Avoiding Forbidden Submatrices by Row Deletions

Size: px
Start display at page:

Download "Avoiding Forbidden Submatrices by Row Deletions"

Transcription

1 Avoiding Forbidden Submatrice by Row Deletion Sebatian Wernicke, Jochen Alber, Jen Gramm, Jiong Guo, and Rolf Niedermeier Wilhelm-Schickard-Intitut für Informatik, niverität Tübingen, Sand 13, D Tübingen, Fed. Rep. of Germany Abtract. We initiate a ytematic tudy of the Row Deletion(B) problem on matrice: For a fixed forbidden ubmatrix B, the quetion i, given an input matrix A (both A and B have entrie choen from a finite-ize alphabet), to remove a minimum number of row uch that A ha no ubmatrix which i equivalent to a row or column permutation of B. An application of thi quetion can be found, e.g., in the contruction of perfect phylogenie. Etablihing a trong connection to variant of the NP-complete Hitting Set problem, we how that for mot matrice B Row Deletion(B) i NP-complete. On the poitive ide, the relation with Hitting Set problem yield contant-factor approximation algorithm and fixed-parameter tractability reult. 1 Introduction Forbidden ubgraph problem play an important role in graph theory and algorithm (cf., e.g., [1, Chapter 7]). For intance, in an application concerned with graph-modeled clutering of biological data [9] one i intereted in modifying a given graph by a few edge deletion a poible uch that the reulting graph conit of a dijoint union of clique (a o-called cluter graph). Exact (fixedparameter) algorithm to olve thi NP-complete problem make ue of the fact that a graph i a cluter graph iff it contain no vertex-induced path of three vertice a a ubgraph [3, 4]. There i a rich literature dealing with uch graph modification problem, cf., e.g., [6] many problem here being NP-complete. By way of contrat, in thi paper we tart the o far eemingly widely neglected invetigation of forbidden ubmatrix problem from an algorithmic point of view. Here, given an input matrix A and a fixed matrix B, the baic quetion i whether B i induced by A. Thi mean that a permutation B of B that i, B can be tranformed into B by a finite erie of row and column wapping can be obtained from A by row and column deletion. Thi work tudie correponding matrix modification problem where, given A and a fixed B, we are aked Supported by the Deutche Forchunggemeinchaft (DFG), project PEAL (parameterized complexity and exact algorithm), NI 369/1; project OPAL (optimal olution for hard problem in computational biology), NI 369/2; junior reearch group PIAF (fixed-parameter algorithm), NI 369/4.

2 to remove a few row from A a poible uch that the reulting matrix no longer induce B. Forbidden ubmatrix problem, e.g., are motivated by quetion of computational biology concerning the contruction of perfect phylogenie [8, 10]. Here, a binary input matrix A allow for a perfect phylogeny iff A doe not induce the ubmatrix B coniting of the row (1, 1), (1, 0), and (0, 1) (ee [8, 10] for detail). We initiate a ytematic tudy of matrix modification problem concerning the complexity of row deletion for forbidden ubmatrice. Our main reult i to etablih a very cloe link between many of thee problem and retricted verion of the NP-complete Hitting Set problem [2]. We decribe and analyze tructure of the forbidden ubmatrix B which make the correponding row deletion problem equivalent to particular verion of Hitting Set. On the negative ide, thi implie NP-completene for mot row deletion matrix modification problem, holding already for binary alphabet. On the poitive ide, we can alo how that approximation and fixed-parameter tractability reult for Hitting Set carry over to the correponding row deletion problem. To the bet of our knowledge, no uch ytematic tudy ha been undertaken o far. We are only aware of the related work of Klinz et al. [5] dealing with the permutation of matrice (without conidering row deletion) in order to avoid forbidden ubmatrice. There, however, they conider the cae of permuting row and column of the big matrix A to obtain a matrix A uch that A cannot be tranformed into a fixed matrix B by row and column deletion. Among other thing, they how NP-completene for the general deciion problem. The paper i tructured a follow. In Section 2, we tart with the baic definition and ome eay obervation. After that, in Section 3, the main reult of the work are preented, giving (or ketching) everal parameter-preerving reduction (the core tool of thi paper) from Hitting Set problem to Row Deletion(B) for variou type of the forbidden ubmatrix B. Then, in Section 4 we how how Row Deletion(B) can be olved uing algorithm for Hitting Set problem, again uing a parameter-preerving reduction. Finally, we end with ome concluding remark and open problem in Section 5. Due to the lack of pace, everal proof have been omitted or hortened in thi article, more detail can be found in [11]. 2 Definition and Preliminarie All matrice in thi work have entrie from an alphabet Σ of fixed ize l; we call thee matrice l-ary. Note, however, that all computational hardne reult already hold for binary alphabet. The central problem Row Deletion(B) for a fixed matrix B i defined a follow. Input: A matrix A and a nonnegative integer k. Quetion: ing at mot k row deletion, can A be tranformed into a matrix A uch that A doe not induce B? Herein, A induce B if there exit a B obtained from B through a finite erie of row and column wapping uch that B can be obtained from A by row and

3 column removal. The remaining row and column of A reulting in B are called occurrence of B in A. A matrix A i B-free if B i not induced by A. Thi work etablihe trong link between Row Deletion(B) and the d- Hitting Set problem for contant d, which i defined a follow. Input: A collection C of ubet of ize at mot d of a finite et S and a nonnegative integer k. Quetion: I there a ubet S S with S k uch that S contain at leat one element from each ubet in C? Already for d = 2, d-hitting Set i NP-complete [2]. To expre the cloene between variant of Row Deletion(B) and d- Hitting Set for variou d, we need the following trong notion of reducibility. Let (S, C, k) be an intance of d-hitting Set. We ay that there i a parameter-preerving reduction from d-hitting Set to Row Deletion(B) if there i a polynomial time algorithm that tranform (S, C) into a matrix A and (S, C, k) i a true-intance of d-hitting Set iff (A, k) i a true-intance of Row Deletion(B). The important obervation here i that the objective value parameter k remain unchanged. Thi make it poible to link approximation and exact (fixed-parameter) algorithm for both problem. Finally, for actually performing row deletion in the input matrix A of Row Deletion(B), it i neceary to find the et of row in A that induce B. A traightforward algorithm yield the following. Propoition 1 Given an n m matrix A and a fixed r matrix B (where 1 r n and 1 m), we can find all ize-r et of row in A that induce B in O(n r m r!) wort-cae time. Oberve that Propoition 1 give a pure wort-cae etimation not making ue, e.g., of the pecial tructure of the repective B. In any cae, however, for contant value of r and the running time i polynomial. 3 Computational Hardne In thi ection, we explore the relative computational hardne of Row Deletion(B) by tudying it relationhip to d-hitting Set. We point out many cae concerning the tructure of B for which Row Deletion(B) i at leat a hard a d-hitting Set for ome d depending only on B. Summary of reult. The key idea behind all reduction from d-hitting Set to Row Deletion(B) i to chooe a ymbol from the alphabet Σ and to decompoe B in a certain manner into four ubmatrice, one of them coniting only of and one of them which doe not contain. We can then ue the latter ubmatrix to encode a given d-hitting Set intance into an intance of Row Deletion(B) (i.e., a matrix A) and ue a a fill-in ymbol to prevent unwanted occurrence of B in A.

