAM, Philaelphia (1996) 16. Wong, S.K.M., Butz, C.J., Wu, D.: On the Impliation Problem for Probabilisti Conitional Inepeneny. IEEE Trans. Syst. Man Cybern. A 30(6), (2000) 17. Zhang, N.L., Poole, D.: A Simple Approah to Bayesian Network Computations. In: 7th Canaian Conferene on Artifiial Intelligene, pp Springer, New York (1994)

Bayesian Network Inference Using Marginal Trees

Bayesian Network Inference Using Marginal Trees Bayesian Network Inference Using Marginal Trees Cory J. Butz 1?, Jhonatan de S. Oliveira 2??, and Anders L. Madsen 34 1 University of Regina, Department of Computer Science, Regina, S4S 0A2, Canada butz@cs.uregina.ca

More information

Sensitivity Analysis in Markov Networks

Sensitivity Analysis in Markov Networks Sensitivity Analysis in Markov Networks Hei Chan and Adnan Darwihe Computer Siene Department University of California, Los Angeles Los Angeles, CA 90095 {hei,darwihe}@s.ula.edu Abstrat This paper explores

More information

McCreight s Suffix Tree Construction Algorithm. Milko Izamski B.Sc. Informatics Instructor: Barbara König

McCreight s Suffix Tree Construction Algorithm. Milko Izamski B.Sc. Informatics Instructor: Barbara König 1. Introution MCreight s Suffix Tree Constrution Algorithm Milko Izamski B.S. Informatis Instrutor: Barbara König The main goal of MCreight s algorithm is to buil a suffix tree in linear time. This is

More information

Chapter 2: One-dimensional Steady State Conduction

Chapter 2: One-dimensional Steady State Conduction 1 Chapter : One-imensional Steay State Conution.1 Eamples of One-imensional Conution Eample.1: Plate with Energy Generation an Variable Conutivity Sine k is variable it must remain insie the ifferentiation

More information

Sensitivity Analysis of Resonant Circuits

Sensitivity Analysis of Resonant Circuits 1 Sensitivity Analysis of Resonant Ciruits Olivier Buu Abstrat We use first-orer perturbation theory to provie a loal linear relation between the iruit parameters an the poles of an RLC network. The sensitivity

More information

Math 225B: Differential Geometry, Homework 6

Math 225B: Differential Geometry, Homework 6 ath 225B: Differential Geometry, Homework 6 Ian Coley February 13, 214 Problem 8.7. Let ω be a 1-form on a manifol. Suppose that ω = for every lose urve in. Show that ω is exat. We laim that this onition

More information

Probabilistic Graphical Models

Probabilistic Graphical Models Probabilisti Graphial Models David Sontag New York University Leture 12, April 19, 2012 Aknowledgement: Partially based on slides by Eri Xing at CMU and Andrew MCallum at UMass Amherst David Sontag (NYU)

More information

Complexity of Regularization RBF Networks

Complexity of Regularization RBF Networks Complexity of Regularization RBF Networks Mark A Kon Department of Mathematis and Statistis Boston University Boston, MA 02215 mkon@buedu Leszek Plaskota Institute of Applied Mathematis University of Warsaw

More information

Expressiveness of the Interval Logics of Allen s Relations on the Class of all Linear Orders: Complete Classification

Expressiveness of the Interval Logics of Allen s Relations on the Class of all Linear Orders: Complete Classification Proeeings of the Twenty-Seon International Joint Conferene on Artifiial Intelligene Expressiveness of the Interval Logis of Allen s Relations on the Class of all Linear Orers: Complete Classifiation Dario

More information

GEOMETRIC AND STOCHASTIC ERROR MINIMISATION IN MOTION TRACKING. Karteek Alahari, Sujit Kuthirummal, C. V. Jawahar, P. J. Narayanan

GEOMETRIC AND STOCHASTIC ERROR MINIMISATION IN MOTION TRACKING. Karteek Alahari, Sujit Kuthirummal, C. V. Jawahar, P. J. Narayanan GEOMETRIC AND STOCHASTIC ERROR MINIMISATION IN MOTION TRACKING Karteek Alahari, Sujit Kuthirummal, C. V. Jawahar, P. J. Narayanan Centre for Visual Information Tehnology International Institute of Information

More information

Extended Spectral Nonlinear Conjugate Gradient methods for solving unconstrained problems

Extended Spectral Nonlinear Conjugate Gradient methods for solving unconstrained problems International Journal of All Researh Euation an Sientifi Methos IJARESM ISSN: 55-6 Volume Issue 5 May-0 Extene Spetral Nonlinear Conjuate Graient methos for solvin unonstraine problems Dr Basim A Hassan

More information

Announcements. Office Hours Swap: OH schedule has been updated to reflect this.

