Two-stage allocations and the double Q-function
|
|
- Claud Cooper
- 5 years ago
- Views:
Transcription
1 Two-stage allocations and the double Q-function Sergey Agievich National Research Center for Applied Problems of Mathematics and Informatics Belarusian State University Fr. Skorina av. 4, Minsk, Belarus Submitted: Apr 2, 2002; Accepted: Jun 10, 2002; Published: May 12, 2003 MR Subject Classifications: 05A15, 05A16, 60C05 Abstract Let m + n particles be thrown randomly, independently of each other into N cells, using the following two-stage procedure. 1. The first m particles are allocated equiprobably, that is, the probability of a particle falling into any particular cell is 1/N. Let the ith cell contain m i particles on completion. Then associate with this cell the probability a i = m i /m and withdraw the particles. 2. The other n particles are then allocated polynomially, that is, the probability of a particle falling into the ith cell is a i. Let ν = νm, N) be the number of the first particle that falls into a non-empty cell during the second stage. We give exact and asymptotic expressions for the expectation E ν. 1 Introduction Problems that deal with random allocations of particles into N cells balls into urns, pellets into boxes) are classical in discrete probability theory and combinatorial analysis see [3, 7] for details). The main results are concerned with determining the probability characteristics of i) the number µ r of cells that contain exactly r particles after allocation, ii) the number ν r,s of the first particle that falls so that some s cells contain at least r particles each, and other random variables. Equiprobable allocations are the most simple and well studied. Consider, for example, an Internet voting on the theme: Which of the N teams will win the world cup?. If voters don t know anything about the teams, then they make a choice particle) for each team cell) with equal probability 1/N. The more common model is so-called polynomial allocations. In this case, the probabilities a 1,...,a N to fall into each cell are given. For the electronic journal of combinatorics ), #R21 1
2 example, we can assume that common preferences exist and voters make a choice for the ith team with the probability a i. Pose the question: how are preferences formed in the absence of a priori information? In this paper we introduce two-stage allocations. At the first stage particles are allocated equiprobably. The number of particles that fell into a particular cell determines the probability to occupy this cell by particles at the second stage. In this model, preferences are formed after the public announcement of the preliminary voting results, i. e. the numbers m 1,...,m N of votes for each team. We can suppose that after seeing these results, influenced voters will make a choice for the ith team with the probability a i = m i /m, wherem = m m N. In the next section, using the generating function for the numbers µ r,weobtainan expectation of the random variable ν = ν 2,1 for allocations at the second stage. To illustrate our interest to the analysis of ν, take the example of cryptographic hash functions [8, chapter 9]. Let A and B be finite alphabets, B = N, andleta be a set of all finite words over A. The hash function h: A Bis applied in cryptography for data compression such that it is computationally infeasible to find a collision: two different words with the same hash value. The model of random equiprobable allocations of particles hash values of different input words) into N cells elements of B) is often used in the analysis of collision search algorithms. The collision waiting time ν is the number of the first particle that occupies non-empty cell. The difficulty of the collision search can be measured by the expectation E ν. From the asymptotic expansion for Ramanujan s Q-function [6, ] it follows that πn E ν = o1) as N. Most cryptographic hash functions have iterative structure based on the compression function σ : A B B. The input word X = X 1...X l is processed in the following way: Beginning with a fixed symbol Y 0 B, successively compute Y k = σx k,y k 1 ), k =1,...,l, and set the hash value hx) toσl, Y l ), where L is the representation of the length l by a symbol of A. To define σ, we must choose N values σl, Y ), where Y runs over B. Suppose that a value B was chosen N B times. Now, if for a random input word of length l an intermediate hash value Y l has uniform distribution on B, then a final hash value B will appear with probability N B /N, that is in general not equal to 1/N. It is clear that collision waiting time for this case is not greater on average than for the case of equiprobable allocations. Indeed, we will show that πn E ν = o1) for the two-stage procedure the random choice of σ the hashing of words with the same length. This expression follows from the asymptotic expansion for the double Q-function introduced in Section 3. the electronic journal of combinatorics ), #R21 2