4 B non-encoding part r B permutation r r V W V W Σ, V i -free encoding part Fig. 1. General cheme for the -decompoition of a matrix B over the alphabet. We call thi pecial decompoition of the forbidden ubmatrix B a -decompoition, illutrated in Fig. 1 and formally defined a follow: Definition 1. (-decompoition) Given an l-ary r matrix B = (b ij ) over the alphabet Σ. A permutation B of B i called a -decompoition of B if there exit a Σ and there exit r, r,, with r + r = r, + = uch that (1) r > 0 and > 0, (2) 1 i r, 1 j : b ij (call thi upper left ubmatrix V ) and (3) r < i r, 1 j : b ij =. The upper right r ubmatrix (b ij ) 1 i r, <j of B i called W, the lower right r ubmatrix (b ij ) r <i r, <j i referred to a. The left part (b ij ) 1 i r,1 j of B (the one containing V ) i called the encoding part of B. The right part (b ij ) 1 i r, <j of B (the one coniting of W and ) i called the non-encoding part of B. For a given Σ, a correponding -decompoition can be eaily computed in time linearly depending on the ize of B (detail omitted). In the following hardne proof, the height of V play a crucial role. Our main hardne reult then are the following. Theorem 1. Let B be a forbidden ubmatrix of ize r with a -decompoition B where the ubmatrix V (of height r ) of B i not induced in the nonencoding part of B. Then there exit a parameter-preerving reduction from r -Hitting Set to Row Deletion(B). Hence, if r 2, Row Deletion(B) i NP-complete. Clearly, it i poible that V i induced in the non-encoding part of B. In particular, then each column vector of V i induced at leat once in the nonencoding part. If we can find one column vector of V which i induced at mot once in the non-encoding part, we again are able to achieve a hardne reult for Row Deletion(B): 1 1 Oberve that it i poible to contruct a ubmatrix B which fulfill the prerequiite of Theorem 1, but doe not fulfill the prerequiite of Theorem 2, and vice vera.

5 Theorem 2. If the r ubmatrix B ha a -decompoition B where the ubmatrix V of height r ha a column vector v that i induced at mot once in the non-encoding part of B, then r -Hitting Set i parameter-preerving reducible to Row Deletion(B). If the ubmatrix B doe not fulfill any of the two prerequiite from Theorem 1 or 2, we can determine two further ubcae for which a hardne reult can be etablihed: Theorem 3. Let B be a forbidden r ubmatrix with a -decompoition B where all entrie of are equal to and V contain r row. Then r -Hitting Set i parameter-preerving reducible to Row Deletion(B). Theorem 4. Let B be a forbidden r ubmatrix with a -decompoition B where all entrie of W are equal to and V contain r row. Then r -Hitting Set i parameter-preerving reducible to Row Deletion(B). For all other cae, i.e., if B doe not fulfill any of the prerequiite from Theorem 1 4, we are not aware of a general tatement on the complexity ) of Row Deletion(B). A an example of uch a matrix conider B = over ( the alphabet Σ = {0, 1}. It i alo clear that Row Deletion(B) i not NP-hard for all B. For example, Row Deletion(B) i olvable in polynomial time if B i a 1 1-matrix. Beide, there are alo non-trivial example for which Row Deletion(B) i olvable in polynomial time, a the matrix B = ( 1 0 ) over the alphabet Σ = {0, 1} how: Oberve that a B-free matrix A ha the property that all it column conit either olely of 1 or olely of 0, i.e., all row of A are identical. Thi implie that the minimum number of row that need to be deleted in order to make an n m matrix B-free i equal to n x, where x denote the ize of the larget et of identical row in A, which can be determined efficiently. Oberve, however, that Row Deletion(B) for B = ( 1 1 ) over the alphabet Σ = {0, 1} already i NP-complete by Theorem 1, ince B trivially ha a - decompoition with = 0, V = B, and W = =. Outline of hardne proof. A mentioned above, all hardne reult are proven by encoding an intance (S, C, k) of d-hitting Set where the value of d i determined by the forbidden ubmatrix B a an intance (A, k) of Row Deletion(B). The key idea concerning how to ue a given -decompoition of B to encode a d-hitting Set intance i illutrated by the following proof of Theorem 3. Subequently, we indicate how thi contruction can be extended to prove, in acending involvedne of the contruction, Theorem 4, Theorem 1, and Theorem 2. Note that due to lack of pace and for a better undertandability of the key idea involved, part of ome proof are only ketched; for their detail, refer to [11]. Proof (Theorem 3). Given an intance (S, C, k) of r -Hitting Set and a - decompoition B of the forbidden r ubmatrix B. Let S = {1,...,n} and

6 C = {{1,3,6},..., {3,5, n},..., {1,3,5}} 3 V W A -decompoition of the forbidden ubmatrix B S C = {{1,3,6},..., {3,5, n},..., {1,3,5}} S = {1,..., n} k An intance of 3-Hitting Set n C The 3-Hitting Set intance encoded into a Row Deletion(B) intance Fig. 2. An example reduction from 3-Hitting Set to Row Deletion(B) following from the proof of Theorem 3 (illutrated for the cae where r = r). C = {C 1,...,C m }. For now, aume that r = r r = 0 (i.e., B conit only of V and W). We generate a matrix A of ize n ( m). Each row of A correpond to an element in S. For each et C C, one occurrence of B i encoded into conecutive column of A, uing the row that correpond to the element in C. For example, conider C h C, 1 h m, with C h = {z 1,...,z r } and z 1,...,z r {1,..., n}. Then, we generate the ubmatrix (a ij ) 1 i n,(h 1) <j h of A uch that the z i th row of thi ubmatrix equal the ith row of B, for all i = 1,...,r, and all other row of thi ubmatrix are et equal to (an illutration for thi i provided in Fig. 2). In thi way, A contain m block of conecutive column where each block induce B exactly once. Thee are the only occurrence of B, ince two column from two different block cannot have r row containing no. Oberve how the property of A that B i only induced within each block and, furthermore, exactly once in each block, i due to uing a a fill-in ymbol: Since i not contained in V, we enure that, by uing a the default-entry for A, no additional occurrence of V (and therefore B) are induced in the row of a block other than the one intended. The outlined reduction can be performed in O(n m ) time. The contruction i eaily generalized for the cae where r < r, i.e., r > 0, by adding r + k row containing only at the bottom of A. Note that by thi contruction, although B i induced multiple time in each block, V i induced only once in each block. It can eaily be hown that olution to the original intance of r -Hitting Set have a 1:1-correpondence with olution to Row Deletion(B) on A: Aume that we have a olution S to the original intance of r -Hitting Set with S = k. Then, delete thoe row in A that correpond to the element

7 in S, thu obtaining A. Note that then, from the ubmatrix V of each B that wa encoded into A, at leat one row ha been deleted. Every column in A contain le than r ymbol different from. Thi directly implie that V doe not occur in A, and therefore A i B-free. We have a olution for the Row Deletion(B) intance with k row deletion. Aume that by deleting at mot k row in A we can make A B-free. Note that we cannot detroy any of the induced B in A by deleting at mot k of the bottom r + k row of A. Therefore, it mut be poible to delete at mot k of the top n row of A to make A B-free. Furthermore, from each induced B in A, at leat one row mut have been deleted. Thu, chooing the element in S that correpond to the deleted row into a et S yield a olution of ize k to the original r -Hitting Set problem. The idea of the above proof uing the ubmatrix V of B to encode an intance of d-hitting Set i employed in all of the following proof. In order to how the 1:1-correpondence of the original d-hitting Set problem and the generated Row Deletion(B) intance, mainly two condition need to be fulfilled: Condition (1): If the optimal olution to the d-hitting Set intance ha ize k, there are no cheaper olution for the generated Row Deletion(B) intance. Condition (2): If there i a olution of ize k to the original d-hitting Set intance, deleting the correponding row in A detroy all occurrence of B in A. Whilt Condition (1) i rather traightforward to meet by extending the idea of the above proof, Condition (2) i quite intricate to fulfill in general, becaue it mut be enured that part of B encoded into A due to different et in C do not induce additional occurrence of B. Proof (Theorem 4). Given an intance of r-hitting Set and a -decompoition for the forbidden ubmatrix B, the reulting matrix A of thi proof reduction i compoed of four ubmatrice: The upper left ubmatrix i generated by the encoding cheme preented in the proof of Theorem 3 uing V a the forbidden ubmatrix, the upper right and lower left ubmatrice are filled with. Two cae are ditinguihed for writing into the lower right ubmatrix of A: If doe not induce V (Cae I), the lower right ubmatrix ha ize (k+1)r (k+1) and contain k + 1 time the matrix in a diagonal cheme. If induce V (Cae II), the lower right ubmatrix ha ize (k + 1)r and contain k + 1 copie of the two cae are illutrated by Fig. 3. Oberve that the reduction for Cae I keep the right part of A V -free. Recall that a ingle by itelf cannot induce V according to the prerequiite of Cae I. However, if we would encode occurrence of one upon the other a for Cae II, on the one hand, V could be induced by row from different encoding of in the lower right part of A. On the other hand, could be induced by everal encoding of V in the upper left part of A. Conequently, we would

