Endogeny for the Logistic Recursive Distributional Equation

Size: px
Start display at page:

Download "Endogeny for the Logistic Recursive Distributional Equation"

Transcription

1 Zeitschrift für Analysis und ihre Anendungen Journal for Analysis and its Applications Volume 30 20, DOI: 0.47/ZAA/433 c European Mathematical Society Endogeny for the Logistic Recursive Distributional Equation Antar Bandyopadhyay Abstract. In this article e prove the endogeny and bivariate uniqueness property for a particular max-type recursive distributional equation RDE. The RDE e consider is the so called logistic RDE, hich appears in the proof of the ζ2-limit of the random assignment problem using the local eak convergence method proved by D. Aldous [Probab. Theory Related Fields , ]. This article provides a non-trivial application of the general theory developed by D. Aldous and A. Bandyopadhyay [Ann. Appl. Probab , 047 0]. The proofs involves analytic arguments, hich illustrate the need to develop more analytic tools for studying such max-type RDEs. Keyords. Bivariate uniqueness, endogeny, logistic distribution, random assignment problem, recursive distributional equations, recursive tree processes Mathematics Subject Classification Primary 60E05, secondary 60K35, 60J80. Introduction and the main result Fixed-point equations have found many applications in various fields of mathematics. In probability theory they are usually referred as distributional identities. A recent article by Aldous and Bandyopadhyay [5] provides a general frameork to study certain type of distributional identities hich arise in a variety of settings. Given a measurable space S, S rite P S for the set of all probabilities on S. According to [5], a recursive distributional equation RDE is a fixed-point equation on P S defined as X d = g ξ; X j : j N on S, A. Bandyopadhyay: Theoretical Statistics and Mathematics Unit, Indian Statistical Institute, 7 S. J. S. Sansanal Marg, Ne Delhi 006, India; antar@isid.ac.in

2 238 A. Bandyopadhyay here it is assumed that X j j are S-valued random variables ith identical distribution and are stochastically independent, and their common distribution is same as that of the random variable X, and are independent of the pair ξ, N. Here ξ is a measurable function taking value on some measurable space, say Λ, Z, N is a non-negative integer valued random variable, hich may take the value and g is a given S-valued function. In the above equation by N e mean the left hand side is N if N <, and < N otherise. In the distribution of X is unknon, hile the distribution of the pair ξ, N and the function g are assumed to be knon quantities. Perhaps a more conventional analytic ay of riting the equation ould be here T : P S P S is a function defined as µ = T µ, 2 T µ := dist g ξ; X j : j N here ξ, N is as above and X j j are independent and identically distributed i.i.d. ith common distribution µ P S and these sets of random variables are stochastically independent. As outlined in [5] in many applications RDEs play a very crucial role. Examples include study of Galton-Watson branching processes and related random trees, probabilistic analysis of algorithms ith suitable recursive structure [, 5, 6], statistical physics models on trees [2, 3, 6, 2], and statistical physics and algorithmic questions in the mean-field model of distance [,2,4,7,8,9]. In many of these applications, particularly in the last to types mentioned above, often one needs to construct a particular tree indexed stationary process related to a given RDE, hich is called a recursive tree process RTP [5]. More precisely, suppose the RDE has a solution, say µ. Then as shon in [5], using the consistency theorem of Kolmogorov [9], one can construct a process, say X i i V, indexed by V := d N d { }, such that i X i µ i V ii for each d 0, X i i =d are independent iii X i = g ξ i ; X ij : j N i i V iv X i is independent of { ξ i, N i i < i } i V, 3 here ξ i, N i i V are taken to be i.i.d. copies of the pair ξ, N, and by e mean the length of a finite ord. The process X i i V is called an invariant recursive tree process RTP ith marginal µ. The i.i.d. random variables ξ i, N i i V are called the innovation process. In some sense, an invariant RTP ith marginal µ is an almost sure representation of a solution µ of the RDE. Here e note that there is a natural tree structure on V. Taking V as the vertex set, e join to ords i, i V by an edge, if and only if, i = ij or i = i j, for

3 Endogeny for the Logistic RDE 239 some j N. We ill denote this tree by T. The empty-ord ill be taken as the root of the tree T. For simplicity e ill rite j = j for j N. In the applications mentioned above the variables X i i V of a RTP are often used as auxiliary variables to define or to construct some useful random structures. In those cases typically the innovation process defines the internal variables hile the RTP is constructed externally using the consistency theorem. It is then natural to ask hether the RTP is measurable only ith respect to the i.i.d. innovation process ξ i, N i. Definition. An invariant RTP ith marginal µ is called endogenous, if the root variable X is almost surely measurable ith respect to the completion of the σ-algebra G := σ { ξ i, N i i V }. This notion of endogeny has been the main topic of discussion in [5]. The authors provide a necessary and sufficient condition for endogeny in the general setup [5, Theorem ]. Some other concepts similar to endogeny can be found in [6]. In this article e provide a non-trivial application of the theory developed in [5]. The example e consider here arise from the study of the asymptotic limit of random assignment problem using local-eak convergence method [4]. A detailed background of this example is given in Section 2... Main result. The folloing RDE plays the central role in deriving the asymptotic limit of the random assignment problem [4], X d = min j ξ j X j on R, 4 here X j j are i.i.d. ith same la as X and are independent of ξ j j hich are points of a Poisson point process of rate on 0,, that is, ξ ξ 2 ξ k a.s. and the collection ξ i ξ i i are i.i.d. random variables ith Exponential distribution. Here e rite ξ 0 0. It is knon [4] that the RDE 4 has a unique solution as the logistic distribution, given by P X x =, x R. 5 + e For this reason e ill call RDE 4 the logistic RDE. The folloing is our main result. Theorem. The invariant recursive tree process ith logistic marginals associated ith the RDE 4 is endogenous. This result though looks technical, but provides a concrete example falling under the general theory developed in [5]. The proof of Theorem involves analytic techniques, thus this ork also demonstrate the need of developing analytic tools for studying max-type RDEs in general.

4 240 A. Bandyopadhyay.2. Outline of rest of the paper. The next section provides the background and motivation for deriving our main result. In Sections 3 e prove the bivariate uniqueness property of the logistic RDE 4 and finally Section 4 gives the proof the main result. 2. Background and motivation for logistic RDE For a given n n matrix of costs C ij, consider the problem of assigning n jobs to n machines in the most cost effective ay. Thus the task is to find a permutation π of {, 2,..., n}, hich solves the folloing minimization problem A n := min π n C i,πi. 6 This problem has been extensively studied in literature for a fixed cost matrix, and there are various algorithms to find the optimal permutation π. A probabilistic model for the assignment problem can be obtained by assuming that the costs are independent random variables each ith Uniform[0, ] distribution. Although this model appears to be quite simple, careful investigations of it in the last fe decades have shon that it has enormous richness in its structure. See [2, 8] for survey and other related orks. Our interest in this problem is from another perspective. In 200, Aldous [4] shoed lim E[A n] = ζ2 = π2 n 6, 7 confirming the earlier ork of Mézard and Parisi [3], here they computed the same limit using non-rigorous arguments based on the replica method [4]. It is also knon that the limit exists and it is universal for any i.i.d. cost distribution ith density f such that f0 = see []. So for calculation of the limiting constant one can assume that C ij s are i.i.d. ith Exponential distribution ith mean n and then rite the objective function A n in the normalized form, i= A n = d min π n n C i,πi. 8 i= In [4], the limit ζ2 as identified in terms of an optimal matching problem on an infinite tree ith random edge eights, described as follos: Let T := V, E be the canonical infinite rooted labeled tree, as before, here is the root. For every vertex i V, let ξ ij j be points of a Poisson point process of rate on 0,, and they are independent as i varies. Define the eight of the edge e = i, ij E as ξ ij.

