Endogeny for the Logistic Recursive Distributional Equation
|
|
- Dayna Arnold
- 5 years ago
- Views:
Transcription
1 Zeitschrift für Analysis und ihre Anendungen Journal for Analysis and its Applications Volume 30 20, DOI: 0.47/ZAA/433 c European Mathematical Society Endogeny for the Logistic Recursive Distributional Equation Antar Bandyopadhyay Abstract. In this article e prove the endogeny and bivariate uniqueness property for a particular max-type recursive distributional equation RDE. The RDE e consider is the so called logistic RDE, hich appears in the proof of the ζ2-limit of the random assignment problem using the local eak convergence method proved by D. Aldous [Probab. Theory Related Fields , ]. This article provides a non-trivial application of the general theory developed by D. Aldous and A. Bandyopadhyay [Ann. Appl. Probab , 047 0]. The proofs involves analytic arguments, hich illustrate the need to develop more analytic tools for studying such max-type RDEs. Keyords. Bivariate uniqueness, endogeny, logistic distribution, random assignment problem, recursive distributional equations, recursive tree processes Mathematics Subject Classification Primary 60E05, secondary 60K35, 60J80. Introduction and the main result Fixed-point equations have found many applications in various fields of mathematics. In probability theory they are usually referred as distributional identities. A recent article by Aldous and Bandyopadhyay [5] provides a general frameork to study certain type of distributional identities hich arise in a variety of settings. Given a measurable space S, S rite P S for the set of all probabilities on S. According to [5], a recursive distributional equation RDE is a fixed-point equation on P S defined as X d = g ξ; X j : j N on S, A. Bandyopadhyay: Theoretical Statistics and Mathematics Unit, Indian Statistical Institute, 7 S. J. S. Sansanal Marg, Ne Delhi 006, India; antar@isid.ac.in
2 238 A. Bandyopadhyay here it is assumed that X j j are S-valued random variables ith identical distribution and are stochastically independent, and their common distribution is same as that of the random variable X, and are independent of the pair ξ, N. Here ξ is a measurable function taking value on some measurable space, say Λ, Z, N is a non-negative integer valued random variable, hich may take the value and g is a given S-valued function. In the above equation by N e mean the left hand side is N if N <, and < N otherise. In the distribution of X is unknon, hile the distribution of the pair ξ, N and the function g are assumed to be knon quantities. Perhaps a more conventional analytic ay of riting the equation ould be here T : P S P S is a function defined as µ = T µ, 2 T µ := dist g ξ; X j : j N here ξ, N is as above and X j j are independent and identically distributed i.i.d. ith common distribution µ P S and these sets of random variables are stochastically independent. As outlined in [5] in many applications RDEs play a very crucial role. Examples include study of Galton-Watson branching processes and related random trees, probabilistic analysis of algorithms ith suitable recursive structure [, 5, 6], statistical physics models on trees [2, 3, 6, 2], and statistical physics and algorithmic questions in the mean-field model of distance [,2,4,7,8,9]. In many of these applications, particularly in the last to types mentioned above, often one needs to construct a particular tree indexed stationary process related to a given RDE, hich is called a recursive tree process RTP [5]. More precisely, suppose the RDE has a solution, say µ. Then as shon in [5], using the consistency theorem of Kolmogorov [9], one can construct a process, say X i i V, indexed by V := d N d { }, such that i X i µ i V ii for each d 0, X i i =d are independent iii X i = g ξ i ; X ij : j N i i V iv X i is independent of { ξ i, N i i < i } i V, 3 here ξ i, N i i V are taken to be i.i.d. copies of the pair ξ, N, and by e mean the length of a finite ord. The process X i i V is called an invariant recursive tree process RTP ith marginal µ. The i.i.d. random variables ξ i, N i i V are called the innovation process. In some sense, an invariant RTP ith marginal µ is an almost sure representation of a solution µ of the RDE. Here e note that there is a natural tree structure on V. Taking V as the vertex set, e join to ords i, i V by an edge, if and only if, i = ij or i = i j, for
3 Endogeny for the Logistic RDE 239 some j N. We ill denote this tree by T. The empty-ord ill be taken as the root of the tree T. For simplicity e ill rite j = j for j N. In the applications mentioned above the variables X i i V of a RTP are often used as auxiliary variables to define or to construct some useful random structures. In those cases typically the innovation process defines the internal variables hile the RTP is constructed externally using the consistency theorem. It is then natural to ask hether the RTP is measurable only ith respect to the i.i.d. innovation process ξ i, N i. Definition. An invariant RTP ith marginal µ is called endogenous, if the root variable X is almost surely measurable ith respect to the completion of the σ-algebra G := σ { ξ i, N i i V }. This notion of endogeny has been the main topic of discussion in [5]. The authors provide a necessary and sufficient condition for endogeny in the general setup [5, Theorem ]. Some other concepts similar to endogeny can be found in [6]. In this article e provide a non-trivial application of the theory developed in [5]. The example e consider here arise from the study of the asymptotic limit of random assignment problem using local-eak convergence method [4]. A detailed background of this example is given in Section 2... Main result. The folloing RDE plays the central role in deriving the asymptotic limit of the random assignment problem [4], X d = min j ξ j X j on R, 4 here X j j are i.i.d. ith same la as X and are independent of ξ j j hich are points of a Poisson point process of rate on 0,, that is, ξ ξ 2 ξ k a.s. and the collection ξ i ξ i i are i.i.d. random variables ith Exponential distribution. Here e rite ξ 0 0. It is knon [4] that the RDE 4 has a unique solution as the logistic distribution, given by P X x =, x R. 5 + e For this reason e ill call RDE 4 the logistic RDE. The folloing is our main result. Theorem. The invariant recursive tree process ith logistic marginals associated ith the RDE 4 is endogenous. This result though looks technical, but provides a concrete example falling under the general theory developed in [5]. The proof of Theorem involves analytic techniques, thus this ork also demonstrate the need of developing analytic tools for studying max-type RDEs in general.
4 240 A. Bandyopadhyay.2. Outline of rest of the paper. The next section provides the background and motivation for deriving our main result. In Sections 3 e prove the bivariate uniqueness property of the logistic RDE 4 and finally Section 4 gives the proof the main result. 2. Background and motivation for logistic RDE For a given n n matrix of costs C ij, consider the problem of assigning n jobs to n machines in the most cost effective ay. Thus the task is to find a permutation π of {, 2,..., n}, hich solves the folloing minimization problem A n := min π n C i,πi. 6 This problem has been extensively studied in literature for a fixed cost matrix, and there are various algorithms to find the optimal permutation π. A probabilistic model for the assignment problem can be obtained by assuming that the costs are independent random variables each ith Uniform[0, ] distribution. Although this model appears to be quite simple, careful investigations of it in the last fe decades have shon that it has enormous richness in its structure. See [2, 8] for survey and other related orks. Our interest in this problem is from another perspective. In 200, Aldous [4] shoed lim E[A n] = ζ2 = π2 n 6, 7 confirming the earlier ork of Mézard and Parisi [3], here they computed the same limit using non-rigorous arguments based on the replica method [4]. It is also knon that the limit exists and it is universal for any i.i.d. cost distribution ith density f such that f0 = see []. So for calculation of the limiting constant one can assume that C ij s are i.i.d. ith Exponential distribution ith mean n and then rite the objective function A n in the normalized form, i= A n = d min π n n C i,πi. 8 i= In [4], the limit ζ2 as identified in terms of an optimal matching problem on an infinite tree ith random edge eights, described as follos: Let T := V, E be the canonical infinite rooted labeled tree, as before, here is the root. For every vertex i V, let ξ ij j be points of a Poisson point process of rate on 0,, and they are independent as i varies. Define the eight of the edge e = i, ij E as ξ ij.
