Information Representation by Hierarchies
|
|
- Eric Harmon
- 5 years ago
- Views:
Transcription
1 Information Representation by Hierarchies We wish to create a telephone system which will enable each telephone to communicate with every other one There are in total N telephones Solution? We can connect each telephone with the other one, N(N-1)/2 connections For big N, the number of connections would be to big 1
2 We could connect each telephone to a single central office For N telephones this would require only N connections The switching load of the central office would be enormous Long waiting times If the telephones are far away, we would require long wires Emphasis of the hierarchical arrangement Set the central office at the top of the diagram Hierarchical arrangement of the network with 2 levels 2
3 Suppose k central offices each serve N/k telephones directly k central offices are themselves connected to a single national office 3-level hierarchical network topology N+k connections What is the optimal number of k? Stating from a given telephone, the waiting time to obtain service from its central office will be proportional to the number of telephones, N/k Time from national office is k Total time k+n/k, minimum for k = Average total time is proportional to Star network average time is N N 2" N Would additional level bring an improvement? 3
4 Our structure, a tree is organized in levels Suppose each node belonging to a given level has the same number of children The levels are labeled from 0 to L, level 0 is the root, level L are the leafs How many nodes should each level contain in order that the average waiting time required is as small as possible? The average witing/search time through such a tree will be minimized if the number of nodes N(k) which belongs to the level k is related to the number N=N(L) N(k)=N k/l for k=1,...,l Example L=2, N(1)=N 1/2 4
5 N(k)=N k/l for k=1,...,l Whatever the value of L is, each subtree of a tree which minimizes average waiting/search time must be also minimize the average time Otherwise it would be possible to replace the subtree with a more efficient Proof of N(k)=N k/l is based on induction L=1 is true We will assume the validity of the equation for k < L and prove it for k=l 5
6 From the equation it follows (N(0)=1) N(1)=N 1/l N(1) k =N k/l =N(k) N(k)=N(1) k N(1)=N(1) 1 N(2)=N(1) 2 N(3)=N(1) 3 and so on...till N(L-1)=N(1) L-1, prove it for L 2t average = N(1)/N(0)+N(2)/N(1)+N(3)/N(2)...+N(L)/N(L-1) Factor 2 appears because, on the average only half of the nodes at each level are encountered in a sequential search 2t average = N(1)+N(1)+N(1)+...+N(L)/N(1) L-1 2t average =(L-1)*N(1)+N(L)/N(1) L-1 2t average =(L-1)*N(1)+N(L)/N(1) L-1 The total number of nodes N (=N(L)) is given, our task is to determine N(1) so that t is minimized dt/n(1)=0 0=dt/N(1)=1/2*((L-1) - (L-1)*N(L)/N(1) L ) Solution --> N=N(L)=N(1) L Which is the formula for k=l, the induction step is conducted 6
7 With N=N(L) follows t avarage =L/2*N(1)=L/2*N 1/L Value of L which minimize tavarage t avarage =L/2*N 1/L =L/2*exp(1/L*log(N)) dt/dl=1/2(1-log(n)/l)*exp(1/l*log(n))=0 L=log(N) 0.69*log 2 (N) t min =log(n)/2*exp(log(n)/(log N)) t min =log(n)/2*exp(1) t min 0.94*log 2 (N) L 0.69*log 2 (N) t min 0.94*log 2 (N) As an example consider a library catalog card tray, with N=800 card, L=7 will minimize the search time However, traditional library card catalogs seldom have an indexing hierarchy greater than 3 7
8 Hierarchical structures occur through civilization Decomposition of a hierarchy into simpler parts Space Shuttle, Cars By repetition of the process of partitioning the system into disjoint and independent sub-units, a level of simplicity is finally reached for which individual expertise suffices to design and produce these elementary components The complex combination which carry the genetic code could hardly, in the limited time, since cooling of the earth, have come into direct existence, if not by hierarchical organization DNA consists of building blocks, each of which in turn is constructed from simpler standardized chemical combinations These combinations have a higher probability to come together 8
9 How much information is carried by DNA? The information of DNA is coded in terms of ordered triples of four chemical substances called nucleotide bases Ordered triples of nucleotide bases correspond to the 20 primary amino acids which are the building blocks of proteins Because there are 64 (4 3 ) possible combinations, it follows that a given amino acid may correspond to more than one combination (=condon) Human DNA consists of 5 bilion nucleid bases, 1.7 billion condons Each condon corresponds to 6 bits, since 2 6 =64 9
10 Structure of mater itself is hierarchically organized 10