5 Endogeny for the Logistic RDE 24 This structure is called Poisson eighted infinite tree and henceforth abbreviated as PWIT. Let K r n,n be the complete bipartite graph on 2n vertices ith a root selected uniformly at random. Suppose e also equip it ith i.i.d. Exponential edge eights ith mean n. Then one can sho [2,4] that in the sense of Aldous-Steel local eak convergence K r n,n converges to the PWIT. Moreover heuristically the random assignment problem on K r n,n has a natural analog to the limit structure, hich is to consider the optimal in sense of minimizing the total cost matching problem on PWIT. Naturally PWIT being an infinite graph ith edge eights each having mean at least, the total cost of any matching is infinite a.s., and hence minimization total cost is not quite meaningful. Hoever, Aldous [4] shoed that it is possible to make a sensible definition of optimal matching on PWIT hich minimizes the average edge eight. This construction is quite hard, and e refer the readers to [2, 4] for the technical details. Here e only provide the basic essentials to understand the motivation for our ork. Consider the heuristic description of the optimal matching problem on PWIT and suppose e define variables X i for each vertex i as follos X i = Total cost of a maximal matching on the subtree T i Total cost of a maximal matching on the forest T i \ {i}, here T i is the subtree rooted at the vertex i. Here by total cost e mean the sum total of all the edge eights in the matching. As noted above, both the total costs appearing in 9 are infinity almost surely. Thus rigorously speaking X i is not ell defined. But at the heuristic level if e ignore this, then simple manipulation yields that they must satisfy the folloing recurrence relation see [4, Section 4.2] 9 X i = min j ξ ij X ij. 0 This is of course the recurrence relation for a RTP associated ith the logistic RDE 4. Thus one can no construct the X i -variables externally as the RTP associated ith the logistic RDE and then use them to redefine the optimal matching on PWIT. This is the construction given in [4] hich also provides a characterization of the optimal matching on the PWIT. Finally one can then derive the ζ2-limit for the random assignment problem. Once again a natural question ould be to figure out hether the random variables X i s are truly external or not, in other ords to see hether the RTP is endogenous or not see [4, Remarks 4.2.d and 4.2.e]. This is our main motivation for this ork. Theorem proves that the X i -variables can be defined using only the edge-eights. In other ords they have no external randomness in them. Some other significance of this result has also been pointed out in [5, Section 7.5].

6 242 A. Bandyopadhyay 3. Bivariate uniqueness for the logistic RDE In this section e prove the bivariate uniqueness property for the logistic RDE 4. Theorem 2. Consider the folloing bivariate RDE X d minj ξ = j X j Y min j ξ j Y j, here X j, Y j j are i.i.d. pairs ith same joint distribution as X, Y and are independent of ξ j j hich are points of a Poisson process of rate on 0,. Then the unique solution of this RDE is given by a diagonal measure, namely, µ := dist X, X here X has the logistic distribution. 3.. Proof of Theorem 2. First observe that if the equation has a solution then, the marginal distributions of X and Y solve the logistic RDE 4, and hence they are both logistic. Further by inspection µ is a solution of. So it is enough to prove that µ is the only solution of. Let µ 2 be a solution of. No consider the points {ξ j ; X j, Y j j } as a point process, say P on 0, R 2. Since ξ j j is a Poisson point process on 0, of rate and X j, Y j j are i.i.d. random vectors on R 2 ith distribution µ 2 hich are independent of the Poisson process ξ j j, thus P is a Compound Poisson process on 0, R 2 ith mean intensity ρt; x, y dt dx, y := dt µ 2 dx, y see [0, Lemma 6.4.VI]. Thus if Gx, y := P X > x, Y > y, for x, y R, then Gx, y = P min = P = exp ξ j Y j > y j ξ j X j > x, and, min j { No points of P are in t; u, v t u x, or, t v y } = exp { t;u,v 0 t u x, or, t v y } ρt; u, v dt d u, v [ Ht x + Ht y Gt x, t y ] dt = Hx Hy exp Gt x, t y dt, here H is the right tail of logistic distribution, defined as 0 Hx = e + e 2

7 Endogeny for the Logistic RDE 243 for x R. The last equality follos from properties of the logistic distribution see Proposition 3c. For notational convenience in this paper e ill rite F := F for any distribution function F. The folloing simple lemma reduces the bivariate problem to a univariate problem. Lemma. For any to random variables U and V, U = V a.s. if and only if U d = V d = U V. Proof. First of all, if U = V a.s. then U V = U a.s. Conversely suppose that U d = V d = U V. Fix a rational q, then under our assumption, PU q < V = PV > q PU > q, V > q = PV > q PU V > q = 0 A similar calculation ill sho that P V q < U = 0. These are true for any rational q, thus P U V = 0. Thus if e can sho that X Y also has logistic distribution, then from the lemma above e ill be able to conclude that X = Y a.s., and hence the proof ill be complete. Put g := P X Y >, e ill sho g = H. No, for every fixed x R, by definition gx = Gx, x. So using 2 e get gx = H 2 x exp gs ds, x R. 3 Notice that from 26 see Proposition 3c g = H is a solution of this nonlinear integral equation 3, hich corresponds to the solution µ 2 = µ of the original equation. To complete the proof of Theorem 2 e need to sho that this is the only solution. For that e ill prove that the operator associated ith 3 defined on an appropriate space is monotone and has unique fixed-point as H. The techniques e ill use here are similar to Eulerian recursion [7], and are heavily based on analytic arguments. Let F be the set of all functions f : R [0, ] such that H 2 x fx Hx for all x R, f is continuous and non-increasing. Observe that by definition H F. Further from 3 it follos that gx H 2 x, as ell as, gx = P X Y > x P X > x = Hx for all x R. Note also that g being the tail of the random variable X Y, is continuous because both X and Y are continuous random variables and non-increasing. So it is appropriate to search for solutions of 3 in F. Let T : F F be defined as T fx := H 2 x exp fs ds, x R. 4

8 244 A. Bandyopadhyay Note that this operator T is not same as the general operator defined in Section, henceforth by T e ill mean the specific operator defined above. Proposition of Section 3.2 shos that T does indeed map F into itself. Observe that the equation 3 is nothing but the fixed-point equation associated ith the operator T, that is, g = T g on F. 5 We here note that using 26 see Proposition 3c T can also be ritten as T fx := Hx exp Hs fs ds, x R, 6 hich ill be used in the subsequent discussion. Define a partial order on F as, f f 2 in F if f x f 2 x for all x R, then the folloing result holds. Lemma 2. T is a monotone operator on the partially ordered set F,. Proof. Let f f 2 be to elements of F, so from definition f x f 2 x, for all x R. Hence f s ds f 2 s ds x R T f x T f 2 x x R T f T f 2. Put f 0 = H 2, and for n N, define f n F recursively as, f n = T f n. No from Lemma 2 e get that if g is a fixed-point of T in F then, f n g n 0. 7 If e can sho f n H point ise, then using 7 e ill get H g, so from definition of F it ill follo that g = H, and our proof ill be complete. For that, the folloing lemma gives an explicit recursion for the functions {f n } n 0. Lemma 3. Let β 0 s = s, 0 s. Define recursively Then for n, β n s := s β n d, 0 < s. 8 f n x = Hx exp β n Hx, x R. 9