5 Endogeny for the Logistic RDE 24 This structure is called Poisson eighted infinite tree and henceforth abbreviated as PWIT. Let K r n,n be the complete bipartite graph on 2n vertices ith a root selected uniformly at random. Suppose e also equip it ith i.i.d. Exponential edge eights ith mean n. Then one can sho [2,4] that in the sense of Aldous-Steel local eak convergence K r n,n converges to the PWIT. Moreover heuristically the random assignment problem on K r n,n has a natural analog to the limit structure, hich is to consider the optimal in sense of minimizing the total cost matching problem on PWIT. Naturally PWIT being an infinite graph ith edge eights each having mean at least, the total cost of any matching is infinite a.s., and hence minimization total cost is not quite meaningful. Hoever, Aldous [4] shoed that it is possible to make a sensible definition of optimal matching on PWIT hich minimizes the average edge eight. This construction is quite hard, and e refer the readers to [2, 4] for the technical details. Here e only provide the basic essentials to understand the motivation for our ork. Consider the heuristic description of the optimal matching problem on PWIT and suppose e define variables X i for each vertex i as follos X i = Total cost of a maximal matching on the subtree T i Total cost of a maximal matching on the forest T i \ {i}, here T i is the subtree rooted at the vertex i. Here by total cost e mean the sum total of all the edge eights in the matching. As noted above, both the total costs appearing in 9 are infinity almost surely. Thus rigorously speaking X i is not ell defined. But at the heuristic level if e ignore this, then simple manipulation yields that they must satisfy the folloing recurrence relation see [4, Section 4.2] 9 X i = min j ξ ij X ij. 0 This is of course the recurrence relation for a RTP associated ith the logistic RDE 4. Thus one can no construct the X i -variables externally as the RTP associated ith the logistic RDE and then use them to redefine the optimal matching on PWIT. This is the construction given in [4] hich also provides a characterization of the optimal matching on the PWIT. Finally one can then derive the ζ2-limit for the random assignment problem. Once again a natural question ould be to figure out hether the random variables X i s are truly external or not, in other ords to see hether the RTP is endogenous or not see [4, Remarks 4.2.d and 4.2.e]. This is our main motivation for this ork. Theorem proves that the X i -variables can be defined using only the edge-eights. In other ords they have no external randomness in them. Some other significance of this result has also been pointed out in [5, Section 7.5].
6 242 A. Bandyopadhyay 3. Bivariate uniqueness for the logistic RDE In this section e prove the bivariate uniqueness property for the logistic RDE 4. Theorem 2. Consider the folloing bivariate RDE X d minj ξ = j X j Y min j ξ j Y j, here X j, Y j j are i.i.d. pairs ith same joint distribution as X, Y and are independent of ξ j j hich are points of a Poisson process of rate on 0,. Then the unique solution of this RDE is given by a diagonal measure, namely, µ := dist X, X here X has the logistic distribution. 3.. Proof of Theorem 2. First observe that if the equation has a solution then, the marginal distributions of X and Y solve the logistic RDE 4, and hence they are both logistic. Further by inspection µ is a solution of. So it is enough to prove that µ is the only solution of. Let µ 2 be a solution of. No consider the points {ξ j ; X j, Y j j } as a point process, say P on 0, R 2. Since ξ j j is a Poisson point process on 0, of rate and X j, Y j j are i.i.d. random vectors on R 2 ith distribution µ 2 hich are independent of the Poisson process ξ j j, thus P is a Compound Poisson process on 0, R 2 ith mean intensity ρt; x, y dt dx, y := dt µ 2 dx, y see [0, Lemma 6.4.VI]. Thus if Gx, y := P X > x, Y > y, for x, y R, then Gx, y = P min = P = exp ξ j Y j > y j ξ j X j > x, and, min j { No points of P are in t; u, v t u x, or, t v y } = exp { t;u,v 0 t u x, or, t v y } ρt; u, v dt d u, v [ Ht x + Ht y Gt x, t y ] dt = Hx Hy exp Gt x, t y dt, here H is the right tail of logistic distribution, defined as 0 Hx = e + e 2
7 Endogeny for the Logistic RDE 243 for x R. The last equality follos from properties of the logistic distribution see Proposition 3c. For notational convenience in this paper e ill rite F := F for any distribution function F. The folloing simple lemma reduces the bivariate problem to a univariate problem. Lemma. For any to random variables U and V, U = V a.s. if and only if U d = V d = U V. Proof. First of all, if U = V a.s. then U V = U a.s. Conversely suppose that U d = V d = U V. Fix a rational q, then under our assumption, PU q < V = PV > q PU > q, V > q = PV > q PU V > q = 0 A similar calculation ill sho that P V q < U = 0. These are true for any rational q, thus P U V = 0. Thus if e can sho that X Y also has logistic distribution, then from the lemma above e ill be able to conclude that X = Y a.s., and hence the proof ill be complete. Put g := P X Y >, e ill sho g = H. No, for every fixed x R, by definition gx = Gx, x. So using 2 e get gx = H 2 x exp gs ds, x R. 3 Notice that from 26 see Proposition 3c g = H is a solution of this nonlinear integral equation 3, hich corresponds to the solution µ 2 = µ of the original equation. To complete the proof of Theorem 2 e need to sho that this is the only solution. For that e ill prove that the operator associated ith 3 defined on an appropriate space is monotone and has unique fixed-point as H. The techniques e ill use here are similar to Eulerian recursion [7], and are heavily based on analytic arguments. Let F be the set of all functions f : R [0, ] such that H 2 x fx Hx for all x R, f is continuous and non-increasing. Observe that by definition H F. Further from 3 it follos that gx H 2 x, as ell as, gx = P X Y > x P X > x = Hx for all x R. Note also that g being the tail of the random variable X Y, is continuous because both X and Y are continuous random variables and non-increasing. So it is appropriate to search for solutions of 3 in F. Let T : F F be defined as T fx := H 2 x exp fs ds, x R. 4
