The Fundamental Theorem of Distributed Storage Systems Revisited

Size: px
Start display at page:

Download "The Fundamental Theorem of Distributed Storage Systems Revisited"

Transcription

1 The Fundamental Theorem of Dstrbuted Storage Systems Revsted Png Hu Department of Electronc Engneerng Cty Unversty of Hong Kong Emal: Kenneth W. Shum Insttute of Networ Codng the Chnese Unversty of Hong Kong, Shenzhen Key Lab. of Networ Codng Key Tech. and Applcaton, Chna. Emal: Ch Wan Sung Department of Electronc Engneerng Cty Unversty of Hong Kong Emal: Abstract The fundamental theorem of dstrbuted storage systems characterzes the maxmum fle sze that can be stored wth certan assumptons on fle retreval and node repar. The result s composed of two parts, namely, the mn-cut bound and that the bound can be acheved by lnear networ code wth bounded feld sze. The dervaton of the mn-cut bound s reexamned and llumnated by mang an mplct step explct. Furthermore, a smple alternatve proof for the achevablty of the mn-cut bound s presented, whcs based on the constructon of the generc storage code, a restrcted form of generc networ code. The proof technques n ths paper are expected to be extensble to other more complex models of dstrbuted storage systems. I. INTRODUCTION Dstrbuted storage systems (DSS) have attracted a lot of research attenton n recent years, partly because of the successful applcaton of networ codng theory to the desgn of DSS wth repar consderatons. In the semnal wor of [1], the dynamcs of node falures and repars n DSS s modeled as a sngle-source multcast acyclc networ, and the fundamental tradeoff between storage effcency and repar bandwdtn DSS s revealed by characterzng the mnmum-cut of the correspondng nformaton flow graph. Le the study of any communcaton channel or networ, the fundamental queston to as n relaton to DSS s ths: What s ts capacty n the nformaton-theoretc sense? The answer to ths type of questons naturally conssts of two parts, an upper bound of the capacty and the achevablty of the bound. The wor of [1] gves the frst part of the answer by dervng the mn-cut bound for the nformaton flow graph of DSS and provde a partal answer to the second by usng results from networ codng theory, whch can be appled to DSS wth a bounded number of node falures and repars. A more complete answer to the second part s gven n [2], whch proves that the mn-cut bound can be acheved by a lnear networ code wth a feld sze whch depends only on Ths wor was partally supported by a grant from the Unversty Grants Commttee of the Hong Kong Specal Admnstratve Regon, Chna (Project No. AoE/E-02/08), and Shenzhen Key Laboratory of Networ Codng Key Technology and Applcaton (ZSDY ), and Peaco Scheme (KQCX ), Shenzhen, Chna. The authors are lsted alphabetcally. the number of storage nodes, but not on the number of falures and repars that occur n the system. The contrbuton of ths paper s two-fold. Frst, we prove a combnatoral result (n Lemma 1) about the sze of the boundary of a cut n the nformaton flow graph. Ths result s crucal n computng the mn-cut bound, but s assumed mplctly n the proof of the mn-cut bound n [1]. We rederve the mn-cut bound on the capacty of a DSS n the frst part of ths paper. Second, we provde an alternatve proof for the achevablty of the fundamental tradeoff between storage and repar bandwdth by lnear networ codes n [2]. The proof of [2] reles on a path-weavng procedure, whch s hghly dependent on the structure of the nformaton flow graph. In ths paper, we gve a determnstc algorthm for constructng a lnear regeneratng code, based on a restrcted form of generc networ code [3]. We call t a generc storage code. The procedure of constructng a generc storage code s conceptually smpler than the one n [2], but requres a larger feld sze. Our constructon s easly transplantable to other models n dstrbuted storage systems wth dfferent assumptons. We remar that the results n ths paper cannot be drectly obtaned from the orgnal lnear networ codng theory [3], [4], whch consders multcast networs that are fnte and fxed n advance. For DSS, the flow graps unbounded because there s no lmt on the number of node falures, but the results n [3], [4] assume fnte networs and fntely many recevng nodes. Our result, as well as that n [2], shows the exstence of a capacty-achevng lnear code, whose feld sze grows exponentally on the number of storage nodes. It s an open queston whether the feld sze can be reduced to polynomal growth. II. DISTRIBUTED STORAGE SYSTEMS In a dstrbuted storage system (DSS), there are n storage nodes. A fle of B symbols from an alphabet set Σ has to be stored n the DSS. Ths fle can later be retreved by a data collector, whch connects to any storage nodes. Each storage node s able to store α symbols. These storage nodes are not relable and may fal after prolonged use. If a node fals, a replacement node, called newcomer, s created by /14/$ IEEE 65