Announcements. Office Hours Swap: OH schedule has been updated to reflect this. SA Solving Announements Offie Hours Swap: Zavain has offie hours from 4-6PM toay in builing 460, room 040A. Rose has offie hours tonight from 7-9PM in Gates B26B. Keith has offie hours hursay from 2-4PM

More information

arxiv: v1 [cs.lg] 19 Jan 2018

arxiv: v1 [cs.lg] 19 Jan 2018 Ative Learning of Strit Partial Orers: A Case Stuy on Conept Prerequisite Relations Chen Liang 1 Jianbo Ye 1 Han Zhao 2 Bart Pursel 1 C. Lee Giles 1 1 The Pennsylvania State University 2 Carnegie Mellon

More information

Computing 2-Walks in Cubic Time

Computing 2-Walks in Cubic Time Computing 2-Walks in Cubi Time Anreas Shmi Max Plank Institute for Informatis Jens M. Shmit Tehnishe Universität Ilmenau Abstrat A 2-walk of a graph is a walk visiting every vertex at least one an at most

More information

Reliability Optimization With Mixed Continuous-Discrete Random Variables and Parameters

Reliability Optimization With Mixed Continuous-Discrete Random Variables and Parameters Subroto Gunawan Researh Fellow Panos Y. Papalambros Professor e-mail: pyp@umih.eu Department of Mehanial Engineering, University of Mihigan, Ann Arbor, MI 4809 Reliability Optimization With Mixe Continuous-Disrete

More information

Linear First-Order Equations

Linear First-Order Equations 5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)

More information

Force Reconstruction for Nonlinear Structures in Time Domain

Force Reconstruction for Nonlinear Structures in Time Domain Fore Reonstrution for Nonlinear Strutures in ime Domain Jie Liu 1, Bing Li 2, Meng Li 3, an Huihui Miao 4 1,2,3,4 State Key Laboratory for Manufaturing Systems Engineering, Xi an Jiaotong niversity, Xi

More information

Asymptotic behavior of solutions to wave equations with a memory condition at the boundary

Asymptotic behavior of solutions to wave equations with a memory condition at the boundary Eletroni Journal of Differential Equations, Vol. 2(2), No. 73, pp.. ISSN: 72-669. URL: http://eje.math.swt.eu or http://eje.math.unt.eu ftp eje.math.swt.eu (login: ftp) Asymptoti behavior of solutions

More information

Journal of Mathematical Analysis and Applications

Journal of Mathematical Analysis and Applications J. Math. Anal. Appl. 371 (010) 759 763 Contents lists available at SieneDiret Journal of Mathematial Analysis an Appliations www.elsevier.om/loate/jmaa Singular Sturm omparison theorems Dov Aharonov, Uri

More information

Combinatorial remarks on two-dimensional Languages

Combinatorial remarks on two-dimensional Languages Combinatorial remarks on two-imensional Languages Franesa De Carli To ite this version: Franesa De Carli. Combinatorial remarks on two-imensional Languages. Mathematis [math]. Université e Savoie 2009.

More information

Labeling Workflow Views with Fine-Grained Dependencies

Labeling Workflow Views with Fine-Grained Dependencies Labeling Workflow Views with Fine-Graine Depenenies Zhuowei Bao Department of omputer an Information iene University of Pennsylvania Philaelphia, P 1914, U zhuowei@is.upenn.eu usan B. Davison Department

More information

CMSC 451: Lecture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017

CMSC 451: Lecture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017 CMSC 451: Leture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017 Reading: Chapt 11 of KT and Set 54 of DPV Set Cover: An important lass of optimization problems involves overing a ertain domain,

More information

Packing Plane Spanning Trees into a Point Set

Packing Plane Spanning Trees into a Point Set Paking Plane Spanning Trees into a Point Set Ahmad Biniaz Alfredo Garía Abstrat Let P be a set of n points in the plane in general position. We show that at least n/3 plane spanning trees an be paked into

More information

Nonreversibility of Multiple Unicast Networks

Nonreversibility of Multiple Unicast Networks Nonreversibility of Multiple Uniast Networks Randall Dougherty and Kenneth Zeger September 27, 2005 Abstrat We prove that for any finite direted ayli network, there exists a orresponding multiple uniast

More information

CSE 5311 Notes 18: NP-Completeness

CSE 5311 Notes 18: NP-Completeness SE 53 Notes 8: NP-ompleteness (Last upate 7//3 8:3 PM) ELEMENTRY ONEPTS Satisfiability: ( p q) ( p q ) ( p q) ( p q ) Is there an assignment? (Deision Problem) Similar to ebugging a logi iruit - Is there

More information

The numbers inside a matrix are called the elements or entries of the matrix.