11 Elementary arithmetic's A primitive and ancient way to denote a positive whole number N is to arrange N similar strokes Counting notation, take up large amount of space Babylonian invention of more efficient positional notation for numbers (4000 years ago) Positional notation is itself a hierarchical organized structure Express the whole number N is positional notation to base B 11
12 Let be B=10 Determine the largest integer k, such that B k N Specify how many digits will occur in the base B notation of the number N Determine the leading digit n k of the base B represented of N n k will be one of digits 0,1,..,B-1 largest integer n k B k N The next digit n k-1 is the largest integer such that n k-1 B k-1 N-n k B k And so on... 12
13 There is a tremendous gain in computational efficiency when two numbers expressed in positional notation are multiplied M=m k B k +...+m 1 B+m 0 N=n l B k +...+n 1 B+n 0 The product M*N is calculated by multiplying the single digits and adding the resulting columns, (k+1)(l+1) elementary operations instead of MN Example of a Taxonomy In 1887 Professor Harry Govier Seeley grouped all dinosaurs into the saurischia and ornithischia groups according to their hip design The saurischian were divided later into two subgroups: the carnivorous, bipedal theropods and the plant-eating, mostly quadruped sauropodomorphs The ornithischians were divided into the subgroups birdlike ornithopods, armored thyreophorans, and margginoncephalia The subgroups can be divided into suborders and then into families and finally into genus The genus includes the species 13
14 14
15 Another Example 15
16 Cost of Information Combination of the amount of information it produces and the effort required to obtain it Maximization of the information gained for a given effort invested (minimize the effort) Hierarchical structures that are characterized by the value of certain structural parameters If one assumes that time required for each elementary operation performed by the hierarchical organized information processing system is independent of the operation, then the time required to provide a unit of information will be a good measure of cost If the parameters of the system are selected so that the corresponding structure minimize the processing time, the system will be optimal for some parameters 16
17 Let be x 1,..,x n the parameters of the system We have some cost of the system (effort) E(x 1,..,x n ) and the corresponding produced information I(x 1,..,x n ) Then the solution to determine an optimal information-processing structure corresponds to maximize I/E Solved by calculus of variations Second law of Thermodynamics A physical system will extremize information for a given value of the energy by evolving towards a canonical distribution of its states which maximizes entropy and minimize the information 17
18 ..addition Example Range query Range query: search covers all points in the space whose Euclidian distance to the query y is smaller or equal to ε 18
19 DB[y] σ = y = Curse of dimensionality The metric indexes trees operate efficiently when the number of dimensions is small The growth of the number of dimensions has negative implications for the performance failing with the dimensionality eventually reducing the search time to sequential scanning problems arise from the fact that the volume of a sphere constant radius grows exponentially with increasing dimension 19
20 Linear subspace sequence Sequence of subspaces with, V=U 0 and Lower bounding lemma, Example, DB in subspace 20
21 Computing costs U={(x 1,x 2 ) R 2 x 1 =x 2 } 21
22 Orthogonal projection Corresponds to the mean value of the projected points Distance d between projected points in R m corresponds to the distance d u in the orthogonal subspace U multiplied by a constant c 22
23 Hierarchy of subspaces The distance between objects d=d U0 in the space U 0 can be obtained from the distance d Uk between objects in the orthogonal subspace U k by multiplying the distance d Uk by a constant Mean Euclidian distance for a query y to the elements of DB 23
24 Mean computing costs using the hierarchical subspace method Error bars indicate the standard deviation The x-axis indicates the number of the most similar images which are retrieved and the y-axis, the computing costs Computing costs simplification to: 24
25 25
An introduction to parallel algorithms
An introduction to parallel algorithms Knut Mørken Department of Informatics Centre of Mathematics for Applications University of Oslo Winter School on Parallel Computing Geilo January 20 25, 2008 1/26
More informationSIGNAL COMPRESSION Lecture 7. Variable to Fix Encoding
SIGNAL COMPRESSION Lecture 7 Variable to Fix Encoding 1. Tunstall codes 2. Petry codes 3. Generalized Tunstall codes for Markov sources (a presentation of the paper by I. Tabus, G. Korodi, J. Rissanen.