2 downloadng data from any d of the survvng nodes. These d nodes are called helper nodes, and the number of symbols a newcomer downloads from each of them s denoted by β. The total number of symbols downloaded, dβ, s called the repar bandwdth. The newcomer, just le the orgnal faled node, s allowed to store at most α symbols. The newcomer s not requred to store exactly the same symbols as the orgnal faled node. Ths repar mechansm s commonly called functonal repar. A DSS that satsfes the above requrement s denoted by DSS(n,, d, α, β). As tme evolves, nodes fal and are replaced by newcomers. The partcular falure order of the storage nodes and the choce of helper nodes for each newcomer defnes an nstance of a DSS. Each DSS nstance can be represented by a drected acyclc graph (DAG), called nformaton flow graph, whch conssts of three types of vertces: a source node S, storage nodes, In s and Out s, and data collectors DC s. For = 1, 2,..., n, there s a drected edge from S to In wtnfnte capacty, and a drected edge from In to Out wth capacty α. When the -th node falure n the DSS occurs, where = 1, 2,..., a correspondng newcomer jons the system. We denote t by node, where = n +. As the orgnal storage nodes, t s represented by In and Out, whch are connected by a drected edge from the former to the latter wth a capacty of α. Furthermore, In s connected to d helper nodes by addng a drected edge from each of Out 1, Out 2,..., Out d to In, where j < for j = 1, 2,..., d. For all possble choces of survvng storage nodes, a correspondng DC s added. Let the nodes to whch DC connects be nodes 1, 2,...,. Then there s an edge of nfnte capacty from each of Out 1, Out 2,..., Out, to DC. For each DSS nstance, there s a correspondng nformaton flow graph. The collecton of graphs for all possble nstances of DSS(n,, d, α, β) s denoted by G(n,, d, α, β), or smply G f no ambguty could occur. Let I(v) and O(v) denote the set of ncomng edges and the set of outgong edges of v V. We defne the mportant concepts of cut and flow below: Defnton 1. An s-t cut K = (S, T ) of a DAG, G = (V, E), s a partton of V nto two dsjont subsets, S and T, such that s S, t T and there s at least one edge jonng S and T. The cut-set of K s {(u, v) E : u S, v T }. The cut-value of K s the sum of the capacty of all edges n the cut-set of K. Defnton 2. A flow f = {f e : e E} n a DAG, G = (V, E), from S to DC s a vald assgnment of a nonnegatve nteger f e to every edge e E such that f e s less than or equal to the capacty of e and e I(v) f e = e O(v) f e for any e V \ {S, DC}. The flow-value of f s e O(S) f e. The maxmum flow-value from S to DC s denoted by maxflow(dc). Fgure 1 shows an example of a grapn G(4, 2, d, α, β) wth only one DC shown. (The other DC s are omtted for clarty.) We are nterested to fnd the mnmum value of all the cuts, wth respect to all DC s, n any G G. A possble Fg. 1. An example of a grapn G(4, 2, d, α, β). cut wth value α + 2β s also shown n the fgure. A rgorous mn-cut analyss wll be done n the next secton. III. MIN-CUT BOUND Gven an nformaton flow graph G 0 G, we construct an auxlary graph G = (V, E) as follows: Frst, we combne In and Out nto a sngle vertex v, whch represents storage node, for all. Denote the source node and an arbtrary data collector by s and t, respectvely, where s, t V. Furthermore, denote the set of all chld vertces of s by V s and the set of all parent vertces of t by V t. Snce the data collector connects to storage nodes for fle retreval, we have V t =. Note that the n-degree of each vertex v V \(V s {s, t}) s equal to d, snce v s a newcomer and has contacted d storage nodes for repar. To smplfy the proof below, for every v V s, we splt ts ncomng edge nto d parallel edges, so that all vertces, except s and t, n the auxlary graph, G, have n-degree d. It s clear that G s also a DAG. Defnton 3. Gven an s-t cut K = (S, T ) of a DAG, G = (V, E), a vertex v T s sad to be on the boundary of the cut, denoted by K, f v s the head of any edge n the cut-set of K. Note that a cut K = (S, T ) can also be specfed by the cutset of K, or by K, as there s a one-to-one correspondence between (S, T ) and the cut-set of K, and also between (S, T ) and K. Lemma 1. For any s-t cut K = (S, T ) n an auxlary graph G, f t K, then K mn{d, }. Proof: Consder an arbtrary cut K = (S, T ) whch satsfes t K. It s clear that V t T, and therefore T. Frst, consder the case d. Snce G s a DAG, there s a topologcal orderng of the vertces, whch means that the vertces are ordered one after another n a way such that (v, v j ) E mples < j. The frst d vertces n T must belong to K, snce ther n-degrees are all equal to d. Hence, K d = mn{d, }. Next, consder the case d >. If T d, then by the same reasonng as before, K d > = mn{d, }. If T < d, then K = T 66