3 2 Two-stage allocations Let m + n particles be thrown randomly, independently of each other into N cells, using the following two-stage procedure. 1. The first m particles are allocated equiprobably, that is, the probability of a particle falling into any particular cell is 1/N. Let the ith cell contain m i particles on completion. Then associate with this cell the probability a i = m i /m a i =0if m = 0) and withdraw the particles. 2. The next n particles are allocated polynomially, that is, the probability of a particle falling into the ith cell is a i. Let µ r N,m,n) be the number of cells that contain exactly r particles, r =r 1,...,r s ) be the vector of different non-negative integers, and x = x 1,...,x s ). Consider the generating function Φ N,r x,y,z)= k 0 m,n 0 where 0 0 =1,k =k 1,...,k s ), x k = x k x ks s N m m n x k y m z n P {µ r N,m,n) =k}, 1) m!n! and P {µ r N,m,n) =k} = P {µ ri N,m,n) =k i,i=1,...,s}. Theorem 1. The generating function 1) has the form: Φ N,r x,y,z)= expye z )+ ) N s x i 1)ψ ri y) zr i, 2) r i! where ψ r y) = m r m 0 m! ym and moreover ψ 0 y) =e y, ψ r+1 y) =yψ r y), r =0, 1,... Proof. Divide N cells into two groups of sizes N 1 and N 2 = N N 1. By the total probability theorem, P {µ r N,m,n) =k} = k 1 +k 2 =k, k i 0 m 1 +m 2 =m, m i 0 n 1 +n 2 =n, n i 0 m m 1 i=1 ) N1 N ) m1 N2 N ) m2 ) n m1 m n 1 ) n1 m2 ) n2 m P {µ r N 1,m 1,n 1 )=k 1 } P {µ r N 2,m 2,n 2 )=k 2 }, where m i /m =0ifm = 0. Multiplying both sides by N m m n x k y m z n and then summing m!n! over all k 0, m, n 0, we obtain Φ N,r x,y,z)=φ N1,rx,y,z)Φ N2,rx,y,z). the electronic journal of combinatorics ), #R21 3
4 This yields and it is enough to note that Φ 1,r x,y,z)= Φ N,r x,y,z)=φ 1,r x,y,z)) N m,n 0 m n y m z n m!n! =expye z )+ s i=1 + s x i 1) zr i m r i y m r i! m! i=1 x i 1)ψ ri y) zr i r i!. m 0 For comparison, if n particles are equiprobably allocated into N cells, then [7]: Φ N,r x,z)= ) N N n s n! xk z n P {µ r N,n) =k} = e z + x i 1) zr i. r k 0 i=1 i! n 0 Let ν = νm, N) be the number of the first particle that falls into a non-empty cell at the second stage. Theorem 2. If m 1, then the expectation E νm, N) = minm,n) n=0 m [n] N [n] m n N n, 3) where u [k] = uu 1)...u k +1) is the kth factorial power of u, u [0] =1. Proof. Obviously, P {ν = n} =0ifn>mor n>n. Therefore, E ν = and it is enough to show that for n minm, N). We have minm,n) n=1 np {ν = n} = minm,n) n=0 P {ν >n} = m[n] N [n] m n N n P {ν >n} = P {µ 0 N,m,n) =N n} = P {ν >n} m!n! N m m n [ x N n y m z n] Φ N,0 x, y, z). the electronic journal of combinatorics ), #R21 4
5 By Theorem 1, Φ N,0 x, y, z) =expye z )+x 1)e y ) N and ) N [x N n y m z n ]Φ N,0 x, y, z) =[y m z n ] expye z ) e y ) n e N n)y n ) ) n N =[y m z n y i i j z j ] e N n)y n i!j! i 0,j 1 ) ) n N =[y m iy i ] e N n)y =[y m ] n i! i 0 ) ) N N N =[y m n ] e Ny m n = n n m n)!. This implies the required result. N n ) ye y ) n e N n)y For comparison, if particles are equiprobably allocated into N cells and νn) is the number of the first particle that falls into a non-empty cell, then E νn) = N n=0 N [n] N n. In the next section we will give an asymptotic analysis of the sum in the right-hand side of 3). 3 The double Q-function For positive integers m and n define the double Q-function The ordinary Q-function Qm, n) = Qn) = minm,n) k=0 n k=1 m [k] n [k] m k n k. was studied by Ramanujan [1], Watson [10], Knuth [6]. Using the integral representation Qn)+1= e z 1+ n) z n dz, they derived the asymptotic expansion Qn) 0 n [k] n k πn π 12 2n 4 135n +... the electronic journal of combinatorics ), #R21 5
6 In [4] Ramanujan s conjecture on the remainder term of this expansion was proven using another representation: Qn) = n! n n 1 [zn ]log 1 1 tz), tz) = n 1 n n 1 n! z n = ze tz) tz) is the exponential generating function of rooted labeled trees). There exists the third representation Qn)+1= n! e nz n n [zn ] 1 z that provides the next double analog Use 4) to prove the following theorem. Qm, n) = m!n! m m n n [xm y n ] emx+ny 1 xy. 4) Theorem 3. Let m, n so that 0 <c 1 n/m c 2 <. Then πmn Qm, n) = 2m + n) mn ) + o1). 5) 3 m + n) 2 Proof. Without loss of generality, assume that n m. Consider the generating function fx, y) = e m1 x) n1 y) 1 xy = k,l 0 q kl x k y l. By 4), e ) m e ) n Qm, n) =m!n! qmn. 6) m n To obtain numbers q mn, n>1, we use the Cauchy formula q mn = 1 fx, y) dydx. 2πi) 2 x =1 Γ 1 Γ 2 x m+1 yn+1 Here for fixed x = e iθ, π θ π, the positively oriented contour Γ 1 Γ 2 in the complex plane y is given by see Fig. 1): Γ 1 =Γ 1 θ) = { y = e iθ 1 re iϕ ) π/2+δ ϕ π/2 δ }, Γ 2 =Γ 2 θ) = { y = e iϕ π ϕ π, θ + ϕ 2δ }, where r = n 2+6ε,0<ε< 1, δ =arcsin r, and the result of the summation θ + ϕ is 12 2 reduced to the interval [ π, π] by adding ±2π as needed. Note that δ<rbecause sin r r r3 6 >r r 6 > r 2 =sinδ. the electronic journal of combinatorics ), #R21 6