8 Encoding of the r -Hitting Set intance uing the reduction cheme from Theorem 3 and V a the forbidden ubmatrix Cae I: i V -free r r r (C,S,k) An intance of r -Hitting Set V A -decompoition of the forbidden ubmatrix B S (k + 1)r.... C... Encoding of the r -Hitting Set intance into a Row Deletion(B) problem (k + 1) Cae II: induce V Fig. 3. Illutration of the reduction in the proof of Theorem 4. have unwanted occurrence of B. The diagonal cheme avoid thee unwanted occurrence of V and keep in particular the right part of A B-free. In Cae II, the reduction cannot keep the right part of A V -free becaue already a ingle occurrence of induce V. However, B cannot be induced there becaue the reduction doe not provide enough column for an occurrence of B. Therefore, if we detroy all induced V in the upper left part of A, then cannot be induced in the left part of A due to the prerequiite of Cae II. Then, the matrix A can be made B-free, even if there are ome occurrence of V in the right part of A. Now, we how the 1:1-correpondence of the olution: Aume that we have a olution S to the encoded r -Hitting Set intance. Then, delete thoe of the n topmot row in A that correpond to the element in S, obtaining A. Note that thi detroy all occurrence of V in the left part of A (enuring Condition (2)). For Cae I, thi directly implie that A i V -free and therefore B-free. For Cae II, recall that B i not induced in the right part of A ince we can find no ufficiently large et of column uch that both and V are induced there. But recall that ince V i not induced in the left part of A, thi alo mean that i not induced there. Hence, A i B-free. Aume that by deleting k row, we can make A B-free. Note that by deleting one of the (k +1)r bottommot row in A, we can detroy at mot one induced B in A. Therefore, there i an optimal olution to Row Deletion(B) that involve only the deletion of k of the n topmot row of A. The ret of the argument follow from the proof of Theorem 3: If, by deleting k of the n topmot row of A, we can make A B-free, then from each V encoded into the

9 Encoding of the r -Hitting Set intance uing the cheme from Theorem 3 and V a the forbidden ubmatrix Encoding of the r -Hitting Set intance uing the cheme from Theorem 3 and W a the forbidden ubmatrix (C,S,k) An intance of r -Hitting Set S r r r V W A -decompoition of the forbidden ubmatrix B r C C C Encoding of the r -Hitting Set intance into a Row Deletion(B) problem Fig. 4. Reduction from r -Hitting Set to Row Deletion(B) ued in the proof of Theorem 1. left part of A, at leat one row mut have been deleted (enuring Condition (1)). Since each encoded V correpond directly to a et in C, chooing the element in S that correpond to the deleted row in A yield a olution to the original r -Hitting Set intance. Proof (Theorem 1). [Sketch] A illutrated in Fig. 4, thi reduction i imilar to the one ued in the proof for Cae I of Theorem 4. The reulting matrix A i again compoed of four ubmatrice, the reduction only differ in the contruction of the upper right ubmatrix of A. In the upper right ubmatrix of A, the given r -Hitting Set intance i encoded uing the cheme from the proof of Theorem 3 and W a the forbidden ubmatrix. A in the previou two proof, the parameter k i preerved and the encoding can be carried out in polynomial time with repect to the input ize. A in the proof of Theorem 4, the encoding proce enure that B i not induced in the right part of A. Thi i due to the following obervation: Aume that B i induced in the right part of A. Then, V i induced there a well. By the prerequiite of the theorem, the non-encoding part of B doe not induce V. Therefore, an occurrence of V involve column from at leat two different encoding of. However, note that any two uch column of A can due to the encoding cheme only have le than r row that do not contain a. But V ha r row with no ymbol equal to, a contradiction.

10 Now note that by deleting one of the r C bottom row in A, we can detroy at mot one induced ubmatrix B in A thi could alway be achieved by deleting one of the S topmot row of A. Therefore, every olution of the produced Row Deletion(B) intance can be tranlated to one deleting only row from the topmot S row. From the econd obervation it i clear that an optimal olution of Row Deletion(B) can only conit of the n topmot row of A. The element of S that correpond to the deleted row form a olution for the original r -Hitting Set intance, uing the ame argument a in the previou proof. Converely, if we have a olution of ize at mot k to the original r -Hitting Set intance, deleting the correponding row in A detroy all occurrence of V in A due to the firt obervation and make A B-free. Hence, every olution to the r - Hitting Set intance (S, C, k) implie a olution to the Row Deletion(B) intance (A, k) and vice vera. The cheme and idea of the above proof are alo ued in proving Theorem 2. The detail of the proof are rather involved, firtly etablihing the reult for r 2 matrice and then extending thi reult to obtain Theorem 2. We hall only preent the main idea for the reduction involved, referring to [11] for detail. Proof (Theorem 2). [Reduction cheme for r 2 matrice, key idea] For r 2 matrice that fulfill the prerequiite of the theorem, the reduction i performed a follow: Given an intance of r -Hitting Set, the matrix A i contructed jut a in the proof of Theorem 1. Then, the following algorithm i performed: A long a there are two column in the right part of A whoe upper n entrie are identical to each other, remove one of the two column from A. It i poible to how that after thi merging of column in A, the right part of A i B-free. An extenion of thi cheme from r 2 matrice to all matrice that fulfill the prerequiite of thi theorem i performed by arguing that by being able to avoid the occurrence of an r 2 ubmatrix of B in the right part of A, we are alo able to avoid the occurrence of B there altogether. 4 Algorithmic Tractability Thi ection point out an algorithmic approach to olve Row Deletion(B). To thi end, we give a parameterized reduction to r-hitting Set where r i the number of row in B. Theorem 5. Given a fixed r ubmatrix B, Row Deletion(B) i parameterpreerving reducible to r-hitting Set in O(n r m r!) time. Proof. Given an intance (A, k) of Row Deletion(B) (where A i an n m matrix), we contruct an intance (S, C, k) of r-hitting Set a follow: (1) We contruct a et S = {r 0,...,r n 1 } containing one element for every row in A. (2) We compute a et C of ubet of S: For every et R {r 0,...,r n 1 } with R = r correponding to r row in A that induce B, we add R to C. (3) The

11 r 0 r 1 r 2 r 3 r 4 r 5 c 0 c 1 c 2 c 3 c 4 c 5 c 6 c 7 c 8 c C = {{r 0, r 1, r 3 }, {r 0, r 2, r 3 }, {r 0, r 3, r 5 }, {r 0, r 4, r 5 }, {r 1, r 3, r 4 }, {r 2, r 3, r 4 }} Fig. 5. Illutrating the reduction from Row Deletion(B) to r-hitting Set. Let B be the matrix coniting of row (1,1), (0,1), and (1,0). Given an input matrix A a hown, we generate an r-hitting Set intance coniting of a et S = {r 0, r 1,..., r 5 } and the et C a hown. The gray underlay how, a an example, how B i induced by row r 0, r 3, and r 5 in column c 1 and c 6 of A, leading to the the ubet {r 0, r 3, r 5 } in C. parameter k i directly preerved. Then, (S, C, k) i the reulting r-hitting Set intance. An example for the reduction i illutrated in Fig. 5. The direct 1:1-correpondence between the olution of the r-hitting Set intance and the Row Deletion(B) intance can be hown a follow: Let S S be a olution of ize k to the r-hitting Set intance (S, C, k). We delete the row in A that correpond to the element in S, yielding A. Aume that B were till induced in A by a et I of row. Then, the row in I did induce B in A, meaning a et containing the element correponding to thee row wa put into C. But one row of I mut then have been deleted ince S i a valid olution to (S, C, k), a contradiction. Therefore, B cannot be induced by A anymore. If, on the other hand, A can be made B-free by deleting k row, then for each occurrence of B in A by ome row, at leat one of thee row mut have been deleted. By chooing the element correponding to the deleted row a a olution S S to the generated r-hitting Set intance, we have choen at leat one element from every et in C, making S a valid olution of ize k. The running time follow with Propoition 1. Theorem 5 directly implie the following two poitive reult: The bet known polynomial-time approximation algorithm for r-hitting Set, which currently ha approximation factor r, can be ued to obtain a factor-r approximation for the correponding Row Deletion(B). r-hitting Set can be trivially olved in O(r k n r ) time, where k denote the ize of the olution. Thi mean that for contant r Row Deletion(B) i fixed-parameter tractable with repect to parameter k. See [7] for the currently bet fixed-parameter algorithm for r-hitting Set for intance, the bet exponential term for 3-Hitting Set i known to be 2.27 k intead of only 3 k.