3 and hence K = mn{d, }. The statement s proved by combnng the two cases. The above result can be used to analyze the mn-cut n the nformaton flow graph. The proof s essentally the same as n [1, Lemma 2]. We nclude the proof for the sae of completeness. Lemma 2 (Mn-Cut Bound [1]). Gven any G 0 G(n,, d, α, β), the value of any s-t cut of G 0 s bounded below by mn{d,} 1 =0 mn{(d )β, α}. (1) Fg. 2. Graphcal llustraton of the bound. Furthermore, the lower bound s tght, meanng that there exsts a DC n G 0 such that the correspondng s-t cut has value equal to (1). Proof: Gven an nformaton flow graph G 0, consder an arbtrary cut K 0 = (S 0, T 0 ). We can exclude the case where t belongs to K 0, snce all ncomng edges of t have nfnte capacty. We can also exclude the case where In T and Out S for some, snce the cut-value can be reduced by movng Out from S to T. Now gven K 0, we can construct a correspondng cut K n the auxlary graph as follows: If ether In or Out s n K 0, then let v be n K. By Lemma 1, there are at least mn{d, } vertces n K, whcmples that there are also at least mn{d, } vertces n K 0. 1 Snce G 0 s a DAG, there s a topologcal orderng of ts vertces. Let Out 1 be the topologcally frst output node n T. Then ether In 1 K 0 or Out 1 K 0. If Out 1 K 0, then ts sngle ncomng edge contrbutes α to the cut-value. If In 1 K 0, we can exclude the case where In 1 V s, snce the ncomng edge of In 1 has nfnte capacty. Therefore, we only need to consder the case where In 1 V s. Its d ncomng edges contrbute a total of dβ to the cut-value. Combnng the two cases, a value of mn{dβ, α} s contrbuted to the cut-value. Next, consder Out j, the topologcally j-th output node n T. Agan ether In j K 0 or Out j K 0. If Out j K 0, then ts sngle ncomng edge contrbutes α to the cut-value. If In j K 0, agan we can exclude the case where In j V s. Then at least d (j 1) of the ncomng edges of In j must be n the cut-set of K 0, snce at most j 1 of ts ncomng edges can be connected to other out-vertces n T, namely Out 1, Out 2,..., Out j 1. Therefore, ts ncomng edges contrbute at least (d j + 1)β to the cut-value. Combnng the two cases, a value of mn{(d j + 1)β, α} s contrbuted to the cut-value. Snce there are at least mn{d, } vertces n K 0 and addng any one or more vertces to T wll not decrease the cut-value, the mnmum cut-value s therefore gven by the expresson n (1). 1 The fact that there cannot be less than mn{d, } vertces n K 0 was taen for granted n the last paragraph of the proof of [1, Lemma 2]. Now we show that the lower bound n (1) s tght by constructng an nformaton flow graph and a cut achevng equalty n (1). Intally, there are n storage nodes connected to S. Consder newcomers ndexed by n+1, n+2,..., n+. For = 1, 2,...,, In n+ connects to Out n+ d,..., Out n+ 1. Consder a data collector that connects to the last Out s. A cut K that acheves the lower bound can be constructed as follows: For = 0, 1,..., 1, f (d )β α, then In K; otherwse, Out K. A graphcal llustraton s shown n Fgure 2. Followng [1], we assume wthout loss of generalty that d. By Lemma 2, we have the followng theorem: Theorem 3. Let B be the sze of the fle stored n DSS(n,, d, α, β). If d, then 1 B mn{(d )β, α}. (2) =0 Proof: By the max-flow bound [5, Theorem 18.3], we have B mn maxflow(dc ). (3) Snce d, by Lemma 2, the mnmum cut-value s bounded below by the rght-hand sde of (2). By the well-nown maxflow mn-cut theorem [6], we have 1 mn maxflow(dc ) mn{(d )β, α}. (4) =0 The statement then follows from (3) and (4). IV. GENERIC STORAGE CODE In ths secton, we frst present some basc concepts n networ codng theory from [7]. Then, we ntroduce the refned nformaton flow graph for DSS. Next, we defne generc storage code, a concept n relaton to the refned nformaton flow graph. A. Basc Concepts of Lnear Networ Code Consder a sngle-source acyclc communcaton networ and ts correspondng graph, G = (V, E). Let the alphabet Σ be the fnte feld GF (q). A lnear networ code can be 67

4 specfed by the set of all local encodng ernels, {l d,e Σ : d I(v), e O(v), v V }. Suppose the message to be transmtted form the source node s an ω-dmensonal column vector x over GF (q). We add ω magnary edges termnatng at S and assgn each of them wth a dstnct column vector n the ω-dmensonal standard bass. These vectors are referred to as the global encodng ernels of the magnary edges. For each edge e = (u, v) E, we teratvely defne ts global encodng ernel by g e l d,e g d. d I(u) The transmtted symbol on edge e s x T g e. For an edge set P, denote the set of the correspondng global encodng ernels by er(p ) {g e : e P }, and the lnear span of er(p ) by For a vertex u, defne vspace(p ) span(er(p )). vspace(u) span(er(i(u))). A sequence of edges e 1, e 2,..., e n forms a patf Head(e ) = Tal(e +1 ) for 1 n 1. Two paths are edge-dsjont f they do not have any edge n common. A set of edges s sad to be path-ndependent f each edge n ths set s on a path orgnatng from an magnary edge and these paths are edgedsjont. An edge set P s sad to be regular wth respect to a lnear networ code f the global encodng ernels n er(p ) are lnearly ndependent. B. Refned Informaton Flow Graph Gven any nformaton flow graph for a DSS, we construct a refned nformaton flow graph by ntroducng the concept of repar stage. In regard to the refned nformaton flow graph, the repar process of a node s called a repar stage. From S to In s s called stage 1. The orgnal n storage nodes s sad to be n stage 0. In stage s > 0, the out-vertex of each storage node, except the one faled n stage s 1, s connected to an auxlary out-vertex by a drected edge of capacty α. The out-vertex of node n stage s s denoted by Out (s) and that n stage s + 1 s denoted by Out (s+1). Let the ndex of the newcomer n stage s + 1 be. We re-label the Out vertex of the newcomer as Out (s+1). Snce each storage node has capacty α, every edge from S to In wtnfnte capacty s replaced by an edge of capacty α. Furthermore, each edge of capacty c s replaced by c parallel edges of unt capacty. Denote the set of all the edges n stage s, except the ncomng edges of data collectors, by E s. Note that the refned nformaton flow graph represents a sngle-source mult-cast acyclc networ. An example wth n = 4, d = 3 s shown n Fgure 3. In the example, node 1 fals n stage 0 and node 2 fals n stage 1. C. Generc Storage Code Snce a DC can connect to nodes n the same stage, we only need to ensure the path-ndependent sets of edges n the same stage are regular. A code that satsfes ths requrement may Fg. 3. An example of a refned nformaton flow graph. be regarded as a restrcted form of a generc networ code [3], [7]. We call t generc storage code, whcs formally defned below: Defnton 4. An ω-dmensonal lnear networ code on a refned nformaton flow graps sad to be an ω-dmensonal generc storage code f every path-ndependent ω-subsets of E s s regular, for any stage s = 0, 1, 2,.... V. ACHIEVABILITY In ths secton, we prove the achevablty of the capacty bound n Theorem 3 by generc storage code. Lemma 4. Let G be a refned nformaton flow graph G such that there s at least one path-ndependent set of edges of sze ω n each stage. An ω-dmensonal generc storage code on G over GF(q) can be constructed, provded that q > ( ) ω. Proof: Let q be a prme power greater than ( ) ω. We prove the statement by mathematcal nducton on the number of repar stages n the refned nformaton flow graph. We want to mantan the nductve nvarant that, n any stage, any pathndependent set of edges s regular. Consder a refned nformaton graph wth no repar stage, (.e. wth only stages 1 and 0). Frst, note that any ω-subset of the edges n stage 1 s path-ndependent. We clam that there exsts a lnear code such that all these ω-subsets are regular. For the frst ω edges n stage 1, t s clear that they can be assgned lnearly ndependent global encodng ernels. For each of the subsequent edges n stage 1, we can pc a vector x vspace(ζ), where ζ s any (ω 1)-subset of edges that have already been assgned global encodng ernels. Ths can be done by pcng a generator matrx of an ω-dmensonal Reed-Solomon code of length nα. We can also assgn the global encodng ernels sequentally, snce ζ vspace(ζ) ( nα ω 1 ) q ω 1 < q ω. Let the global encodng ernels of α ncomng edges of every In, = 1, 2,..., n be the same as those of ts α outgong 68