7 I 1 = 1 4π 2 I 2 = 1 4π 2 Figure 1: The contour Γ 1 Γ 2 The chosen integration surface in two-dimensional complex space x, y) encircles the origin and does not intersect with the surface xy =1ofpolesoffx, y). Denote I k = 1 fx, y) dydx. 2πi) 2 x =1 Γ k x m+1 yn+1 After some calculations, π π/2 δ exp nre iϕ θ) ) expg 1 θ)) dϕdθ, π π/2+δ 1 re iϕ ) n+1 where π θ,ϕ π θ+ϕ 2δ expg 2 θ, ϕ)) 1 e iθ+ϕ) dϕdθ, g 1 θ) = m1 e iθ ) miθ n1 e iθ )+niθ, g 2 θ, ϕ) = m1 e iθ ) miθ n1 e iϕ ) niϕ. Further we prove that the integral I 1 gives the main contribution to Qm, n) the first term in the right-hand side of 5)). To estimate I 1, we use the technique related the electronic journal of combinatorics ), #R21 7
8 to Laplace s method see [9] for references). Firstly, we approximate the integrand near θ = 0 by a simpler function and evaluate the contribution of the approximation. Then we show that remaining regions of integration contribute a negligible amount. We apply a similar technique to the integral I 2. The main difficulty is to estimate the contribution of a punctured neighborhood of the singularity ϕ = θ. The integration regions near this singularity contribute large in magnitude, but these contributions mostly cancel each other. The chosen integration path Γ 2 θ) allows us to control this cancellation with desired accuracy. The integral I 1.Since π/2 δ π/2+δ exp nre iϕ θ) ) 1 re iϕ ) n+1 dϕ = π/2 δ π/2+δ 1 + Onr))dϕ =π 2δ)1 + Onr)), we get I 1 = 1 π expg 1 θ))1 + On 1+6ε ))dθ. 4π π Denote θ 0 = m 1/2+ε and split the integral into two parts: θ θ 0 and θ 0 θ π. We have in the first part and g 1 θ) = m + n)θ 2 /2 im n)θ 3 /6+Omθ 4 0) expg 1 θ)) =exp m + n)1 cos θ)) < exp m1 cos θ 0 )) = Oexp mθ 2 0/3)) in the second one. So, accurate to an exponentially small term, θ0 I 1 = 1 exp m + n)θ 2 /2 im n)θ 3 /6)1 + On 1+6ε ))dθ 4π θ 0 = 1 θ0 ) exp m + n)θ 2 /2) e im n)θ3 /6 + e im n)θ3 /6 1 + On 1+6ε ))dθ 4π 0 = 1 θ0 exp m + n)θ 2 /2)2 + Om n) 2 θ 6 ))1 + On 1+6ε ))dθ 4π 0 = 1 θ0 exp m + n)θ 2 /2)1 + On 1+6ε ))dθ. 2π 0 Integrating from 0 to, weget I 1 = 1 2π π 2m + n) 1 + On 1+6ε )). 7) The integral I 2. If θ 0 θ π, then expg 2 θ, ϕ)) 1 e iθ+ϕ) r 1 expg 2 θ, ϕ)) = r 1 Oexp mθ0 2 /3)) = Oexp mθ2 0 /4)). the electronic journal of combinatorics ), #R21 8
9 Similarly, if ϕ 0 = n 1/2+2ε and ϕ 0 ϕ π, then the integrand has the order Oexp nϕ 2 0 /4)). For m and n sufficiently large we have ϕ 0 θ 0 +2δ and accurate to an exponentially small term I 2 = 1 expg 2 θ, ϕ)) dϕdθ, 4π 2 S 0 S 1 1 e iθ+ϕ) where S k = {θ, ϕ) 0 1) k θ θ 0,ϕ [ ϕ 0, θ 2δ] [ θ +2δ, ϕ 0 ]}. Expanding g 2 θ, ϕ) = mθ 2 /2 imθ 3 /6 nϕ 2 /2 inϕ 3 /6+Omθ0 4 + nϕ 4 0) and changing in S 1 directions of integration, we obtain I 2 = 1 exp mθ 2 /2 nϕ 2 /2)Jα, β)1 + On 1+8ε ))dϕdθ, 4π 2 S 0 where α = mθ 3 /6+nϕ 3 /6, β = θ + ϕ, Jα, β) = e iα eiα cos α cosα + β) + = 1 eiβ 1 e iβ 1 cos β =1+Oα 2 )+ 2α β 1 + Oα2 )+Oβ 2 )) = 1+ n3 θ2 θϕ + ϕ 2 m n)θ3 )+ 3θ + ϕ) =cosα + sin α 1 + cos β) sin β ) 1 + On 1/2+6ε )). So, 1 I 2 = 4π I m n ) 12π I On 1/2+6ε )), where I 21 = exp mθ 2 /2 nϕ 2 /2) 1+ n ) S 0 3 θ2 θϕ + ϕ 2 ) dϕdθ, I 22 = exp mθ 2 /2 nϕ 2 θ 3 /2) S 0 θ + ϕ dϕdθ. Since 1+ n 3 θ2 θϕ + ϕ 2 ) = Onθ0 2 ) for 0 θ θ 0 and ϕ [ θ 2δ, θ +2δ], we obtain θ0 ϕ0 I 21 = exp mθ 2 /2 nϕ 2 /2) 1+ n ) 0 ϕ 0 3 θ2 θϕ + ϕ 2 ) dϕdθ +4δθ 0 Onθ0) 2 = exp mθ 2 /2 nϕ 2 /2) 1+ n ) 0 3 θ2 + ϕ 2 ) dϕdθ + On 5/2+9ε ) = π 1+ 1 mn 3 + n ) + On 5/2+9ε ). 3m the electronic journal of combinatorics ), #R21 9
10 Further, I 22 = = + θ0 [ 2δ 0 ϕ 0 +θ θ0 ϕ0 0 θ0 0 [ + ϕ0 +θ 2δ 2δ ϕ0 +θ ϕ0 +θ + ϕ 0 ϕ 0 ] exp mθ 2 /2 nϕ θ) 2 /2) θ3 ϕ dϕdθ exp m + n)θ 2 /2 nϕ 2 /2) θ3 e nθϕ e nθϕ ) dϕdθ+ ϕ ] exp mθ 2 /2 nϕ θ) 2 /2) θ3 ϕ dϕdθ. The last term is exponentially small and θ 3 e nθϕ e nθϕ ) ϕ = Onθ4 0 ) for 0 θ θ 0 and ϕ [0, 2δ]. Therefore, I 22 = = θ0 ϕ exp m + n)θ 2 /2 nϕ 2 /2) θ3 e nθϕ e nθϕ ) dϕdθ +2δθ 0 Onθ0 4 ϕ ) exp m + n)θ 2 /2 nϕ 2 /2) θ3 e nθϕ e nθϕ ) dϕdθ + On 7/2+11ε ). ϕ Write the integrand as the series 2 exp m + n)θ 2 /2 nϕ 2 /2) n2k+1 θ 2k+4 ϕ 2k 2k +1)! k 0 and interchange the summation and integrations it is easy to justify). We get π n I 22 = 3+ ) k n k 2k +3) 1 m + n) 5/2 m + n 2l) ) 1 + On 7/2+11ε ). k 1 l=1 Additionally, 3+ k u k 2k +3) 1 1 ) =31 u) 1/2 + u1 u) 3/2 2l k 1 for a real u, u < 1. Thus I 22 = l=1 π n m + n) 2 3+ n ) + On 7/2+11ε ) m m and, therefore, 1 2 I 2 = 2π mn 3 + n nm n) 1 + 6m m + n) n )) 1 + On 1/2+6ε )). 8) 6m Applying the Stirling formula to 6), we have Qm, n) =2π mni 1 + I 2 )1 + On 1 )). Using here estimates 7) and 8), we obtain the result stated. the electronic journal of combinatorics ), #R21 10