8 244 A. Bandyopadhyay Note that this operator T is not same as the general operator defined in Section, henceforth by T e ill mean the specific operator defined above. Proposition of Section 3.2 shos that T does indeed map F into itself. Observe that the equation 3 is nothing but the fixed-point equation associated ith the operator T, that is, g = T g on F. 5 We here note that using 26 see Proposition 3c T can also be ritten as T fx := Hx exp Hs fs ds, x R, 6 hich ill be used in the subsequent discussion. Define a partial order on F as, f f 2 in F if f x f 2 x for all x R, then the folloing result holds. Lemma 2. T is a monotone operator on the partially ordered set F,. Proof. Let f f 2 be to elements of F, so from definition f x f 2 x, for all x R. Hence f s ds f 2 s ds x R T f x T f 2 x x R T f T f 2. Put f 0 = H 2, and for n N, define f n F recursively as, f n = T f n. No from Lemma 2 e get that if g is a fixed-point of T in F then, f n g n 0. 7 If e can sho f n H point ise, then using 7 e ill get H g, so from definition of F it ill follo that g = H, and our proof ill be complete. For that, the folloing lemma gives an explicit recursion for the functions {f n } n 0. Lemma 3. Let β 0 s = s, 0 s. Define recursively Then for n, β n s := s β n d, 0 < s. 8 f n x = Hx exp β n Hx, x R. 9
9 Endogeny for the Logistic RDE 245 Proof. We ill prove this by induction on n. Fix x R, for n = e get f x = T f 0 x = Hx exp = Hx exp = Hx exp Hs H2 s ds Hs Hs ds H s ds = Hx exp Hx = Hx exp β 0 Hx [using 6] [using Proposition 3a] No, assume that the assertion of the Lemma is true for n {, 2,..., k}, for some k, then from definition e have f k+ x = T f k x = Hx exp = Hx exp = Hx exp Hs fk s ds Hs β k Hs ds Hx β k d [using 6] 20 The last equality follos by substituting = Hs and thus from parts a and b of Proposition 3 e get that d = Hs ds and H = Hx. Finally by definition of β n s and using 20 e get f k+ = T f k. To complete the proof it is no enough to sho that β n 0 point ise, hich ill imply by Lemma 3 that f n H point ise, as n. Using Proposition 2 see Section 3.2 e get the folloing characterization of the point ise limit of these β n s. Lemma 4. There exists a function L : [0, ] [0, ] ith L = 0, such that Ls = s and Ls = lim n β n s for all 0 s. L d s [0,, 2 Proof. From the Proposition 2 e kno that for any s [0, ] the sequence {β n s} is decreasing, and hence there exists a function L : [0, ] [0, ] such
10 246 A. Bandyopadhyay that Ls = lim n β n s. No observe that β n β 0 = for all 0, and hence 0 β n β n 0. Thus by taking limit as n in 8 and using the dominated convergence theorem along ith part a of Proposition 2 e get that Ls = s L d 0 s <. The above lemma basically translates the non-linear integral equation 3 to the non-linear integral equation 2, here the solution g = H of 3 is given by the solution L 0 of 2. So at first sight this may not lead us to the conclusion. But fortunately, something nice happens for equation 2, and e have the folloing result hich is enough to complete the proof of Theorem 2. Lemma 5. If L : [0, ] [0, ] is a function hich satisfies the non-linear integral equation 2, namely, Ls = and if L = 0, then L 0. s L d 0 s <, Proof. First note that L 0 is a solution. No let L be any solution of 2, then L is infinitely differentiable on the open interval 0,, by repetitive application of Fundamental Theorem of Calculus. Consider η := L + e L, [0, ]. Observe, that η0 = η = 0 as L = 0. No, from 2 e get that L = L, 0,. Thus differentiating the function η e get η = e L [ 2 e L + e L ] 0 0,. 22 So the function η is decreasing in 0, and is continuous in [0, ] ith boundary values as 0, hence η 0. Thus e must have η 0, so from equation 22 e get that e Ls + e Ls = 2 for all s 0,. This implies L 0 on [0, ].
11 Endogeny for the Logistic RDE Some technical details. This section provides some of the technical results hich ere needed in the previous section. Proposition. The operator T maps F into F. Proof. First note that if f F, then by definition T fx H 2 x for all x R. Next by definition of F e get that f F f H, thus fs ds Hs ds x R T fx H 2 x exp Hs ds = Hx x R. The last equality follos from 26 see Proposition 3c. So, H 2 x T fx Hx x R. 23 No e need to sho that for any f F e must have T f continuous and non-increasing. From the definition T f is continuous in fact, infinitely differentiable. Moreover if x y be to real numbers, then Hs fs ds Hs fs ds, y because f H. Also Hx Hy, thus using 6 e get T fx T fy 24 So using 23 and 24 e conclude that T f F if f F. Proposition 2. The folloing are true for the sequence of functions {β n } n 0 defined in 8. a For every fixed s 0, ], the sequence {β n s} is decreasing. b For every n, lim s 0+ β n s exists, and is given by 0 β n d, e ill rite this as β n 0. c The sequence of numbers {β n 0} is also decreasing. Proof. a Notice that β 0 s = s for s [0, ], thus β s = s d < s = β 0 s s 0, ].
12 248 A. Bandyopadhyay No assume that for some n e have β n s β n s β 0 s for all s 0, ], if e sho that β n+ s β n s for all s 0, ] then by induction the proof ill be complete. For that, fix s 0, ] then β n+ s = s β n d s β n d = β n s. This proves the part a. b, c First note that by trivial induction β n s 0 for every s 0, ], n 0. Thus from definition for every n 0, the limit lim s 0+ β n s exists in [0, ] and is given by β n d. No using a above e conclude 0 β n+ 0 = lim s 0+ β n+s lim s 0+ β ns = β n 0, 25 for every n 0. Since β 0 0 =, so e get β n 0 < for all n 0, and the sequence is decreasing. This proves parts b and c. Finally, the folloing proposition lists some basic facts about the logistic distribution function. Proposition 3. Suppose X is a random variable ith logistic distribution and H x := P X x for x R be the distribution function of X. Then a H is infinitely differentiable and H = H H, here H = H. b H is symmetric around 0, that is, H = Hx for all x R. c H is the unique solution of the non-linear integral equation Hx = exp Hs ds x R. 26 Proof. a and b trivially follos from the definition of H. For c notice that the equation 26 is nothing but the Logistic RDE, this is because P min ξ j X j > x = exp Hs ds x R j here X j j are i.i.d. ith distribution function H and are independent of ξ j j, hich are points of a Poisson point process of rate on 0,. Thus from the fact that H is the unique solution of logistic RDE see [4, Lemma 5] e conclude that H is unique solution of equation Proof of Theorem We note that by Theorem 2 the logistic RDE 4 has bivariate uniqueness property. Thus by [5, Theorem b] to prove endogeny for the logistic RDE 4 all remains is to check the folloing technical continuity assumption.