12 5 Concluion In thi work, we have tarted a ytematic tudy on complexity of and algorithm for Row Deletion(B). Among other, we were able to how NP-completene for a number of natural cae of forbidden ubmatrice B. It remain open to generalize all pecial cae treated in thi work, e.g., by proving or diproving the following conjecture: For every forbidden ubmatrix B with at leat three row, Row Deletion(B) i NP-complete. Our work wa partially motivated by contructing perfect phylogenie from binary matrice [8, 10]. For thi pecial cae, where we have to conider a forbidden ubmatrix B coniting of the row (1, 1), (1, 0), and (0, 1), our reult yield that Row Deletion(B) i at leat a hard a 2-Hitting Set (which i the ame a the well-known Vertex Cover problem) and that it alway can be olved by tranforming it into an intance of 3-Hitting Set. Note that there remain a gap between the reult of thi work: Let an r forbidden ubmatrix B have a -decompoition with height-r ubmatrix V. Then, if r > r, we howed, on the one hand, that in certain cae Row Deletion(B) i at leat a hard to olve a r -Hitting Set and, on the other hand, that it i not harder to olve than r-hitting Set. Reference 1. A. Brandtädt, V. B. Le, and J. P. Spinrad. Graph Clae: A Survey. SIAM Monograph on Dicrete Mathematic and Application, M. R. Garey and D. S. Johnon. Computer and Intractability: A Guide to the Theory of NP-Completene. W. H. Freeman, J. Gramm, J. Guo, F. Hüffner, and R. Niedermeier. Graph-modeled data clutering: fixed-parameter algorithm for clique generation. In Proc. of 5th CIAC, volume 2653 of LNCS, page , Springer, J. Gramm, J. Guo, F. Hüffner, and R. Niedermeier. Automated generation of earch tree algorithm for graph modification problem. In Proc. of 11th ESA, volume 2832 of LNCS, page , Springer, B. Klinz, R. Rudolf, and G. J. Woeginger. Permuting matrice to avoid forbidden ubmatrice. Dicrete Applied Mathematic, 60: , A. Natanzon, R. Shamir, and R. Sharan. Complexity claification of ome edge modification problem. Dicrete Applied Mathematic, 113: , R. Niedermeier and P. Romanith. An efficient fixed-parameter algorithm for 3- Hitting Set. Journal of Dicrete Algorithm, 1:89 102, I. Pe er, R. Shamir, and R. Sharan. On the generality of phylogenie from incomplete directed character. In Proc. of 8th SWAT, volume 2368 of LNCS, page , Springer, R. Shamir, R. Sharan, and D. Tur. Cluter graph modification problem. In Proc. of 28th WG, volume 2573 of LNCS, page , Springer, R. Sharan. Graph Modification Problem and their Application to Genomic Reearch. Ph.D. Thei, School of Computer Science, Tel-Aviv niverity, S. Wernicke. On the Algorithmic Tractability of Single Nucleotide Polymorphim (SNP) Analyi and Related Problem. Diploma Thei, WSI für Informatik, niverität Tübingen, September 2003.

Int. Journal of Foundations of CS, Vol. 17(6), pp , 2006

Int. Journal of Foundations of CS, Vol. 17(6), pp , 2006 Int Journal of Foundations of CS, Vol 7(6), pp 467-484, 2006 THE COMPUTATIONAL COMPLEXITY OF AVOIDING FORBIDDEN SUBMATRICES BY ROW DELETIONS SEBASTIAN WERNICKE, JOCHEN ALBER 2, JENS GRAMM 3, JIONG GUO,

More information

Problem Set 8 Solutions

Problem Set 8 Solutions Deign and Analyi of Algorithm April 29, 2015 Maachuett Intitute of Technology 6.046J/18.410J Prof. Erik Demaine, Srini Devada, and Nancy Lynch Problem Set 8 Solution Problem Set 8 Solution Thi problem

More information

List coloring hypergraphs

List coloring hypergraphs Lit coloring hypergraph Penny Haxell Jacque Vertraete Department of Combinatoric and Optimization Univerity of Waterloo Waterloo, Ontario, Canada pehaxell@uwaterloo.ca Department of Mathematic Univerity

More information

LINEAR ALGEBRA METHOD IN COMBINATORICS. Theorem 1.1 (Oddtown theorem). In a town of n citizens, no more than n clubs can be formed under the rules

LINEAR ALGEBRA METHOD IN COMBINATORICS. Theorem 1.1 (Oddtown theorem). In a town of n citizens, no more than n clubs can be formed under the rules LINEAR ALGEBRA METHOD IN COMBINATORICS 1 Warming-up example Theorem 11 (Oddtown theorem) In a town of n citizen, no more tha club can be formed under the rule each club have an odd number of member each

More information

Lecture 21. The Lovasz splitting-off lemma Topics in Combinatorial Optimization April 29th, 2004

Lecture 21. The Lovasz splitting-off lemma Topics in Combinatorial Optimization April 29th, 2004 18.997 Topic in Combinatorial Optimization April 29th, 2004 Lecture 21 Lecturer: Michel X. Goeman Scribe: Mohammad Mahdian 1 The Lovaz plitting-off lemma Lovaz plitting-off lemma tate the following. Theorem

More information

Clustering Methods without Given Number of Clusters

Clustering Methods without Given Number of Clusters Clutering Method without Given Number of Cluter Peng Xu, Fei Liu Introduction A we now, mean method i a very effective algorithm of clutering. It mot powerful feature i the calability and implicity. However,

More information

Multicolor Sunflowers

Multicolor Sunflowers Multicolor Sunflower Dhruv Mubayi Lujia Wang October 19, 2017 Abtract A unflower i a collection of ditinct et uch that the interection of any two of them i the ame a the common interection C of all of

More information

An Inequality for Nonnegative Matrices and the Inverse Eigenvalue Problem

An Inequality for Nonnegative Matrices and the Inverse Eigenvalue Problem An Inequality for Nonnegative Matrice and the Invere Eigenvalue Problem Robert Ream Program in Mathematical Science The Univerity of Texa at Dalla Box 83688, Richardon, Texa 7583-688 Abtract We preent

More information

Chapter 4. The Laplace Transform Method

Chapter 4. The Laplace Transform Method Chapter 4. The Laplace Tranform Method The Laplace Tranform i a tranformation, meaning that it change a function into a new function. Actually, it i a linear tranformation, becaue it convert a linear combination

More information

Codes Correcting Two Deletions

Codes Correcting Two Deletions 1 Code Correcting Two Deletion Ryan Gabry and Frederic Sala Spawar Sytem Center Univerity of California, Lo Angele ryan.gabry@navy.mil fredala@ucla.edu Abtract In thi work, we invetigate the problem of

More information

Bogoliubov Transformation in Classical Mechanics

Bogoliubov Transformation in Classical Mechanics Bogoliubov Tranformation in Claical Mechanic Canonical Tranformation Suppoe we have a et of complex canonical variable, {a j }, and would like to conider another et of variable, {b }, b b ({a j }). How

More information

Convex Hulls of Curves Sam Burton

Convex Hulls of Curves Sam Burton Convex Hull of Curve Sam Burton 1 Introduction Thi paper will primarily be concerned with determining the face of convex hull of curve of the form C = {(t, t a, t b ) t [ 1, 1]}, a < b N in R 3. We hall

More information

Chip-firing game and a partial Tutte polynomial for Eulerian digraphs

Chip-firing game and a partial Tutte polynomial for Eulerian digraphs Chip-firing game and a partial Tutte polynomial for Eulerian digraph Kévin Perrot Aix Mareille Univerité, CNRS, LIF UMR 7279 3288 Mareille cedex 9, France. kevin.perrot@lif.univ-mr.fr Trung Van Pham Intitut