11 The proof above can be easily adapted to the one-dimensional case. In this case, we obtain the first two terms of the asymptotic expansion for Qn) by estimating the integral Γ1 Γ2 e n1 y) 1 y)y n+1dy, Γ k =Γ k 0). Note that the chosen contour Γ 1 Γ 2 differs from ones used in the saddle point method [2, 9] or in the singularity analysis [5], the most useful tools for obtaining asymptotic expansions for the coefficients of generating functions. The saddle point technique cannot be applied to our generating function e n1 y) 1 y) 1 due to a small singularity at y = 1 that yields a slow decay of the corresponding integrand near its saddle point. The singularity analysis works with generating functions of the form L1 y) 1 )1 y) 1, where Lu) must be a special slowly varying at infinity function, but this does not hold in our case. Acknowledgment The author would like to thank the anonymous referees for pointing out the voting interpretation of two-stage allocations. References [1] B. C. Berndt, Ramanujan s notebooks, Part II, Springer-Verlag, Berlin, [2] N. G. debruijn, Asymptotic methods in analysis, North-Holland, Amsterdam, [3] W. Feller, An introduction to probability theory and its applications, VolumeI,3rd edition, John Wiley & Sons, Inc., New York, [4] P. Flajolet, P. Grabner, P. Kirschenhofer, and H. Prodinger, On Ramanujan s Q-function, J. Computational and Applied Mathematics ) [5] P. Flajolet, A. Odlyzko, Singularity analysis of generating functions. SIAM Journal on Discrete Math ) [6] D. E. Knuth, The art of computer programming, Vol. 1: Fundamental algorithms, Addison-Wesley, Reading, Massachusetts, [7] V. F. Kolchin, B. Sevast yanov, and V. Chistyakov, Random allocations, Wiley, New York, [8] A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of applied cryptology, CRC Press, New York, the electronic journal of combinatorics ), #R21 11
12 [9] A. Odlyzko. Asymptotic enumeration methods. In R. L. Graham, M. Grötschel, and L. Lovász eds.), Handbook of Combinatorics, Vol. II, Elsevier, Amsterdam 1995) [10] G. H. Watson, Theorems stated by Ramanujan V): Approximations connected with e x, Proc. London Math. Soc ) the electronic journal of combinatorics ), #R21 12
The Number of Inversions in Permutations: A Saddle Point Approach
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 6 (23), Article 3.2.8 The Number of Inversions in Permutations: A Saddle Point Approach Guy Louchard Département d Informatique CP 212, Boulevard du
More informationThe number of inversions in permutations: A saddle point approach
The number of inversions in permutations: A saddle point approach Guy Louchard and Helmut Prodinger November 4, 22 Abstract Using the saddle point method, we obtain from the generating function of the
More informationSome theorems on the explicit evaluations of singular moduli 1
General Mathematics Vol 17 No 1 009) 71 87 Some theorems on the explicit evaluations of singular moduli 1 K Sushan Bairy Abstract At scattered places in his notebooks Ramanujan recorded some theorems for
More informationPermutations with Inversions
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 4 2001, Article 01.2.4 Permutations with Inversions Barbara H. Margolius Cleveland State University Cleveland, Ohio 44115 Email address: b.margolius@csuohio.edu
More informationCounting Palindromes According to r-runs of Ones Using Generating Functions
3 47 6 3 Journal of Integer Sequences, Vol. 7 (04), Article 4.6. Counting Palindromes According to r-runs of Ones Using Generating Functions Helmut Prodinger Department of Mathematics Stellenbosch University
More informationROSENA R.X. DU AND HELMUT PRODINGER. Dedicated to Philippe Flajolet ( )
ON PROTECTED NODES IN DIGITAL SEARCH TREES ROSENA R.X. DU AND HELMUT PRODINGER Dedicated to Philippe Flajolet (98 2) Abstract. Recently, 2-protected nodes were studied in the context of ordered trees and
More informationAsymptotics of Integrals of. Hermite Polynomials
Applied Mathematical Sciences, Vol. 4, 010, no. 61, 04-056 Asymptotics of Integrals of Hermite Polynomials R. B. Paris Division of Complex Systems University of Abertay Dundee Dundee DD1 1HG, UK R.Paris@abertay.ac.uk
More informationPAijpam.eu REPEATED RANDOM ALLOCATIONS WITH INCOMPLETE INFORMATION Vladimir G. Panov 1, Julia V. Nagrebetskaya 2
International Journal of Pure and Applied Mathematics Volume 118 No. 4 2018, 1021-1032 ISSN: 1311-8080 printed version; ISSN: 1314-3395 on-line version url: http://www.ipam.eu doi: 10.12732/ipam.v118i4.16
More informationMath Homework 2
Math 73 Homework Due: September 8, 6 Suppose that f is holomorphic in a region Ω, ie an open connected set Prove that in any of the following cases (a) R(f) is constant; (b) I(f) is constant; (c) f is
More informationNotes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.
Lecture: Hélène Barcelo Analytic Combinatorics ECCO 202, Bogotá Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.. Tuesday, June 2, 202 Combinatorics is the study of finite structures that
More informationPERIOD LENGTHS OF CHAOTIC PSEUDO-RANDOM NUMBER GENERATORS
PERIOD LENGTHS OF CHAOTIC PSEUDO-RANDOM NUMBER GENERATORS Jörg Keller Hanno Wiese FernUniversität in Hagen LG Parallelität und VLSI 58084 Hagen, Germany joerg.keller@fernuni-hagen.de ABSTRACT Cryptographic
More informationThe Number of Guillotine Partitions in d Dimensions
The Number of Guillotine Partitions in d Dimensions Eyal Ackerman Gill Barequet Ron Y. Pinter Dan Romik Abstract Guillotine partitions play an important role in many research areas and application domains,
More informationOn the number of matchings of a tree.