The numbers inside a matrix are called the elements or entries of the matrix. Chapter Review of Matries. Definitions A matrix is a retangular array of numers of the form a a a 3 a n a a a 3 a n a 3 a 3 a 33 a 3n..... a m a m a m3 a mn We usually use apital letters (for example,

More information

An Integer Solution of Fractional Programming Problem

An Integer Solution of Fractional Programming Problem Gen. Math. Notes, Vol. 4, No., June 0, pp. -9 ISSN 9-784; Copyright ICSRS Publiation, 0 www.i-srs.org Available free online at http://www.geman.in An Integer Solution of Frational Programming Problem S.C.

More information

Some Useful Results for Spherical and General Displacements

Some Useful Results for Spherical and General Displacements E 5 Fall 997 V. Kumar Some Useful Results for Spherial an General Displaements. Spherial Displaements.. Eulers heorem We have seen that a spherial isplaement or a pure rotation is esribe by a 3 3 rotation

More information

He s Semi-Inverse Method and Ansatz Approach to look for Topological and Non-Topological Solutions Generalized Nonlinear Schrödinger Equation

He s Semi-Inverse Method and Ansatz Approach to look for Topological and Non-Topological Solutions Generalized Nonlinear Schrödinger Equation Quant. Phys. Lett. 3, No. 2, 23-27 2014) 23 Quantum Physis Letters An International Journal http://x.oi.org/10.12785/qpl/030202 He s Semi-Inverse Metho an Ansatz Approah to look for Topologial an Non-Topologial

More information

Hankel Optimal Model Order Reduction 1

Hankel Optimal Model Order Reduction 1 Massahusetts Institute of Tehnology Department of Eletrial Engineering and Computer Siene 6.245: MULTIVARIABLE CONTROL SYSTEMS by A. Megretski Hankel Optimal Model Order Redution 1 This leture overs both

More information

Supplementary Materials for A universal data based method for reconstructing complex networks with binary-state dynamics

Supplementary Materials for A universal data based method for reconstructing complex networks with binary-state dynamics Supplementary Materials for A universal ata ase metho for reonstruting omplex networks with inary-state ynamis Jingwen Li, Zhesi Shen, Wen-Xu Wang, Celso Greogi, an Ying-Cheng Lai 1 Computation etails

More information

Average Rate Speed Scaling

Average Rate Speed Scaling Average Rate Speed Saling Nikhil Bansal David P. Bunde Ho-Leung Chan Kirk Pruhs May 2, 2008 Abstrat Speed saling is a power management tehnique that involves dynamially hanging the speed of a proessor.

More information

Zero-Free Region for ζ(s) and PNT

Zero-Free Region for ζ(s) and PNT Contents Zero-Free Region for ζs an PN att Rosenzweig Chebyshev heory ellin ransforms an Perron s Formula Zero-Free Region of Zeta Funtion 6. Jensen s Inequality..........................................

More information

Modal Horn Logics Have Interpolation

Modal Horn Logics Have Interpolation Modal Horn Logis Have Interpolation Marus Kraht Department of Linguistis, UCLA PO Box 951543 405 Hilgard Avenue Los Angeles, CA 90095-1543 USA kraht@humnet.ula.de Abstrat We shall show that the polymodal

More information

The optimization of kinematical response of gear transmission

The optimization of kinematical response of gear transmission Proeeings of the 7 WSEAS Int. Conferene on Ciruits, Systems, Signal an Teleommuniations, Gol Coast, Australia, January 7-9, 7 The optimization of inematial response of gear transmission VINCENZO NIOLA

More information

Two Dimensional Principal Component Analysis for Online Tamil Character Recognition

Two Dimensional Principal Component Analysis for Online Tamil Character Recognition Two Dimensional Prinipal Component Analysis for Online Tamil Charater Reognition Suresh Sunaram, A G Ramarishnan Inian Institute of Siene,Bangalore, Inia suresh@ee.iis.ernet.in, ramiag@ee.iis.ernet.in