More informationInformation Theory, Statistics, and Decision Trees
Information Theory, Statistics, and Decision Trees Léon Bottou COS 424 4/6/2010 Summary 1. Basic information theory. 2. Decision trees. 3. Information theory and statistics. Léon Bottou 2/31 COS 424 4/6/2010
More informationThe Fundamental Theorem of Arithmetic
Chapter 1 The Fundamental Theorem of Arithmetic 1.1 Primes Definition 1.1. We say that p N is prime if it has just two factors in N, 1 and p itself. Number theory might be described as the study of the
More informationWolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig
Multimedia Databases Wolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 14 Indexes for Multimedia Data 14 Indexes for Multimedia
More informationk-protected VERTICES IN BINARY SEARCH TREES
k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from
More informationCompute the Fourier transform on the first register to get x {0,1} n x 0.
CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary
More informationAverage Case Analysis of QuickSort and Insertion Tree Height using Incompressibility
Average Case Analysis of QuickSort and Insertion Tree Height using Incompressibility Tao Jiang, Ming Li, Brendan Lucier September 26, 2005 Abstract In this paper we study the Kolmogorov Complexity of a
More informationClasses of Boolean Functions
Classes of Boolean Functions Nader H. Bshouty Eyal Kushilevitz Abstract Here we give classes of Boolean functions that considered in COLT. Classes of Functions Here we introduce the basic classes of functions
More informationDiscrete Mathematics & Mathematical Reasoning Chapter 6: Counting
Discrete Mathematics & Mathematical Reasoning Chapter 6: Counting Kousha Etessami U. of Edinburgh, UK Kousha Etessami (U. of Edinburgh, UK) Discrete Mathematics (Chapter 6) 1 / 39 Chapter Summary The Basics
More informationCS Data Structures and Algorithm Analysis
CS 483 - Data Structures and Algorithm Analysis Lecture VII: Chapter 6, part 2 R. Paul Wiegand George Mason University, Department of Computer Science March 22, 2006 Outline 1 Balanced Trees 2 Heaps &
More informationLecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018
CS17 Integrated Introduction to Computer Science Klein Contents Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018 1 Tree definitions 1 2 Analysis of mergesort using a binary tree 1 3 Analysis of
More information1 Adeles over Q. 1.1 Absolute values
1 Adeles over Q 1.1 Absolute values Definition 1.1.1 (Absolute value) An absolute value on a field F is a nonnegative real valued function on F which satisfies the conditions: (i) x = 0 if and only if
More informationLecture 2: Proof of Switching Lemma
Lecture 2: oof of Switching Lemma Yuan Li June 25, 2014 1 Decision Tree Instead of bounding the probability that f can be written as some s-dnf, we estimate the probability that f can be computed by a
More informationBiological Networks: Comparison, Conservation, and Evolution via Relative Description Length By: Tamir Tuller & Benny Chor
Biological Networks:,, and via Relative Description Length By: Tamir Tuller & Benny Chor Presented by: Noga Grebla Content of the presentation Presenting the goals of the research Reviewing basic terms
More informationStructured Variational Inference
Structured Variational Inference Sargur srihari@cedar.buffalo.edu 1 Topics 1. Structured Variational Approximations 1. The Mean Field Approximation 1. The Mean Field Energy 2. Maximizing the energy functional:
More informationPreliminaries and Complexity Theory
Preliminaries and Complexity Theory Oleksandr Romanko CAS 746 - Advanced Topics in Combinatorial Optimization McMaster University, January 16, 2006 Introduction Book structure: 2 Part I Linear Algebra
More informationA ZERO ENTROPY T SUCH THAT THE [T,ID] ENDOMORPHISM IS NONSTANDARD
A ZERO ENTROPY T SUCH THAT THE [T,ID] ENDOMORPHISM IS NONSTANDARD CHRISTOPHER HOFFMAN Abstract. We present an example of an ergodic transformation T, a variant of a zero entropy non loosely Bernoulli map
More informationGreedy Trees, Caterpillars, and Wiener-Type Graph Invariants
Georgia Southern University Digital Commons@Georgia Southern Mathematical Sciences Faculty Publications Mathematical Sciences, Department of 2012 Greedy Trees, Caterpillars, and Wiener-Type Graph Invariants
More informationProblem. Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26
Binary Search Introduction Problem Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26 Strategy 1: Random Search Randomly select a page until the page containing
More informationMARKING A BINARY TREE PROBABILISTIC ANALYSIS OF A RANDOMIZED ALGORITHM
MARKING A BINARY TREE PROBABILISTIC ANALYSIS OF A RANDOMIZED ALGORITHM XIANG LI Abstract. This paper centers on the analysis of a specific randomized algorithm, a basic random process that involves marking