On the number of matchings of a tree. Stephan G. Wagner Department of Mathematics, Graz University of Technology, Steyrergasse 30, A-800 Graz, Austria Abstract In a paper of Klazar, several counting examples
More informationBlind Collective Signature Protocol
Computer Science Journal of Moldova, vol.19, no.1(55), 2011 Blind Collective Signature Protocol Nikolay A. Moldovyan Abstract Using the digital signature (DS) scheme specified by Belarusian DS standard
More informationEnumerating connected labelled graphs
Enumerating connected labelled graphs Keith Briggs Keith.Briggs@bt.com more.btexact.com/people/briggsk2/ 2004 August 17 conn-lab-graphs.tex typeset 2004 August 17 10:40 in pdflatex on a linux system Enumerating
More informationCounting Palindromes According to r-runs of Ones Using Generating Functions
Counting Palindromes According to r-runs of Ones Using Generating Functions Helmut Prodinger Department of Mathematics Stellenbosch University 7602 Stellenbosch South Africa hproding@sun.ac.za Abstract
More informationarxiv: v1 [math.co] 8 Feb 2013
ormal numbers and normality measure Christoph Aistleitner arxiv:302.99v [math.co] 8 Feb 203 Abstract The normality measure has been introduced by Mauduit and Sárközy in order to describe the pseudorandomness
More information1. Introduction Interest in this project began with curiosity about the Laplace transform of the Digamma function, e as ψ(s + 1)ds,
ON THE LAPLACE TRANSFORM OF THE PSI FUNCTION M. LAWRENCE GLASSER AND DANTE MANNA Abstract. Guided by numerical experimentation, we have been able to prove that Z 8 / x x + ln dx = γ + ln) [cosx)] and to
More informationASYMPTOTICS OF THE EULERIAN NUMBERS REVISITED: A LARGE DEVIATION ANALYSIS
ASYMPTOTICS OF THE EULERIAN NUMBERS REVISITED: A LARGE DEVIATION ANALYSIS GUY LOUCHARD ABSTRACT Using the Saddle point method and multiseries expansions we obtain from the generating function of the Eulerian
More informationPHYS 404 Lecture 1: Legendre Functions
PHYS 404 Lecture 1: Legendre Functions Dr. Vasileios Lempesis PHYS 404 - LECTURE 1 DR. V. LEMPESIS 1 Legendre Functions physical justification Legendre functions or Legendre polynomials are the solutions
More informationOn a generalization of addition chains: Addition multiplication chains
Discrete Mathematics 308 (2008) 611 616 www.elsevier.com/locate/disc On a generalization of addition chains: Addition multiplication chains Hatem M. Bahig Computer Science Division, Department of Mathematics,
More informationLengyel's Constant Page 1 of 5
Lengyel's Constant Page 1 of 5 Lengyel's Constant Set Partitions and Bell Numbers Let S be a set with n elements. The set of all subsets of S has elements. By a partition of S we mean a disjoint set of
More informationAsymptotics of the Eulerian numbers revisited: a large deviation analysis
Asymptotics of the Eulerian numbers revisited: a large deviation analysis Guy Louchard November 204 Abstract Using the Saddle point method and multiseries expansions we obtain from the generating function
More informationForty years of tree enumeration
October 24, 206 Canada John Moon (Alberta) Counting labelled trees Canadian mathematical monographs What is our subject? Asymptotic enumeration or Probabilistic combinatorics? What is our subject? Asymptotic
More informationON THE COEFFICIENTS OF AN ASYMPTOTIC EXPANSION RELATED TO SOMOS QUADRATIC RECURRENCE CONSTANT
Applicable Analysis and Discrete Mathematics available online at http://pefmath.etf.bg.ac.yu Appl. Anal. Discrete Math. x (xxxx), xxx xxx. doi:10.2298/aadmxxxxxxxx ON THE COEFFICIENTS OF AN ASYMPTOTIC
More informationMinimax Redundancy for Large Alphabets by Analytic Methods
Minimax Redundancy for Large Alphabets by Analytic Methods Wojciech Szpankowski Purdue University W. Lafayette, IN 47907 March 15, 2012 NSF STC Center for Science of Information CISS, Princeton 2012 Joint
More informationOn the stirling expansion into negative powers of a triangular number
MATHEMATICAL COMMUNICATIONS 359 Math. Commun., Vol. 5, No. 2, pp. 359-364 200) On the stirling expansion into negative powers of a triangular number Cristinel Mortici, Department of Mathematics, Valahia
More informationGrowing and Destroying Catalan Stanley Trees
Discrete Mathematics and Theoretical Computer Science DMTCS vol. 20:1, 2018, #11 Growing and Destroying Catalan Stanley Trees Benjamin Hackl 1 Helmut Prodinger 2 arxiv:1704.03734v3 [math.co] 26 Feb 2018
More informationMULTISECTION METHOD AND FURTHER FORMULAE FOR π. De-Yin Zheng
Indian J. pure appl. Math., 39(: 37-55, April 008 c Printed in India. MULTISECTION METHOD AND FURTHER FORMULAE FOR π De-Yin Zheng Department of Mathematics, Hangzhou Normal University, Hangzhou 30036,
More informationBlind Signature Protocol Based on Difficulty of. Simultaneous Solving Two Difficult Problems
Applied Mathematical Sciences, Vol. 6, 202, no. 39, 6903-690 Blind Signature Protocol Based on Difficulty of Simultaneous Solving Two Difficult Problems N. H. Minh, D. V. Binh 2, N. T. Giang 3 and N. A.
More information1 Discussion on multi-valued functions
Week 3 notes, Math 7651 1 Discussion on multi-valued functions Log function : Note that if z is written in its polar representation: z = r e iθ, where r = z and θ = arg z, then log z log r + i θ + 2inπ
More informationON THE TAYLOR COEFFICIENTS OF THE HURWITZ ZETA FUNCTION
ON THE TAYLOR COEFFICIENTS OF THE HURWITZ ZETA FUNCTION Khristo N. Boyadzhiev Department of Mathematics, Ohio Northern University, Ada, Ohio, 45810 k-boyadzhiev@onu.edu Abstract. We find a representation
More informationNew asymptotic expansion for the Γ (z) function.
New asymptotic expansion for the Γ z function. Gergő Nemes Institute of Mathematics, Eötvös Loránd University 7 Budapest, Hungary September 4, 007 Published in Stan s Library, Volume II, 3 Dec 007. Link:
More informationOPSF, Random Matrices and Riemann-Hilbert problems
OPSF, Random Matrices and Riemann-Hilbert problems School on Orthogonal Polynomials in Approximation Theory and Mathematical Physics, ICMAT 23 27 October, 207 Plan of the course lecture : Orthogonal Polynomials
More informationJournal of Mathematical Analysis and Applications
J. Math. Anal. Appl. 383 (011) 00 07 Contents lists available at ScienceDirect Journal of Mathematical Analysis and Applications www.elsevier.com/locate/jmaa Asymptotic enumeration of some RNA secondary
More informationOn Ramanujan's Q-function
JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS ELSEVIER Journal of Computational and Applied Mathematics 58 (1995) 103-116 On Ramanujan's Q-function Philippe Flajolet*' a, Peter J. Grabner b, Peter Kirschenhofere,
More informationMAT389 Fall 2016, Problem Set 11
MAT389 Fall 216, Problem Set 11 Improper integrals 11.1 In each of the following cases, establish the convergence of the given integral and calculate its value. i) x 2 x 2 + 1) 2 ii) x x 2 + 1)x 2 + 2x
More informationA class of trees and its Wiener index.
