Information Representation by Hierarchies

Size: px
Start display at page:

Download "Information Representation by Hierarchies"

Transcription

1 Information Representation by Hierarchies We wish to create a telephone system which will enable each telephone to communicate with every other one There are in total N telephones Solution? We can connect each telephone with the other one, N(N-1)/2 connections For big N, the number of connections would be to big 1

2 We could connect each telephone to a single central office For N telephones this would require only N connections The switching load of the central office would be enormous Long waiting times If the telephones are far away, we would require long wires Emphasis of the hierarchical arrangement Set the central office at the top of the diagram Hierarchical arrangement of the network with 2 levels 2

3 Suppose k central offices each serve N/k telephones directly k central offices are themselves connected to a single national office 3-level hierarchical network topology N+k connections What is the optimal number of k? Stating from a given telephone, the waiting time to obtain service from its central office will be proportional to the number of telephones, N/k Time from national office is k Total time k+n/k, minimum for k = Average total time is proportional to Star network average time is N N 2" N Would additional level bring an improvement? 3

4 Our structure, a tree is organized in levels Suppose each node belonging to a given level has the same number of children The levels are labeled from 0 to L, level 0 is the root, level L are the leafs How many nodes should each level contain in order that the average waiting time required is as small as possible? The average witing/search time through such a tree will be minimized if the number of nodes N(k) which belongs to the level k is related to the number N=N(L) N(k)=N k/l for k=1,...,l Example L=2, N(1)=N 1/2 4

5 N(k)=N k/l for k=1,...,l Whatever the value of L is, each subtree of a tree which minimizes average waiting/search time must be also minimize the average time Otherwise it would be possible to replace the subtree with a more efficient Proof of N(k)=N k/l is based on induction L=1 is true We will assume the validity of the equation for k < L and prove it for k=l 5

6 From the equation it follows (N(0)=1) N(1)=N 1/l N(1) k =N k/l =N(k) N(k)=N(1) k N(1)=N(1) 1 N(2)=N(1) 2 N(3)=N(1) 3 and so on...till N(L-1)=N(1) L-1, prove it for L 2t average = N(1)/N(0)+N(2)/N(1)+N(3)/N(2)...+N(L)/N(L-1) Factor 2 appears because, on the average only half of the nodes at each level are encountered in a sequential search 2t average = N(1)+N(1)+N(1)+...+N(L)/N(1) L-1 2t average =(L-1)*N(1)+N(L)/N(1) L-1 2t average =(L-1)*N(1)+N(L)/N(1) L-1 The total number of nodes N (=N(L)) is given, our task is to determine N(1) so that t is minimized dt/n(1)=0 0=dt/N(1)=1/2*((L-1) - (L-1)*N(L)/N(1) L ) Solution --> N=N(L)=N(1) L Which is the formula for k=l, the induction step is conducted 6

7 With N=N(L) follows t avarage =L/2*N(1)=L/2*N 1/L Value of L which minimize tavarage t avarage =L/2*N 1/L =L/2*exp(1/L*log(N)) dt/dl=1/2(1-log(n)/l)*exp(1/l*log(n))=0 L=log(N) 0.69*log 2 (N) t min =log(n)/2*exp(log(n)/(log N)) t min =log(n)/2*exp(1) t min 0.94*log 2 (N) L 0.69*log 2 (N) t min 0.94*log 2 (N) As an example consider a library catalog card tray, with N=800 card, L=7 will minimize the search time However, traditional library card catalogs seldom have an indexing hierarchy greater than 3 7

8 Hierarchical structures occur through civilization Decomposition of a hierarchy into simpler parts Space Shuttle, Cars By repetition of the process of partitioning the system into disjoint and independent sub-units, a level of simplicity is finally reached for which individual expertise suffices to design and produce these elementary components The complex combination which carry the genetic code could hardly, in the limited time, since cooling of the earth, have come into direct existence, if not by hierarchical organization DNA consists of building blocks, each of which in turn is constructed from simpler standardized chemical combinations These combinations have a higher probability to come together 8

9 How much information is carried by DNA? The information of DNA is coded in terms of ordered triples of four chemical substances called nucleotide bases Ordered triples of nucleotide bases correspond to the 20 primary amino acids which are the building blocks of proteins Because there are 64 (4 3 ) possible combinations, it follows that a given amino acid may correspond to more than one combination (=condon) Human DNA consists of 5 bilion nucleid bases, 1.7 billion condons Each condon corresponds to 6 bits, since 2 6 =64 9

10 Structure of mater itself is hierarchically organized 10

11 Elementary arithmetic's A primitive and ancient way to denote a positive whole number N is to arrange N similar strokes Counting notation, take up large amount of space Babylonian invention of more efficient positional notation for numbers (4000 years ago) Positional notation is itself a hierarchical organized structure Express the whole number N is positional notation to base B 11

12 Let be B=10 Determine the largest integer k, such that B k N Specify how many digits will occur in the base B notation of the number N Determine the leading digit n k of the base B represented of N n k will be one of digits 0,1,..,B-1 largest integer n k B k N The next digit n k-1 is the largest integer such that n k-1 B k-1 N-n k B k And so on... 12