More informationMulti-normed spaces and multi-banach algebras. H. G. Dales. Leeds Semester
Multi-normed spaces and multi-banach algebras H. G. Dales Leeds Semester Leeds, 2 June 2010 1 Motivating problem Let G be a locally compact group, with group algebra L 1 (G). Theorem - B. E. Johnson, 1972
More informationCIS (More Propositional Calculus - 6 points)
1 CIS6333 Homework 1 (due Friday, February 1) 1. (Propositional Calculus - 10 points) --------------------------------------- Let P, Q, R range over state predicates of some program. Prove or disprove
More informationA Phylogenetic Network Construction due to Constrained Recombination
A Phylogenetic Network Construction due to Constrained Recombination Mohd. Abdul Hai Zahid Research Scholar Research Supervisors: Dr. R.C. Joshi Dr. Ankush Mittal Department of Electronics and Computer
More information1 Introduction to information theory
1 Introduction to information theory 1.1 Introduction In this chapter we present some of the basic concepts of information theory. The situations we have in mind involve the exchange of information through
More informationInformation & Correlation
Information & Correlation Jilles Vreeken 11 June 2014 (TADA) Questions of the day What is information? How can we measure correlation? and what do talking drums have to do with this? Bits and Pieces What
More informationInduction and recursion. Chapter 5
Induction and recursion Chapter 5 Chapter Summary Mathematical Induction Strong Induction Well-Ordering Recursive Definitions Structural Induction Recursive Algorithms Mathematical Induction Section 5.1
More informationProblem Set 1 Solutions
18.014 Problem Set 1 Solutions Total: 4 points Problem 1: If ab = 0, then a = 0 or b = 0. Suppose ab = 0 and b = 0. By axiom 6, there exists a real number y such that by = 1. Hence, we have a = 1 a = a
More informationAnalysis-3 lecture schemes
Analysis-3 lecture schemes (with Homeworks) 1 Csörgő István November, 2015 1 A jegyzet az ELTE Informatikai Kar 2015. évi Jegyzetpályázatának támogatásával készült Contents 1. Lesson 1 4 1.1. The Space
More informationDiscrete Mathematics, Spring 2004 Homework 4 Sample Solutions
Discrete Mathematics, Spring 2004 Homework 4 Sample Solutions 4.2 #77. Let s n,k denote the number of ways to seat n persons at k round tables, with at least one person at each table. (The numbers s n,k
More informationREVIEW QUESTIONS. Chapter 1: Foundations: Sets, Logic, and Algorithms
REVIEW QUESTIONS Chapter 1: Foundations: Sets, Logic, and Algorithms 1. Why can t a Venn diagram be used to prove a statement about sets? 2. Suppose S is a set with n elements. Explain why the power set
More informationA NEW BASIS SELECTION PARADIGM FOR WAVELET PACKET IMAGE CODING
A NEW BASIS SELECTION PARADIGM FOR WAVELET PACKET IMAGE CODING Nasir M. Rajpoot, Roland G. Wilson, François G. Meyer, Ronald R. Coifman Corresponding Author: nasir@dcs.warwick.ac.uk ABSTRACT In this paper,
More informationChapter Summary. Mathematical Induction Strong Induction Well-Ordering Recursive Definitions Structural Induction Recursive Algorithms
1 Chapter Summary Mathematical Induction Strong Induction Well-Ordering Recursive Definitions Structural Induction Recursive Algorithms 2 Section 5.1 3 Section Summary Mathematical Induction Examples of
More informationWolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig
Multimedia Databases Wolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 13 Indexes for Multimedia Data 13 Indexes for Multimedia
More informationHierarchical Clustering
Hierarchical Clustering Some slides by Serafim Batzoglou 1 From expression profiles to distances From the Raw Data matrix we compute the similarity matrix S. S ij reflects the similarity of the expression
More informationStandard forms for writing numbers
Standard forms for writing numbers In order to relate the abstract mathematical descriptions of familiar number systems to the everyday descriptions of numbers by decimal expansions and similar means,
More informationAssociative Digital Network Theory
Associative Digital Network Theory An Associative Algebra Approach to Logic, Arithmetic and State Machines Nico F. Benschop Preface This book is intended for researchers at industrial laboratories, teachers
More informationDR.RUPNATHJI( DR.RUPAK NATH )
Contents 1 Sets 1 2 The Real Numbers 9 3 Sequences 29 4 Series 59 5 Functions 81 6 Power Series 105 7 The elementary functions 111 Chapter 1 Sets It is very convenient to introduce some notation and terminology
More informationProblems for Putnam Training
Problems for Putnam Training 1 Number theory Problem 1.1. Prove that for each positive integer n, the number is not prime. 10 1010n + 10 10n + 10 n 1 Problem 1.2. Show that for any positive integer n,
More informationBasic elements of number theory