More information

7.2 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 281

7.2 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 281 72 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 28 and i 2 Show how Euler formula (page 33) can then be ued to deduce the reult a ( a) 2 b 2 {e at co bt} {e at in bt} b ( a) 2 b 2 5 Under what condition

More information

Computers and Mathematics with Applications. Sharp algebraic periodicity conditions for linear higher order

Computers and Mathematics with Applications. Sharp algebraic periodicity conditions for linear higher order Computer and Mathematic with Application 64 (2012) 2262 2274 Content lit available at SciVere ScienceDirect Computer and Mathematic with Application journal homepage: wwweleviercom/locate/camwa Sharp algebraic

More information

THE SPLITTING SUBSPACE CONJECTURE

THE SPLITTING SUBSPACE CONJECTURE THE SPLITTING SUBSPAE ONJETURE ERI HEN AND DENNIS TSENG Abtract We anwer a uetion by Niederreiter concerning the enumeration of a cla of ubpace of finite dimenional vector pace over finite field by proving

More information

Symmetric Determinantal Representation of Formulas and Weakly Skew Circuits

Symmetric Determinantal Representation of Formulas and Weakly Skew Circuits Contemporary Mathematic Symmetric Determinantal Repreentation of Formula and Weakly Skew Circuit Bruno Grenet, Erich L. Kaltofen, Pacal Koiran, and Natacha Portier Abtract. We deploy algebraic complexity

More information

Multicast Network Coding and Field Sizes

Multicast Network Coding and Field Sizes Multicat Network Coding and Field Size Qifu (Tyler) Sun, Xunrui Yin, Zongpeng Li, and Keping Long Intitute of Advanced Networking Technology and New Service, Univerity of Science and Technology Beijing,

More information

arxiv: v1 [math.mg] 25 Aug 2011

arxiv: v1 [math.mg] 25 Aug 2011 ABSORBING ANGLES, STEINER MINIMAL TREES, AND ANTIPODALITY HORST MARTINI, KONRAD J. SWANEPOEL, AND P. OLOFF DE WET arxiv:08.5046v [math.mg] 25 Aug 20 Abtract. We give a new proof that a tar {op i : i =,...,

More information

Interval Deletion is Fixed-Parameter Tractable

Interval Deletion is Fixed-Parameter Tractable 0 Interval Deletion i Fixed-Parameter Tractable YIXIN CAO and DÁNIEL MARX, Hungarian Academy of Science (MTA SZTAKI) We tudy the minimum interval deletion problem, which ak for the removal of a et of at

More information

ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION. Xiaoqun Wang

ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION. Xiaoqun Wang Proceeding of the 2008 Winter Simulation Conference S. J. Maon, R. R. Hill, L. Mönch, O. Roe, T. Jefferon, J. W. Fowler ed. ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION Xiaoqun Wang

More information

Theoretical Computer Science. Optimal algorithms for online scheduling with bounded rearrangement at the end

Theoretical Computer Science. Optimal algorithms for online scheduling with bounded rearrangement at the end Theoretical Computer Science 4 (0) 669 678 Content lit available at SciVere ScienceDirect Theoretical Computer Science journal homepage: www.elevier.com/locate/tc Optimal algorithm for online cheduling

More information

Minimal state space realization of MIMO systems in the max algebra

Minimal state space realization of MIMO systems in the max algebra KULeuven Department of Electrical Engineering (ESAT) SISTA Technical report 94-54 Minimal tate pace realization of MIMO ytem in the max algebra B De Schutter and B De Moor If you want to cite thi report

More information

Lecture 7: Testing Distributions

Lecture 7: Testing Distributions CSE 5: Sublinear (and Streaming) Algorithm Spring 014 Lecture 7: Teting Ditribution April 1, 014 Lecturer: Paul Beame Scribe: Paul Beame 1 Teting Uniformity of Ditribution We return today to property teting

More information

Preemptive scheduling on a small number of hierarchical machines

Preemptive scheduling on a small number of hierarchical machines Available online at www.ciencedirect.com Information and Computation 06 (008) 60 619 www.elevier.com/locate/ic Preemptive cheduling on a mall number of hierarchical machine György Dóa a, Leah Eptein b,

More information

TRIPLE SOLUTIONS FOR THE ONE-DIMENSIONAL

TRIPLE SOLUTIONS FOR THE ONE-DIMENSIONAL GLASNIK MATEMATIČKI Vol. 38583, 73 84 TRIPLE SOLUTIONS FOR THE ONE-DIMENSIONAL p-laplacian Haihen Lü, Donal O Regan and Ravi P. Agarwal Academy of Mathematic and Sytem Science, Beijing, China, National

More information

Lecture 9: Shor s Algorithm

Lecture 9: Shor s Algorithm Quantum Computation (CMU 8-859BB, Fall 05) Lecture 9: Shor Algorithm October 7, 05 Lecturer: Ryan O Donnell Scribe: Sidhanth Mohanty Overview Let u recall the period finding problem that wa et up a a function

More information

Electronic Theses and Dissertations

Electronic Theses and Dissertations Eat Tenneee State Univerity Digital Common @ Eat Tenneee State Univerity Electronic Thee and Diertation Student Work 5-208 Vector Partition Jennifer French Eat Tenneee State Univerity Follow thi and additional

More information

Social Studies 201 Notes for November 14, 2003

Social Studies 201 Notes for November 14, 2003 1 Social Studie 201 Note for November 14, 2003 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the

More information

arxiv: v1 [math.co] 17 Nov 2014

arxiv: v1 [math.co] 17 Nov 2014 Maximizing proper coloring on graph Jie Ma Humberto Nave arxiv:1411.4364v1 [math.co] 17 Nov 2014 Abtract The number of proper q-coloring of a graph G, denoted by P G q, i an important graph parameter that

More information

Primitive Digraphs with the Largest Scrambling Index

Primitive Digraphs with the Largest Scrambling Index Primitive Digraph with the Larget Scrambling Index Mahmud Akelbek, Steve Kirkl 1 Department of Mathematic Statitic, Univerity of Regina, Regina, Sakatchewan, Canada S4S 0A Abtract The crambling index of

More information

A Constraint Propagation Algorithm for Determining the Stability Margin. The paper addresses the stability margin assessment for linear systems

A Constraint Propagation Algorithm for Determining the Stability Margin. The paper addresses the stability margin assessment for linear systems A Contraint Propagation Algorithm for Determining the Stability Margin of Linear Parameter Circuit and Sytem Lubomir Kolev and Simona Filipova-Petrakieva Abtract The paper addree the tability margin aement

More information

Social Studies 201 Notes for March 18, 2005

Social Studies 201 Notes for March 18, 2005 1 Social Studie 201 Note for March 18, 2005 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the

More information

Lecture 10 Filtering: Applied Concepts

Lecture 10 Filtering: Applied Concepts Lecture Filtering: Applied Concept In the previou two lecture, you have learned about finite-impule-repone (FIR) and infinite-impule-repone (IIR) filter. In thee lecture, we introduced the concept of filtering

More information

Suggestions - Problem Set (a) Show the discriminant condition (1) takes the form. ln ln, # # R R

Suggestions - Problem Set (a) Show the discriminant condition (1) takes the form. ln ln, # # R R Suggetion - Problem Set 3 4.2 (a) Show the dicriminant condition (1) take the form x D Ð.. Ñ. D.. D. ln ln, a deired. We then replace the quantitie. 3ß D3 by their etimate to get the proper form for thi

More information

ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS. Volker Ziegler Technische Universität Graz, Austria

ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS. Volker Ziegler Technische Universität Graz, Austria GLASNIK MATEMATIČKI Vol. 1(61)(006), 9 30 ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS Volker Ziegler Techniche Univerität Graz, Autria Abtract. We conider the parameterized Thue

More information

Nonlinear Single-Particle Dynamics in High Energy Accelerators

Nonlinear Single-Particle Dynamics in High Energy Accelerators Nonlinear Single-Particle Dynamic in High Energy Accelerator Part 6: Canonical Perturbation Theory Nonlinear Single-Particle Dynamic in High Energy Accelerator Thi coure conit of eight lecture: 1. Introduction

More information

New bounds for Morse clusters

New bounds for Morse clusters New bound for More cluter Tamá Vinkó Advanced Concept Team, European Space Agency, ESTEC Keplerlaan 1, 2201 AZ Noordwijk, The Netherland Tama.Vinko@ea.int and Arnold Neumaier Fakultät für Mathematik, Univerität