13 Endogeny for the Logistic RDE 249 Proposition 4. Let S be the set of all probabilities on R 2 and let Γ : S S be the operator associated ith the RDE, that is, Γ µ 2 d = minj ξ j X j min j ξ j Y j, 27 here X j, Y j j are i.i.d. ith joint la µ 2 S and are independent of ξ j j hich are points of a Poisson point process of rate on 0,. Then Γ is continuous ith respect to the eak convergence topology hen restricted to the subspace S defined as { } S := µ 2 both the marginals of µ 2 are logistic distribution. 28 Before e prove this proposition, it is orth mentioning that the operator Γ is not continuous ith respect to the eak convergence topology on the hole space S. In fact, it is not difficult to see that the operator Γ is every here discontinuous on S. But fortunately for applying [5, Theorem b] e only need the continuity of Γ hen restricted to the subspace S. Proof of Proposition 4. Let { µ 2 } n n= S be such that µ 2 n µ 2 S. We ill sho that Γµ 2 d n Γµ 2. d µ 2 here Let Ω, F, P be a probability space such that there exists {X n, Y n } n= and X, Y random vectors taking values in R 2, ith X n, Y n µ 2 n, n, and X, Y µ 2. Notice that by definition X n d = Y n d = X d = Y, and each has logistic distribution. Fix x, y R, let G n x, y := Γµ 2 n x, y,, then by exactly the same argument as in the derivation of 2 e get G n x, y = Hx Hy exp = Hx Hy exp = Hx Hy exp G n t x, t y dt P X n > t x, Y n > t y dt P X n + x Y n + y > t dt = Hx Hy exp E [ X n + x + Y n + y +], and a similar calculation ill also give that Gx, y := Γµ 2 x, y, = Hx Hy exp E [ X + x + Y + y +].
14 250 A. Bandyopadhyay No to complete the proof all e need is to sho E [ X n + x + Y n + y +] E [ X + x + Y + y +]. Since e assumed that X n, Y n d X, Y it follos X n + x + Y n + y + d X + x + Y + y + x, y R. Fix x, y R, define Zn x,y Y + y +. Observe that := X n + x + Y n + y +, and Z x,y := X + x + 0 Z x,y n X n + x + X n + x n. But, X n + x = d X + x for all n. So clearly {Zn x,y } n= is uniformly integrable. Hence e conclude using the theorem of Billingsley [9, Theorem 25.2] that E [Zn x,y ] E [Z x,y ]. This completes the proof. Acknoledgments. The author ould like to thank David Aldous for suggesting the the problem and for many illuminating discussions. Thanks are also due to the Department of Statistics, University of California, Berkeley here most of the ork as done during the author s doctoral study. References [] Aldous, D. Asymptotics in the random assignment problem. Probab. Theory Related Fields , [2] Aldous, D. and Steele, J. M., The objective method: probabilistic combinatorial optimization and local eak convergence. In: Probability on Discrete Structures ed.: H. Kesten. Encyclopaedia Math. Sci. 0. Berlin: Springer 2004, pp. 72. [3] Aldous, D. J., The percolation process on a tree here infinite clusters are frozen. Math. Proc. Cambridge Philos. Soc , [4] Aldous, D. J., The ζ2 Limit in the Random Assignment Problem. Random Structures Algorithms , [5] Aldous, D. J. and Bandyopadhyay, A., A survey of max-type recursive distributional equations. Ann. Appl. Probab , [6] Bandyopadhyay, A., A necessary and sufficient condition for the tail-triviality of a recursive tree process. Sankhyā , 23. [7] Bandyopadhyay, A. and Gamarnik, D., Counting ithout sampling. Ne algorithms for enumeration problems using statistical physics. In: Proc. Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithms. Philadelphia PA: SIAM 2006, pp
15 Endogeny for the Logistic RDE 25 [8] Bandyopadhyay, A. and Gamarnik, D., Counting ithout sampling: asymptotics of the log-partition function for certain statistical physics models. Random Structures Algorithms , [9] Billingsley, P., Probability and Measure. Third ed. Ne York: Wiley 995. [0] Daley, D. J. and Vere-Jones, D., An Introduction to the Theory of Point Processes. Vol. I. Elementary theory and methods. Sec. ed. Probab. Appl. N. Y.. Ne York: Springer-Verlag [] Fill, J. A. and Janson, S., A characterization of the set of fixed points of the Quicksort transformation. Electron. Comm. Probab , electronic. [2] Gamarnik, D., Noicki, T. and Sirszcz, G., Maximum eight independent sets and matchings in sparse random graphs. Exact results using the local eak convergence method. Random Structures Algorithms , [3] Mézard, M. and Parisi, G., On the solution of the random link matching problem. J. Physique , [4] Mézard, M., Parisi, G. and Virasoro, M. A., Spin Glass Theory and Beyond. Singapore: World Scientific 987. [5] Rösler, U. and Rüschendorf, L., The contraction method for recursive algorithms. Algorithmica , [6] Rösler, U., A fixed point theorem for distributions. Stochastic Process. Appl , [7] Simmons, G. F., Differential Equations ith Applications and Historical Notes. Ne York: McGra-Hill 972. [8] Steele, J. M., Probability Theory and Combinatorial Optimization. Philadelphia PA: SIAM 997. [9] Wästlund, J., The mean field traveling salesman and related problems. Acta Math , Received May 2, 200; revised September 27, 200
Bivariate Uniqueness in the Logistic Recursive Distributional Equation
Bivariate Uniqueness in the Logistic Recursive Distributional Equation Antar Bandyopadhyay Technical Report # 629 University of California Department of Statistics 367 Evans Hall # 3860 Berkeley CA 94720-3860
More informationHard-Core Model on Random Graphs
Hard-Core Model on Random Graphs Antar Bandyopadhyay Theoretical Statistics and Mathematics Unit Seminar Theoretical Statistics and Mathematics Unit Indian Statistical Institute, New Delhi Centre New Delhi,
More informationStat 8112 Lecture Notes Weak Convergence in Metric Spaces Charles J. Geyer January 23, Metric Spaces
Stat 8112 Lecture Notes Weak Convergence in Metric Spaces Charles J. Geyer January 23, 2013 1 Metric Spaces Let X be an arbitrary set. A function d : X X R is called a metric if it satisfies the folloing
More informationMean-field dual of cooperative reproduction
The mean-field dual of systems with cooperative reproduction joint with Tibor Mach (Prague) A. Sturm (Göttingen) Friday, July 6th, 2018 Poisson construction of Markov processes Let (X t ) t 0 be a continuous-time
More informationA proof of topological completeness for S4 in (0,1)
A proof of topological completeness for S4 in (,) Grigori Mints and Ting Zhang 2 Philosophy Department, Stanford University mints@csli.stanford.edu 2 Computer Science Department, Stanford University tingz@cs.stanford.edu
More informationarxiv:math.pr/ v1 17 May 2004
Probabilistic Analysis for Randomized Game Tree Evaluation Tämur Ali Khan and Ralph Neininger arxiv:math.pr/0405322 v1 17 May 2004 ABSTRACT: We give a probabilistic analysis for the randomized game tree
More informationSemi-simple Splicing Systems
Semi-simple Splicing Systems Elizabeth Goode CIS, University of Delaare Neark, DE 19706 goode@mail.eecis.udel.edu Dennis Pixton Mathematics, Binghamton University Binghamton, NY 13902-6000 dennis@math.binghamton.edu