9 Endogeny for the Logistic RDE 245 Proof. We ill prove this by induction on n. Fix x R, for n = e get f x = T f 0 x = Hx exp = Hx exp = Hx exp Hs H2 s ds Hs Hs ds H s ds = Hx exp Hx = Hx exp β 0 Hx [using 6] [using Proposition 3a] No, assume that the assertion of the Lemma is true for n {, 2,..., k}, for some k, then from definition e have f k+ x = T f k x = Hx exp = Hx exp = Hx exp Hs fk s ds Hs β k Hs ds Hx β k d [using 6] 20 The last equality follos by substituting = Hs and thus from parts a and b of Proposition 3 e get that d = Hs ds and H = Hx. Finally by definition of β n s and using 20 e get f k+ = T f k. To complete the proof it is no enough to sho that β n 0 point ise, hich ill imply by Lemma 3 that f n H point ise, as n. Using Proposition 2 see Section 3.2 e get the folloing characterization of the point ise limit of these β n s. Lemma 4. There exists a function L : [0, ] [0, ] ith L = 0, such that Ls = s and Ls = lim n β n s for all 0 s. L d s [0,, 2 Proof. From the Proposition 2 e kno that for any s [0, ] the sequence {β n s} is decreasing, and hence there exists a function L : [0, ] [0, ] such

10 246 A. Bandyopadhyay that Ls = lim n β n s. No observe that β n β 0 = for all 0, and hence 0 β n β n 0. Thus by taking limit as n in 8 and using the dominated convergence theorem along ith part a of Proposition 2 e get that Ls = s L d 0 s <. The above lemma basically translates the non-linear integral equation 3 to the non-linear integral equation 2, here the solution g = H of 3 is given by the solution L 0 of 2. So at first sight this may not lead us to the conclusion. But fortunately, something nice happens for equation 2, and e have the folloing result hich is enough to complete the proof of Theorem 2. Lemma 5. If L : [0, ] [0, ] is a function hich satisfies the non-linear integral equation 2, namely, Ls = and if L = 0, then L 0. s L d 0 s <, Proof. First note that L 0 is a solution. No let L be any solution of 2, then L is infinitely differentiable on the open interval 0,, by repetitive application of Fundamental Theorem of Calculus. Consider η := L + e L, [0, ]. Observe, that η0 = η = 0 as L = 0. No, from 2 e get that L = L, 0,. Thus differentiating the function η e get η = e L [ 2 e L + e L ] 0 0,. 22 So the function η is decreasing in 0, and is continuous in [0, ] ith boundary values as 0, hence η 0. Thus e must have η 0, so from equation 22 e get that e Ls + e Ls = 2 for all s 0,. This implies L 0 on [0, ].

11 Endogeny for the Logistic RDE Some technical details. This section provides some of the technical results hich ere needed in the previous section. Proposition. The operator T maps F into F. Proof. First note that if f F, then by definition T fx H 2 x for all x R. Next by definition of F e get that f F f H, thus fs ds Hs ds x R T fx H 2 x exp Hs ds = Hx x R. The last equality follos from 26 see Proposition 3c. So, H 2 x T fx Hx x R. 23 No e need to sho that for any f F e must have T f continuous and non-increasing. From the definition T f is continuous in fact, infinitely differentiable. Moreover if x y be to real numbers, then Hs fs ds Hs fs ds, y because f H. Also Hx Hy, thus using 6 e get T fx T fy 24 So using 23 and 24 e conclude that T f F if f F. Proposition 2. The folloing are true for the sequence of functions {β n } n 0 defined in 8. a For every fixed s 0, ], the sequence {β n s} is decreasing. b For every n, lim s 0+ β n s exists, and is given by 0 β n d, e ill rite this as β n 0. c The sequence of numbers {β n 0} is also decreasing. Proof. a Notice that β 0 s = s for s [0, ], thus β s = s d < s = β 0 s s 0, ].

12 248 A. Bandyopadhyay No assume that for some n e have β n s β n s β 0 s for all s 0, ], if e sho that β n+ s β n s for all s 0, ] then by induction the proof ill be complete. For that, fix s 0, ] then β n+ s = s β n d s β n d = β n s. This proves the part a. b, c First note that by trivial induction β n s 0 for every s 0, ], n 0. Thus from definition for every n 0, the limit lim s 0+ β n s exists in [0, ] and is given by β n d. No using a above e conclude 0 β n+ 0 = lim s 0+ β n+s lim s 0+ β ns = β n 0, 25 for every n 0. Since β 0 0 =, so e get β n 0 < for all n 0, and the sequence is decreasing. This proves parts b and c. Finally, the folloing proposition lists some basic facts about the logistic distribution function. Proposition 3. Suppose X is a random variable ith logistic distribution and H x := P X x for x R be the distribution function of X. Then a H is infinitely differentiable and H = H H, here H = H. b H is symmetric around 0, that is, H = Hx for all x R. c H is the unique solution of the non-linear integral equation Hx = exp Hs ds x R. 26 Proof. a and b trivially follos from the definition of H. For c notice that the equation 26 is nothing but the Logistic RDE, this is because P min ξ j X j > x = exp Hs ds x R j here X j j are i.i.d. ith distribution function H and are independent of ξ j j, hich are points of a Poisson point process of rate on 0,. Thus from the fact that H is the unique solution of logistic RDE see [4, Lemma 5] e conclude that H is unique solution of equation Proof of Theorem We note that by Theorem 2 the logistic RDE 4 has bivariate uniqueness property. Thus by [5, Theorem b] to prove endogeny for the logistic RDE 4 all remains is to check the folloing technical continuity assumption.

13 Endogeny for the Logistic RDE 249 Proposition 4. Let S be the set of all probabilities on R 2 and let Γ : S S be the operator associated ith the RDE, that is, Γ µ 2 d = minj ξ j X j min j ξ j Y j, 27 here X j, Y j j are i.i.d. ith joint la µ 2 S and are independent of ξ j j hich are points of a Poisson point process of rate on 0,. Then Γ is continuous ith respect to the eak convergence topology hen restricted to the subspace S defined as { } S := µ 2 both the marginals of µ 2 are logistic distribution. 28 Before e prove this proposition, it is orth mentioning that the operator Γ is not continuous ith respect to the eak convergence topology on the hole space S. In fact, it is not difficult to see that the operator Γ is every here discontinuous on S. But fortunately for applying [5, Theorem b] e only need the continuity of Γ hen restricted to the subspace S. Proof of Proposition 4. Let { µ 2 } n n= S be such that µ 2 n µ 2 S. We ill sho that Γµ 2 d n Γµ 2. d µ 2 here Let Ω, F, P be a probability space such that there exists {X n, Y n } n= and X, Y random vectors taking values in R 2, ith X n, Y n µ 2 n, n, and X, Y µ 2. Notice that by definition X n d = Y n d = X d = Y, and each has logistic distribution. Fix x, y R, let G n x, y := Γµ 2 n x, y,, then by exactly the same argument as in the derivation of 2 e get G n x, y = Hx Hy exp = Hx Hy exp = Hx Hy exp G n t x, t y dt P X n > t x, Y n > t y dt P X n + x Y n + y > t dt = Hx Hy exp E [ X n + x + Y n + y +], and a similar calculation ill also give that Gx, y := Γµ 2 x, y, = Hx Hy exp E [ X + x + Y + y +].