More information

u!i = a T u = 0. Then S satisfies

u!i = a T u = 0. Then S satisfies Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace

More information

The Effectiveness of the Linear Hull Effect

The Effectiveness of the Linear Hull Effect The Effetiveness of the Linear Hull Effet S. Murphy Tehnial Report RHUL MA 009 9 6 Otober 009 Department of Mathematis Royal Holloway, University of London Egham, Surrey TW0 0EX, England http://www.rhul.a.uk/mathematis/tehreports

More information

II. First variation of functionals

II. First variation of functionals II. First variation of functionals The erivative of a function being zero is a necessary conition for the etremum of that function in orinary calculus. Let us now tackle the question of the equivalent

More information

Maximum Entropy and Exponential Families

Maximum Entropy and Exponential Families Maximum Entropy and Exponential Families April 9, 209 Abstrat The goal of this note is to derive the exponential form of probability distribution from more basi onsiderations, in partiular Entropy. It

More information

Probabilistic Graphical Models

Probabilistic Graphical Models Probabilisti Graphial Models 0-708 Undireted Graphial Models Eri Xing Leture, Ot 7, 2005 Reading: MJ-Chap. 2,4, and KF-hap5 Review: independene properties of DAGs Defn: let I l (G) be the set of loal independene

More information

Optimal Distributed Estimation Fusion with Transformed Data

Optimal Distributed Estimation Fusion with Transformed Data Optimal Distribute Estimation Fusion with Transforme Data Zhansheng Duan X. Rong Li Department of Eletrial Engineering University of New Orleans New Orleans LA 70148 U.S.A. Email: {zuanxli@uno.eu Abstrat

More information

18 Numerical Integration of Functions

18 Numerical Integration of Functions Slightly moifie //9, /8/6 Firstly written at Marh 5 8 Numerial Integration of Funtions Introution Romberg Integration Gauss Quarature Aaptive Quarature Case Stuy: Root-Mean-Square Current DM869/Computational

More information

Learning Triggering Kernels for Multi-dimensional Hawkes Processes

Learning Triggering Kernels for Multi-dimensional Hawkes Processes Ke Zhou Georgia Institute of Tehnology Hongyuan Zha Georgia Institute of Tehnology Le Song Georgia Institute of Tehnology kzhou@gateh.eu zha@.gateh.eu lsong@.gateh.eu Abstrat How oes the ativity of one

More information

6 General properties of an autonomous system of two first order ODE

6 General properties of an autonomous system of two first order ODE 6 General properties of an autonomous system of two first orer ODE Here we embark on stuying the autonomous system of two first orer ifferential equations of the form ẋ 1 = f 1 (, x 2 ), ẋ 2 = f 2 (, x

More information

The Exact Form and General Integrating Factors

The Exact Form and General Integrating Factors 7 The Exact Form an General Integrating Factors In the previous chapters, we ve seen how separable an linear ifferential equations can be solve using methos for converting them to forms that can be easily

More information

Witt#5: Around the integrality criterion 9.93 [version 1.1 (21 April 2013), not completed, not proofread]

Witt#5: Around the integrality criterion 9.93 [version 1.1 (21 April 2013), not completed, not proofread] Witt vectors. Part 1 Michiel Hazewinkel Sienotes by Darij Grinberg Witt#5: Aroun the integrality criterion 9.93 [version 1.1 21 April 2013, not complete, not proofrea In [1, section 9.93, Hazewinkel states

More information

A MATLAB Method of Lines Template for Evolution Equations

A MATLAB Method of Lines Template for Evolution Equations A MATLAB Metho of Lines Template for Evolution Equations H.S. Lee a, C.J. Matthews a, R.D. Braok a, G.C. Saner b an F. Ganola a a Faulty of Environmental Sienes, Griffith University, Nathan, QLD, 4111

More information

Danielle Maddix AA238 Final Project December 9, 2016

Danielle Maddix AA238 Final Project December 9, 2016 Struture and Parameter Learning in Bayesian Networks with Appliations to Prediting Breast Caner Tumor Malignany in a Lower Dimension Feature Spae Danielle Maddix AA238 Final Projet Deember 9, 2016 Abstrat

More information

Designing Against Size Effect on Shear Strength of Reinforced Concrete Beams Without Stirrups

Designing Against Size Effect on Shear Strength of Reinforced Concrete Beams Without Stirrups Designing Against Size Effet on Shear Strength of Reinfore Conrete Beams Without Stirrups By Zeněk P. Bažant an Qiang Yu Abstrat: The shear failure of reinfore onrete beams is a very omplex frature phenomenon

More information

Computer Science 786S - Statistical Methods in Natural Language Processing and Data Analysis Page 1

Computer Science 786S - Statistical Methods in Natural Language Processing and Data Analysis Page 1 Computer Siene 786S - Statistial Methods in Natural Language Proessing and Data Analysis Page 1 Hypothesis Testing A statistial hypothesis is a statement about the nature of the distribution of a random

More information

Linear Capacity Scaling in Wireless Networks: Beyond Physical Limits?