5 edges. Snce n stage 1, any ω-subset of the nα edges s regular, so s any ω-subset of the nα edges n stage 0. Assume that for any refned nformaton graph wth s 0 repar stages, (.e., s + 1 stages ncludng stage 0), a generc storage code has been constructed. By defnton, any pathndependent ω-subset of E s s regular wth respect to the constructed networ code. In stage s + 1, there are n 1 auxlary out-vertces of the survvng nodes n stage s, and one newcomer. Let the set of ndces of the n 1 survvng nodes be S, and the ndex of the newcomer be. For S, Out (s) has α ncomng edges and α outgong edges connectng to. Let the global encodng ernels of these α outgong edges be the same as those of the α ncomng edges. Let the d helper nodes of newcomer be ndexed by h 1, h 2,..., h d S, where h 1 < h 2 < < h d. Let U be the edge set whch Out (s+1) for. It remans to determne the global encodng ernels for all the ncomng edges and outgong edges of In n such a way that any pathndependent ω-subset of U s regular. Ths can be done by Algorthm 1, whcs adapted from [5, Algorthm 19.34]. conssts of all ncomng and outgong edges of Out (s) S and all ncomng edges of Out (s+1) Algorthm 1 Assgn Global Encodng Kernels for the Newcomer Input: {g e : e I(Out (s) ) for all S} and h 1, h 2,..., h d Output: {g e : e I(In ) or e I(Out (s+1) )} 1: U 0 := {e I(Out (s) ) for all S}; 2: for := 1, 2,... d do 3: for j := 1, 2,... β do 4: e := the j-tncomng edges of In from Out (s) ; 5: Choose a vector x vspace(out (s) ) such that x vspace(ζ), where ζ s any ω-subset of U 0 such that ζ s regular and vspace(out (s) ) vspace(ζ); 6: g e := x and U 0 := U 0 {e}; 7: end for 8: end for 9: for j := 1, 2,... α do 10: e := the j-tncomng edges of Out (s+1) ; 11: Choose a vector x vspace(in ) such that x vspace(ζ), where ζ s any ω-subset of U 0 such that ζ s regular and vspace(in ) vspace(ζ); 12: g e := x and U 0 := U 0 {e}; 13: end for By constructon, t can be seen that any path-ndependent ω-subset of U s regular. In the algorthm, the vector x n lne 5 can always be found. To see ths, notce that there are at most (nα + dβ) edges n U 0 and the number of possble ). Denote the dmenson of ) vspace(ζ), the dmenson of vspace(out (s) ) vspace(ζ) s less than or equal choces of ζ s at most ( ω vspace(out (s) ) by ν. Snce vspace(out (s) to ν 1. Thus, vspace(out (s) ) ( ( ) nα + dβ vspace(ζ)) q ν 1 < q ν. ω ζ Lewse, the vector x n lne 11 can also be found. Theorem 5. A fle wth sze B = ω 1 =0 mn{(d )β, α} can be stored n a DSS(n,, d, α, β) by an ω-dmensonal generc storage code over GF(q), where q > ( ) ω. Proof: We have shown the exstence of generc storage code n Lemma 4. Now we show any collector can retreve the fle based on the generc storage code. By Lemma 2, there are at least ω dsjont paths termnatng at any out-vertces, n every stage s 0. Thus there are at least one path-ndependent set, say P wth sze ω wthn the ncomng edges of these out-vertces. By the defnton of generc storage code, the dmenson of er(p ) s ω, and the fle wth sze B = ω can be decoded. VI. CONCLUDING REMARKS We present a more rgorous dervaton of the mn-cut bound, and mae explct that fndng the mnmum number of nodes on the cut-boundary s a necessary step of the proof. We hope that ths provdes more nsght to the problem, whch may be useful for analyzng mn-cut bounds for future DSS models wth dfferent assumptons. To prove the achevablty of the mn-cut bound, a new concept called generc storage code s ntroduced. We remar that the correspondng nducton nvarant n Lemma 4 s larger than necessary n provng the achevablty result. Instead, the nducton nvarant found n [2] requres a smaller nductve nvarant. Hence, the feld sze requrement n [2] s smaller than that of generc storage code. Another approach, whch uses exact-repar regeneratng codes, can also obtan feld szes that reman constant for an unbounded number of falures. Exact-repar regeneratng codes, however, do not exst for the entre tradeoff curve [8]. Among all these approaches, the use of generc storage code s more flexble n the sense that t does not rely on the structure of the nformaton flow graph, renderng t more applcable to other DSS models. REFERENCES [1] A. G. Dmas, P. B. Godfrey, Y. Wu, M. J. Wanwrght, and K. Ramchandran, Networ codng for dstrbuted storage systems, IEEE Trans. Inf. Theory, vol. 56, no. 9, pp , Sep [2] Y. Wu, Exstence and constructon of capacty-achevng networ codes for dstrbuted storage, IEEE J. on Selected Areas n Commun., vol. 28, no. 2, pp , Feb [3] S.-Y. R. L, R. W. Yeung, and N. Ca, Lnear networ codng, IEEE Trans. Inf. Theory, vol. 49, no. 2, pp , Feb [4] R. Koetter and M. Médard, An algebrac approach to networ codng, IEEE/ACM Trans. Networng, vol. 11, no. 5, pp , Oct [5] R. W. Yeung, Informaton Theory and Networ Codng. Sprnger, [6] L. K. Ford Jr. and D. R. Fulerson, Flows n Networ. Prnceton Unversty Press, [7] M. Tan, R. W. Yeung, S.-T. Ho, and N. Ca, A unfed framewor for lnear networ codng, IEEE Trans. Inf. Theory, vol. 57, no. 1, pp , Jan [8] C. Tan, Characterzng the rate regon of the (4,3,3) exact-repar regeneratng codes, IEEE J. on Selected Areas n Commun., vol., no. 5, pp , May