14 250 A. Bandyopadhyay No to complete the proof all e need is to sho E [ X n + x + Y n + y +] E [ X + x + Y + y +]. Since e assumed that X n, Y n d X, Y it follos X n + x + Y n + y + d X + x + Y + y + x, y R. Fix x, y R, define Zn x,y Y + y +. Observe that := X n + x + Y n + y +, and Z x,y := X + x + 0 Z x,y n X n + x + X n + x n. But, X n + x = d X + x for all n. So clearly {Zn x,y } n= is uniformly integrable. Hence e conclude using the theorem of Billingsley [9, Theorem 25.2] that E [Zn x,y ] E [Z x,y ]. This completes the proof. Acknoledgments. The author ould like to thank David Aldous for suggesting the the problem and for many illuminating discussions. Thanks are also due to the Department of Statistics, University of California, Berkeley here most of the ork as done during the author s doctoral study. References [] Aldous, D. Asymptotics in the random assignment problem. Probab. Theory Related Fields , [2] Aldous, D. and Steele, J. M., The objective method: probabilistic combinatorial optimization and local eak convergence. In: Probability on Discrete Structures ed.: H. Kesten. Encyclopaedia Math. Sci. 0. Berlin: Springer 2004, pp. 72. [3] Aldous, D. J., The percolation process on a tree here infinite clusters are frozen. Math. Proc. Cambridge Philos. Soc , [4] Aldous, D. J., The ζ2 Limit in the Random Assignment Problem. Random Structures Algorithms , [5] Aldous, D. J. and Bandyopadhyay, A., A survey of max-type recursive distributional equations. Ann. Appl. Probab , [6] Bandyopadhyay, A., A necessary and sufficient condition for the tail-triviality of a recursive tree process. Sankhyā , 23. [7] Bandyopadhyay, A. and Gamarnik, D., Counting ithout sampling. Ne algorithms for enumeration problems using statistical physics. In: Proc. Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithms. Philadelphia PA: SIAM 2006, pp

15 Endogeny for the Logistic RDE 25 [8] Bandyopadhyay, A. and Gamarnik, D., Counting ithout sampling: asymptotics of the log-partition function for certain statistical physics models. Random Structures Algorithms , [9] Billingsley, P., Probability and Measure. Third ed. Ne York: Wiley 995. [0] Daley, D. J. and Vere-Jones, D., An Introduction to the Theory of Point Processes. Vol. I. Elementary theory and methods. Sec. ed. Probab. Appl. N. Y.. Ne York: Springer-Verlag [] Fill, J. A. and Janson, S., A characterization of the set of fixed points of the Quicksort transformation. Electron. Comm. Probab , electronic. [2] Gamarnik, D., Noicki, T. and Sirszcz, G., Maximum eight independent sets and matchings in sparse random graphs. Exact results using the local eak convergence method. Random Structures Algorithms , [3] Mézard, M. and Parisi, G., On the solution of the random link matching problem. J. Physique , [4] Mézard, M., Parisi, G. and Virasoro, M. A., Spin Glass Theory and Beyond. Singapore: World Scientific 987. [5] Rösler, U. and Rüschendorf, L., The contraction method for recursive algorithms. Algorithmica , [6] Rösler, U., A fixed point theorem for distributions. Stochastic Process. Appl , [7] Simmons, G. F., Differential Equations ith Applications and Historical Notes. Ne York: McGra-Hill 972. [8] Steele, J. M., Probability Theory and Combinatorial Optimization. Philadelphia PA: SIAM 997. [9] Wästlund, J., The mean field traveling salesman and related problems. Acta Math , Received May 2, 200; revised September 27, 200

Bivariate Uniqueness in the Logistic Recursive Distributional Equation

Bivariate Uniqueness in the Logistic Recursive Distributional Equation Bivariate Uniqueness in the Logistic Recursive Distributional Equation Antar Bandyopadhyay Technical Report # 629 University of California Department of Statistics 367 Evans Hall # 3860 Berkeley CA 94720-3860

More information

Hard-Core Model on Random Graphs

Hard-Core Model on Random Graphs Hard-Core Model on Random Graphs Antar Bandyopadhyay Theoretical Statistics and Mathematics Unit Seminar Theoretical Statistics and Mathematics Unit Indian Statistical Institute, New Delhi Centre New Delhi,

More information

Stat 8112 Lecture Notes Weak Convergence in Metric Spaces Charles J. Geyer January 23, Metric Spaces

Stat 8112 Lecture Notes Weak Convergence in Metric Spaces Charles J. Geyer January 23, Metric Spaces Stat 8112 Lecture Notes Weak Convergence in Metric Spaces Charles J. Geyer January 23, 2013 1 Metric Spaces Let X be an arbitrary set. A function d : X X R is called a metric if it satisfies the folloing

More information

Mean-field dual of cooperative reproduction

Mean-field dual of cooperative reproduction The mean-field dual of systems with cooperative reproduction joint with Tibor Mach (Prague) A. Sturm (Göttingen) Friday, July 6th, 2018 Poisson construction of Markov processes Let (X t ) t 0 be a continuous-time

More information

A proof of topological completeness for S4 in (0,1)

A proof of topological completeness for S4 in (0,1) A proof of topological completeness for S4 in (,) Grigori Mints and Ting Zhang 2 Philosophy Department, Stanford University mints@csli.stanford.edu 2 Computer Science Department, Stanford University tingz@cs.stanford.edu

More information

arxiv:math.pr/ v1 17 May 2004

arxiv:math.pr/ v1 17 May 2004 Probabilistic Analysis for Randomized Game Tree Evaluation Tämur Ali Khan and Ralph Neininger arxiv:math.pr/0405322 v1 17 May 2004 ABSTRACT: We give a probabilistic analysis for the randomized game tree

More information

Semi-simple Splicing Systems

Semi-simple Splicing Systems Semi-simple Splicing Systems Elizabeth Goode CIS, University of Delaare Neark, DE 19706 goode@mail.eecis.udel.edu Dennis Pixton Mathematics, Binghamton University Binghamton, NY 13902-6000 dennis@math.binghamton.edu

More information

Max-type Recursive Distributional Equations. Antar Bandyopadhyay

Max-type Recursive Distributional Equations. Antar Bandyopadhyay Max-type Recursive Distributional Equations by Antar Bandyopadhyay M.Stat. Indian Statistical Institute, Calcutta, India) 1998 M.A. University of California, Berkeley) 2000 A dissertation submitted in

More information

On the approximation of real powers of sparse, infinite, bounded and Hermitian matrices

On the approximation of real powers of sparse, infinite, bounded and Hermitian matrices On the approximation of real poers of sparse, infinite, bounded and Hermitian matrices Roman Werpachoski Center for Theoretical Physics, Al. Lotnikó 32/46 02-668 Warszaa, Poland Abstract We describe a

More information

Course Notes. Part IV. Probabilistic Combinatorics. Algorithms

Course Notes. Part IV. Probabilistic Combinatorics. Algorithms Course Notes Part IV Probabilistic Combinatorics and Algorithms J. A. Verstraete Department of Mathematics University of California San Diego 9500 Gilman Drive La Jolla California 92037-0112 jacques@ucsd.edu

More information

CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum

CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum 1997 19 CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION 3.0. Introduction

More information

A Generalization of a result of Catlin: 2-factors in line graphs

A Generalization of a result of Catlin: 2-factors in line graphs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 72(2) (2018), Pages 164 184 A Generalization of a result of Catlin: 2-factors in line graphs Ronald J. Gould Emory University Atlanta, Georgia U.S.A. rg@mathcs.emory.edu

More information

Enhancing Generalization Capability of SVM Classifiers with Feature Weight Adjustment

Enhancing Generalization Capability of SVM Classifiers with Feature Weight Adjustment Enhancing Generalization Capability of SVM Classifiers ith Feature Weight Adjustment Xizhao Wang and Qiang He College of Mathematics and Computer Science, Hebei University, Baoding 07002, Hebei, China