Linear Capacity Scaling in Wireless Networks: Beyond Physical Limits? Linear Capaity Saling in Wireless Networks: Beyon Physial Limits? Ayfer Özgür, Olivier Lévêque EPFL, Switzerlan {ayfer.ozgur, olivier.leveque}@epfl.h Davi Tse University of California at Berkeley tse@ees.berkeley.eu

More information

Problem set 6 for the course Theoretical Optics Sample Solutions

Problem set 6 for the course Theoretical Optics Sample Solutions Karlsruher Institut für Tehnologie KIT) Institut für theoretishe Festkörperphysik SS01 Prof. Dr. G. Shön, Dr. R. Frank 15.06.01 http://www.tfp.kit.eu/stuium-lehre.php Tutorial: Group 1, Name: Group, Group

More information

Belief Update in CLG Bayesian Networks With Lazy Propagation

Belief Update in CLG Bayesian Networks With Lazy Propagation Belief Update in CLG Bayesian Networks With Lazy Propagation Anders L Madsen HUGIN Expert A/S Gasværksvej 5 9000 Aalborg, Denmark Anders.L.Madsen@hugin.com Abstract In recent years Bayesian networks (BNs)

More information

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations Diophantine Approximations: Examining the Farey Process an its Metho on Proucing Best Approximations Kelly Bowen Introuction When a person hears the phrase irrational number, one oes not think of anything

More information

The Chebyshev Wavelet Method for Numerical Solutions of A Fractional Oscillator

The Chebyshev Wavelet Method for Numerical Solutions of A Fractional Oscillator Shiraz University of Tehnology From the SeleteWorks of Habibolla Latifizaeh 01 The Chebyshev Wavelet Metho for Numerial Solutions of A Frational Osillator E. Hesameini, Shiraz University of Tehnology S.

More information

Simultaneous and Sequential Auctions of Oligopoly Licenses

Simultaneous and Sequential Auctions of Oligopoly Licenses Simultaneous an Sequential Autions of Oligopoly Lienses Georgios Katsenos Institut für Mikroökonomik, Leibniz Universität Hannover September 1, 2007 Abstrat This paper ompares two proeures for alloating

More information

2. Properties of Functions

2. Properties of Functions 2. PROPERTIES OF FUNCTIONS 111 2. Properties of Funtions 2.1. Injetions, Surjetions, an Bijetions. Definition 2.1.1. Given f : A B 1. f is one-to-one (short han is 1 1) or injetive if preimages are unique.

More information

Where as discussed previously we interpret solutions to this partial differential equation in the weak sense: b

Where as discussed previously we interpret solutions to this partial differential equation in the weak sense: b Consider the pure initial value problem for a homogeneous system of onservation laws with no soure terms in one spae dimension: Where as disussed previously we interpret solutions to this partial differential

More information

Implementing the Law of Sines to solve SAS triangles

Implementing the Law of Sines to solve SAS triangles Implementing the Law of Sines to solve SAS triangles June 8, 009 Konstantine Zelator Dept. of Math an Computer Siene Rhoe Islan College 600 Mount Pleasant Avenue Proviene, RI 0908 U.S.A. e-mail : kzelator@ri.eu

More information

Formal Concept Sampling for Counting and Threshold-Free Local Pattern Mining

Formal Concept Sampling for Counting and Threshold-Free Local Pattern Mining Formal Conept Sampling for Counting an Threshol-Free Loal Pattern Mining Mario Boley an Thomas Gärtner an Henrik Grosskreutz Fraunhofer IAIS Shloss Birlinghoven 53754 Sankt Augustin, Germany {mario.boley,

More information

Fast Evaluation of Canonical Oscillatory Integrals

Fast Evaluation of Canonical Oscillatory Integrals Appl. Math. Inf. Si. 6, No., 45-51 (01) 45 Applie Mathematis & Information Sienes An International Journal 01 NSP Natural Sienes Publishing Cor. Fast Evaluation of Canonial Osillatory Integrals Ying Liu