A class of trees and its Wiener index. Stephan G. Wagner Department of Mathematics Graz University of Technology Steyrergasse 3, A-81 Graz, Austria wagner@finanz.math.tu-graz.ac.at Abstract In this paper,
More informationPacific Journal of Mathematics
Pacific Journal of Mathematics ELLIPTIC FUNCTIONS TO THE QUINTIC BASE HENG HUAT CHAN AND ZHI-GUO LIU Volume 226 No. July 2006 PACIFIC JOURNAL OF MATHEMATICS Vol. 226, No., 2006 ELLIPTIC FUNCTIONS TO THE
More informationThe Generating Functions for Pochhammer
The Generating Functions for Pochhammer Symbol { }, n N Aleksandar Petoević University of Novi Sad Teacher Training Faculty, Department of Mathematics Podgorička 4, 25000 Sombor SERBIA and MONTENEGRO Email
More informationPollard s Rho Algorithm for Elliptic Curves
November 30, 2015 Consider the elliptic curve E over F 2 k, where E = n. Assume we want to solve the elliptic curve discrete logarithm problem: find k in Q = kp. Partition E into S 1 S 2 S 3, where the
More informationMOMENTS OF HYPERGEOMETRIC HURWITZ ZETA FUNCTIONS
MOMENTS OF HYPERGEOMETRIC HURWITZ ZETA FUNCTIONS ABDUL HASSEN AND HIEU D. NGUYEN Abstract. This paper investigates a generalization the classical Hurwitz zeta function. It is shown that many of the properties
More informationAlmost all trees have an even number of independent sets
Almost all trees have an even number of independent sets Stephan G. Wagner Department of Mathematical Sciences Stellenbosch University Private Bag X1, Matieland 7602, South Africa swagner@sun.ac.za Submitted:
More informationAn identity of Andrews and the Askey-Wilson integral
Ramanujan J DOI 0.007/s39-008-922-4 An identity of Andrews and the Askey-Wilson integral Zhi-Guo Liu Received: 6 July 2007 / Accepted: 7 January 2008 Springer Science+Business Media, LLC 2008 Abstract
More informationCOMPLEXITY IN COOPERATIVE GAME THEORY
COMPLEXITY IN COOPERATIVE GAME THEORY J. M. Bilbao 1,J.R.Fernández 2 andj.j.lópez 3 Matemática Aplicada II, Escuela Superior de Ingenieros Camino de los Descubrimientos s/n, 41092 Sevilla, Spain http://www.esi.us.es/~mbilbao/
More informationA REMARK ON THE BOROS-MOLL SEQUENCE
#A49 INTEGERS 11 (2011) A REMARK ON THE BOROS-MOLL SEQUENCE J.-P. Allouche CNRS, Institut de Math., Équipe Combinatoire et Optimisation Université Pierre et Marie Curie, Paris, France allouche@math.jussieu.fr
More informationThe Asymptotic Hadamard Conjecture
p. 1/4 The Asymptotic Hadamard Conjecture Rod Canfield erc@cs.uga.edu Department of Computer Science University of Georgia Atlanta Lecture Series in Combinatorics and Graph Theory November 13, 2010 p.
More information2 Write down the range of values of α (real) or β (complex) for which the following integrals converge. (i) e z2 dz where {γ : z = se iα, < s < }
Mathematical Tripos Part II Michaelmas term 2007 Further Complex Methods, Examples sheet Dr S.T.C. Siklos Comments and corrections: e-mail to stcs@cam. Sheet with commentary available for supervisors.
More informationGrowth of Solutions of Second Order Complex Linear Differential Equations with Entire Coefficients
Filomat 32: (208), 275 284 https://doi.org/0.2298/fil80275l Published by Faculty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Growth of Solutions
More informationThe Moments of the Profile in Random Binary Digital Trees
Journal of mathematics and computer science 6(2013)176-190 The Moments of the Profile in Random Binary Digital Trees Ramin Kazemi and Saeid Delavar Department of Statistics, Imam Khomeini International
More informationON POLYNOMIAL REPRESENTATION FUNCTIONS FOR MULTILINEAR FORMS. 1. Introduction
ON POLYNOMIAL REPRESENTATION FUNCTIONS FOR MULTILINEAR FORMS JUANJO RUÉ In Memoriam of Yahya Ould Hamidoune. Abstract. Given an infinite sequence of positive integers A, we prove that for every nonnegative
More informationCounting k-marked Durfee Symbols
Counting k-marked Durfee Symbols Kağan Kurşungöz Department of Mathematics The Pennsylvania State University University Park PA 602 kursun@math.psu.edu Submitted: May 7 200; Accepted: Feb 5 20; Published:
More information(x 1, y 1 ) = (x 2, y 2 ) if and only if x 1 = x 2 and y 1 = y 2.
1. Complex numbers A complex number z is defined as an ordered pair z = (x, y), where x and y are a pair of real numbers. In usual notation, we write z = x + iy, where i is a symbol. The operations of
More informationMTH4101 CALCULUS II REVISION NOTES. 1. COMPLEX NUMBERS (Thomas Appendix 7 + lecture notes) ax 2 + bx + c = 0. x = b ± b 2 4ac 2a. i = 1.
MTH4101 CALCULUS II REVISION NOTES 1. COMPLEX NUMBERS (Thomas Appendix 7 + lecture notes) 1.1 Introduction Types of numbers (natural, integers, rationals, reals) The need to solve quadratic equations:
More informationComputers and Mathematics with Applications
Computers and Mathematics with Applications 61 (2011) 1261 1265 Contents lists available at ScienceDirect Computers and Mathematics with Applications journal homepage: wwwelseviercom/locate/camwa Cryptanalysis
More informationNON-LINEAR COMPLEXITY OF THE NAOR REINGOLD PSEUDO-RANDOM FUNCTION
NON-LINEAR COMPLEXITY OF THE NAOR REINGOLD PSEUDO-RANDOM FUNCTION William D. Banks 1, Frances Griffin 2, Daniel Lieman 3, Igor E. Shparlinski 4 1 Department of Mathematics, University of Missouri Columbia,
More informationHere are brief notes about topics covered in class on complex numbers, focusing on what is not covered in the textbook.