13 There is a tremendous gain in computational efficiency when two numbers expressed in positional notation are multiplied M=m k B k +...+m 1 B+m 0 N=n l B k +...+n 1 B+n 0 The product M*N is calculated by multiplying the single digits and adding the resulting columns, (k+1)(l+1) elementary operations instead of MN Example of a Taxonomy In 1887 Professor Harry Govier Seeley grouped all dinosaurs into the saurischia and ornithischia groups according to their hip design The saurischian were divided later into two subgroups: the carnivorous, bipedal theropods and the plant-eating, mostly quadruped sauropodomorphs The ornithischians were divided into the subgroups birdlike ornithopods, armored thyreophorans, and margginoncephalia The subgroups can be divided into suborders and then into families and finally into genus The genus includes the species 13

14 14

15 Another Example 15

16 Cost of Information Combination of the amount of information it produces and the effort required to obtain it Maximization of the information gained for a given effort invested (minimize the effort) Hierarchical structures that are characterized by the value of certain structural parameters If one assumes that time required for each elementary operation performed by the hierarchical organized information processing system is independent of the operation, then the time required to provide a unit of information will be a good measure of cost If the parameters of the system are selected so that the corresponding structure minimize the processing time, the system will be optimal for some parameters 16

17 Let be x 1,..,x n the parameters of the system We have some cost of the system (effort) E(x 1,..,x n ) and the corresponding produced information I(x 1,..,x n ) Then the solution to determine an optimal information-processing structure corresponds to maximize I/E Solved by calculus of variations Second law of Thermodynamics A physical system will extremize information for a given value of the energy by evolving towards a canonical distribution of its states which maximizes entropy and minimize the information 17

18 ..addition Example Range query Range query: search covers all points in the space whose Euclidian distance to the query y is smaller or equal to ε 18

19 DB[y] σ = y = Curse of dimensionality The metric indexes trees operate efficiently when the number of dimensions is small The growth of the number of dimensions has negative implications for the performance failing with the dimensionality eventually reducing the search time to sequential scanning problems arise from the fact that the volume of a sphere constant radius grows exponentially with increasing dimension 19

20 Linear subspace sequence Sequence of subspaces with, V=U 0 and Lower bounding lemma, Example, DB in subspace 20

21 Computing costs U={(x 1,x 2 ) R 2 x 1 =x 2 } 21

22 Orthogonal projection Corresponds to the mean value of the projected points Distance d between projected points in R m corresponds to the distance d u in the orthogonal subspace U multiplied by a constant c 22

23 Hierarchy of subspaces The distance between objects d=d U0 in the space U 0 can be obtained from the distance d Uk between objects in the orthogonal subspace U k by multiplying the distance d Uk by a constant Mean Euclidian distance for a query y to the elements of DB 23

24 Mean computing costs using the hierarchical subspace method Error bars indicate the standard deviation The x-axis indicates the number of the most similar images which are retrieved and the y-axis, the computing costs Computing costs simplification to: 24

25 25

An introduction to parallel algorithms

An introduction to parallel algorithms An introduction to parallel algorithms Knut Mørken Department of Informatics Centre of Mathematics for Applications University of Oslo Winter School on Parallel Computing Geilo January 20 25, 2008 1/26

More information

SIGNAL COMPRESSION Lecture 7. Variable to Fix Encoding

SIGNAL COMPRESSION Lecture 7. Variable to Fix Encoding SIGNAL COMPRESSION Lecture 7 Variable to Fix Encoding 1. Tunstall codes 2. Petry codes 3. Generalized Tunstall codes for Markov sources (a presentation of the paper by I. Tabus, G. Korodi, J. Rissanen.

More information

Information Theory, Statistics, and Decision Trees

Information Theory, Statistics, and Decision Trees Information Theory, Statistics, and Decision Trees Léon Bottou COS 424 4/6/2010 Summary 1. Basic information theory. 2. Decision trees. 3. Information theory and statistics. Léon Bottou 2/31 COS 424 4/6/2010

More information

The Fundamental Theorem of Arithmetic

The Fundamental Theorem of Arithmetic Chapter 1 The Fundamental Theorem of Arithmetic 1.1 Primes Definition 1.1. We say that p N is prime if it has just two factors in N, 1 and p itself. Number theory might be described as the study of the

More information

Wolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig

Wolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig Multimedia Databases Wolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 14 Indexes for Multimedia Data 14 Indexes for Multimedia

More information

k-protected VERTICES IN BINARY SEARCH TREES

k-protected VERTICES IN BINARY SEARCH TREES k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from

More information

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Compute the Fourier transform on the first register to get x {0,1} n x 0. CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary

More information

Average Case Analysis of QuickSort and Insertion Tree Height using Incompressibility