Cryptography Basic elements of number theory Marius Zimand By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a k for some integer k. Notation
More informationBasic elements of number theory
Cryptography Basic elements of number theory Marius Zimand 1 Divisibility, prime numbers By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a
More informationEECS 229A Spring 2007 * * (a) By stationarity and the chain rule for entropy, we have
EECS 229A Spring 2007 * * Solutions to Homework 3 1. Problem 4.11 on pg. 93 of the text. Stationary processes (a) By stationarity and the chain rule for entropy, we have H(X 0 ) + H(X n X 0 ) = H(X 0,
More informationDistribution-specific analysis of nearest neighbor search and classification
Distribution-specific analysis of nearest neighbor search and classification Sanjoy Dasgupta University of California, San Diego Nearest neighbor The primeval approach to information retrieval and classification.
More informationLecture 16: Communication Complexity
CSE 531: Computational Complexity I Winter 2016 Lecture 16: Communication Complexity Mar 2, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 Communication Complexity In (two-party) communication complexity
More informationInference as Optimization
Inference as Optimization Sargur Srihari srihari@cedar.buffalo.edu 1 Topics in Inference as Optimization Overview Exact Inference revisited The Energy Functional Optimizing the Energy Functional 2 Exact
More information(1) Consider the space S consisting of all continuous real-valued functions on the closed interval [0, 1]. For f, g S, define
Homework, Real Analysis I, Fall, 2010. (1) Consider the space S consisting of all continuous real-valued functions on the closed interval [0, 1]. For f, g S, define ρ(f, g) = 1 0 f(x) g(x) dx. Show that
More informationEnumeration and symmetry of edit metric spaces. Jessie Katherine Campbell. A dissertation submitted to the graduate faculty
Enumeration and symmetry of edit metric spaces by Jessie Katherine Campbell A dissertation submitted to the graduate faculty in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY
More informationSolutions: Problem Set 3 Math 201B, Winter 2007
Solutions: Problem Set 3 Math 201B, Winter 2007 Problem 1. Prove that an infinite-dimensional Hilbert space is a separable metric space if and only if it has a countable orthonormal basis. Solution. If
More informationMultimedia Databases 1/29/ Indexes for Multimedia Data Indexes for Multimedia Data Indexes for Multimedia Data
1/29/2010 13 Indexes for Multimedia Data 13 Indexes for Multimedia Data 13.1 R-Trees Multimedia Databases Wolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig
More informationImpression Store: Compressive Sensing-based Storage for. Big Data Analytics
Impression Store: Compressive Sensing-based Storage for Big Data Analytics Jiaxing Zhang, Ying Yan, Liang Jeff Chen, Minjie Wang, Thomas Moscibroda & Zheng Zhang Microsoft Research The Curse of O(N) in
More informationBraids and some other groups arising in geometry and topology
Braids and some other groups arising in geometry and topology Vladimir Vershinin Young Topologist Seminar, IMS, Singapore (11-21 August 2015) Braids and Thompson groups 1. Geometrical definition of Thompson
More informationBLAST: Target frequencies and information content Dannie Durand
Computational Genomics and Molecular Biology, Fall 2016 1 BLAST: Target frequencies and information content Dannie Durand BLAST has two components: a fast heuristic for searching for similar sequences
More informationA Polynomial Time Deterministic Algorithm for Identity Testing Read-Once Polynomials
A Polynomial Time Deterministic Algorithm for Identity Testing Read-Once Polynomials Daniel Minahan Ilya Volkovich August 15, 2016 Abstract The polynomial identity testing problem, or PIT, asks how we
More informationOn improving matchings in trees, via bounded-length augmentations 1
On improving matchings in trees, via bounded-length augmentations 1 Julien Bensmail a, Valentin Garnero a, Nicolas Nisse a a Université Côte d Azur, CNRS, Inria, I3S, France Abstract Due to a classical
More informationComplexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler
Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard
More informationACO Comprehensive Exam 19 March Graph Theory
1. Graph Theory Let G be a connected simple graph that is not a cycle and is not complete. Prove that there exist distinct non-adjacent vertices u, v V (G) such that the graph obtained from G by deleting
More informationA strongly polynomial algorithm for linear systems having a binary solution
A strongly polynomial algorithm for linear systems having a binary solution Sergei Chubanov Institute of Information Systems at the University of Siegen, Germany e-mail: sergei.chubanov@uni-siegen.de 7th
More informationCSCE 222 Discrete Structures for Computing. Review for Exam 2. Dr. Hyunyoung Lee !!!