More information

ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS

ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS ON A CERTAIN FAMILY OF QUARTIC THUE EQUATIONS WITH THREE PARAMETERS VOLKER ZIEGLER Abtract We conider the parameterized Thue equation X X 3 Y (ab + (a + bx Y abxy 3 + a b Y = ±1, where a, b 1 Z uch that

More information

CS 170: Midterm Exam II University of California at Berkeley Department of Electrical Engineering and Computer Sciences Computer Science Division

CS 170: Midterm Exam II University of California at Berkeley Department of Electrical Engineering and Computer Sciences Computer Science Division 1 1 April 000 Demmel / Shewchuk CS 170: Midterm Exam II Univerity of California at Berkeley Department of Electrical Engineering and Computer Science Computer Science Diviion hi i a cloed book, cloed calculator,

More information

Unavoidable Cycles in Polynomial-Based Time-Invariant LDPC Convolutional Codes

Unavoidable Cycles in Polynomial-Based Time-Invariant LDPC Convolutional Codes European Wirele, April 7-9,, Vienna, Autria ISBN 978--87-4-9 VE VERLAG GMBH Unavoidable Cycle in Polynomial-Baed Time-Invariant LPC Convolutional Code Hua Zhou and Norbert Goertz Intitute of Telecommunication

More information

Chapter 2 Sampling and Quantization. In order to investigate sampling and quantization, the difference between analog

Chapter 2 Sampling and Quantization. In order to investigate sampling and quantization, the difference between analog Chapter Sampling and Quantization.1 Analog and Digital Signal In order to invetigate ampling and quantization, the difference between analog and digital ignal mut be undertood. Analog ignal conit of continuou

More information

On the chromatic number of a random 5-regular graph

On the chromatic number of a random 5-regular graph On the chromatic number of a random 5-regular graph J. Díaz A.C. Kapori G.D. Kemke L.M. Kiroui X. Pérez N. Wormald Abtract It wa only recently hown by Shi and Wormald, uing the differential equation method

More information

IEOR 3106: Fall 2013, Professor Whitt Topics for Discussion: Tuesday, November 19 Alternating Renewal Processes and The Renewal Equation

IEOR 3106: Fall 2013, Professor Whitt Topics for Discussion: Tuesday, November 19 Alternating Renewal Processes and The Renewal Equation IEOR 316: Fall 213, Profeor Whitt Topic for Dicuion: Tueday, November 19 Alternating Renewal Procee and The Renewal Equation 1 Alternating Renewal Procee An alternating renewal proce alternate between

More information

CHAPTER 8 OBSERVER BASED REDUCED ORDER CONTROLLER DESIGN FOR LARGE SCALE LINEAR DISCRETE-TIME CONTROL SYSTEMS

CHAPTER 8 OBSERVER BASED REDUCED ORDER CONTROLLER DESIGN FOR LARGE SCALE LINEAR DISCRETE-TIME CONTROL SYSTEMS CHAPTER 8 OBSERVER BASED REDUCED ORDER CONTROLLER DESIGN FOR LARGE SCALE LINEAR DISCRETE-TIME CONTROL SYSTEMS 8.1 INTRODUCTION 8.2 REDUCED ORDER MODEL DESIGN FOR LINEAR DISCRETE-TIME CONTROL SYSTEMS 8.3

More information

into a discrete time function. Recall that the table of Laplace/z-transforms is constructed by (i) selecting to get

into a discrete time function. Recall that the table of Laplace/z-transforms is constructed by (i) selecting to get Lecture 25 Introduction to Some Matlab c2d Code in Relation to Sampled Sytem here are many way to convert a continuou time function, { h( t) ; t [0, )} into a dicrete time function { h ( k) ; k {0,,, }}

More information

Flag-transitive non-symmetric 2-designs with (r, λ) = 1 and alternating socle

Flag-transitive non-symmetric 2-designs with (r, λ) = 1 and alternating socle Flag-tranitive non-ymmetric -deign with (r, λ = 1 and alternating ocle Shenglin Zhou, Yajie Wang School of Mathematic South China Univerity of Technology Guangzhou, Guangdong 510640, P. R. China lzhou@cut.edu.cn

More information

Minimum Cost Noncrossing Flow Problem on Layered Networks

Minimum Cost Noncrossing Flow Problem on Layered Networks Minimum Cot Noncroing Flow Problem on Layered Network İ. Kuban Altınel*, Necati Ara, Zeynep Şuvak, Z. Caner Taşkın Department of Indutrial Engineering, Boğaziçi Univerity, 44, Bebek, İtanbul, Turkey Abtract

More information

arxiv: v2 [math.co] 11 Sep 2017

arxiv: v2 [math.co] 11 Sep 2017 The maximum number of clique in graph without long cycle Ruth Luo September 13, 017 arxiv:1701.0747v [math.co] 11 Sep 017 Abtract The Erdő Gallai Theorem tate that for k 3 every graph on n vertice with

More information

Balanced Network Flows

Balanced Network Flows revied, June, 1992 Thi paper appeared in Bulletin of the Intitute of Combinatoric and it Application 7 (1993), 17-32. Balanced Network Flow William Kocay* and Dougla tone Department of Computer cience

More information

c n b n 0. c k 0 x b n < 1 b k b n = 0. } of integers between 0 and b 1 such that x = b k. b k c k c k

c n b n 0. c k 0 x b n < 1 b k b n = 0. } of integers between 0 and b 1 such that x = b k. b k c k c k 1. Exitence Let x (0, 1). Define c k inductively. Suppoe c 1,..., c k 1 are already defined. We let c k be the leat integer uch that x k An eay proof by induction give that and for all k. Therefore c n

More information

arxiv: v1 [math.ac] 30 Nov 2012

arxiv: v1 [math.ac] 30 Nov 2012 ON MODULAR INVARIANTS OF A VECTOR AND A COVECTOR YIN CHEN arxiv:73v [mathac 3 Nov Abtract Let S L (F q be the pecial linear group over a finite field F q, V be the -dimenional natural repreentation of

More information

Singular perturbation theory

Singular perturbation theory Singular perturbation theory Marc R. Rouel June 21, 2004 1 Introduction When we apply the teady-tate approximation (SSA) in chemical kinetic, we typically argue that ome of the intermediate are highly

More information

RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS

RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS www.arpapre.com/volume/vol29iue1/ijrras_29_1_01.pdf RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS Sevcan Demir Atalay 1,* & Özge Elmataş Gültekin

More information

Chapter Landscape of an Optimization Problem. Local Search. Coping With NP-Hardness. Gradient Descent: Vertex Cover

Chapter Landscape of an Optimization Problem. Local Search. Coping With NP-Hardness. Gradient Descent: Vertex Cover Coping With NP-Hardne Chapter 12 Local Search Q Suppoe I need to olve an NP-hard problem What hould I do? A Theory ay you're unlikely to find poly-time algorithm Mut acrifice one of three deired feature

More information

DIFFERENTIAL EQUATIONS

DIFFERENTIAL EQUATIONS DIFFERENTIAL EQUATIONS Laplace Tranform Paul Dawkin Table of Content Preface... Laplace Tranform... Introduction... The Definition... 5 Laplace Tranform... 9 Invere Laplace Tranform... Step Function...4

More information

CONGESTION control is a key functionality in modern

CONGESTION control is a key functionality in modern IEEE TRANSACTIONS ON INFORMATION TEORY, VOL. X, NO. X, XXXXXXX 2008 On the Connection-Level Stability of Congetion-Controlled Communication Network Xiaojun Lin, Member, IEEE, Ne B. Shroff, Fellow, IEEE,

More information

arxiv: v2 [math.nt] 30 Apr 2015

arxiv: v2 [math.nt] 30 Apr 2015 A THEOREM FOR DISTINCT ZEROS OF L-FUNCTIONS École Normale Supérieure arxiv:54.6556v [math.nt] 3 Apr 5 943 Cachan November 9, 7 Abtract In thi paper, we etablih a imple criterion for two L-function L and

More information

TAYLOR POLYNOMIALS FOR NABLA DYNAMIC EQUATIONS ON TIME SCALES

TAYLOR POLYNOMIALS FOR NABLA DYNAMIC EQUATIONS ON TIME SCALES TAYLOR POLYNOMIALS FOR NABLA DYNAMIC EQUATIONS ON TIME SCALES DOUGLAS R. ANDERSON Abtract. We are concerned with the repreentation of polynomial for nabla dynamic equation on time cale. Once etablihed,

More information

CHAPTER 6. Estimation

CHAPTER 6. Estimation CHAPTER 6 Etimation Definition. Statitical inference i the procedure by which we reach a concluion about a population on the bai of information contained in a ample drawn from that population. Definition.