Average Case Analysis of QuickSort and Insertion Tree Height using Incompressibility Average Case Analysis of QuickSort and Insertion Tree Height using Incompressibility Tao Jiang, Ming Li, Brendan Lucier September 26, 2005 Abstract In this paper we study the Kolmogorov Complexity of a

More information

Classes of Boolean Functions

Classes of Boolean Functions Classes of Boolean Functions Nader H. Bshouty Eyal Kushilevitz Abstract Here we give classes of Boolean functions that considered in COLT. Classes of Functions Here we introduce the basic classes of functions

More information

Discrete Mathematics & Mathematical Reasoning Chapter 6: Counting

Discrete Mathematics & Mathematical Reasoning Chapter 6: Counting Discrete Mathematics & Mathematical Reasoning Chapter 6: Counting Kousha Etessami U. of Edinburgh, UK Kousha Etessami (U. of Edinburgh, UK) Discrete Mathematics (Chapter 6) 1 / 39 Chapter Summary The Basics

More information

CS Data Structures and Algorithm Analysis

CS Data Structures and Algorithm Analysis CS 483 - Data Structures and Algorithm Analysis Lecture VII: Chapter 6, part 2 R. Paul Wiegand George Mason University, Department of Computer Science March 22, 2006 Outline 1 Balanced Trees 2 Heaps &

More information

Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018

Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018 CS17 Integrated Introduction to Computer Science Klein Contents Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018 1 Tree definitions 1 2 Analysis of mergesort using a binary tree 1 3 Analysis of

More information

1 Adeles over Q. 1.1 Absolute values

1 Adeles over Q. 1.1 Absolute values 1 Adeles over Q 1.1 Absolute values Definition 1.1.1 (Absolute value) An absolute value on a field F is a nonnegative real valued function on F which satisfies the conditions: (i) x = 0 if and only if

More information

Lecture 2: Proof of Switching Lemma

Lecture 2: Proof of Switching Lemma Lecture 2: oof of Switching Lemma Yuan Li June 25, 2014 1 Decision Tree Instead of bounding the probability that f can be written as some s-dnf, we estimate the probability that f can be computed by a

More information

Biological Networks: Comparison, Conservation, and Evolution via Relative Description Length By: Tamir Tuller & Benny Chor

Biological Networks: Comparison, Conservation, and Evolution via Relative Description Length By: Tamir Tuller & Benny Chor Biological Networks:,, and via Relative Description Length By: Tamir Tuller & Benny Chor Presented by: Noga Grebla Content of the presentation Presenting the goals of the research Reviewing basic terms

More information

Structured Variational Inference

Structured Variational Inference Structured Variational Inference Sargur srihari@cedar.buffalo.edu 1 Topics 1. Structured Variational Approximations 1. The Mean Field Approximation 1. The Mean Field Energy 2. Maximizing the energy functional:

More information

Preliminaries and Complexity Theory

Preliminaries and Complexity Theory Preliminaries and Complexity Theory Oleksandr Romanko CAS 746 - Advanced Topics in Combinatorial Optimization McMaster University, January 16, 2006 Introduction Book structure: 2 Part I Linear Algebra

More information

A ZERO ENTROPY T SUCH THAT THE [T,ID] ENDOMORPHISM IS NONSTANDARD

A ZERO ENTROPY T SUCH THAT THE [T,ID] ENDOMORPHISM IS NONSTANDARD A ZERO ENTROPY T SUCH THAT THE [T,ID] ENDOMORPHISM IS NONSTANDARD CHRISTOPHER HOFFMAN Abstract. We present an example of an ergodic transformation T, a variant of a zero entropy non loosely Bernoulli map

More information

Greedy Trees, Caterpillars, and Wiener-Type Graph Invariants

Greedy Trees, Caterpillars, and Wiener-Type Graph Invariants Georgia Southern University Digital Commons@Georgia Southern Mathematical Sciences Faculty Publications Mathematical Sciences, Department of 2012 Greedy Trees, Caterpillars, and Wiener-Type Graph Invariants

More information

Problem. Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26

Problem. Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26 Binary Search Introduction Problem Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26 Strategy 1: Random Search Randomly select a page until the page containing

More information

MARKING A BINARY TREE PROBABILISTIC ANALYSIS OF A RANDOMIZED ALGORITHM

MARKING A BINARY TREE PROBABILISTIC ANALYSIS OF A RANDOMIZED ALGORITHM MARKING A BINARY TREE PROBABILISTIC ANALYSIS OF A RANDOMIZED ALGORITHM XIANG LI Abstract. This paper centers on the analysis of a specific randomized algorithm, a basic random process that involves marking

More information

Multi-normed spaces and multi-banach algebras. H. G. Dales. Leeds Semester

Multi-normed spaces and multi-banach algebras. H. G. Dales. Leeds Semester Multi-normed spaces and multi-banach algebras H. G. Dales Leeds Semester Leeds, 2 June 2010 1 Motivating problem Let G be a locally compact group, with group algebra L 1 (G). Theorem - B. E. Johnson, 1972

More information

CIS (More Propositional Calculus - 6 points)