Refined Coding Bounds for Network Error Correction

Refined Coding Bounds for Network Error Correction Refned Codng Bounds for Network Error Correcton Shenghao Yang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong shyang5@e.cuhk.edu.hk Raymond W. Yeung Department

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

Affine transformations and convexity

Affine transformations and convexity Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

Exact-Regenerating Codes between MBR and MSR Points

Exact-Regenerating Codes between MBR and MSR Points Exact-Regeneratng Codes between BR SR Ponts arxv:1304.5357v1 [cs.dc] 19 Apr 2013 Abstract In ths paper we study dstrbuted storage systems wth exact repar. We gve a constructon for regeneratng codes between

More information

Edge Isoperimetric Inequalities

Edge Isoperimetric Inequalities November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013 ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run

More information

On Network Coding of Independent and Dependent Sources in Line Networks

On Network Coding of Independent and Dependent Sources in Line Networks On Network Codng of Independent and Dependent Sources n Lne Networks Mayank Baksh, Mchelle Effros, WeHsn Gu, Ralf Koetter Department of Electrcal Engneerng Department of Electrcal Engneerng Calforna Insttute

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

Finding Dense Subgraphs in G(n, 1/2)

Finding Dense Subgraphs in G(n, 1/2) Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

Long MDS Codes for Optimal Repair Bandwidth

Long MDS Codes for Optimal Repair Bandwidth Long MDS Codes for Optmal Repar Bandwdth Zhyng Wang, Itzhak Tamo, and Jehoshua Bruck Electrcal Engneerng Department, Calforna Insttute of Technology, Pasadena, CA 91125, USA Electrcal and Computer Engneerng,

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

n ). This is tight for all admissible values of t, k and n. k t + + n t

n ). This is tight for all admissible values of t, k and n. k t + + n t MAXIMIZING THE NUMBER OF NONNEGATIVE SUBSETS NOGA ALON, HAROUT AYDINIAN, AND HAO HUANG Abstract. Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what

More information

2.3 Nilpotent endomorphisms

2.3 Nilpotent endomorphisms s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP

FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP C O L L O Q U I U M M A T H E M A T I C U M VOL. 80 1999 NO. 1 FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP BY FLORIAN K A I N R A T H (GRAZ) Abstract. Let H be a Krull monod wth nfnte class

More information

The L(2, 1)-Labeling on -Product of Graphs

The L(2, 1)-Labeling on -Product of Graphs Annals of Pure and Appled Mathematcs Vol 0, No, 05, 9-39 ISSN: 79-087X (P, 79-0888(onlne Publshed on 7 Aprl 05 wwwresearchmathscorg Annals of The L(, -Labelng on -Product of Graphs P Pradhan and Kamesh

More information

18.1 Introduction and Recap

18.1 Introduction and Recap CS787: Advanced Algorthms Scrbe: Pryananda Shenoy and Shjn Kong Lecturer: Shuch Chawla Topc: Streamng Algorthmscontnued) Date: 0/26/2007 We contnue talng about streamng algorthms n ths lecture, ncludng

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work

More information

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

Lecture 12: Discrete Laplacian

Lecture 12: Discrete Laplacian Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly

More information

Graph Reconstruction by Permutations

Graph Reconstruction by Permutations Graph Reconstructon by Permutatons Perre Ille and Wllam Kocay* Insttut de Mathémathques de Lumny CNRS UMR 6206 163 avenue de Lumny, Case 907 13288 Marselle Cedex 9, France e-mal: lle@ml.unv-mrs.fr Computer