More information

A relationship between generalized Davenport-Schinzel sequences and interval chains

A relationship between generalized Davenport-Schinzel sequences and interval chains A relationhip between generalized Davenport-Schinzel equence and interval chain The MIT Faculty ha made thi article openly available. Pleae hare how thi acce benefit you. Your tory matter. Citation A Publihed

More information

Lecture 17: Analytic Functions and Integrals (See Chapter 14 in Boas)

Lecture 17: Analytic Functions and Integrals (See Chapter 14 in Boas) Lecture 7: Analytic Function and Integral (See Chapter 4 in Boa) Thi i a good point to take a brief detour and expand on our previou dicuion of complex variable and complex function of complex variable.

More information

Compact finite-difference approximations for anisotropic image smoothing and painting

Compact finite-difference approximations for anisotropic image smoothing and painting CWP-593 Compact finite-difference approximation for aniotropic image moothing and painting Dave Hale Center for Wave Phenomena, Colorado School of Mine, Golden CO 80401, USA ABSTRACT Finite-difference

More information

March 18, 2014 Academic Year 2013/14

March 18, 2014 Academic Year 2013/14 POLITONG - SHANGHAI BASIC AUTOMATIC CONTROL Exam grade March 8, 4 Academic Year 3/4 NAME (Pinyin/Italian)... STUDENT ID Ue only thee page (including the back) for anwer. Do not ue additional heet. Ue of

More information

Some Sets of GCF ϵ Expansions Whose Parameter ϵ Fetch the Marginal Value

Some Sets of GCF ϵ Expansions Whose Parameter ϵ Fetch the Marginal Value Journal of Mathematical Reearch with Application May, 205, Vol 35, No 3, pp 256 262 DOI:03770/jin:2095-26520503002 Http://jmredluteducn Some Set of GCF ϵ Expanion Whoe Parameter ϵ Fetch the Marginal Value

More information

arxiv: v1 [quant-ph] 22 Oct 2010

arxiv: v1 [quant-ph] 22 Oct 2010 The extenion problem for partial Boolean tructure in Quantum Mechanic Cotantino Budroni 1 and Giovanni Morchio 1, 2 1) Dipartimento di Fiica, Univerità di Pia, Italy 2) INFN, Sezione di Pia, Italy Alternative

More information

3.1 The Revised Simplex Algorithm. 3 Computational considerations. Thus, we work with the following tableau. Basic observations = CARRY. ... m.

3.1 The Revised Simplex Algorithm. 3 Computational considerations. Thus, we work with the following tableau. Basic observations = CARRY. ... m. 3 Computational conideration In what follow, we analyze the complexity of the Simplex algorithm more in detail For thi purpoe, we focu on the update proce in each iteration of thi procedure Clearly, ince,

More information

(b) Is the game below solvable by iterated strict dominance? Does it have a unique Nash equilibrium?

(b) Is the game below solvable by iterated strict dominance? Does it have a unique Nash equilibrium? 14.1 Final Exam Anwer all quetion. You have 3 hour in which to complete the exam. 1. (60 Minute 40 Point) Anwer each of the following ubquetion briefly. Pleae how your calculation and provide rough explanation

More information

The Hassenpflug Matrix Tensor Notation

The Hassenpflug Matrix Tensor Notation The Haenpflug Matrix Tenor Notation D.N.J. El Dept of Mech Mechatron Eng Univ of Stellenboch, South Africa e-mail: dnjel@un.ac.za 2009/09/01 Abtract Thi i a ample document to illutrate the typeetting of

More information

Dimensional Analysis A Tool for Guiding Mathematical Calculations

Dimensional Analysis A Tool for Guiding Mathematical Calculations Dimenional Analyi A Tool for Guiding Mathematical Calculation Dougla A. Kerr Iue 1 February 6, 2010 ABSTRACT AND INTRODUCTION In converting quantitie from one unit to another, we may know the applicable

More information

ONLINE APPENDIX: TESTABLE IMPLICATIONS OF TRANSLATION INVARIANCE AND HOMOTHETICITY: VARIATIONAL, MAXMIN, CARA AND CRRA PREFERENCES

ONLINE APPENDIX: TESTABLE IMPLICATIONS OF TRANSLATION INVARIANCE AND HOMOTHETICITY: VARIATIONAL, MAXMIN, CARA AND CRRA PREFERENCES ONLINE APPENDIX: TESTABLE IMPLICATIONS OF TRANSLATION INVARIANCE AND HOMOTHETICITY: VARIATIONAL, MAXMIN, CARA AND CRRA PREFERENCES CHRISTOPHER P. CHAMBERS, FEDERICO ECHENIQUE, AND KOTA SAITO In thi online

More information

Fractional Hedonic Games: Individual and Group Stability

Fractional Hedonic Games: Individual and Group Stability Fractional Hedonic Game: Individual and Group Stability Florian Brandl Intitut für Informatik TU München, Germany brandlfl@in.tum.de Felix Brandt Intitut für Informatik TU München, Germany brandtf@in.tum.de

More information

Unbounded solutions of second order discrete BVPs on infinite intervals

Unbounded solutions of second order discrete BVPs on infinite intervals Available online at www.tjna.com J. Nonlinear Sci. Appl. 9 206), 357 369 Reearch Article Unbounded olution of econd order dicrete BVP on infinite interval Hairong Lian a,, Jingwu Li a, Ravi P Agarwal b

More information

Lecture 8: Period Finding: Simon s Problem over Z N

Lecture 8: Period Finding: Simon s Problem over Z N Quantum Computation (CMU 8-859BB, Fall 205) Lecture 8: Period Finding: Simon Problem over Z October 5, 205 Lecturer: John Wright Scribe: icola Rech Problem A mentioned previouly, period finding i a rephraing

More information

Pythagorean Triple Updated 08--5 Drlnoordzij@leennoordzijnl wwwleennoordzijme Content A Roadmap for generating Pythagorean Triple Pythagorean Triple 3 Dicuion Concluion 5 A Roadmap for generating Pythagorean

More information

Optimization model in Input output analysis and computable general. equilibrium by using multiple criteria non-linear programming.

Optimization model in Input output analysis and computable general. equilibrium by using multiple criteria non-linear programming. Optimization model in Input output analyi and computable general equilibrium by uing multiple criteria non-linear programming Jing He * Intitute of ytem cience, cademy of Mathematic and ytem cience Chinee

More information

On Multi-source Networks: Enumeration, Rate Region Computation, and Hierarchy

On Multi-source Networks: Enumeration, Rate Region Computation, and Hierarchy On Multi-ource Network: Enumeration, Rate Region Computation, and Hierarchy Congduan Li, Student Member, IEEE, Steven Weber, Senior Member, IEEE, and John MacLaren Walh, Member, IEEE arxiv:5070578v [cit]

More information

The Impact of Imperfect Scheduling on Cross-Layer Rate. Control in Multihop Wireless Networks

The Impact of Imperfect Scheduling on Cross-Layer Rate. Control in Multihop Wireless Networks The mpact of mperfect Scheduling on Cro-Layer Rate Control in Multihop Wirele Network Xiaojun Lin and Ne B. Shroff Center for Wirele Sytem and Application (CWSA) School of Electrical and Computer Engineering,

More information

in a circular cylindrical cavity K. Kakazu Department of Physics, University of the Ryukyus, Okinawa , Japan Y. S. Kim

in a circular cylindrical cavity K. Kakazu Department of Physics, University of the Ryukyus, Okinawa , Japan Y. S. Kim Quantization of electromagnetic eld in a circular cylindrical cavity K. Kakazu Department of Phyic, Univerity of the Ryukyu, Okinawa 903-0, Japan Y. S. Kim Department of Phyic, Univerity of Maryland, College

More information

Optimal Coordination of Samples in Business Surveys

Optimal Coordination of Samples in Business Surveys Paper preented at the ICES-III, June 8-, 007, Montreal, Quebec, Canada Optimal Coordination of Sample in Buine Survey enka Mach, Ioana Şchiopu-Kratina, Philip T Rei, Jean-Marc Fillion Statitic Canada New

More information

Copyright 1967, by the author(s). All rights reserved.