CSCE 222 Discrete Structures for Computing Review for Exam 2 Dr. Hyunyoung Lee 1 Strategy for Exam Preparation - Start studying now (unless have already started) - Study class notes (lecture slides and
More information1 AC 0 and Håstad Switching Lemma
princeton university cos 522: computational complexity Lecture 19: Circuit complexity Lecturer: Sanjeev Arora Scribe:Tony Wirth Complexity theory s Waterloo As we saw in an earlier lecture, if PH Σ P 2
More informationOutline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.
Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität
More informationAlgorithms and Data Structures
Charles A. Wuethrich Bauhaus-University Weimar - CogVis/MMC June 1, 2017 1/44 Space reduction mechanisms Range searching Elementary Algorithms (2D) Raster Methods Shell sort Divide and conquer Quicksort
More informationJournal of Combinatorial Theory, Series B
Journal of Combinatorial Theory, Series B 100 2010) 161 170 Contents lists available at ScienceDirect Journal of Combinatorial Theory, Series B www.elsevier.com/locate/jctb The average order of a subtree
More informationCS1800: Mathematical Induction. Professor Kevin Gold
CS1800: Mathematical Induction Professor Kevin Gold Induction: Used to Prove Patterns Just Keep Going For an algorithm, we may want to prove that it just keeps working, no matter how big the input size
More informationTopological properties
CHAPTER 4 Topological properties 1. Connectedness Definitions and examples Basic properties Connected components Connected versus path connected, again 2. Compactness Definition and first examples Topological
More informationDo we need Number Theory? Václav Snášel
Do we need Number Theory? Václav Snášel What is a number? MCDXIX 664554 0xABCD 01717 010101010111011100001 i i 1 + 1 1! + 1 2! + 1 3! + 1 4! + VŠB-TUO, Ostrava 2014 2 References Neal Koblitz, p-adic Numbers,
More informationRandomized Algorithms III Min Cut
Chapter 11 Randomized Algorithms III Min Cut CS 57: Algorithms, Fall 01 October 1, 01 11.1 Min Cut 11.1.1 Problem Definition 11. Min cut 11..0.1 Min cut G = V, E): undirected graph, n vertices, m edges.