More informationMax-type Recursive Distributional Equations. Antar Bandyopadhyay
Max-type Recursive Distributional Equations by Antar Bandyopadhyay M.Stat. Indian Statistical Institute, Calcutta, India) 1998 M.A. University of California, Berkeley) 2000 A dissertation submitted in
More informationOn the approximation of real powers of sparse, infinite, bounded and Hermitian matrices
On the approximation of real poers of sparse, infinite, bounded and Hermitian matrices Roman Werpachoski Center for Theoretical Physics, Al. Lotnikó 32/46 02-668 Warszaa, Poland Abstract We describe a
More informationCourse Notes. Part IV. Probabilistic Combinatorics. Algorithms
Course Notes Part IV Probabilistic Combinatorics and Algorithms J. A. Verstraete Department of Mathematics University of California San Diego 9500 Gilman Drive La Jolla California 92037-0112 jacques@ucsd.edu
More informationCHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum
CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum 1997 19 CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION 3.0. Introduction
More informationA Generalization of a result of Catlin: 2-factors in line graphs
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 72(2) (2018), Pages 164 184 A Generalization of a result of Catlin: 2-factors in line graphs Ronald J. Gould Emory University Atlanta, Georgia U.S.A. rg@mathcs.emory.edu
More informationEnhancing Generalization Capability of SVM Classifiers with Feature Weight Adjustment
Enhancing Generalization Capability of SVM Classifiers ith Feature Weight Adjustment Xizhao Wang and Qiang He College of Mathematics and Computer Science, Hebei University, Baoding 07002, Hebei, China
More informationSOLUTIONS OF SEMILINEAR WAVE EQUATION VIA STOCHASTIC CASCADES
Communications on Stochastic Analysis Vol. 4, No. 3 010) 45-431 Serials Publications www.serialspublications.com SOLUTIONS OF SEMILINEAR WAVE EQUATION VIA STOCHASTIC CASCADES YURI BAKHTIN* AND CARL MUELLER
More informationOn a generalized combinatorial conjecture involving addition mod 2 k 1
On a generalized combinatorial conjecture involving addition mod k 1 Gérard Cohen Jean-Pierre Flori Tuesday 14 th February, 01 Abstract In this note, e give a simple proof of the combinatorial conjecture
More informationBootstrap Percolation on Periodic Trees
Bootstrap Percolation on Periodic Trees Milan Bradonjić Iraj Saniee Abstract We study bootstrap percolation with the threshold parameter θ 2 and the initial probability p on infinite periodic trees that
More informationBranching, smoothing and endogeny
Branching, smoothing and endogeny John D. Biggins, School of Mathematics and Statistics, University of Sheffield, Sheffield, S7 3RH, UK September 2011, Paris Joint work with Gerold Alsmeyer and Matthias
More informationHow Long Does it Take to Catch a Wild Kangaroo?
Ho Long Does it Take to Catch a Wild Kangaroo? Ravi Montenegro Prasad Tetali ABSTRACT The discrete logarithm problem asks to solve for the exponent x, given the generator g of a cyclic group G and an element
More informationUC Berkeley Department of Electrical Engineering and Computer Sciences. EECS 126: Probability and Random Processes
UC Berkeley Department of Electrical Engineering and Computer Sciences EECS 26: Probability and Random Processes Problem Set Spring 209 Self-Graded Scores Due:.59 PM, Monday, February 4, 209 Submit your
More informationAlmost giant clusters for percolation on large trees
for percolation on large trees Institut für Mathematik Universität Zürich Erdős-Rényi random graph model in supercritical regime G n = complete graph with n vertices Bond percolation with parameter p(n)
More informationResistance Growth of Branching Random Networks
Peking University Oct.25, 2018, Chengdu Joint work with Yueyun Hu (U. Paris 13) and Shen Lin (U. Paris 6), supported by NSFC Grant No. 11528101 (2016-2017) for Research Cooperation with Oversea Investigators
More informationCONSTRAINED PERCOLATION ON Z 2
CONSTRAINED PERCOLATION ON Z 2 ZHONGYANG LI Abstract. We study a constrained percolation process on Z 2, and prove the almost sure nonexistence of infinite clusters and contours for a large class of probability
More informationBloom Filters and Locality-Sensitive Hashing
Randomized Algorithms, Summer 2016 Bloom Filters and Locality-Sensitive Hashing Instructor: Thomas Kesselheim and Kurt Mehlhorn 1 Notation Lecture 4 (6 pages) When e talk about the probability of an event,
More informationCOS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 12 Scribe: Indraneel Mukherjee March 12, 2008
COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture # 12 Scribe: Indraneel Mukherjee March 12, 2008 In the previous lecture, e ere introduced to the SVM algorithm and its basic motivation
More informationy(x) = x w + ε(x), (1)
Linear regression We are ready to consider our first machine-learning problem: linear regression. Suppose that e are interested in the values of a function y(x): R d R, here x is a d-dimensional vector-valued
More informationk-protected VERTICES IN BINARY SEARCH TREES
k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from
More informationStatistical Physics on Sparse Random Graphs: Mathematical Perspective
Statistical Physics on Sparse Random Graphs: Mathematical Perspective Amir Dembo Stanford University Northwestern, July 19, 2016 x 5 x 6 Factor model [DM10, Eqn. (1.4)] x 1 x 2 x 3 x 4 x 9 x8 x 7 x 10
More informationLecture Notes 8
14.451 Lecture Notes 8 Guido Lorenzoni Fall 29 1 Stochastic dynamic programming: an example We no turn to analyze problems ith uncertainty, in discrete time. We begin ith an example that illustrates the
More informationRandomized Smoothing Networks
Randomized Smoothing Netorks Maurice Herlihy Computer Science Dept., Bron University, Providence, RI, USA Srikanta Tirthapura Dept. of Electrical and Computer Engg., Ioa State University, Ames, IA, USA
More informationThe degree sequence of Fibonacci and Lucas cubes
The degree sequence of Fibonacci and Lucas cubes Sandi Klavžar Faculty of Mathematics and Physics University of Ljubljana, Slovenia and Faculty of Natural Sciences and Mathematics University of Maribor,
More informationAlmost all trees have an even number of independent sets
Almost all trees have an even number of independent sets Stephan G. Wagner Department of Mathematical Sciences Stellenbosch University Private Bag X1, Matieland 7602, South Africa swagner@sun.ac.za Submitted:
More informationTHE NOISY VETO-VOTER MODEL: A RECURSIVE DISTRIBUTIONAL EQUATION ON [0,1] April 28, 2007
THE NOISY VETO-VOTER MODEL: A RECURSIVE DISTRIBUTIONAL EQUATION ON [0,1] SAUL JACKA AND MARCUS SHEEHAN Abstract. We study a particular example of a recursive distributional equation (RDE) on the unit interval.