Copyright 1967, by the author(s). All rights reserved. Copyright 1967, by the author(). All right reerved. Permiion to make digital or hard copie of all or part of thi work for peronal or claroom ue i granted without fee provided that copie are not made or

More information

List Coloring Graphs

List Coloring Graphs Lit Coloring Graph February 6, 004 LIST COLORINGS AND CHOICE NUMBER Thomaen Long Grotzch girth 5 verion Thomaen Long Let G be a connected planar graph of girth at leat 5. Let A be a et of vertice in G

More information

Logic, Automata and Games

Logic, Automata and Games Logic, Automata and Game Jacque Duparc EJCIM 27 EJCIM, 23-27 January 27 J. Duparc ( & ) Logic, Automata and Game Lyon, 23-27 January 27 / 97 Reference [] K. R. Apt and E. Grädel. Lecture in game theory

More information

Robustness analysis for the boundary control of the string equation

Robustness analysis for the boundary control of the string equation Routne analyi for the oundary control of the tring equation Martin GUGAT Mario SIGALOTTI and Mariu TUCSNAK I INTRODUCTION AND MAIN RESULTS In thi paper we conider the infinite dimenional ytem determined

More information

Estimation of Peaked Densities Over the Interval [0,1] Using Two-Sided Power Distribution: Application to Lottery Experiments

Estimation of Peaked Densities Over the Interval [0,1] Using Two-Sided Power Distribution: Application to Lottery Experiments MPRA Munich Peronal RePEc Archive Etimation of Peaed Denitie Over the Interval [0] Uing Two-Sided Power Ditribution: Application to Lottery Experiment Krzyztof Konte Artal Invetment 8. April 00 Online

More information

COHOMOLOGY AS A LOCAL-TO-GLOBAL BRIDGE

COHOMOLOGY AS A LOCAL-TO-GLOBAL BRIDGE COHOMOLOGY AS A LOCAL-TO-GLOBAL BRIDGE LIVIU I. NICOLAESCU ABSTRACT. I dicu low dimenional incarnation of cohomology and illutrate how baic cohomological principle lead to a proof of Sperner lemma. CONTENTS.

More information

The Secret Life of the ax + b Group

The Secret Life of the ax + b Group The Secret Life of the ax + b Group Linear function x ax + b are prominent if not ubiquitou in high chool mathematic, beginning in, or now before, Algebra I. In particular, they are prime exhibit in any

More information

LDPC Convolutional Codes Based on Permutation Polynomials over Integer Rings

LDPC Convolutional Codes Based on Permutation Polynomials over Integer Rings LDPC Convolutional Code Baed on Permutation Polynomial over Integer Ring Marco B. S. Tavare and Gerhard P. Fettwei Vodafone Chair Mobile Communication Sytem, Dreden Univerity of Technology, 01062 Dreden,

More information

Assignment for Mathematics for Economists Fall 2016

Assignment for Mathematics for Economists Fall 2016 Due date: Mon. Nov. 1. Reading: CSZ, Ch. 5, Ch. 8.1 Aignment for Mathematic for Economit Fall 016 We now turn to finihing our coverage of concavity/convexity. There are two part: Jenen inequality for concave/convex

More information

Vector-Space Methods and Kirchhoff Graphs for Reaction Networks

Vector-Space Methods and Kirchhoff Graphs for Reaction Networks Vector-Space Method and Kirchhoff Graph for Reaction Network Joeph D. Fehribach Fuel Cell Center WPI Mathematical Science and Chemical Engineering 00 Intitute Rd. Worceter, MA 0609-2247 Thi article preent

More information

MATEMATIK Datum: Tid: eftermiddag. A.Heintz Telefonvakt: Anders Martinsson Tel.:

MATEMATIK Datum: Tid: eftermiddag. A.Heintz Telefonvakt: Anders Martinsson Tel.: MATEMATIK Datum: 20-08-25 Tid: eftermiddag GU, Chalmer Hjälpmedel: inga A.Heintz Telefonvakt: Ander Martinon Tel.: 073-07926. Löningar till tenta i ODE och matematik modellering, MMG5, MVE6. Define what

More information

Accuracy of Symmetric Partitioned Runge-Kutta Methods for Differential Equations on Lie-Groups

Accuracy of Symmetric Partitioned Runge-Kutta Methods for Differential Equations on Lie-Groups Accuracy of Symmetric Partitioned Runge-Kutta Method for Differential Equation on Lie-Group WUB / 11-23 BUW-IMACM 11-19, Michael Günther, Franceco Knechtli and Michèle Wandelt Bergiche Univerität Wuppertal,

More information

Riemann s Functional Equation is Not Valid and its Implication on the Riemann Hypothesis. Armando M. Evangelista Jr.

Riemann s Functional Equation is Not Valid and its Implication on the Riemann Hypothesis. Armando M. Evangelista Jr. Riemann Functional Equation i Not Valid and it Implication on the Riemann Hypothei By Armando M. Evangelita Jr. On November 4, 28 ABSTRACT Riemann functional equation wa formulated by Riemann that uppoedly

More information

A BATCH-ARRIVAL QUEUE WITH MULTIPLE SERVERS AND FUZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH

A BATCH-ARRIVAL QUEUE WITH MULTIPLE SERVERS AND FUZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH Mathematical and Computational Application Vol. 11 No. pp. 181-191 006. Aociation for Scientific Reearch A BATCH-ARRIVA QEE WITH MTIPE SERVERS AND FZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH Jau-Chuan

More information

4. Connectivity Connectivity Connectivity. Whitney's s connectivity theorem: (G) (G) (G) for special

4. Connectivity Connectivity Connectivity. Whitney's s connectivity theorem: (G) (G) (G) for special 4. Connectivity 4.. Connectivity Vertex-cut and vertex-connectivity Edge-cut and edge-connectivty Whitney' connectivity theorem: Further theorem for the relation of and graph 4.. The Menger Theorem and

More information

The Axiom of Choice and the Law of Excluded Middle in Weak Set Theories

The Axiom of Choice and the Law of Excluded Middle in Weak Set Theories The Axiom of Choice and the Law of Excluded Middle in Weak Set Theorie John L. Bell Department of Philoophy, Univerity of Wetern Ontario In contructive mathematic the axiom of choice (AC) ha a omewhat

More information

Control Systems Analysis and Design by the Root-Locus Method

Control Systems Analysis and Design by the Root-Locus Method 6 Control Sytem Analyi and Deign by the Root-Locu Method 6 1 INTRODUCTION The baic characteritic of the tranient repone of a cloed-loop ytem i cloely related to the location of the cloed-loop pole. If

More information

New index matrix representations of operations over natural numbers

New index matrix representations of operations over natural numbers Note on Number Theory and Dicrete Mathematic Print ISSN 30 532 Online ISSN 2367 8275 Vol 24 208 No 53 60 DOI: 07546/nntdm2082453-60 New index matrix repreentation of operation over natural number Lilija

More information

The machines in the exercise work as follows:

The machines in the exercise work as follows: Tik-79.148 Spring 2001 Introduction to Theoretical Computer Science Tutorial 9 Solution to Demontration Exercie 4. Contructing a complex Turing machine can be very laboriou. With the help of machine chema

More information

Extension of Inagaki General Weighted Operators. and. A New Fusion Rule Class of Proportional Redistribution of Intersection Masses

Extension of Inagaki General Weighted Operators. and. A New Fusion Rule Class of Proportional Redistribution of Intersection Masses Extenion of nagaki General Weighted Operator and A New Fuion Rule Cla of Proportional Reditribution of nterection Mae Florentin Smarandache Chair of Math & Science Depart. Univerity of New Mexico, Gallup,

More information