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

Subset Topological Spaces and Kakutani s Theorem

Subset Topological Spaces and Kakutani s Theorem MOD Natural Neutrosophc Subset Topologcal Spaces and Kakutan s Theorem W. B. Vasantha Kandasamy lanthenral K Florentn Smarandache 1 Copyrght 1 by EuropaNova ASBL and the Authors Ths book can be ordered

More information

Connecting Multiple-unicast and Network Error Correction: Reduction and Unachievability

Connecting Multiple-unicast and Network Error Correction: Reduction and Unachievability Connectng Multple-uncast and Network Error Correcton: Reducton and Unachevablty Wentao Huang Calforna Insttute of Technology Mchael Langberg Unversty at Buffalo, SUNY Joerg Klewer New Jersey Insttute of

More information

Every planar graph is 4-colourable a proof without computer

Every planar graph is 4-colourable a proof without computer Peter Dörre Department of Informatcs and Natural Scences Fachhochschule Südwestfalen (Unversty of Appled Scences) Frauenstuhlweg 31, D-58644 Iserlohn, Germany Emal: doerre(at)fh-swf.de Mathematcs Subject

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.65/15.070J Fall 013 Lecture 1 10/1/013 Martngale Concentraton Inequaltes and Applcatons Content. 1. Exponental concentraton for martngales wth bounded ncrements.

More information

a b a In case b 0, a being divisible by b is the same as to say that

a b a In case b 0, a being divisible by b is the same as to say that Secton 6.2 Dvsblty among the ntegers An nteger a ε s dvsble by b ε f there s an nteger c ε such that a = bc. Note that s dvsble by any nteger b, snce = b. On the other hand, a s dvsble by only f a = :

More information

Learning Theory: Lecture Notes

Learning Theory: Lecture Notes Learnng Theory: Lecture Notes Lecturer: Kamalka Chaudhur Scrbe: Qush Wang October 27, 2012 1 The Agnostc PAC Model Recall that one of the constrants of the PAC model s that the data dstrbuton has to be

More information

find (x): given element x, return the canonical element of the set containing x;

find (x): given element x, return the canonical element of the set containing x; COS 43 Sprng, 009 Dsjont Set Unon Problem: Mantan a collecton of dsjont sets. Two operatons: fnd the set contanng a gven element; unte two sets nto one (destructvely). Approach: Canoncal element method:

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017 U.C. Berkeley CS94: Beyond Worst-Case Analyss Handout 4s Luca Trevsan September 5, 07 Summary of Lecture 4 In whch we ntroduce semdefnte programmng and apply t to Max Cut. Semdefnte Programmng Recall that

More information

Linear Approximation with Regularization and Moving Least Squares

Linear Approximation with Regularization and Moving Least Squares Lnear Approxmaton wth Regularzaton and Movng Least Squares Igor Grešovn May 007 Revson 4.6 (Revson : March 004). 5 4 3 0.5 3 3.5 4 Contents: Lnear Fttng...4. Weghted Least Squares n Functon Approxmaton...

More information

Section 3.6 Complex Zeros

Section 3.6 Complex Zeros 04 Chapter Secton 6 Comple Zeros When fndng the zeros of polynomals, at some pont you're faced wth the problem Whle there are clearly no real numbers that are solutons to ths equaton, leavng thngs there

More information

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

Randić Energy and Randić Estrada Index of a Graph

Randić Energy and Randić Estrada Index of a Graph EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS Vol. 5, No., 202, 88-96 ISSN 307-5543 www.ejpam.com SPECIAL ISSUE FOR THE INTERNATIONAL CONFERENCE ON APPLIED ANALYSIS AND ALGEBRA 29 JUNE -02JULY 20, ISTANBUL

More information

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003 Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel

More information

arxiv: v1 [math.co] 1 Mar 2014

arxiv: v1 [math.co] 1 Mar 2014 Unon-ntersectng set systems Gyula O.H. Katona and Dánel T. Nagy March 4, 014 arxv:1403.0088v1 [math.co] 1 Mar 014 Abstract Three ntersecton theorems are proved. Frst, we determne the sze of the largest

More information

The optimal delay of the second test is therefore approximately 210 hours earlier than =2.

The optimal delay of the second test is therefore approximately 210 hours earlier than =2. THE IEC 61508 FORMULAS 223 The optmal delay of the second test s therefore approxmately 210 hours earler than =2. 8.4 The IEC 61508 Formulas IEC 61508-6 provdes approxmaton formulas for the PF for smple

More information

Computing Correlated Equilibria in Multi-Player Games

Computing Correlated Equilibria in Multi-Player Games Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,

More information

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0 MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector

More information

5 The Rational Canonical Form

5 The Rational Canonical Form 5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces

More information

A new construction of 3-separable matrices via an improved decoding of Macula s construction

A new construction of 3-separable matrices via an improved decoding of Macula s construction Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula

More information

FINITELY-GENERATED MODULES OVER A PRINCIPAL IDEAL DOMAIN

FINITELY-GENERATED MODULES OVER A PRINCIPAL IDEAL DOMAIN FINITELY-GENERTED MODULES OVER PRINCIPL IDEL DOMIN EMMNUEL KOWLSKI Throughout ths note, s a prncpal deal doman. We recall the classfcaton theorem: Theorem 1. Let M be a fntely-generated -module. (1) There

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Chapter 7 Channel Capacity and Coding

Chapter 7 Channel Capacity and Coding Wreless Informaton Transmsson System Lab. Chapter 7 Channel Capacty and Codng Insttute of Communcatons Engneerng atonal Sun Yat-sen Unversty Contents 7. Channel models and channel capacty 7.. Channel models

More information

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng

More information

Linear, affine, and convex sets and hulls In the sequel, unless otherwise specified, X will denote a real vector space.