More informationExtension of continuous functions in digital spaces with the Khalimsky topology
Extension of continuous functions in digital spaces with the Khalimsky topology Erik Melin Uppsala University, Department of Mathematics Box 480, SE-751 06 Uppsala, Sweden melin@math.uu.se http://www.math.uu.se/~melin
More informationThe Moran Process as a Markov Chain on Leaf-labeled Trees
The Moran Process as a Markov Chain on Leaf-labeled Trees David J. Aldous University of California Department of Statistics 367 Evans Hall # 3860 Berkeley CA 94720-3860 aldous@stat.berkeley.edu http://www.stat.berkeley.edu/users/aldous
More informationA necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees
A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees Yoshimi Egawa Department of Mathematical Information Science, Tokyo University of
More informationRecursive tree processes and the mean-field limit of stochastic flows
Recursive tree processes and the mean-field limit of stochastic flows Tibor Mach Anja Sturm Jan M. Swart December 26, 2018 Abstract Interacting particle systems can often be constructed from a graphical
More information3 - Vector Spaces Definition vector space linear space u, v,
3 - Vector Spaces Vectors in R and R 3 are essentially matrices. They can be vieed either as column vectors (matrices of size and 3, respectively) or ro vectors ( and 3 matrices). The addition and scalar
More informationDecomposing oriented graphs into transitive tournaments
Decomposing oriented graphs into transitive tournaments Raphael Yuster Department of Mathematics University of Haifa Haifa 39105, Israel Abstract For an oriented graph G with n vertices, let f(g) denote
More informationIntroduction A basic result from classical univariate extreme value theory is expressed by the Fisher-Tippett theorem. It states that the limit distri
The dependence function for bivariate extreme value distributions { a systematic approach Claudia Kluppelberg Angelika May October 2, 998 Abstract In this paper e classify the existing bivariate models
More informationL n = l n (π n ) = length of a longest increasing subsequence of π n.
Longest increasing subsequences π n : permutation of 1,2,...,n. L n = l n (π n ) = length of a longest increasing subsequence of π n. Example: π n = (π n (1),..., π n (n)) = (7, 2, 8, 1, 3, 4, 10, 6, 9,
More informationAn easy proof of the ζ(2) limit in the random assignment problem
An easy proof of the ζ(2) limit in the random assignment problem Johan Wästlund Department of Mathematical Sciences, Chalmers University of Technology, S-412 96 Göteborg, Sweden wastlund@chalmers.se Mathematics
More informationAverage Coset Weight Distributions of Gallager s LDPC Code Ensemble
1 Average Coset Weight Distributions of Gallager s LDPC Code Ensemble Tadashi Wadayama Abstract In this correspondence, the average coset eight distributions of Gallager s LDPC code ensemble are investigated.
More informationPERCOLATION IN SELFISH SOCIAL NETWORKS
PERCOLATION IN SELFISH SOCIAL NETWORKS Charles Bordenave UC Berkeley joint work with David Aldous (UC Berkeley) PARADIGM OF SOCIAL NETWORKS OBJECTIVE - Understand better the dynamics of social behaviors
More informationSample Spaces, Random Variables
Sample Spaces, Random Variables Moulinath Banerjee University of Michigan August 3, 22 Probabilities In talking about probabilities, the fundamental object is Ω, the sample space. (elements) in Ω are denoted
More informationRenormalization: An Attack on Critical Exponents
Renormalization: An Attack on Critical Exponents Zebediah Engberg March 15, 2010 1 Introduction Suppose L R d is a lattice with critical probability p c. Percolation on L is significantly differs depending
More informationA class of trees and its Wiener index.
A class of trees and its Wiener index. Stephan G. Wagner Department of Mathematics Graz University of Technology Steyrergasse 3, A-81 Graz, Austria wagner@finanz.math.tu-graz.ac.at Abstract In this paper,
More informationForcing unbalanced complete bipartite minors
Forcing unbalanced complete bipartite minors Daniela Kühn Deryk Osthus Abstract Myers conjectured that for every integer s there exists a positive constant C such that for all integers t every graph of
More informationThe DMP Inverse for Rectangular Matrices
Filomat 31:19 (2017, 6015 6019 https://doi.org/10.2298/fil1719015m Published by Faculty of Sciences Mathematics, University of Niš, Serbia Available at: http://.pmf.ni.ac.rs/filomat The DMP Inverse for
More informationLogarithmic scaling of planar random walk s local times
Logarithmic scaling of planar random walk s local times Péter Nándori * and Zeyu Shen ** * Department of Mathematics, University of Maryland ** Courant Institute, New York University October 9, 2015 Abstract
More informationDYNAMICS ON THE CIRCLE I
DYNAMICS ON THE CIRCLE I SIDDHARTHA GADGIL Dynamics is the study of the motion of a body, or more generally evolution of a system with time, for instance, the motion of two revolving bodies attracted to
More informationDAVID ELLIS AND BHARGAV NARAYANAN
ON SYMMETRIC 3-WISE INTERSECTING FAMILIES DAVID ELLIS AND BHARGAV NARAYANAN Abstract. A family of sets is said to be symmetric if its automorphism group is transitive, and 3-wise intersecting if any three
More informationThe Probability of Pathogenicity in Clinical Genetic Testing: A Solution for the Variant of Uncertain Significance
International Journal of Statistics and Probability; Vol. 5, No. 4; July 2016 ISSN 1927-7032 E-ISSN 1927-7040 Published by Canadian Center of Science and Education The Probability of Pathogenicity in Clinical
More informationAn Analog Analogue of a Digital Quantum Computation
An Analog Analogue of a Digital Quantum Computation arxiv:quant-ph/9612026v1 6 Dec 1996 Edard Farhi Center for Theoretical Physics Massachusetts Institute of Technology Cambridge, MA 02139 Sam Gutmann
More informationThe Minesweeper game: Percolation and Complexity
The Minesweeper game: Percolation and Complexity Elchanan Mossel Hebrew University of Jerusalem and Microsoft Research March 15, 2002 Abstract We study a model motivated by the minesweeper game In this
More informationShort-length routes in low-cost networks via Poisson line patterns
Short-length routes in low-cost networks via Poisson line patterns (joint work with David Aldous) Wilfrid Kendall w.s.kendall@warwick.ac.uk Stochastic processes and algorithms workshop, Hausdorff Research