Phys374, Spring 2008, Prof. Ted Jacobson Department of Physics, University of Maryland Complex numbers version 5/21/08 Here are brief notes about topics covered in class on complex numbers, focusing on
More informationIDENTITIES INVOLVING BERNOULLI NUMBERS RELATED TO SUMS OF POWERS OF INTEGERS
IDENTITIES INVOLVING ERNOULLI NUMERS RELATED TO SUMS OF POWERS OF INTEGERS PIERLUIGI MAGLI Abstract. Pointing out the relations between integer power s sums and ernoulli and Genocchi polynomials, several
More informationOn solving sparse algebraic equations over finite
On solving sparse algebraic equations over finite fields II Igor Semaev Department of Informatics, University of Bergen, Norway Abstract. A system of algebraic equations over a finite field is called sparse
More informationThe q-exponential generating function for permutations by consecutive patterns and inversions
The q-exponential generating function for permutations by consecutive patterns and inversions Don Rawlings Abstract The inverse of Fedou s insertion-shift bijection is used to deduce a general form for
More informationConsidering our result for the sum and product of analytic functions, this means that for (a 0, a 1,..., a N ) C N+1, the polynomial.
Lecture 3 Usual complex functions MATH-GA 245.00 Complex Variables Polynomials. Construction f : z z is analytic on all of C since its real and imaginary parts satisfy the Cauchy-Riemann relations and
More information1. The COMPLEX PLANE AND ELEMENTARY FUNCTIONS: Complex numbers; stereographic projection; simple and multiple connectivity, elementary functions.
Complex Analysis Qualifying Examination 1 The COMPLEX PLANE AND ELEMENTARY FUNCTIONS: Complex numbers; stereographic projection; simple and multiple connectivity, elementary functions 2 ANALYTIC FUNCTIONS:
More informationGROWTH OF SOLUTIONS TO HIGHER ORDER LINEAR HOMOGENEOUS DIFFERENTIAL EQUATIONS IN ANGULAR DOMAINS
Electronic Journal of Differential Equations, Vol 200(200), No 64, pp 7 ISSN: 072-669 URL: http://ejdemathtxstateedu or http://ejdemathuntedu ftp ejdemathtxstateedu GROWTH OF SOLUTIONS TO HIGHER ORDER
More informationOn the discrepancy of circular sequences of reals
On the discrepancy of circular sequences of reals Fan Chung Ron Graham Abstract In this paper we study a refined measure of the discrepancy of sequences of real numbers in [0, ] on a circle C of circumference.
More informationBook announcements. Sukumar Das Adhikari ASPECTS OF COMBINATORICS AND COMBINATORIAL NUMBER THEORY CRC Press, Florida, 2002, 156pp.
Discrete Mathematics 263 (2003) 347 352 www.elsevier.com/locate/disc Book announcements Sukumar Das Adhikari ASPECTS OF COMBINATORICS AND COMBINATORIAL NUMBER THEORY CRC Press, Florida, 2002, 156pp. Notations
More informationAPPLICATION OF SOMMERFELD - WATSON TRANSFORMATION TO AN ELECTROSTATICS PROBLEM*
SLAC -PUB-533 December 19 68 (MISC) APPLICATION OF SOMMERFELD - WATSON TRANSFORMATION TO AN ELECTROSTATICS PROBLEM* Jon Pumplin Stanford Linear Accelerator Center Stanford University, Stanford, California
More informationHigher order asymptotics from multivariate generating functions
Higher order asymptotics from multivariate generating functions Mark C. Wilson, University of Auckland (joint with Robin Pemantle, Alex Raichev) Rutgers, 2009-11-19 Outline Preliminaries References Our
More informationk-protected VERTICES IN BINARY SEARCH TREES
k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from
More informationA Note about the Pochhammer Symbol
Mathematica Moravica Vol. 12-1 (2008), 37 42 A Note about the Pochhammer Symbol Aleksandar Petoević Abstract. In this paper we give elementary proofs of the generating functions for the Pochhammer symbol
More informationMOCK THETA FUNCTIONS AND THETA FUNCTIONS. Bhaskar Srivastava
NEW ZEALAND JOURNAL OF MATHEMATICS Volume 36 (2007), 287 294 MOCK THETA FUNCTIONS AND THETA FUNCTIONS Bhaskar Srivastava (Received August 2004). Introduction In his last letter to Hardy, Ramanujan gave
More informationSecond Midterm Exam Name: Practice Problems March 10, 2015
Math 160 1. Treibergs Second Midterm Exam Name: Practice Problems March 10, 015 1. Determine the singular points of the function and state why the function is analytic everywhere else: z 1 fz) = z + 1)z
More informationQualification Exam: Mathematical Methods
Qualification Exam: Mathematical Methods Name:, QEID#41534189: August, 218 Qualification Exam QEID#41534189 2 1 Mathematical Methods I Problem 1. ID:MM-1-2 Solve the differential equation dy + y = sin
More informationOn the Distribution of the Subset Sum Pseudorandom Number Generator on Elliptic Curves
On the Distribution of the Subset Sum Pseudorandom Number Generator on Elliptic Curves Simon R. Blacburn Department of Mathematics Royal Holloway University of London Egham, Surrey, TW20 0EX, UK s.blacburn@rhul.ac.u
More informationYunhi Cho and Young-One Kim
Bull. Korean Math. Soc. 41 (2004), No. 1, pp. 27 43 ANALYTIC PROPERTIES OF THE LIMITS OF THE EVEN AND ODD HYPERPOWER SEQUENCES Yunhi Cho Young-One Kim Dedicated to the memory of the late professor Eulyong
More informationSPRING 2008: POLYNOMIAL IMAGES OF CIRCLES
18.821 SPRING 28: POLYNOMIAL IMAGES OF CIRCLES JUSTIN CURRY, MICHAEL FORBES, MATTHEW GORDON Abstract. This paper considers the effect of complex polynomial maps on circles of various radii. Several phenomena
More informationHomework 27. Homework 28. Homework 29. Homework 30. Prof. Girardi, Math 703, Fall 2012 Homework: Define f : C C and u, v : R 2 R by
Homework 27 Define f : C C and u, v : R 2 R by f(z) := xy where x := Re z, y := Im z u(x, y) = Re f(x + iy) v(x, y) = Im f(x + iy). Show that 1. u and v satisfies the Cauchy Riemann equations at (x, y)
More informationMath 185 Fall 2015, Sample Final Exam Solutions
Math 185 Fall 2015, Sample Final Exam Solutions Nikhil Srivastava December 12, 2015 1. True or false: (a) If f is analytic in the annulus A = {z : 1 < z < 2} then there exist functions g and h such that
More informationGenerating All Circular Shifts by Context-Free Grammars in Greibach Normal Form
Generating All Circular Shifts by Context-Free Grammars in Greibach Normal Form Peter R.J. Asveld Department of Computer Science, Twente University of Technology P.O. Box 17, 7500 AE Enschede, the Netherlands
More informationAn Involution for the Gauss Identity
An Involution for the Gauss Identity William Y. C. Chen Center for Combinatorics Nankai University, Tianjin 300071, P. R. China Email: chenstation@yahoo.com Qing-Hu Hou Center for Combinatorics Nankai
More informationAsymptotic Estimates for Generalized Stirling Numbers
Centrum voor Wiskunde en Informatica REPORTRAPPORT Asmptotic Estimates for Generalized Stirling Numbers R. Chelluri, L.B. Richmond, N.M. Temme Modelling, Analsis and Simulation (MAS) MAS-R9923 September
More informationOn the number of ways of writing t as a product of factorials
On the number of ways of writing t as a product of factorials Daniel M. Kane December 3, 005 Abstract Let N 0 denote the set of non-negative integers. In this paper we prove that lim sup n, m N 0 : n!m!