More information

SOLUTIONS OF SEMILINEAR WAVE EQUATION VIA STOCHASTIC CASCADES

SOLUTIONS OF SEMILINEAR WAVE EQUATION VIA STOCHASTIC CASCADES Communications on Stochastic Analysis Vol. 4, No. 3 010) 45-431 Serials Publications www.serialspublications.com SOLUTIONS OF SEMILINEAR WAVE EQUATION VIA STOCHASTIC CASCADES YURI BAKHTIN* AND CARL MUELLER

More information

On a generalized combinatorial conjecture involving addition mod 2 k 1

On a generalized combinatorial conjecture involving addition mod 2 k 1 On a generalized combinatorial conjecture involving addition mod k 1 Gérard Cohen Jean-Pierre Flori Tuesday 14 th February, 01 Abstract In this note, e give a simple proof of the combinatorial conjecture

More information

Bootstrap Percolation on Periodic Trees

Bootstrap Percolation on Periodic Trees Bootstrap Percolation on Periodic Trees Milan Bradonjić Iraj Saniee Abstract We study bootstrap percolation with the threshold parameter θ 2 and the initial probability p on infinite periodic trees that

More information

Branching, smoothing and endogeny

Branching, smoothing and endogeny Branching, smoothing and endogeny John D. Biggins, School of Mathematics and Statistics, University of Sheffield, Sheffield, S7 3RH, UK September 2011, Paris Joint work with Gerold Alsmeyer and Matthias

More information

How Long Does it Take to Catch a Wild Kangaroo?

How Long Does it Take to Catch a Wild Kangaroo? Ho Long Does it Take to Catch a Wild Kangaroo? Ravi Montenegro Prasad Tetali ABSTRACT The discrete logarithm problem asks to solve for the exponent x, given the generator g of a cyclic group G and an element

More information

UC Berkeley Department of Electrical Engineering and Computer Sciences. EECS 126: Probability and Random Processes

UC Berkeley Department of Electrical Engineering and Computer Sciences. EECS 126: Probability and Random Processes UC Berkeley Department of Electrical Engineering and Computer Sciences EECS 26: Probability and Random Processes Problem Set Spring 209 Self-Graded Scores Due:.59 PM, Monday, February 4, 209 Submit your

More information

Almost giant clusters for percolation on large trees

Almost giant clusters for percolation on large trees for percolation on large trees Institut für Mathematik Universität Zürich Erdős-Rényi random graph model in supercritical regime G n = complete graph with n vertices Bond percolation with parameter p(n)

More information

Resistance Growth of Branching Random Networks

Resistance Growth of Branching Random Networks Peking University Oct.25, 2018, Chengdu Joint work with Yueyun Hu (U. Paris 13) and Shen Lin (U. Paris 6), supported by NSFC Grant No. 11528101 (2016-2017) for Research Cooperation with Oversea Investigators

More information

CONSTRAINED PERCOLATION ON Z 2

CONSTRAINED PERCOLATION ON Z 2 CONSTRAINED PERCOLATION ON Z 2 ZHONGYANG LI Abstract. We study a constrained percolation process on Z 2, and prove the almost sure nonexistence of infinite clusters and contours for a large class of probability

More information

Bloom Filters and Locality-Sensitive Hashing

Bloom Filters and Locality-Sensitive Hashing Randomized Algorithms, Summer 2016 Bloom Filters and Locality-Sensitive Hashing Instructor: Thomas Kesselheim and Kurt Mehlhorn 1 Notation Lecture 4 (6 pages) When e talk about the probability of an event,

More information

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 12 Scribe: Indraneel Mukherjee March 12, 2008

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 12 Scribe: Indraneel Mukherjee March 12, 2008 COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture # 12 Scribe: Indraneel Mukherjee March 12, 2008 In the previous lecture, e ere introduced to the SVM algorithm and its basic motivation

More information

y(x) = x w + ε(x), (1)

y(x) = x w + ε(x), (1) Linear regression We are ready to consider our first machine-learning problem: linear regression. Suppose that e are interested in the values of a function y(x): R d R, here x is a d-dimensional vector-valued

More information

k-protected VERTICES IN BINARY SEARCH TREES

k-protected VERTICES IN BINARY SEARCH TREES k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from

More information

Statistical Physics on Sparse Random Graphs: Mathematical Perspective

Statistical Physics on Sparse Random Graphs: Mathematical Perspective Statistical Physics on Sparse Random Graphs: Mathematical Perspective Amir Dembo Stanford University Northwestern, July 19, 2016 x 5 x 6 Factor model [DM10, Eqn. (1.4)] x 1 x 2 x 3 x 4 x 9 x8 x 7 x 10

More information

Lecture Notes 8

Lecture Notes 8 14.451 Lecture Notes 8 Guido Lorenzoni Fall 29 1 Stochastic dynamic programming: an example We no turn to analyze problems ith uncertainty, in discrete time. We begin ith an example that illustrates the

More information

Randomized Smoothing Networks

Randomized Smoothing Networks Randomized Smoothing Netorks Maurice Herlihy Computer Science Dept., Bron University, Providence, RI, USA Srikanta Tirthapura Dept. of Electrical and Computer Engg., Ioa State University, Ames, IA, USA

More information

The degree sequence of Fibonacci and Lucas cubes

The degree sequence of Fibonacci and Lucas cubes The degree sequence of Fibonacci and Lucas cubes Sandi Klavžar Faculty of Mathematics and Physics University of Ljubljana, Slovenia and Faculty of Natural Sciences and Mathematics University of Maribor,

More information

Almost all trees have an even number of independent sets

Almost all trees have an even number of independent sets Almost all trees have an even number of independent sets Stephan G. Wagner Department of Mathematical Sciences Stellenbosch University Private Bag X1, Matieland 7602, South Africa swagner@sun.ac.za Submitted:

More information

THE NOISY VETO-VOTER MODEL: A RECURSIVE DISTRIBUTIONAL EQUATION ON [0,1] April 28, 2007

THE NOISY VETO-VOTER MODEL: A RECURSIVE DISTRIBUTIONAL EQUATION ON [0,1] April 28, 2007 THE NOISY VETO-VOTER MODEL: A RECURSIVE DISTRIBUTIONAL EQUATION ON [0,1] SAUL JACKA AND MARCUS SHEEHAN Abstract. We study a particular example of a recursive distributional equation (RDE) on the unit interval.

More information

Extension of continuous functions in digital spaces with the Khalimsky topology

Extension of continuous functions in digital spaces with the Khalimsky topology Extension of continuous functions in digital spaces with the Khalimsky topology Erik Melin Uppsala University, Department of Mathematics Box 480, SE-751 06 Uppsala, Sweden melin@math.uu.se http://www.math.uu.se/~melin

More information

The Moran Process as a Markov Chain on Leaf-labeled Trees

The Moran Process as a Markov Chain on Leaf-labeled Trees The Moran Process as a Markov Chain on Leaf-labeled Trees David J. Aldous University of California Department of Statistics 367 Evans Hall # 3860 Berkeley CA 94720-3860 aldous@stat.berkeley.edu http://www.stat.berkeley.edu/users/aldous

More information

A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees

A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees Yoshimi Egawa Department of Mathematical Information Science, Tokyo University of

More information

Recursive tree processes and the mean-field limit of stochastic flows

Recursive tree processes and the mean-field limit of stochastic flows Recursive tree processes and the mean-field limit of stochastic flows Tibor Mach Anja Sturm Jan M. Swart December 26, 2018 Abstract Interacting particle systems can often be constructed from a graphical

More information

3 - Vector Spaces Definition vector space linear space u, v,

3 - Vector Spaces Definition vector space linear space u, v, 3 - Vector Spaces Vectors in R and R 3 are essentially matrices. They can be vieed either as column vectors (matrices of size and 3, respectively) or ro vectors ( and 3 matrices). The addition and scalar

More information

Decomposing oriented graphs into transitive tournaments

Decomposing oriented graphs into transitive tournaments Decomposing oriented graphs into transitive tournaments Raphael Yuster Department of Mathematics University of Haifa Haifa 39105, Israel Abstract For an oriented graph G with n vertices, let f(g) denote

More information

Introduction A basic result from classical univariate extreme value theory is expressed by the Fisher-Tippett theorem. It states that the limit distri

Introduction A basic result from classical univariate extreme value theory is expressed by the Fisher-Tippett theorem. It states that the limit distri The dependence function for bivariate extreme value distributions { a systematic approach Claudia Kluppelberg Angelika May October 2, 998 Abstract In this paper e classify the existing bivariate models

More information

L n = l n (π n ) = length of a longest increasing subsequence of π n.