CIS (More Propositional Calculus - 6 points) 1 CIS6333 Homework 1 (due Friday, February 1) 1. (Propositional Calculus - 10 points) --------------------------------------- Let P, Q, R range over state predicates of some program. Prove or disprove

More information

A Phylogenetic Network Construction due to Constrained Recombination

A Phylogenetic Network Construction due to Constrained Recombination A Phylogenetic Network Construction due to Constrained Recombination Mohd. Abdul Hai Zahid Research Scholar Research Supervisors: Dr. R.C. Joshi Dr. Ankush Mittal Department of Electronics and Computer

More information

1 Introduction to information theory

1 Introduction to information theory 1 Introduction to information theory 1.1 Introduction In this chapter we present some of the basic concepts of information theory. The situations we have in mind involve the exchange of information through

More information

Information & Correlation

Information & Correlation Information & Correlation Jilles Vreeken 11 June 2014 (TADA) Questions of the day What is information? How can we measure correlation? and what do talking drums have to do with this? Bits and Pieces What

More information

Induction and recursion. Chapter 5

Induction and recursion. Chapter 5 Induction and recursion Chapter 5 Chapter Summary Mathematical Induction Strong Induction Well-Ordering Recursive Definitions Structural Induction Recursive Algorithms Mathematical Induction Section 5.1

More information

Problem Set 1 Solutions

Problem Set 1 Solutions 18.014 Problem Set 1 Solutions Total: 4 points Problem 1: If ab = 0, then a = 0 or b = 0. Suppose ab = 0 and b = 0. By axiom 6, there exists a real number y such that by = 1. Hence, we have a = 1 a = a

More information

Analysis-3 lecture schemes

Analysis-3 lecture schemes Analysis-3 lecture schemes (with Homeworks) 1 Csörgő István November, 2015 1 A jegyzet az ELTE Informatikai Kar 2015. évi Jegyzetpályázatának támogatásával készült Contents 1. Lesson 1 4 1.1. The Space

More information

Discrete Mathematics, Spring 2004 Homework 4 Sample Solutions

Discrete Mathematics, Spring 2004 Homework 4 Sample Solutions Discrete Mathematics, Spring 2004 Homework 4 Sample Solutions 4.2 #77. Let s n,k denote the number of ways to seat n persons at k round tables, with at least one person at each table. (The numbers s n,k

More information

REVIEW QUESTIONS. Chapter 1: Foundations: Sets, Logic, and Algorithms

REVIEW QUESTIONS. Chapter 1: Foundations: Sets, Logic, and Algorithms REVIEW QUESTIONS Chapter 1: Foundations: Sets, Logic, and Algorithms 1. Why can t a Venn diagram be used to prove a statement about sets? 2. Suppose S is a set with n elements. Explain why the power set

More information

A NEW BASIS SELECTION PARADIGM FOR WAVELET PACKET IMAGE CODING

A NEW BASIS SELECTION PARADIGM FOR WAVELET PACKET IMAGE CODING A NEW BASIS SELECTION PARADIGM FOR WAVELET PACKET IMAGE CODING Nasir M. Rajpoot, Roland G. Wilson, François G. Meyer, Ronald R. Coifman Corresponding Author: nasir@dcs.warwick.ac.uk ABSTRACT In this paper,

More information

Chapter Summary. Mathematical Induction Strong Induction Well-Ordering Recursive Definitions Structural Induction Recursive Algorithms

Chapter Summary. Mathematical Induction Strong Induction Well-Ordering Recursive Definitions Structural Induction Recursive Algorithms 1 Chapter Summary Mathematical Induction Strong Induction Well-Ordering Recursive Definitions Structural Induction Recursive Algorithms 2 Section 5.1 3 Section Summary Mathematical Induction Examples of

More information

Wolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig

Wolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig Multimedia Databases Wolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 13 Indexes for Multimedia Data 13 Indexes for Multimedia

More information

Hierarchical Clustering

Hierarchical Clustering Hierarchical Clustering Some slides by Serafim Batzoglou 1 From expression profiles to distances From the Raw Data matrix we compute the similarity matrix S. S ij reflects the similarity of the expression

More information

Standard forms for writing numbers

Standard forms for writing numbers Standard forms for writing numbers In order to relate the abstract mathematical descriptions of familiar number systems to the everyday descriptions of numbers by decimal expansions and similar means,

More information

Associative Digital Network Theory

Associative Digital Network Theory Associative Digital Network Theory An Associative Algebra Approach to Logic, Arithmetic and State Machines Nico F. Benschop Preface This book is intended for researchers at industrial laboratories, teachers

More information

DR.RUPNATHJI( DR.RUPAK NATH )

DR.RUPNATHJI( DR.RUPAK NATH ) Contents 1 Sets 1 2 The Real Numbers 9 3 Sequences 29 4 Series 59 5 Functions 81 6 Power Series 105 7 The elementary functions 111 Chapter 1 Sets It is very convenient to introduce some notation and terminology