Linear, affine, and convex sets and hulls In the sequel, unless otherwise specified, X will denote a real vector space. Lnear, affne, and convex sets and hulls In the sequel, unless otherwse specfed, X wll denote a real vector space. Lnes and segments. Gven two ponts x, y X, we defne xy = {x + t(y x) : t R} = {(1 t)x +

More information

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011 Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected

More information

Anti-van der Waerden numbers of 3-term arithmetic progressions.

Anti-van der Waerden numbers of 3-term arithmetic progressions. Ant-van der Waerden numbers of 3-term arthmetc progressons. Zhanar Berkkyzy, Alex Schulte, and Mchael Young Aprl 24, 2016 Abstract The ant-van der Waerden number, denoted by aw([n], k), s the smallest

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

Random Walks on Digraphs

Random Walks on Digraphs Random Walks on Dgraphs J. J. P. Veerman October 23, 27 Introducton Let V = {, n} be a vertex set and S a non-negatve row-stochastc matrx (.e. rows sum to ). V and S defne a dgraph G = G(V, S) and a drected

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

The Geometry of Logit and Probit

The Geometry of Logit and Probit The Geometry of Logt and Probt Ths short note s meant as a supplement to Chapters and 3 of Spatal Models of Parlamentary Votng and the notaton and reference to fgures n the text below s to those two chapters.

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

Mixed-integer vertex covers on bipartite graphs

Mixed-integer vertex covers on bipartite graphs Mxed-nteger vertex covers on bpartte graphs Mchele Confort, Bert Gerards, Gacomo Zambell November, 2006 Abstract Let A be the edge-node ncdence matrx of a bpartte graph G = (U, V ; E), I be a subset the

More information

Distribution of subgraphs of random regular graphs

Distribution of subgraphs of random regular graphs Dstrbuton of subgraphs of random regular graphs Zhcheng Gao Faculty of Busness Admnstraton Unversty of Macau Macau Chna zcgao@umac.mo N. C. Wormald Department of Combnatorcs and Optmzaton Unversty of Waterloo

More information

20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness.

20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness. 20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The frst dea s connectedness. Essentally, we want to say that a space cannot be decomposed

More information

Finding Primitive Roots Pseudo-Deterministically

Finding Primitive Roots Pseudo-Deterministically Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms

More information

Data Secrecy in Distributed Storage Systems under Exact Repair

Data Secrecy in Distributed Storage Systems under Exact Repair Data Secrecy n Dstrbuted Storage Systems under Exact Repar Sreechakra Goparaju, Salm El Rouayheb, Robert Calderbank and H. Vncent Poor Abstract The problem of securng data aganst eavesdroppng n dstrbuted

More information

Section 8.3 Polar Form of Complex Numbers

Section 8.3 Polar Form of Complex Numbers 80 Chapter 8 Secton 8 Polar Form of Complex Numbers From prevous classes, you may have encountered magnary numbers the square roots of negatve numbers and, more generally, complex numbers whch are the

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

7. Products and matrix elements

7. Products and matrix elements 7. Products and matrx elements 1 7. Products and matrx elements Based on the propertes of group representatons, a number of useful results can be derved. Consder a vector space V wth an nner product ψ

More information

Exercise Solutions to Real Analysis

Exercise Solutions to Real Analysis xercse Solutons to Real Analyss Note: References refer to H. L. Royden, Real Analyss xersze 1. Gven any set A any ɛ > 0, there s an open set O such that A O m O m A + ɛ. Soluton 1. If m A =, then there

More information

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2].

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2]. Bulletn of Mathematcal Scences and Applcatons Submtted: 016-04-07 ISSN: 78-9634, Vol. 18, pp 1-10 Revsed: 016-09-08 do:10.1805/www.scpress.com/bmsa.18.1 Accepted: 016-10-13 017 ScPress Ltd., Swtzerland

More information

Outline and Reading. Dynamic Programming. Dynamic Programming revealed. Computing Fibonacci. The General Dynamic Programming Technique

Outline and Reading. Dynamic Programming. Dynamic Programming revealed. Computing Fibonacci. The General Dynamic Programming Technique Outlne and Readng Dynamc Programmng The General Technque ( 5.3.2) -1 Knapsac Problem ( 5.3.3) Matrx Chan-Product ( 5.3.1) Dynamc Programmng verson 1.4 1 Dynamc Programmng verson 1.4 2 Dynamc Programmng

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

Complete subgraphs in multipartite graphs

Complete subgraphs in multipartite graphs Complete subgraphs n multpartte graphs FLORIAN PFENDER Unverstät Rostock, Insttut für Mathematk D-18057 Rostock, Germany Floran.Pfender@un-rostock.de Abstract Turán s Theorem states that every graph G

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

Introductory Cardinality Theory Alan Kaylor Cline

Introductory Cardinality Theory Alan Kaylor Cline Introductory Cardnalty Theory lan Kaylor Clne lthough by name the theory of set cardnalty may seem to be an offshoot of combnatorcs, the central nterest s actually nfnte sets. Combnatorcs deals wth fnte