More informationNumerical Analysis Lecture Notes
Numerical Analysis Lecture Notes Peter J Olver 8 Numerical Computation of Eigenvalues In this part, we discuss some practical methods for computing eigenvalues and eigenvectors of matrices Needless to
More informationOn Fixed Point Equations over Commutative Semirings
On Fixed Point Equations over Commutative Semirings Javier Esparza, Stefan Kiefer, and Michael Luttenberger Universität Stuttgart Institute for Formal Methods in Computer Science Stuttgart, Germany {esparza,kiefersn,luttenml}@informatik.uni-stuttgart.de
More informationChapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations
Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 9.1 Chapter 9 Objectives
More informationEVOLUTIONARY DISTANCES
EVOLUTIONARY DISTANCES FROM STRINGS TO TREES Luca Bortolussi 1 1 Dipartimento di Matematica ed Informatica Università degli studi di Trieste luca@dmi.units.it Trieste, 14 th November 2007 OUTLINE 1 STRINGS:
More informationLecture 4: Counting, Pigeonhole Principle, Permutations, Combinations Lecturer: Lale Özkahya
BBM 205 Discrete Mathematics Hacettepe University http://web.cs.hacettepe.edu.tr/ bbm205 Lecture 4: Counting, Pigeonhole Principle, Permutations, Combinations Lecturer: Lale Özkahya Resources: Kenneth
More informationAlgorithmic Approach to Counting of Certain Types m-ary Partitions
Algorithmic Approach to Counting of Certain Types m-ary Partitions Valentin P. Bakoev Abstract Partitions of integers of the type m n as a sum of powers of m (the so called m-ary partitions) and their
More informationLecture Notes 1 Basic Probability. Elements of Probability. Conditional probability. Sequential Calculation of Probability
Lecture Notes 1 Basic Probability Set Theory Elements of Probability Conditional probability Sequential Calculation of Probability Total Probability and Bayes Rule Independence Counting EE 178/278A: Basic
More informationSolutions to Exercises Chapter 2: On numbers and counting
Solutions to Exercises Chapter 2: On numbers and counting 1 Criticise the following proof that 1 is the largest natural number. Let n be the largest natural number, and suppose than n 1. Then n > 1, and
More informationA dyadic endomorphism which is Bernoulli but not standard
A dyadic endomorphism which is Bernoulli but not standard Christopher Hoffman Daniel Rudolph November 4, 2005 Abstract Any measure preserving endomorphism generates both a decreasing sequence of σ-algebras
More informationIntroduction to Association Schemes
Introduction to Association Schemes Akihiro Munemasa Tohoku University June 5 6, 24 Algebraic Combinatorics Summer School, Sendai Assumed results (i) Vandermonde determinant: a a m =. a m a m m i
More informationINTEGERS CONFERENCE 2013: ERDŐS CENTENNIAL
INTEGERS CONFERENCE 2013: ERDŐS CENTENNIAL (joint work with Mits Kobayashi) University of Georgia October 24, 2013 1 / 22 All Greek to us 2 / 22 Among simple even, some are super, others are deficient:
More informationCographs; chordal graphs and tree decompositions
Cographs; chordal graphs and tree decompositions Zdeněk Dvořák September 14, 2015 Let us now proceed with some more interesting graph classes closed on induced subgraphs. 1 Cographs The class of cographs
More informationAtoms and Cells. The chart below shows a variety of things sorted into two different groups.
Structure and Function 6 Atoms and Cells The chart below shows a variety of things sorted into two different groups. Group A leaf of a plant horse s muscle cap of a mushroom baby elephant seed of a bean
More informationCS383, Algorithms Spring 2009 HW1 Solutions
Prof. Sergio A. Alvarez http://www.cs.bc.edu/ alvarez/ 21 Campanella Way, room 569 alvarez@cs.bc.edu Computer Science Department voice: (617) 552-4333 Boston College fax: (617) 552-6790 Chestnut Hill,
More informationHW #4. (mostly by) Salim Sarımurat. 1) Insert 6 2) Insert 8 3) Insert 30. 4) Insert S a.
HW #4 (mostly by) Salim Sarımurat 04.12.2009 S. 1. 1. a. 1) Insert 6 2) Insert 8 3) Insert 30 4) Insert 40 2 5) Insert 50 6) Insert 61 7) Insert 70 1. b. 1) Insert 12 2) Insert 29 3) Insert 30 4) Insert
More informationWeek 2: Sequences and Series
QF0: Quantitative Finance August 29, 207 Week 2: Sequences and Series Facilitator: Christopher Ting AY 207/208 Mathematicians have tried in vain to this day to discover some order in the sequence of prime
More informationOn the local connectivity of limit sets of Kleinian groups
On the local connectivity of limit sets of Kleinian groups James W. Anderson and Bernard Maskit Department of Mathematics, Rice University, Houston, TX 77251 Department of Mathematics, SUNY at Stony Brook,
More informationSome of these slides have been borrowed from Dr. Paul Lewis, Dr. Joe Felsenstein. Thanks!