More information

Problems for Putnam Training

Problems for Putnam Training Problems for Putnam Training 1 Number theory Problem 1.1. Prove that for each positive integer n, the number is not prime. 10 1010n + 10 10n + 10 n 1 Problem 1.2. Show that for any positive integer n,

More information

Basic elements of number theory

Basic elements of number theory Cryptography Basic elements of number theory Marius Zimand By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a k for some integer k. Notation

More information

Basic elements of number theory

Basic elements of number theory Cryptography Basic elements of number theory Marius Zimand 1 Divisibility, prime numbers By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a

More information

EECS 229A Spring 2007 * * (a) By stationarity and the chain rule for entropy, we have

EECS 229A Spring 2007 * * (a) By stationarity and the chain rule for entropy, we have EECS 229A Spring 2007 * * Solutions to Homework 3 1. Problem 4.11 on pg. 93 of the text. Stationary processes (a) By stationarity and the chain rule for entropy, we have H(X 0 ) + H(X n X 0 ) = H(X 0,

More information

Distribution-specific analysis of nearest neighbor search and classification

Distribution-specific analysis of nearest neighbor search and classification Distribution-specific analysis of nearest neighbor search and classification Sanjoy Dasgupta University of California, San Diego Nearest neighbor The primeval approach to information retrieval and classification.

More information

Lecture 16: Communication Complexity

Lecture 16: Communication Complexity CSE 531: Computational Complexity I Winter 2016 Lecture 16: Communication Complexity Mar 2, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 Communication Complexity In (two-party) communication complexity

More information

Inference as Optimization

Inference as Optimization Inference as Optimization Sargur Srihari srihari@cedar.buffalo.edu 1 Topics in Inference as Optimization Overview Exact Inference revisited The Energy Functional Optimizing the Energy Functional 2 Exact

More information

(1) Consider the space S consisting of all continuous real-valued functions on the closed interval [0, 1]. For f, g S, define

(1) Consider the space S consisting of all continuous real-valued functions on the closed interval [0, 1]. For f, g S, define Homework, Real Analysis I, Fall, 2010. (1) Consider the space S consisting of all continuous real-valued functions on the closed interval [0, 1]. For f, g S, define ρ(f, g) = 1 0 f(x) g(x) dx. Show that

More information

Enumeration and symmetry of edit metric spaces. Jessie Katherine Campbell. A dissertation submitted to the graduate faculty

Enumeration and symmetry of edit metric spaces. Jessie Katherine Campbell. A dissertation submitted to the graduate faculty Enumeration and symmetry of edit metric spaces by Jessie Katherine Campbell A dissertation submitted to the graduate faculty in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY

More information

Solutions: Problem Set 3 Math 201B, Winter 2007

Solutions: Problem Set 3 Math 201B, Winter 2007 Solutions: Problem Set 3 Math 201B, Winter 2007 Problem 1. Prove that an infinite-dimensional Hilbert space is a separable metric space if and only if it has a countable orthonormal basis. Solution. If

More information

Multimedia Databases 1/29/ Indexes for Multimedia Data Indexes for Multimedia Data Indexes for Multimedia Data

Multimedia Databases 1/29/ Indexes for Multimedia Data Indexes for Multimedia Data Indexes for Multimedia Data 1/29/2010 13 Indexes for Multimedia Data 13 Indexes for Multimedia Data 13.1 R-Trees Multimedia Databases Wolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig

More information

Impression Store: Compressive Sensing-based Storage for. Big Data Analytics

Impression Store: Compressive Sensing-based Storage for. Big Data Analytics Impression Store: Compressive Sensing-based Storage for Big Data Analytics Jiaxing Zhang, Ying Yan, Liang Jeff Chen, Minjie Wang, Thomas Moscibroda & Zheng Zhang Microsoft Research The Curse of O(N) in

More information

Braids and some other groups arising in geometry and topology

Braids and some other groups arising in geometry and topology Braids and some other groups arising in geometry and topology Vladimir Vershinin Young Topologist Seminar, IMS, Singapore (11-21 August 2015) Braids and Thompson groups 1. Geometrical definition of Thompson

More information

BLAST: Target frequencies and information content Dannie Durand

BLAST: Target frequencies and information content Dannie Durand Computational Genomics and Molecular Biology, Fall 2016 1 BLAST: Target frequencies and information content Dannie Durand BLAST has two components: a fast heuristic for searching for similar sequences

More information

A Polynomial Time Deterministic Algorithm for Identity Testing Read-Once Polynomials

A Polynomial Time Deterministic Algorithm for Identity Testing Read-Once Polynomials A Polynomial Time Deterministic Algorithm for Identity Testing Read-Once Polynomials Daniel Minahan Ilya Volkovich August 15, 2016 Abstract The polynomial identity testing problem, or PIT, asks how we

More information

On improving matchings in trees, via bounded-length augmentations 1

On improving matchings in trees, via bounded-length augmentations 1 On improving matchings in trees, via bounded-length augmentations 1 Julien Bensmail a, Valentin Garnero a, Nicolas Nisse a a Université Côte d Azur, CNRS, Inria, I3S, France Abstract Due to a classical