More informationSome results on the existence of t-all-or-nothing transforms over arbitrary alphabets
Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets Navid Nasr Esfahani, Ian Goldberg and Douglas R. Stinson David R. Cheriton School of Computer Science University of
More informationOn the mean values of an analytic function
ANNALES POLONICI MATHEMATICI LVII.2 (1992) On the mean values of an analytic function by G. S. Srivastava and Sunita Rani (Roorkee) Abstract. Let f(z), z = re iθ, be analytic in the finite disc z < R.
More informationNotes: Most of the material presented in this chapter is taken from Jackson, Chap. 2, 3, and 4, and Di Bartolo, Chap. 2. 2π nx i a. ( ) = G n.
Chapter. Electrostatic II Notes: Most of the material presented in this chapter is taken from Jackson, Chap.,, and 4, and Di Bartolo, Chap... Mathematical Considerations.. The Fourier series and the Fourier
More informationLAURENT SERIES AND SINGULARITIES
LAURENT SERIES AND SINGULARITIES Introduction So far we have studied analytic functions Locally, such functions are represented by power series Globally, the bounded ones are constant, the ones that get
More informationTROPICAL CRYPTOGRAPHY II: EXTENSIONS BY HOMOMORPHISMS
TROPICAL CRYPTOGRAPHY II: EXTENSIONS BY HOMOMORPHISMS DIMA GRIGORIEV AND VLADIMIR SHPILRAIN Abstract We use extensions of tropical algebras as platforms for very efficient public key exchange protocols
More informationSuggested Homework Solutions
Suggested Homework Solutions Chapter Fourteen Section #9: Real and Imaginary parts of /z: z = x + iy = x + iy x iy ( ) x iy = x #9: Real and Imaginary parts of ln z: + i ( y ) ln z = ln(re iθ ) = ln r
More informationOn Quasigroup Pseudo Random Sequence Generators
On Quasigroup Pseudo Random Sequence Generators V. Dimitrova, J. Markovski Institute of Informatics, Faculty of Natural Sciences and Mathematics Ss Cyril and Methodius University, 1 Skopje, FYRO Macedonia
More informationCentrum voor Wiskunde en Informatica
Centrum voor Wiskunde en Informatica Modelling, Analysis and Simulation Modelling, Analysis and Simulation Two-point Taylor expansions of analytic functions J.L. Lópe, N.M. Temme REPORT MAS-R0 APRIL 30,
More informationCombinatorial properties of the numbers of tableaux of bounded height
Combinatorial properties of the numbers of tableaux of bounded height Marilena Barnabei, Flavio Bonetti, and Matteo Sibani Abstract We introduce an infinite family of lower triangular matrices Γ (s), where
More informationCOMMUTATIVE SEMIFIELDS OF ORDER 243 AND 3125
COMMUTATIVE SEMIFIELDS OF ORDER 243 AND 3125 ROBERT S. COULTER AND PAMELA KOSICK Abstract. This note summarises a recent search for commutative semifields of order 243 and 3125. For each of these two orders,
More informationAssignment 2 - Complex Analysis
Assignment 2 - Complex Analysis MATH 440/508 M.P. Lamoureux Sketch of solutions. Γ z dz = Γ (x iy)(dx + idy) = (xdx + ydy) + i Γ Γ ( ydx + xdy) = (/2)(x 2 + y 2 ) endpoints + i [( / y) y ( / x)x]dxdy interiorγ
More informationFourth Week: Lectures 10-12
Fourth Week: Lectures 10-12 Lecture 10 The fact that a power series p of positive radius of convergence defines a function inside its disc of convergence via substitution is something that we cannot ignore
More informationarxiv: v1 [math.co] 12 Sep 2018
ON THE NUMBER OF INCREASING TREES WITH LABEL REPETITIONS arxiv:809.0434v [math.co] Sep 08 OLIVIER BODINI, ANTOINE GENITRINI, AND BERNHARD GITTENBERGER Abstract. In this paper we study a special subclass
More informationHypergeometric series and the Riemann zeta function
ACTA ARITHMETICA LXXXII.2 (997) Hypergeometric series and the Riemann zeta function by Wenchang Chu (Roma) For infinite series related to the Riemann zeta function, De Doelder [4] established numerous
More informationEstimates of the error in Gauss-Legendre quadrature for double integrals
Estimates of the error in Gauss-Legendre quadrature for double integrals Author Elliott, David, Johnston, Peter, Johnston, Barbara Published 211 Journal Title Journal of Computational and Applied Mathematics
More informationNew asymptotic expansion for the Γ (x) function
New asymptotic epansion for the Γ function Gergő Nemes December 7, 2008 http://d.doi.org/0.3247/sl2math08.005 Abstract Using a series transformation, Stirling-De Moivre asymptotic series approimation to
More informationBT Research at Martlesham, Suffolk
Connectivity of random graphs Keith Briggs Keith.Briggs@bt.com research.btexact.com/teralab/keithbriggs.html Alan Turing Institute 2004 November 19 1330 typeset 2004 November 17 10:55 in pdflatex on a
More informationPeriodic trajectories in the regular pentagon, II
Periodic trajectories in the regular pentagon, II Dmitry Fuchs, and Serge Tachnikov December 9, 011 1 Introduction and formulation of results In our recent paper [1], we studied periodic billiard trajectories
More informationSplitting Fields for Characteristic Polynomials of Matrices with Entries in a Finite Field.
Splitting Fields for Characteristic Polynomials of Matrices with Entries in a Finite Field. Eric Schmutz Mathematics Department, Drexel University,Philadelphia, Pennsylvania, 19104. Abstract Let M n be
More information