More information

Zero-Knowledge Protocols

Zero-Knowledge Protocols he People Zero-Knowlege Protools 2 he wars Prover (Peggy) Claim I Verifier (Vi) S Seret Deision 2 {true, false} zero-knowlege protool allows Peggy to Convine Vi that her laim is true an that she knows

More information

max min z i i=1 x j k s.t. j=1 x j j:i T j

max min z i i=1 x j k s.t. j=1 x j j:i T j AM 221: Advaned Optimization Spring 2016 Prof. Yaron Singer Leture 22 April 18th 1 Overview In this leture, we will study the pipage rounding tehnique whih is a deterministi rounding proedure that an be

More information

Distributed Representation of Syntactic Structure by Tensor Product Representation and Non-Linear Compression

Distributed Representation of Syntactic Structure by Tensor Product Representation and Non-Linear Compression Distribute Representation of Syntati Struture by Tensor Prout Representation an on-linear Compression Heii H. T. Yeung Peter W. M. Tsang City University of Hong Kong Tat Chee Roa, Kowloon Tong, Kowloon,

More information

c-perfect Hashing Schemes for Binary Trees, with Applications to Parallel Memories

c-perfect Hashing Schemes for Binary Trees, with Applications to Parallel Memories -Perfet Hashing Shemes for Binary Trees, with Appliations to Parallel Memories (Extended Abstrat Gennaro Cordaso 1, Alberto Negro 1, Vittorio Sarano 1, and Arnold L.Rosenberg 2 1 Dipartimento di Informatia

More information

Chapter 8 Hypothesis Testing

Chapter 8 Hypothesis Testing Leture 5 for BST 63: Statistial Theory II Kui Zhang, Spring Chapter 8 Hypothesis Testing Setion 8 Introdution Definition 8 A hypothesis is a statement about a population parameter Definition 8 The two

More information

Iterated Point-Line Configurations Grow Doubly-Exponentially

Iterated Point-Line Configurations Grow Doubly-Exponentially Iterate Point-Line Configurations Grow Doubly-Exponentially Joshua Cooper an Mark Walters July 9, 008 Abstract Begin with a set of four points in the real plane in general position. A to this collection

More information

Supplementary Materials

Supplementary Materials Supplementary Materials Neural population partitioning and a onurrent brain-mahine interfae for sequential motor funtion Maryam M. Shanehi, Rollin C. Hu, Marissa Powers, Gregory W. Wornell, Emery N. Brown

More information

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs Lectures - Week 10 Introuction to Orinary Differential Equations (ODES) First Orer Linear ODEs When stuying ODEs we are consiering functions of one inepenent variable, e.g., f(x), where x is the inepenent

More information

On Predictive Density Estimation for Location Families under Integrated Absolute Error Loss

On Predictive Density Estimation for Location Families under Integrated Absolute Error Loss On Preitive Density Estimation for Loation Families uner Integrate Absolute Error Loss Tatsuya Kubokawa a, Éri Marhanb, William E. Strawerman a Department of Eonomis, University of Tokyo, 7-3- Hongo, Bunkyo-ku,

More information

Ordered fields and the ultrafilter theorem

Ordered fields and the ultrafilter theorem F U N D A M E N T A MATHEMATICAE 59 (999) Ordered fields and the ultrafilter theorem by R. B e r r (Dortmund), F. D e l o n (Paris) and J. S h m i d (Dortmund) Abstrat. We prove that on the basis of ZF

More information

A Primer on the Statistics of Longest Increasing Subsequences and Quantum States

A Primer on the Statistics of Longest Increasing Subsequences and Quantum States A Primer on the Statistis of Longest Inreasing Subsequenes an Quantum States Ryan O Donnell John Wright Abstrat We give an introution to the statistis of quantum states, with a fous on reent results giving

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fischer) January 21,

Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fischer) January 21, Sequene Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson & J. Fisher) January 21, 201511 9 Suffix Trees and Suffix Arrays This leture is based on the following soures, whih are all reommended

More information

This is an electronic reprint of the original article. This reprint may differ from the original in pagination and typographic detail.