More information

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard

More information

ACO Comprehensive Exam 19 March Graph Theory

ACO Comprehensive Exam 19 March Graph Theory 1. Graph Theory Let G be a connected simple graph that is not a cycle and is not complete. Prove that there exist distinct non-adjacent vertices u, v V (G) such that the graph obtained from G by deleting

More information

A strongly polynomial algorithm for linear systems having a binary solution

A strongly polynomial algorithm for linear systems having a binary solution A strongly polynomial algorithm for linear systems having a binary solution Sergei Chubanov Institute of Information Systems at the University of Siegen, Germany e-mail: sergei.chubanov@uni-siegen.de 7th

More information

CSCE 222 Discrete Structures for Computing. Review for Exam 2. Dr. Hyunyoung Lee !!!

CSCE 222 Discrete Structures for Computing. Review for Exam 2. Dr. Hyunyoung Lee !!! CSCE 222 Discrete Structures for Computing Review for Exam 2 Dr. Hyunyoung Lee 1 Strategy for Exam Preparation - Start studying now (unless have already started) - Study class notes (lecture slides and

More information

1 AC 0 and Håstad Switching Lemma

1 AC 0 and Håstad Switching Lemma princeton university cos 522: computational complexity Lecture 19: Circuit complexity Lecturer: Sanjeev Arora Scribe:Tony Wirth Complexity theory s Waterloo As we saw in an earlier lecture, if PH Σ P 2

More information

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181. Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität

More information

Algorithms and Data Structures

Algorithms and Data Structures Charles A. Wuethrich Bauhaus-University Weimar - CogVis/MMC June 1, 2017 1/44 Space reduction mechanisms Range searching Elementary Algorithms (2D) Raster Methods Shell sort Divide and conquer Quicksort

More information

Journal of Combinatorial Theory, Series B

Journal of Combinatorial Theory, Series B Journal of Combinatorial Theory, Series B 100 2010) 161 170 Contents lists available at ScienceDirect Journal of Combinatorial Theory, Series B www.elsevier.com/locate/jctb The average order of a subtree

More information

CS1800: Mathematical Induction. Professor Kevin Gold

CS1800: Mathematical Induction. Professor Kevin Gold CS1800: Mathematical Induction Professor Kevin Gold Induction: Used to Prove Patterns Just Keep Going For an algorithm, we may want to prove that it just keeps working, no matter how big the input size

More information

Topological properties

Topological properties CHAPTER 4 Topological properties 1. Connectedness Definitions and examples Basic properties Connected components Connected versus path connected, again 2. Compactness Definition and first examples Topological

More information

Do we need Number Theory? Václav Snášel

Do we need Number Theory? Václav Snášel Do we need Number Theory? Václav Snášel What is a number? MCDXIX 664554 0xABCD 01717 010101010111011100001 i i 1 + 1 1! + 1 2! + 1 3! + 1 4! + VŠB-TUO, Ostrava 2014 2 References Neal Koblitz, p-adic Numbers,

More information

Randomized Algorithms III Min Cut

Randomized Algorithms III Min Cut Chapter 11 Randomized Algorithms III Min Cut CS 57: Algorithms, Fall 01 October 1, 01 11.1 Min Cut 11.1.1 Problem Definition 11. Min cut 11..0.1 Min cut G = V, E): undirected graph, n vertices, m edges.

More information

Numerical Analysis Lecture Notes

Numerical Analysis Lecture Notes Numerical Analysis Lecture Notes Peter J Olver 8 Numerical Computation of Eigenvalues In this part, we discuss some practical methods for computing eigenvalues and eigenvectors of matrices Needless to

More information

On Fixed Point Equations over Commutative Semirings

On Fixed Point Equations over Commutative Semirings On Fixed Point Equations over Commutative Semirings Javier Esparza, Stefan Kiefer, and Michael Luttenberger Universität Stuttgart Institute for Formal Methods in Computer Science Stuttgart, Germany {esparza,kiefersn,luttenml}@informatik.uni-stuttgart.de

More information

Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations

Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 9.1 Chapter 9 Objectives

More information

EVOLUTIONARY DISTANCES

EVOLUTIONARY DISTANCES EVOLUTIONARY DISTANCES FROM STRINGS TO TREES Luca Bortolussi 1 1 Dipartimento di Matematica ed Informatica Università degli studi di Trieste luca@dmi.units.it Trieste, 14 th November 2007 OUTLINE 1 STRINGS:

More information

Lecture 4: Counting, Pigeonhole Principle, Permutations, Combinations Lecturer: Lale Özkahya

Lecture 4: Counting, Pigeonhole Principle, Permutations, Combinations Lecturer: Lale Özkahya BBM 205 Discrete Mathematics Hacettepe University http://web.cs.hacettepe.edu.tr/ bbm205 Lecture 4: Counting, Pigeonhole Principle, Permutations, Combinations Lecturer: Lale Özkahya Resources: Kenneth