L n = l n (π n ) = length of a longest increasing subsequence of π n. Longest increasing subsequences π n : permutation of 1,2,...,n. L n = l n (π n ) = length of a longest increasing subsequence of π n. Example: π n = (π n (1),..., π n (n)) = (7, 2, 8, 1, 3, 4, 10, 6, 9,

More information

An easy proof of the ζ(2) limit in the random assignment problem

An easy proof of the ζ(2) limit in the random assignment problem An easy proof of the ζ(2) limit in the random assignment problem Johan Wästlund Department of Mathematical Sciences, Chalmers University of Technology, S-412 96 Göteborg, Sweden wastlund@chalmers.se Mathematics

More information

Average Coset Weight Distributions of Gallager s LDPC Code Ensemble

Average Coset Weight Distributions of Gallager s LDPC Code Ensemble 1 Average Coset Weight Distributions of Gallager s LDPC Code Ensemble Tadashi Wadayama Abstract In this correspondence, the average coset eight distributions of Gallager s LDPC code ensemble are investigated.

More information

PERCOLATION IN SELFISH SOCIAL NETWORKS

PERCOLATION IN SELFISH SOCIAL NETWORKS PERCOLATION IN SELFISH SOCIAL NETWORKS Charles Bordenave UC Berkeley joint work with David Aldous (UC Berkeley) PARADIGM OF SOCIAL NETWORKS OBJECTIVE - Understand better the dynamics of social behaviors

More information

Sample Spaces, Random Variables

Sample Spaces, Random Variables Sample Spaces, Random Variables Moulinath Banerjee University of Michigan August 3, 22 Probabilities In talking about probabilities, the fundamental object is Ω, the sample space. (elements) in Ω are denoted

More information

Renormalization: An Attack on Critical Exponents

Renormalization: An Attack on Critical Exponents Renormalization: An Attack on Critical Exponents Zebediah Engberg March 15, 2010 1 Introduction Suppose L R d is a lattice with critical probability p c. Percolation on L is significantly differs depending

More information

A class of trees and its Wiener index.

A class of trees and its Wiener index. A class of trees and its Wiener index. Stephan G. Wagner Department of Mathematics Graz University of Technology Steyrergasse 3, A-81 Graz, Austria wagner@finanz.math.tu-graz.ac.at Abstract In this paper,

More information

Forcing unbalanced complete bipartite minors

Forcing unbalanced complete bipartite minors Forcing unbalanced complete bipartite minors Daniela Kühn Deryk Osthus Abstract Myers conjectured that for every integer s there exists a positive constant C such that for all integers t every graph of

More information

The DMP Inverse for Rectangular Matrices

The DMP Inverse for Rectangular Matrices Filomat 31:19 (2017, 6015 6019 https://doi.org/10.2298/fil1719015m Published by Faculty of Sciences Mathematics, University of Niš, Serbia Available at: http://.pmf.ni.ac.rs/filomat The DMP Inverse for

More information

Logarithmic scaling of planar random walk s local times

Logarithmic scaling of planar random walk s local times Logarithmic scaling of planar random walk s local times Péter Nándori * and Zeyu Shen ** * Department of Mathematics, University of Maryland ** Courant Institute, New York University October 9, 2015 Abstract

More information

DYNAMICS ON THE CIRCLE I

DYNAMICS ON THE CIRCLE I DYNAMICS ON THE CIRCLE I SIDDHARTHA GADGIL Dynamics is the study of the motion of a body, or more generally evolution of a system with time, for instance, the motion of two revolving bodies attracted to

More information

DAVID ELLIS AND BHARGAV NARAYANAN

DAVID ELLIS AND BHARGAV NARAYANAN ON SYMMETRIC 3-WISE INTERSECTING FAMILIES DAVID ELLIS AND BHARGAV NARAYANAN Abstract. A family of sets is said to be symmetric if its automorphism group is transitive, and 3-wise intersecting if any three

More information

The Probability of Pathogenicity in Clinical Genetic Testing: A Solution for the Variant of Uncertain Significance

The Probability of Pathogenicity in Clinical Genetic Testing: A Solution for the Variant of Uncertain Significance International Journal of Statistics and Probability; Vol. 5, No. 4; July 2016 ISSN 1927-7032 E-ISSN 1927-7040 Published by Canadian Center of Science and Education The Probability of Pathogenicity in Clinical

More information

An Analog Analogue of a Digital Quantum Computation

An Analog Analogue of a Digital Quantum Computation An Analog Analogue of a Digital Quantum Computation arxiv:quant-ph/9612026v1 6 Dec 1996 Edard Farhi Center for Theoretical Physics Massachusetts Institute of Technology Cambridge, MA 02139 Sam Gutmann

More information

The Minesweeper game: Percolation and Complexity

The Minesweeper game: Percolation and Complexity The Minesweeper game: Percolation and Complexity Elchanan Mossel Hebrew University of Jerusalem and Microsoft Research March 15, 2002 Abstract We study a model motivated by the minesweeper game In this

More information

Short-length routes in low-cost networks via Poisson line patterns

Short-length routes in low-cost networks via Poisson line patterns Short-length routes in low-cost networks via Poisson line patterns (joint work with David Aldous) Wilfrid Kendall w.s.kendall@warwick.ac.uk Stochastic processes and algorithms workshop, Hausdorff Research

More information

Optimality of Belief Propagation for Random Assignment Problem

Optimality of Belief Propagation for Random Assignment Problem Optimality of Belief Propagation for andom Assignment Problem J. Salez and D. Shah Abstract he assignment problem concerns finding the minimum-cost perfect matching in a complete weighted n n bipartite

More information

Infinitely iterated Brownian motion

Infinitely iterated Brownian motion Mathematics department Uppsala University (Joint work with Nicolas Curien) This talk was given in June 2013, at the Mittag-Leffler Institute in Stockholm, as part of the Symposium in honour of Olav Kallenberg

More information

Empirical Processes: General Weak Convergence Theory

Empirical Processes: General Weak Convergence Theory Empirical Processes: General Weak Convergence Theory Moulinath Banerjee May 18, 2010 1 Extended Weak Convergence The lack of measurability of the empirical process with respect to the sigma-field generated

More information

An Application of Catalan Numbers on Cayley Tree of Order 2: Single Polygon Counting

An Application of Catalan Numbers on Cayley Tree of Order 2: Single Polygon Counting BULLETIN of the Malaysian Mathematical Sciences Society http://math.usm.my/bulletin Bull. Malays. Math. Sci. Soc. (2) 31(2) (2008), 175 183 An Application of Catalan Numbers on Cayley Tree of Order 2:

More information

The Skorokhod reflection problem for functions with discontinuities (contractive case)

The Skorokhod reflection problem for functions with discontinuities (contractive case) The Skorokhod reflection problem for functions with discontinuities (contractive case) TAKIS KONSTANTOPOULOS Univ. of Texas at Austin Revised March 1999 Abstract Basic properties of the Skorokhod reflection