This is an electronic reprint of the original article. This reprint may differ from the original in pagination and typographic detail. Powere by TCPDF (www.tpf.org) This is an eletroni reprint of the original artile. This reprint may iffer from the original in pagination an typographi etail. Cihonska, Anna; Pahikkala, Tapio; Szemak, Sanor;

More information

arxiv: v1 [math-ph] 19 Apr 2009

arxiv: v1 [math-ph] 19 Apr 2009 arxiv:0904.933v1 [math-ph] 19 Apr 009 The relativisti mehanis in a nonholonomi setting: A unifie approah to partiles with non-zero mass an massless partiles. Olga Krupková an Jana Musilová Deember 008

More information

Constraint-free Analog Placement with Topological Symmetry Structure

Constraint-free Analog Placement with Topological Symmetry Structure Constraint-free Analog Plaement with Topologial Symmetry Struture Qing DONG Department of Information an Meia Sienes University of Kitakyushu Wakamatsu, Kitakyushu, Fukuoka, 808-0135, Japan e-mail: ongqing@env.kitakyu-u.a.jp

More information

The Computational Complexity of the Unrooted Subtree Prune and Regraft Distance. Technical Report CS

The Computational Complexity of the Unrooted Subtree Prune and Regraft Distance. Technical Report CS The Computational Complexit of the Unroote ubtree rune an egraft Distane Glenn Hike Frank Dehne Anrew au-chaplin Christian Blouin Tehnial eport C-006-06 Jul, 006 Fault of Computer iene 6050 Universit Ave.,

More information

AN ALGORITHM FOR QUASI-ASSOCIATIVE AND QUASI- MARKOVIAN RULES OF COMBINATION IN INFORMATION FUSION

AN ALGORITHM FOR QUASI-ASSOCIATIVE AND QUASI- MARKOVIAN RULES OF COMBINATION IN INFORMATION FUSION ehnial Sienes and Applied Mathematis AN ALGORIHM FOR QUASI-ASSOCIAIVE AND QUASI- MARKOVIAN RULES OF COMBINAION IN INFORMAION FUSION Florentin SMARANDACHE*, Jean DEZER** *University of New Mexio, Gallup,

More information

Sensitivity analysis for linear optimization problem with fuzzy data in the objective function

Sensitivity analysis for linear optimization problem with fuzzy data in the objective function Sensitivity analysis for linear optimization problem with fuzzy data in the objetive funtion Stephan Dempe, Tatiana Starostina May 5, 2004 Abstrat Linear programming problems with fuzzy oeffiients in the

More information

On the sustainability of collusion in Bertrand supergames with discrete pricing and nonlinear demand

On the sustainability of collusion in Bertrand supergames with discrete pricing and nonlinear demand PRA unih Personal RePE Arhive On the sustainability of ollusion in Bertran supergames with isrete priing an nonlinear eman Paul R. Zimmerman US Feeral Trae Commission 25. January 2010 Online at http://mpra.ub.uni-muenhen.e/20249/

More information

COMPSCI 276 Fall 2007

COMPSCI 276 Fall 2007 Exact Inference lgorithms for Probabilistic Reasoning; OMPSI 276 Fall 2007 1 elief Updating Smoking lung ancer ronchitis X-ray Dyspnoea P lung cancer=yes smoking=no, dyspnoea=yes =? 2 Probabilistic Inference

More information

SINCE Zadeh s compositional rule of fuzzy inference

SINCE Zadeh s compositional rule of fuzzy inference IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 14, NO. 6, DECEMBER 2006 709 Error Estimation of Perturbations Under CRI Guosheng Cheng Yuxi Fu Abstrat The analysis of stability robustness of fuzzy reasoning

More information

FORMAL METHODS LECTURE VI BINARY DECISION DIAGRAMS (BDD S)

FORMAL METHODS LECTURE VI BINARY DECISION DIAGRAMS (BDD S) Alessandro Artale (FM First Semester 2009/2010) p. 1/38 FORMAL METHODS LECTURE VI BINARY DECISION DIAGRAMS (BDD S) Alessandro Artale Faulty of Computer Siene Free University of Bolzano artale@inf.unibz.it

More information

7 Max-Flow Problems. Business Computing and Operations Research 608

7 Max-Flow Problems. Business Computing and Operations Research 608 7 Max-Flow Problems Business Computing and Operations Researh 68 7. Max-Flow Problems In what follows, we onsider a somewhat modified problem onstellation Instead of osts of transmission, vetor now indiates

More information

Multi-scale Godunov-type method for cell-centered discrete Lagrangian hydrodynamics.