More informationOptimality of Belief Propagation for Random Assignment Problem
Optimality of Belief Propagation for andom Assignment Problem J. Salez and D. Shah Abstract he assignment problem concerns finding the minimum-cost perfect matching in a complete weighted n n bipartite
More informationInfinitely iterated Brownian motion
Mathematics department Uppsala University (Joint work with Nicolas Curien) This talk was given in June 2013, at the Mittag-Leffler Institute in Stockholm, as part of the Symposium in honour of Olav Kallenberg
More informationEmpirical Processes: General Weak Convergence Theory
Empirical Processes: General Weak Convergence Theory Moulinath Banerjee May 18, 2010 1 Extended Weak Convergence The lack of measurability of the empirical process with respect to the sigma-field generated
More informationAn Application of Catalan Numbers on Cayley Tree of Order 2: Single Polygon Counting
BULLETIN of the Malaysian Mathematical Sciences Society http://math.usm.my/bulletin Bull. Malays. Math. Sci. Soc. (2) 31(2) (2008), 175 183 An Application of Catalan Numbers on Cayley Tree of Order 2:
More informationThe Skorokhod reflection problem for functions with discontinuities (contractive case)
The Skorokhod reflection problem for functions with discontinuities (contractive case) TAKIS KONSTANTOPOULOS Univ. of Texas at Austin Revised March 1999 Abstract Basic properties of the Skorokhod reflection
More informationMi-Hwa Ko. t=1 Z t is true. j=0
Commun. Korean Math. Soc. 21 (2006), No. 4, pp. 779 786 FUNCTIONAL CENTRAL LIMIT THEOREMS FOR MULTIVARIATE LINEAR PROCESSES GENERATED BY DEPENDENT RANDOM VECTORS Mi-Hwa Ko Abstract. Let X t be an m-dimensional
More informationbe a deterministic function that satisfies x( t) dt. Then its Fourier
Lecture Fourier ransforms and Applications Definition Let ( t) ; t (, ) be a deterministic function that satisfies ( t) dt hen its Fourier it ransform is defined as X ( ) ( t) e dt ( )( ) heorem he inverse
More informationMath 249B. Geometric Bruhat decomposition
Math 249B. Geometric Bruhat decomposition 1. Introduction Let (G, T ) be a split connected reductive group over a field k, and Φ = Φ(G, T ). Fix a positive system of roots Φ Φ, and let B be the unique
More informationNote on the structure of Kruskal s Algorithm
Note on the structure of Kruskal s Algorithm Nicolas Broutin Luc Devroye Erin McLeish November 15, 2007 Abstract We study the merging process when Kruskal s algorithm is run with random graphs as inputs.
More informationCHARACTERIZATION OF ULTRASONIC IMMERSION TRANSDUCERS
CHARACTERIZATION OF ULTRASONIC IMMERSION TRANSDUCERS INTRODUCTION David D. Bennink, Center for NDE Anna L. Pate, Engineering Science and Mechanics Ioa State University Ames, Ioa 50011 In any ultrasonic
More informationSTATC141 Spring 2005 The materials are from Pairwise Sequence Alignment by Robert Giegerich and David Wheeler
STATC141 Spring 2005 The materials are from Pairise Sequence Alignment by Robert Giegerich and David Wheeler Lecture 6, 02/08/05 The analysis of multiple DNA or protein sequences (I) Sequence similarity
More informationN-bit Parity Neural Networks with minimum number of threshold neurons
Open Eng. 2016; 6:309 313 Research Article Open Access Marat Z. Arslanov*, Zhazira E. Amirgalieva, and Chingiz A. Kenshimov N-bit Parity Neural Netorks ith minimum number of threshold neurons DOI 10.1515/eng-2016-0037
More informationA Proof of a Conjecture of Buck, Chan, and Robbins on the Expected Value of the Minimum Assignment
A Proof of a Conjecture of Buck, Chan, and Robbins on the Expected Value of the Minimum Assignment Johan Wästlund Department of Mathematics, Linköping University, S-58 83 Linköping, Sweden; e-mail: jowas@mai.liu.se
More informationMinimax strategy for prediction with expert advice under stochastic assumptions
Minimax strategy for prediction ith expert advice under stochastic assumptions Wojciech Kotłosi Poznań University of Technology, Poland otlosi@cs.put.poznan.pl Abstract We consider the setting of prediction
More informationEstimates for probabilities of independent events and infinite series
Estimates for probabilities of independent events and infinite series Jürgen Grahl and Shahar evo September 9, 06 arxiv:609.0894v [math.pr] 8 Sep 06 Abstract This paper deals with finite or infinite sequences
More informationTREE AND GRID FACTORS FOR GENERAL POINT PROCESSES
Elect. Comm. in Probab. 9 (2004) 53 59 ELECTRONIC COMMUNICATIONS in PROBABILITY TREE AND GRID FACTORS FOR GENERAL POINT PROCESSES ÁDÁM TIMÁR1 Department of Mathematics, Indiana University, Bloomington,
More informationarxiv: v2 [math.pr] 4 Sep 2017
arxiv:1708.08576v2 [math.pr] 4 Sep 2017 On the Speed of an Excited Asymmetric Random Walk Mike Cinkoske, Joe Jackson, Claire Plunkett September 5, 2017 Abstract An excited random walk is a non-markovian
More informationLogistic Regression. Machine Learning Fall 2018
Logistic Regression Machine Learning Fall 2018 1 Where are e? We have seen the folloing ideas Linear models Learning as loss minimization Bayesian learning criteria (MAP and MLE estimation) The Naïve Bayes
More informationErdős-Renyi random graphs basics
Erdős-Renyi random graphs basics Nathanaël Berestycki U.B.C. - class on percolation We take n vertices and a number p = p(n) with < p < 1. Let G(n, p(n)) be the graph such that there is an edge between
More informationNotes on uniform convergence
Notes on uniform convergence Erik Wahlén erik.wahlen@math.lu.se January 17, 2012 1 Numerical sequences We begin by recalling some properties of numerical sequences. By a numerical sequence we simply mean
More informationConsider this problem. A person s utility function depends on consumption and leisure. Of his market time (the complement to leisure), h t
VI. INEQUALITY CONSTRAINED OPTIMIZATION Application of the Kuhn-Tucker conditions to inequality constrained optimization problems is another very, very important skill to your career as an economist. If
More informationOn Almost Complete Caps in PG(N, q)
BLGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 8 No 5 Special Thematic Issue on Optimal Codes and Related Topics Sofia 08 Print ISSN: 3-970; Online ISSN: 34-408 DOI: 0478/cait-08-000
More informationLinear models: the perceptron and closest centroid algorithms. D = {(x i,y i )} n i=1. x i 2 R d 9/3/13. Preliminaries. Chapter 1, 7.