More information

Mi-Hwa Ko. t=1 Z t is true. j=0

Mi-Hwa Ko. t=1 Z t is true. j=0 Commun. Korean Math. Soc. 21 (2006), No. 4, pp. 779 786 FUNCTIONAL CENTRAL LIMIT THEOREMS FOR MULTIVARIATE LINEAR PROCESSES GENERATED BY DEPENDENT RANDOM VECTORS Mi-Hwa Ko Abstract. Let X t be an m-dimensional

More information

be a deterministic function that satisfies x( t) dt. Then its Fourier

be a deterministic function that satisfies x( t) dt. Then its Fourier Lecture Fourier ransforms and Applications Definition Let ( t) ; t (, ) be a deterministic function that satisfies ( t) dt hen its Fourier it ransform is defined as X ( ) ( t) e dt ( )( ) heorem he inverse

More information

Math 249B. Geometric Bruhat decomposition

Math 249B. Geometric Bruhat decomposition Math 249B. Geometric Bruhat decomposition 1. Introduction Let (G, T ) be a split connected reductive group over a field k, and Φ = Φ(G, T ). Fix a positive system of roots Φ Φ, and let B be the unique

More information

Note on the structure of Kruskal s Algorithm

Note on the structure of Kruskal s Algorithm Note on the structure of Kruskal s Algorithm Nicolas Broutin Luc Devroye Erin McLeish November 15, 2007 Abstract We study the merging process when Kruskal s algorithm is run with random graphs as inputs.

More information

CHARACTERIZATION OF ULTRASONIC IMMERSION TRANSDUCERS

CHARACTERIZATION OF ULTRASONIC IMMERSION TRANSDUCERS CHARACTERIZATION OF ULTRASONIC IMMERSION TRANSDUCERS INTRODUCTION David D. Bennink, Center for NDE Anna L. Pate, Engineering Science and Mechanics Ioa State University Ames, Ioa 50011 In any ultrasonic

More information

STATC141 Spring 2005 The materials are from Pairwise Sequence Alignment by Robert Giegerich and David Wheeler

STATC141 Spring 2005 The materials are from Pairwise Sequence Alignment by Robert Giegerich and David Wheeler STATC141 Spring 2005 The materials are from Pairise Sequence Alignment by Robert Giegerich and David Wheeler Lecture 6, 02/08/05 The analysis of multiple DNA or protein sequences (I) Sequence similarity

More information

N-bit Parity Neural Networks with minimum number of threshold neurons

N-bit Parity Neural Networks with minimum number of threshold neurons Open Eng. 2016; 6:309 313 Research Article Open Access Marat Z. Arslanov*, Zhazira E. Amirgalieva, and Chingiz A. Kenshimov N-bit Parity Neural Netorks ith minimum number of threshold neurons DOI 10.1515/eng-2016-0037

More information

A Proof of a Conjecture of Buck, Chan, and Robbins on the Expected Value of the Minimum Assignment

A Proof of a Conjecture of Buck, Chan, and Robbins on the Expected Value of the Minimum Assignment A Proof of a Conjecture of Buck, Chan, and Robbins on the Expected Value of the Minimum Assignment Johan Wästlund Department of Mathematics, Linköping University, S-58 83 Linköping, Sweden; e-mail: jowas@mai.liu.se

More information

Minimax strategy for prediction with expert advice under stochastic assumptions

Minimax strategy for prediction with expert advice under stochastic assumptions Minimax strategy for prediction ith expert advice under stochastic assumptions Wojciech Kotłosi Poznań University of Technology, Poland otlosi@cs.put.poznan.pl Abstract We consider the setting of prediction

More information

Estimates for probabilities of independent events and infinite series

Estimates for probabilities of independent events and infinite series Estimates for probabilities of independent events and infinite series Jürgen Grahl and Shahar evo September 9, 06 arxiv:609.0894v [math.pr] 8 Sep 06 Abstract This paper deals with finite or infinite sequences

More information

TREE AND GRID FACTORS FOR GENERAL POINT PROCESSES

TREE AND GRID FACTORS FOR GENERAL POINT PROCESSES Elect. Comm. in Probab. 9 (2004) 53 59 ELECTRONIC COMMUNICATIONS in PROBABILITY TREE AND GRID FACTORS FOR GENERAL POINT PROCESSES ÁDÁM TIMÁR1 Department of Mathematics, Indiana University, Bloomington,

More information

arxiv: v2 [math.pr] 4 Sep 2017

arxiv: v2 [math.pr] 4 Sep 2017 arxiv:1708.08576v2 [math.pr] 4 Sep 2017 On the Speed of an Excited Asymmetric Random Walk Mike Cinkoske, Joe Jackson, Claire Plunkett September 5, 2017 Abstract An excited random walk is a non-markovian

More information

Logistic Regression. Machine Learning Fall 2018

Logistic Regression. Machine Learning Fall 2018 Logistic Regression Machine Learning Fall 2018 1 Where are e? We have seen the folloing ideas Linear models Learning as loss minimization Bayesian learning criteria (MAP and MLE estimation) The Naïve Bayes

More information

Erdős-Renyi random graphs basics

Erdős-Renyi random graphs basics Erdős-Renyi random graphs basics Nathanaël Berestycki U.B.C. - class on percolation We take n vertices and a number p = p(n) with < p < 1. Let G(n, p(n)) be the graph such that there is an edge between

More information

Notes on uniform convergence

Notes on uniform convergence Notes on uniform convergence Erik Wahlén erik.wahlen@math.lu.se January 17, 2012 1 Numerical sequences We begin by recalling some properties of numerical sequences. By a numerical sequence we simply mean

More information

Consider this problem. A person s utility function depends on consumption and leisure. Of his market time (the complement to leisure), h t

Consider this problem. A person s utility function depends on consumption and leisure. Of his market time (the complement to leisure), h t VI. INEQUALITY CONSTRAINED OPTIMIZATION Application of the Kuhn-Tucker conditions to inequality constrained optimization problems is another very, very important skill to your career as an economist. If

More information

On Almost Complete Caps in PG(N, q)

On Almost Complete Caps in PG(N, q) BLGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 8 No 5 Special Thematic Issue on Optimal Codes and Related Topics Sofia 08 Print ISSN: 3-970; Online ISSN: 34-408 DOI: 0478/cait-08-000

More information

Linear models: the perceptron and closest centroid algorithms. D = {(x i,y i )} n i=1. x i 2 R d 9/3/13. Preliminaries. Chapter 1, 7.