Some of these slides have been borrowed from Dr. Paul Lewis, Dr. Joe Felsenstein. Thanks! Paul has many great tools for teaching phylogenetics at his web site: http://hydrodictyon.eeb.uconn.edu/people/plewis
More information25 Minimum bandwidth: Approximation via volume respecting embeddings
25 Minimum bandwidth: Approximation via volume respecting embeddings We continue the study of Volume respecting embeddings. In the last lecture, we motivated the use of volume respecting embeddings by
More informationAlgorithms (II) Yu Yu. Shanghai Jiaotong University
Algorithms (II) Yu Yu Shanghai Jiaotong University Chapter 1. Algorithms with Numbers Two seemingly similar problems Factoring: Given a number N, express it as a product of its prime factors. Primality:
More informationCHAPTER 9. Embedding theorems
CHAPTER 9 Embedding theorems In this chapter we will describe a general method for attacking embedding problems. We will establish several results but, as the main final result, we state here the following:
More informationTrees for Group Key Management with Batch Update
Trees for Group Key Management with Batch Update Ph. D. Defense May 30th, 2008 Nan Zang Outline Secure group key management overview Jumping sequence problem Properties of optimal jumping sequences Properties
More informationMA 524 Final Fall 2015 Solutions
MA 54 Final Fall 05 Solutions Name: Question Points Score 0 0 3 5 4 0 5 5 6 5 7 0 8 5 Total: 60 MA 54 Solutions Final, Page of 8. Let L be a finite lattice. (a) (5 points) Show that p ( (p r)) (p ) (p
More informationWe already came across a form of indistinguishably in the canonical partition function: V N Q =
Bosons en fermions Indistinguishability We already came across a form of indistinguishably in the canonical partition function: for distinguishable particles Q = Λ 3N βe p r, r 2,..., r N ))dτ dτ 2...
More informationGenerating p-extremal graphs
Generating p-extremal graphs Derrick Stolee Department of Mathematics Department of Computer Science University of Nebraska Lincoln s-dstolee1@math.unl.edu August 2, 2011 Abstract Let f(n, p be the maximum
More informationLearning Decision Trees
Learning Decision Trees Machine Learning Fall 2018 Some slides from Tom Mitchell, Dan Roth and others 1 Key issues in machine learning Modeling How to formulate your problem as a machine learning problem?
More informationOn Locating-Dominating Codes in Binary Hamming Spaces
Discrete Mathematics and Theoretical Computer Science 6, 2004, 265 282 On Locating-Dominating Codes in Binary Hamming Spaces Iiro Honkala and Tero Laihonen and Sanna Ranto Department of Mathematics and
More informationFinite Metric Spaces & Their Embeddings: Introduction and Basic Tools
Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools Manor Mendel, CMI, Caltech 1 Finite Metric Spaces Definition of (semi) metric. (M, ρ): M a (finite) set of points. ρ a distance function
More informationSummer 2017 June 16, Written Homework 03
CS1800 Discrete Structures Prof. Schnyder Summer 2017 June 16, 2017 Assigned: Fr 16 June 2017 Due: Tu 20 June 2017 Instructions: Written Homework 0 The assignment has to be uploaded to Blackboard by the
More informationDistribution of Environments in Formal Measures of Intelligence: Extended Version
Distribution of Environments in Formal Measures of Intelligence: Extended Version Bill Hibbard December 2008 Abstract This paper shows that a constraint on universal Turing machines is necessary for Legg's
More informationFUNCTIONAL ANALYSIS LECTURE NOTES: COMPACT SETS AND FINITE-DIMENSIONAL SPACES. 1. Compact Sets
FUNCTIONAL ANALYSIS LECTURE NOTES: COMPACT SETS AND FINITE-DIMENSIONAL SPACES CHRISTOPHER HEIL 1. Compact Sets Definition 1.1 (Compact and Totally Bounded Sets). Let X be a metric space, and let E X be
More informationInduction and Recursion
. All rights reserved. Authorized only for instructor use in the classroom. No reproduction or further distribution permitted without the prior written consent of McGraw-Hill Education. Induction and Recursion
More informationAspects of Growth in Baumslag-Solitar Groups
Aspects of Growth in Baumslag-Solitar Groups Groups St Andrews in Birmingham 7 August 2017 Eric Freden with undergraduate research assistant Courtney Cleveland Prelude: what are the obstructions to understanding
More informationBDD Based Upon Shannon Expansion
Boolean Function Manipulation OBDD and more BDD Based Upon Shannon Expansion Notations f(x, x 2,, x n ) - n-input function, x i = or f xi=b (x,, x n ) = f(x,,x i-,b,x i+,,x n ), b= or Shannon Expansion
More information