Preliminaries Linear models: the perceptron and closest centroid algorithms Chapter 1, 7 Definition: The Euclidean dot product beteen to vectors is the expression d T x = i x i The dot product is also
More informationEXPLICIT CONSTANTS IN AVERAGES INVOLVING THE MULTIPLICATIVE ORDER
EXPLICIT CONSTANTS IN AVERAGES INVOLVING THE MULTIPLICATIVE ORDER KIM, SUNGJIN DEPARTMENT OF MATHEMATICS UNIVERSITY OF CALIFORNIA, LOS ANGELES MATH SCIENCE BUILDING 667A E-MAIL: 70707@GMAILCOM Abstract
More informationFirst Order Convergence and Roots
Article First Order Convergence and Roots Christofides, Demetres and Kral, Daniel Available at http://clok.uclan.ac.uk/17855/ Christofides, Demetres and Kral, Daniel (2016) First Order Convergence and
More informationLong run input use-input price relations and the cost function Hessian. Ian Steedman Manchester Metropolitan University
Long run input use-input price relations and the cost function Hessian Ian Steedman Manchester Metropolitan University Abstract By definition, to compare alternative long run equilibria is to compare alternative
More informationLOCAL CONVERGENCE OF GRAPHS AND ENUMERATION OF SPANNING TREES. 1. Introduction
LOCAL CONVERGENCE OF GRAPHS AND ENUMERATION OF SPANNING TREES MUSTAZEE RAHMAN 1 Introduction A spanning tree in a connected graph G is a subgraph that contains every vertex of G and is itself a tree Clearly,
More informationA new characterization of endogeny
A new characterization of endogeny Tibor Mach Anja Sturm Jan M. Swart October 1, 2018 Abstract Aldous and Bandyopadhyay have shown that each solution to a recursive distributional equation (RDE) gives
More informationJim Pitman. Department of Statistics. University of California. June 16, Abstract
The asymptotic behavior of the Hurwitz binomial distribution Jim Pitman Technical Report No. 5 Department of Statistics University of California 367 Evans Hall # 386 Berkeley, CA 9472-386 June 16, 1998
More informationPermutation groups/1. 1 Automorphism groups, permutation groups, abstract
Permutation groups Whatever you have to do with a structure-endowed entity Σ try to determine its group of automorphisms... You can expect to gain a deep insight into the constitution of Σ in this way.
More informationTHE CONE OF BETTI TABLES OVER THREE NON-COLLINEAR POINTS IN THE PLANE
JOURNAL OF COMMUTATIVE ALGEBRA Volume 8, Number 4, Winter 2016 THE CONE OF BETTI TABLES OVER THREE NON-COLLINEAR POINTS IN THE PLANE IULIA GHEORGHITA AND STEVEN V SAM ABSTRACT. We describe the cone of
More information1 Introduction CLASSES OF STANDARD GAUSSIAN RANDOM VARIABLES AND THEIR GENERALIZATIONS. Acta Wasaensia 1. Wolf-Dieter Richter University of Rostock
Acta Wasaensia 1 CLASSES OF STANDARD GAUSSIAN RANDOM VARIABLES AND THEIR GENERALIZATIONS Wolf-Dieter Richter University of Rostock 1 Introduction Numerous results on the skeed normal distribution and its
More informationRandom Bernstein-Markov factors
Random Bernstein-Markov factors Igor Pritsker and Koushik Ramachandran October 20, 208 Abstract For a polynomial P n of degree n, Bernstein s inequality states that P n n P n for all L p norms on the unit
More informationThe interface of statistical physics, algorithmic theory, and
Scaling and universality in continuous length combinatorial optimization David Aldous and Allon G. Percus Department of Statistics, University of California, Berkeley, CA 94720-3860; and Computer and Computational
More informationApplications of the Lopsided Lovász Local Lemma Regarding Hypergraphs
Regarding Hypergraphs Ph.D. Dissertation Defense April 15, 2013 Overview The Local Lemmata 2-Coloring Hypergraphs with the Original Local Lemma Counting Derangements with the Lopsided Local Lemma Lopsided
More informationPerron eigenvector of the Tsetlin matrix
Linear Algebra and its Applications 363 (2003) 3 16 wwwelseviercom/locate/laa Perron eigenvector of the Tsetlin matrix RB Bapat Indian Statistical Institute, Delhi Centre, 7 SJS Sansanwal Marg, New Delhi
More informationPhase transitions in discrete structures
Phase transitions in discrete structures Amin Coja-Oghlan Goethe University Frankfurt Overview 1 The physics approach. [following Mézard, Montanari 09] Basics. Replica symmetry ( Belief Propagation ).
More informationConnectivity of addable graph classes
Connectivity of addable graph classes Paul Balister Béla Bollobás Stefanie Gerke July 6, 008 A non-empty class A of labelled graphs is weakly addable if for each graph G A and any two distinct components
More informationDependent percolation: some examples and multi-scale tools
Dependent percolation: some examples and multi-scale tools Maria Eulália Vares UFRJ, Rio de Janeiro, Brasil 8th Purdue International Symposium, June 22 I. Motivation Classical Ising model (spins ±) in
More informationOn distribution functions of ξ(3/2) n mod 1
ACTA ARITHMETICA LXXXI. (997) On distribution functions of ξ(3/2) n mod by Oto Strauch (Bratislava). Preliminary remarks. The question about distribution of (3/2) n mod is most difficult. We present a
More informationA = A U. U [n] P(A U ). n 1. 2 k(n k). k. k=1
Lecture I jacques@ucsd.edu Notation: Throughout, P denotes probability and E denotes expectation. Denote (X) (r) = X(X 1)... (X r + 1) and let G n,p denote the Erdős-Rényi model of random graphs. 10 Random
More informationPROTECTED NODES AND FRINGE SUBTREES IN SOME RANDOM TREES
PROTECTED NODES AND FRINGE SUBTREES IN SOME RANDOM TREES LUC DEVROYE AND SVANTE JANSON Abstract. We study protected nodes in various classes of random rooted trees by putting them in the general context
More informationChordal Graphs, Interval Graphs, and wqo
Chordal Graphs, Interval Graphs, and wqo Guoli Ding DEPARTMENT OF MATHEMATICS LOUISIANA STATE UNIVERSITY BATON ROUGE, LA 70803-4918 E-mail: ding@math.lsu.edu Received July 29, 1997 Abstract: Let be the
More informationThe Tightness of the Kesten-Stigum Reconstruction Bound for a Symmetric Model With Multiple Mutations
The Tightness of the Kesten-Stigum Reconstruction Bound for a Symmetric Model With Multiple Mutations City University of New York Frontier Probability Days 2018 Joint work with Dr. Sreenivasa Rao Jammalamadaka
More informationA statistical mechanical interpretation of algorithmic information theory
A statistical mechanical interpretation of algorithmic information theory Kohtaro Tadaki Research and Development Initiative, Chuo University 1 13 27 Kasuga, Bunkyo-ku, Tokyo 112-8551, Japan. E-mail: tadaki@kc.chuo-u.ac.jp
More information