More information

Algorithmic Approach to Counting of Certain Types m-ary Partitions

Algorithmic Approach to Counting of Certain Types m-ary Partitions Algorithmic Approach to Counting of Certain Types m-ary Partitions Valentin P. Bakoev Abstract Partitions of integers of the type m n as a sum of powers of m (the so called m-ary partitions) and their

More information

Lecture Notes 1 Basic Probability. Elements of Probability. Conditional probability. Sequential Calculation of Probability

Lecture Notes 1 Basic Probability. Elements of Probability. Conditional probability. Sequential Calculation of Probability Lecture Notes 1 Basic Probability Set Theory Elements of Probability Conditional probability Sequential Calculation of Probability Total Probability and Bayes Rule Independence Counting EE 178/278A: Basic

More information

Solutions to Exercises Chapter 2: On numbers and counting

Solutions to Exercises Chapter 2: On numbers and counting Solutions to Exercises Chapter 2: On numbers and counting 1 Criticise the following proof that 1 is the largest natural number. Let n be the largest natural number, and suppose than n 1. Then n > 1, and

More information

A dyadic endomorphism which is Bernoulli but not standard

A dyadic endomorphism which is Bernoulli but not standard A dyadic endomorphism which is Bernoulli but not standard Christopher Hoffman Daniel Rudolph November 4, 2005 Abstract Any measure preserving endomorphism generates both a decreasing sequence of σ-algebras

More information

Introduction to Association Schemes

Introduction to Association Schemes Introduction to Association Schemes Akihiro Munemasa Tohoku University June 5 6, 24 Algebraic Combinatorics Summer School, Sendai Assumed results (i) Vandermonde determinant: a a m =. a m a m m i

More information

INTEGERS CONFERENCE 2013: ERDŐS CENTENNIAL

INTEGERS CONFERENCE 2013: ERDŐS CENTENNIAL INTEGERS CONFERENCE 2013: ERDŐS CENTENNIAL (joint work with Mits Kobayashi) University of Georgia October 24, 2013 1 / 22 All Greek to us 2 / 22 Among simple even, some are super, others are deficient:

More information

Cographs; chordal graphs and tree decompositions

Cographs; chordal graphs and tree decompositions Cographs; chordal graphs and tree decompositions Zdeněk Dvořák September 14, 2015 Let us now proceed with some more interesting graph classes closed on induced subgraphs. 1 Cographs The class of cographs

More information

Atoms and Cells. The chart below shows a variety of things sorted into two different groups.

Atoms and Cells. The chart below shows a variety of things sorted into two different groups. Structure and Function 6 Atoms and Cells The chart below shows a variety of things sorted into two different groups. Group A leaf of a plant horse s muscle cap of a mushroom baby elephant seed of a bean

More information

CS383, Algorithms Spring 2009 HW1 Solutions

CS383, Algorithms Spring 2009 HW1 Solutions Prof. Sergio A. Alvarez http://www.cs.bc.edu/ alvarez/ 21 Campanella Way, room 569 alvarez@cs.bc.edu Computer Science Department voice: (617) 552-4333 Boston College fax: (617) 552-6790 Chestnut Hill,

More information

HW #4. (mostly by) Salim Sarımurat. 1) Insert 6 2) Insert 8 3) Insert 30. 4) Insert S a.

HW #4. (mostly by) Salim Sarımurat. 1) Insert 6 2) Insert 8 3) Insert 30. 4) Insert S a. HW #4 (mostly by) Salim Sarımurat 04.12.2009 S. 1. 1. a. 1) Insert 6 2) Insert 8 3) Insert 30 4) Insert 40 2 5) Insert 50 6) Insert 61 7) Insert 70 1. b. 1) Insert 12 2) Insert 29 3) Insert 30 4) Insert

More information

Week 2: Sequences and Series

Week 2: Sequences and Series QF0: Quantitative Finance August 29, 207 Week 2: Sequences and Series Facilitator: Christopher Ting AY 207/208 Mathematicians have tried in vain to this day to discover some order in the sequence of prime

More information

On the local connectivity of limit sets of Kleinian groups

On the local connectivity of limit sets of Kleinian groups On the local connectivity of limit sets of Kleinian groups James W. Anderson and Bernard Maskit Department of Mathematics, Rice University, Houston, TX 77251 Department of Mathematics, SUNY at Stony Brook,

More information

Some of these slides have been borrowed from Dr. Paul Lewis, Dr. Joe Felsenstein. Thanks!