Linear models: the perceptron and closest centroid algorithms. D = {(x i,y i )} n i=1. x i 2 R d 9/3/13. Preliminaries. Chapter 1, 7. Preliminaries Linear models: the perceptron and closest centroid algorithms Chapter 1, 7 Definition: The Euclidean dot product beteen to vectors is the expression d T x = i x i The dot product is also

More information

EXPLICIT CONSTANTS IN AVERAGES INVOLVING THE MULTIPLICATIVE ORDER

EXPLICIT CONSTANTS IN AVERAGES INVOLVING THE MULTIPLICATIVE ORDER EXPLICIT CONSTANTS IN AVERAGES INVOLVING THE MULTIPLICATIVE ORDER KIM, SUNGJIN DEPARTMENT OF MATHEMATICS UNIVERSITY OF CALIFORNIA, LOS ANGELES MATH SCIENCE BUILDING 667A E-MAIL: 70707@GMAILCOM Abstract

More information

First Order Convergence and Roots

First Order Convergence and Roots Article First Order Convergence and Roots Christofides, Demetres and Kral, Daniel Available at http://clok.uclan.ac.uk/17855/ Christofides, Demetres and Kral, Daniel (2016) First Order Convergence and

More information

Long run input use-input price relations and the cost function Hessian. Ian Steedman Manchester Metropolitan University

Long run input use-input price relations and the cost function Hessian. Ian Steedman Manchester Metropolitan University Long run input use-input price relations and the cost function Hessian Ian Steedman Manchester Metropolitan University Abstract By definition, to compare alternative long run equilibria is to compare alternative

More information

LOCAL CONVERGENCE OF GRAPHS AND ENUMERATION OF SPANNING TREES. 1. Introduction

LOCAL CONVERGENCE OF GRAPHS AND ENUMERATION OF SPANNING TREES. 1. Introduction LOCAL CONVERGENCE OF GRAPHS AND ENUMERATION OF SPANNING TREES MUSTAZEE RAHMAN 1 Introduction A spanning tree in a connected graph G is a subgraph that contains every vertex of G and is itself a tree Clearly,

More information

A new characterization of endogeny

A new characterization of endogeny A new characterization of endogeny Tibor Mach Anja Sturm Jan M. Swart October 1, 2018 Abstract Aldous and Bandyopadhyay have shown that each solution to a recursive distributional equation (RDE) gives

More information

Jim Pitman. Department of Statistics. University of California. June 16, Abstract

Jim Pitman. Department of Statistics. University of California. June 16, Abstract The asymptotic behavior of the Hurwitz binomial distribution Jim Pitman Technical Report No. 5 Department of Statistics University of California 367 Evans Hall # 386 Berkeley, CA 9472-386 June 16, 1998

More information

Permutation groups/1. 1 Automorphism groups, permutation groups, abstract

Permutation groups/1. 1 Automorphism groups, permutation groups, abstract Permutation groups Whatever you have to do with a structure-endowed entity Σ try to determine its group of automorphisms... You can expect to gain a deep insight into the constitution of Σ in this way.

More information

THE CONE OF BETTI TABLES OVER THREE NON-COLLINEAR POINTS IN THE PLANE

THE CONE OF BETTI TABLES OVER THREE NON-COLLINEAR POINTS IN THE PLANE JOURNAL OF COMMUTATIVE ALGEBRA Volume 8, Number 4, Winter 2016 THE CONE OF BETTI TABLES OVER THREE NON-COLLINEAR POINTS IN THE PLANE IULIA GHEORGHITA AND STEVEN V SAM ABSTRACT. We describe the cone of

More information

1 Introduction CLASSES OF STANDARD GAUSSIAN RANDOM VARIABLES AND THEIR GENERALIZATIONS. Acta Wasaensia 1. Wolf-Dieter Richter University of Rostock

1 Introduction CLASSES OF STANDARD GAUSSIAN RANDOM VARIABLES AND THEIR GENERALIZATIONS. Acta Wasaensia 1. Wolf-Dieter Richter University of Rostock Acta Wasaensia 1 CLASSES OF STANDARD GAUSSIAN RANDOM VARIABLES AND THEIR GENERALIZATIONS Wolf-Dieter Richter University of Rostock 1 Introduction Numerous results on the skeed normal distribution and its

More information

Random Bernstein-Markov factors

Random Bernstein-Markov factors Random Bernstein-Markov factors Igor Pritsker and Koushik Ramachandran October 20, 208 Abstract For a polynomial P n of degree n, Bernstein s inequality states that P n n P n for all L p norms on the unit

More information

The interface of statistical physics, algorithmic theory, and

The interface of statistical physics, algorithmic theory, and Scaling and universality in continuous length combinatorial optimization David Aldous and Allon G. Percus Department of Statistics, University of California, Berkeley, CA 94720-3860; and Computer and Computational

More information

Applications of the Lopsided Lovász Local Lemma Regarding Hypergraphs

Applications of the Lopsided Lovász Local Lemma Regarding Hypergraphs Regarding Hypergraphs Ph.D. Dissertation Defense April 15, 2013 Overview The Local Lemmata 2-Coloring Hypergraphs with the Original Local Lemma Counting Derangements with the Lopsided Local Lemma Lopsided

More information

Perron eigenvector of the Tsetlin matrix

Perron eigenvector of the Tsetlin matrix Linear Algebra and its Applications 363 (2003) 3 16 wwwelseviercom/locate/laa Perron eigenvector of the Tsetlin matrix RB Bapat Indian Statistical Institute, Delhi Centre, 7 SJS Sansanwal Marg, New Delhi

More information

Phase transitions in discrete structures

Phase transitions in discrete structures Phase transitions in discrete structures Amin Coja-Oghlan Goethe University Frankfurt Overview 1 The physics approach. [following Mézard, Montanari 09] Basics. Replica symmetry ( Belief Propagation ).

More information

Connectivity of addable graph classes

Connectivity of addable graph classes Connectivity of addable graph classes Paul Balister Béla Bollobás Stefanie Gerke July 6, 008 A non-empty class A of labelled graphs is weakly addable if for each graph G A and any two distinct components

More information

Dependent percolation: some examples and multi-scale tools

Dependent percolation: some examples and multi-scale tools Dependent percolation: some examples and multi-scale tools Maria Eulália Vares UFRJ, Rio de Janeiro, Brasil 8th Purdue International Symposium, June 22 I. Motivation Classical Ising model (spins ±) in

More information

On distribution functions of ξ(3/2) n mod 1

On distribution functions of ξ(3/2) n mod 1 ACTA ARITHMETICA LXXXI. (997) On distribution functions of ξ(3/2) n mod by Oto Strauch (Bratislava). Preliminary remarks. The question about distribution of (3/2) n mod is most difficult. We present a

More information

A = A U. U [n] P(A U ). n 1. 2 k(n k). k. k=1

A = A U. U [n] P(A U ). n 1. 2 k(n k). k. k=1 Lecture I jacques@ucsd.edu Notation: Throughout, P denotes probability and E denotes expectation. Denote (X) (r) = X(X 1)... (X r + 1) and let G n,p denote the Erdős-Rényi model of random graphs. 10 Random

More information

PROTECTED NODES AND FRINGE SUBTREES IN SOME RANDOM TREES

PROTECTED NODES AND FRINGE SUBTREES IN SOME RANDOM TREES PROTECTED NODES AND FRINGE SUBTREES IN SOME RANDOM TREES LUC DEVROYE AND SVANTE JANSON Abstract. We study protected nodes in various classes of random rooted trees by putting them in the general context

More information

Chordal Graphs, Interval Graphs, and wqo

Chordal Graphs, Interval Graphs, and wqo Chordal Graphs, Interval Graphs, and wqo Guoli Ding DEPARTMENT OF MATHEMATICS LOUISIANA STATE UNIVERSITY BATON ROUGE, LA 70803-4918 E-mail: ding@math.lsu.edu Received July 29, 1997 Abstract: Let be the

More information

The Tightness of the Kesten-Stigum Reconstruction Bound for a Symmetric Model With Multiple Mutations

The Tightness of the Kesten-Stigum Reconstruction Bound for a Symmetric Model With Multiple Mutations The Tightness of the Kesten-Stigum Reconstruction Bound for a Symmetric Model With Multiple Mutations City University of New York Frontier Probability Days 2018 Joint work with Dr. Sreenivasa Rao Jammalamadaka

More information

A statistical mechanical interpretation of algorithmic information theory

A statistical mechanical interpretation of algorithmic information theory A statistical mechanical interpretation of algorithmic information theory Kohtaro Tadaki Research and Development Initiative, Chuo University 1 13 27 Kasuga, Bunkyo-ku, Tokyo 112-8551, Japan. E-mail: tadaki@kc.chuo-u.ac.jp

More information