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Lecture 10: May 6, 2013

Lecture 10: May 6, 2013 TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

Expected Value and Variance

Expected Value and Variance MATH 38 Expected Value and Varance Dr. Neal, WKU We now shall dscuss how to fnd the average and standard devaton of a random varable X. Expected Value Defnton. The expected value (or average value, or

More information

SL n (F ) Equals its Own Derived Group

SL n (F ) Equals its Own Derived Group Internatonal Journal of Algebra, Vol. 2, 2008, no. 12, 585-594 SL n (F ) Equals ts Own Derved Group Jorge Macel BMCC-The Cty Unversty of New York, CUNY 199 Chambers street, New York, NY 10007, USA macel@cms.nyu.edu

More information

Approximate Smallest Enclosing Balls

Approximate Smallest Enclosing Balls Chapter 5 Approxmate Smallest Enclosng Balls 5. Boundng Volumes A boundng volume for a set S R d s a superset of S wth a smple shape, for example a box, a ball, or an ellpsod. Fgure 5.: Boundng boxes Q(P

More information

HMMT February 2016 February 20, 2016

HMMT February 2016 February 20, 2016 HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,

More information

COS 521: Advanced Algorithms Game Theory and Linear Programming

COS 521: Advanced Algorithms Game Theory and Linear Programming COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton

More information

Perfect Competition and the Nash Bargaining Solution

Perfect Competition and the Nash Bargaining Solution Perfect Competton and the Nash Barganng Soluton Renhard John Department of Economcs Unversty of Bonn Adenauerallee 24-42 53113 Bonn, Germany emal: rohn@un-bonn.de May 2005 Abstract For a lnear exchange

More information

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS BOUNDEDNESS OF THE IESZ TANSFOM WITH MATIX A WEIGHTS Introducton Let L = L ( n, be the functon space wth norm (ˆ f L = f(x C dx d < For a d d matrx valued functon W : wth W (x postve sem-defnte for all

More information

Lecture 20: Lift and Project, SDP Duality. Today we will study the Lift and Project method. Then we will prove the SDP duality theorem.

Lecture 20: Lift and Project, SDP Duality. Today we will study the Lift and Project method. Then we will prove the SDP duality theorem. prnceton u. sp 02 cos 598B: algorthms and complexty Lecture 20: Lft and Project, SDP Dualty Lecturer: Sanjeev Arora Scrbe:Yury Makarychev Today we wll study the Lft and Project method. Then we wll prove

More information

The equation of motion of a dynamical system is given by a set of differential equations. That is (1)

The equation of motion of a dynamical system is given by a set of differential equations. That is (1) Dynamcal Systems Many engneerng and natural systems are dynamcal systems. For example a pendulum s a dynamcal system. State l The state of the dynamcal system specfes t condtons. For a pendulum n the absence

More information

p 1 c 2 + p 2 c 2 + p 3 c p m c 2

p 1 c 2 + p 2 c 2 + p 3 c p m c 2 Where to put a faclty? Gven locatons p 1,..., p m n R n of m houses, want to choose a locaton c n R n for the fre staton. Want c to be as close as possble to all the house. We know how to measure dstance

More information

princeton univ. F 13 cos 521: Advanced Algorithm Design Lecture 3: Large deviations bounds and applications Lecturer: Sanjeev Arora

princeton univ. F 13 cos 521: Advanced Algorithm Design Lecture 3: Large deviations bounds and applications Lecturer: Sanjeev Arora prnceton unv. F 13 cos 521: Advanced Algorthm Desgn Lecture 3: Large devatons bounds and applcatons Lecturer: Sanjeev Arora Scrbe: Today s topc s devaton bounds: what s the probablty that a random varable

More information

Counterexamples to the Connectivity Conjecture of the Mixed Cells

Counterexamples to the Connectivity Conjecture of the Mixed Cells Dscrete Comput Geom 2:55 52 998 Dscrete & Computatonal Geometry 998 Sprnger-Verlag New York Inc. Counterexamples to the Connectvty Conjecture of the Mxed Cells T. Y. L and X. Wang 2 Department of Mathematcs

More information

CSCE 790S Background Results

CSCE 790S Background Results CSCE 790S Background Results Stephen A. Fenner September 8, 011 Abstract These results are background to the course CSCE 790S/CSCE 790B, Quantum Computaton and Informaton (Sprng 007 and Fall 011). Each

More information

A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS

A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS Journal of Mathematcal Scences: Advances and Applcatons Volume 25, 2014, Pages 1-12 A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS JIA JI, WEN ZHANG and XIAOFEI QI Department of Mathematcs

More information

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results. Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson

More information

Lecture 2: Gram-Schmidt Vectors and the LLL Algorithm

Lecture 2: Gram-Schmidt Vectors and the LLL Algorithm NYU, Fall 2016 Lattces Mn Course Lecture 2: Gram-Schmdt Vectors and the LLL Algorthm Lecturer: Noah Stephens-Davdowtz 2.1 The Shortest Vector Problem In our last lecture, we consdered short solutons to

More information

THERE ARE INFINITELY MANY FIBONACCI COMPOSITES WITH PRIME SUBSCRIPTS

THERE ARE INFINITELY MANY FIBONACCI COMPOSITES WITH PRIME SUBSCRIPTS Research and Communcatons n Mathematcs and Mathematcal Scences Vol 10, Issue 2, 2018, Pages 123-140 ISSN 2319-6939 Publshed Onlne on November 19, 2018 2018 Jyot Academc Press http://jyotacademcpressorg

More information