Multi-scale Godunov-type method for cell-centered discrete Lagrangian hydrodynamics. Multi-sale Gounov-type metho for ell-entere isrete Lagrangian hyroynamis. Pierre-Henri Maire, Bonifae Nkonga To ite this version: Pierre-Henri Maire, Bonifae Nkonga. Multi-sale Gounov-type metho for ell-entere

More information

LECTURE NOTES FOR , FALL 2004

LECTURE NOTES FOR , FALL 2004 LECTURE NOTES FOR 18.155, FALL 2004 83 12. Cone support and wavefront set In disussing the singular support of a tempered distibution above, notie that singsupp(u) = only implies that u C (R n ), not as

More information

CSIR-UGC NET/JRF JUNE - 6 PHYSICAL SCIENCES OOKLET - [A] PART. The raius of onvergene of the Taylor series epansion of the funtion (). The value of the ontour integral the anti-lokwise iretion, is 4z e

More information

Stability of alternate dual frames

Stability of alternate dual frames Stability of alternate dual frames Ali Akbar Arefijamaal Abstrat. The stability of frames under perturbations, whih is important in appliations, is studied by many authors. It is worthwhile to onsider

More information

Structural and Strongly Structural Input and State Observability of Linear Network Systems

Structural and Strongly Structural Input and State Observability of Linear Network Systems Strutural an Strongly Strutural Input an State Oservaility of Linear Network Systems Sein Gray Feeria Garin Alain Kiangou To ite this version: Sein Gray Feeria Garin Alain Kiangou Strutural an Strongly

More information

Probabilistic Partial Evaluation: Exploiting rule structure in probabilistic inference

Probabilistic Partial Evaluation: Exploiting rule structure in probabilistic inference Probabilistic Partial Evaluation: Exploiting rule structure in probabilistic inference David Poole University of British Columbia 1 Overview Belief Networks Variable Elimination Algorithm Parent Contexts

More information

Pseudo-Differential Operators Involving Fractional Fourier Cosine (Sine) Transform

Pseudo-Differential Operators Involving Fractional Fourier Cosine (Sine) Transform ilomat 31:6 17, 1791 181 DOI 1.98/IL176791P Publishe b ault of Sienes an Mathematis, Universit of Niš, Serbia Available at: http://www.pmf.ni.a.rs/filomat Pseuo-Differential Operators Involving rational

More information

arxiv: v2 [cs.dm] 4 May 2018

arxiv: v2 [cs.dm] 4 May 2018 Disrete Morse theory for the ollapsibility of supremum setions Balthazar Bauer INRIA, DIENS, PSL researh, CNRS, Paris, Frane Luas Isenmann LIRMM, Université de Montpellier, CNRS, Montpellier, Frane arxiv:1803.09577v2

More information

MODELS FOR VARIABLE RECRUITMENT (continued)

MODELS FOR VARIABLE RECRUITMENT (continued) ODL FOR VARIABL RCRUITNT (ontinue) The other moel ommonly use to relate reruitment strength with the size of the parental spawning population is a moel evelope by Beverton an Holt (957, etion 6), whih

More information

A Channel-Based Perspective on Conjugate Priors

A Channel-Based Perspective on Conjugate Priors A Channel-Based Perspetive on Conjugate Priors Simons Institute, Berkeley Bart Jaobs, Radboud University Nijmegen bart@s.ru.nl De 12, 2017 Page 1 of 15 Jaobs De 12, 2017 Conjugate Priors Where we are,

More information

M5' Algorithm for Shear Strength Prediction of HSC Slender Beams without Web Reinforcement

M5' Algorithm for Shear Strength Prediction of HSC Slender Beams without Web Reinforcement International Journal of Modeling and Optimization, Vol. 7, No. 1, February 217 M5' Algorithm for Shear Strength Predition of HSC Slender Beams without Web Reinforement Ali Kaveh, Seyyed Mahmoud Hamze-Ziabari,

More information

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors Math 18.02 Notes on ifferentials, the Chain Rule, graients, irectional erivative, an normal vectors Tangent plane an linear approximation We efine the partial erivatives of f( xy, ) as follows: f f( x+

More information

Estimating the probability law of the codelength as a function of the approximation error in image compression

Estimating the probability law of the codelength as a function of the approximation error in image compression Estimating the probability law of the odelength as a funtion of the approximation error in image ompression François Malgouyres Marh 7, 2007 Abstrat After some reolletions on ompression of images using

More information

7.1 Roots of a Polynomial

7.1 Roots of a Polynomial 7.1 Roots of a Polynomial A. Purpose Given the oeffiients a i of a polynomial of degree n = NDEG > 0, a 1 z n + a 2 z n 1 +... + a n z + a n+1 with a 1 0, this subroutine omputes the NDEG roots of the

More information