Some of these slides have been borrowed from Dr. Paul Lewis, Dr. Joe Felsenstein. Thanks! Some of these slides have been borrowed from Dr. Paul Lewis, Dr. Joe Felsenstein. Thanks! Paul has many great tools for teaching phylogenetics at his web site: http://hydrodictyon.eeb.uconn.edu/people/plewis

More information

25 Minimum bandwidth: Approximation via volume respecting embeddings

25 Minimum bandwidth: Approximation via volume respecting embeddings 25 Minimum bandwidth: Approximation via volume respecting embeddings We continue the study of Volume respecting embeddings. In the last lecture, we motivated the use of volume respecting embeddings by

More information

Algorithms (II) Yu Yu. Shanghai Jiaotong University

Algorithms (II) Yu Yu. Shanghai Jiaotong University Algorithms (II) Yu Yu Shanghai Jiaotong University Chapter 1. Algorithms with Numbers Two seemingly similar problems Factoring: Given a number N, express it as a product of its prime factors. Primality:

More information

CHAPTER 9. Embedding theorems

CHAPTER 9. Embedding theorems CHAPTER 9 Embedding theorems In this chapter we will describe a general method for attacking embedding problems. We will establish several results but, as the main final result, we state here the following:

More information

Trees for Group Key Management with Batch Update

Trees for Group Key Management with Batch Update Trees for Group Key Management with Batch Update Ph. D. Defense May 30th, 2008 Nan Zang Outline Secure group key management overview Jumping sequence problem Properties of optimal jumping sequences Properties

More information

MA 524 Final Fall 2015 Solutions

MA 524 Final Fall 2015 Solutions MA 54 Final Fall 05 Solutions Name: Question Points Score 0 0 3 5 4 0 5 5 6 5 7 0 8 5 Total: 60 MA 54 Solutions Final, Page of 8. Let L be a finite lattice. (a) (5 points) Show that p ( (p r)) (p ) (p

More information

We already came across a form of indistinguishably in the canonical partition function: V N Q =

We already came across a form of indistinguishably in the canonical partition function: V N Q = Bosons en fermions Indistinguishability We already came across a form of indistinguishably in the canonical partition function: for distinguishable particles Q = Λ 3N βe p r, r 2,..., r N ))dτ dτ 2...

More information

Generating p-extremal graphs

Generating p-extremal graphs Generating p-extremal graphs Derrick Stolee Department of Mathematics Department of Computer Science University of Nebraska Lincoln s-dstolee1@math.unl.edu August 2, 2011 Abstract Let f(n, p be the maximum

More information

Learning Decision Trees

Learning Decision Trees Learning Decision Trees Machine Learning Fall 2018 Some slides from Tom Mitchell, Dan Roth and others 1 Key issues in machine learning Modeling How to formulate your problem as a machine learning problem?

More information

On Locating-Dominating Codes in Binary Hamming Spaces

On Locating-Dominating Codes in Binary Hamming Spaces Discrete Mathematics and Theoretical Computer Science 6, 2004, 265 282 On Locating-Dominating Codes in Binary Hamming Spaces Iiro Honkala and Tero Laihonen and Sanna Ranto Department of Mathematics and

More information

Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools

Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools Manor Mendel, CMI, Caltech 1 Finite Metric Spaces Definition of (semi) metric. (M, ρ): M a (finite) set of points. ρ a distance function

More information

Summer 2017 June 16, Written Homework 03

Summer 2017 June 16, Written Homework 03 CS1800 Discrete Structures Prof. Schnyder Summer 2017 June 16, 2017 Assigned: Fr 16 June 2017 Due: Tu 20 June 2017 Instructions: Written Homework 0 The assignment has to be uploaded to Blackboard by the

More information

Distribution of Environments in Formal Measures of Intelligence: Extended Version

Distribution of Environments in Formal Measures of Intelligence: Extended Version Distribution of Environments in Formal Measures of Intelligence: Extended Version Bill Hibbard December 2008 Abstract This paper shows that a constraint on universal Turing machines is necessary for Legg's

More information

FUNCTIONAL ANALYSIS LECTURE NOTES: COMPACT SETS AND FINITE-DIMENSIONAL SPACES. 1. Compact Sets

FUNCTIONAL ANALYSIS LECTURE NOTES: COMPACT SETS AND FINITE-DIMENSIONAL SPACES. 1. Compact Sets FUNCTIONAL ANALYSIS LECTURE NOTES: COMPACT SETS AND FINITE-DIMENSIONAL SPACES CHRISTOPHER HEIL 1. Compact Sets Definition 1.1 (Compact and Totally Bounded Sets). Let X be a metric space, and let E X be

More information

Induction and Recursion

Induction and Recursion . All rights reserved. Authorized only for instructor use in the classroom. No reproduction or further distribution permitted without the prior written consent of McGraw-Hill Education. Induction and Recursion

More information

Aspects of Growth in Baumslag-Solitar Groups

Aspects of Growth in Baumslag-Solitar Groups Aspects of Growth in Baumslag-Solitar Groups Groups St Andrews in Birmingham 7 August 2017 Eric Freden with undergraduate research assistant Courtney Cleveland Prelude: what are the obstructions to understanding

More information

BDD Based Upon Shannon Expansion

BDD Based Upon Shannon Expansion Boolean Function Manipulation OBDD and more BDD Based Upon Shannon Expansion Notations f(x, x 2,, x n ) - n-input function, x i = or f xi=b (x,, x n ) = f(x,,x i-,b,x i+,,x n ), b= or Shannon Expansion

More information