Analytic Depoissonization and Its Applications Λ

Size: px
Start display at page:

Download "Analytic Depoissonization and Its Applications Λ"

Transcription

1 Analytic Depoissonization and Its Applications Λ W. Szpankowski y Department of Computer Science Purdue University W. Lafayette, IN May 31, 2003 Λ This research is supported by NSF and NIH. y Joint work with P. Jacquet, INRIA, France.

2 Outline of the Talk 1. Definition of Poisson Transform and Its Properties 2. Motivating Examples Digital Trees ffl Leader Election Problem ffl Probabilistic Counting ffl 3. Algebraic Depoissonization 4. Depoissonization Theorems Simple Depoissonization Result and Its Proof ffl Generalized Depoissonization Results ffl Poissonized Variance vs Bernoulli Variance ffl Diagonal Depoissonization Theorems ffl Exponential Diagonal Depoissonization Theorems ffl 5. Applications DepthinaTrie ffl Size of a a Trie ffl Digital Search Trees ffl ffl Entropy of the Binomial Distribution

3 g n z n n(n 1) (n k) z k+1 1)z) exp((ff e z =(1 z) n! Poisson Transform Let fg n g n2n be a sequence of complex numbers such that jg n j = exp(o(n)): The Poisson transform of fg n g n2n is defined as eg(z) = X n! e z (1) n 0 G(z) e 1 1 g n n z n e 2z ( 1) n ff Basic Problem: How to recover g n from asymptotics of eg(z).

4 gk P ffn g n e G(ffz) gk f n k g n+1 e G(z)e z e G(z) e F (z)e z Some Properties of Poisson Transform Assumption: The Poisson transform G(z) is an entire function. Table 1: Some Properties of Poisson Transform sequence Poisson transform k n k P n e G(z) + e G(z) g n+k Pi k i e Example: Let a n = n p k q n k g k f n k k X with p + q = 1. Then k ea(z) = e F (pz) e G(qz):

5 g n k k! e : Probabilistic vs Analytic Depoissonization Let N be an integer variable with Poisson distribution of parameter : P (N = k) = k Observe that E[gN] = k! e := e G( ) This constitutes the basis for the probabilistic poissonization/depoissonization. n 0 X Thus Poisson transform e G(z) is an analytic continuation of e G( ) to complex plane. Remark: It seems to us that probabilistic poissonization was introduced by M. Kac (1949) (limited to real arguments).

6 Applications: Digital Trees Digital trees are data structures suitable to store data (keys) represented by a sequence of symbols from a finite alphabet. There are three types of digital trees, namely: trie, Patricia trie (PAT), and digital search tree (DST). These structures are recalled below. trie Patricia DST 1 0 S S 2 S 3 S 1 S S 1 S 2 S 3 S 4 S4 S 3 S 4 Figure 1: A trie, Patricia trie and a digital search tree (DST) built from the following four strings S 1 = :::, S 2 = :::, S 3 = :::, S 4 = :::.

7 F (z) = a(z) ρ +? F (zp)ρ +? Generic Example F(z) a(z) contribution of the root zp zq F(zp) F(zq) Figure 2: Generic Situation F (zq) + intitial conditions : ff ff

8 Tries and Their Parameters The parameters of interests are: typical depth D n, i.e., the length of a path from the root to a randomly ffl selected (external) node, height H n, i.e., maximum path from the root to a terminal node, ffl total path length L n, i.e., sum of all paths from the root to (external) ffl nodes, ffl size of the tree S n, i.e., number of nodes.

9 ed(z; u) = 1X D n (u) zn n! e z Recurrences and Functional Equations Average Depth: L n = ne[d n ]: L 0 = 0, L 1 = 1, and L n = n + n p k q n k (L k + L n k ) k X Poisson transform: k el(z) = z + e L(pz) + e L(qz) ze z (2) The bivariate Poisson generating function for the depth D n (u) = E[u Dn ], and and the total path length L n (u) = E[u Ln ] (e.g., n=0 and similar for e L(z; u)). They satisfy the following functional equations: ed(z; u) = u(p e D(zp; u) + q e D(zq; u)) + (1 u)e z ; el(z; u) = e L(zup; u) e L(zuq; u) + z(1 u)e z :

10 s n = 1 + Size of Tries Average Size: s n = E[S n ]: s 0 = s 1 = 1 and n p k q n k (s k + s n k ): k X Poisson transform: k S(z) = 1 + S(pz) + S(qz) 2(1 + z)e z (3) Bivariate Poisson GF: es(z; u) = ue S(zp; u) e S(zq; u) + (1 u)e z :

11 L n+1 (u) = u n Example: Digital Search Trees The exponential generating functions for digital search tree parameters satisfy the following = u(pd(zp; u) + qd(zq; u)) + 1 ; k (z) dh dz = H k 1 (zp)h k 1 (qz) with H 0 (z) = (1 + z). = L(zup; u)l(zuq; u) : Above equations come from corresponding recurrences. n (u) = E[u Ln ] satisfies L For example: nx n p k q n k (L k (u) + L n k (u)): k k=0

12 Leader election algorithm Figure below explains how a randomized leader election algorithm works (Prodinger, DM, 1993) T a b c d e f g H H b d e g a c f T b d e g H T d g b e T H d g d g H The loser -> d g Figure 3: An incomplete trie for the elimination process starting with 7 players. Height H n is the number of steps needed to find a leader (loser).

13 n = H n nx n (u) u k k=1 2 eh(z; u) = u(1 + e z=2 ) e H z 2 ;u Leader Election Poisson Transform H (u) E[u Let ] e Hn n and. P = n 0 H n(z) zn H(z; = u) n! The following functional equations are easy to derive k (u) + uh n(u) H n 2 + e z h (1 + z)(1 u) ue z=2i :

14 Generalized Probabilistic Counting In several algorithms on databases a major determinant of efficiency is the cardinality of the underlying set, saym. Generalized Flajolet & Martin idea works as follows. Consider an empty bitmap string with all positions filled by zeros. ffl Assume that N objects (e.g., data, persons, etc.) can randomly insert ffl (hit) 1 a at any position of the bitmap, however, the probability of hitting j 0 the position is equal 2 to. j 1 Every object can hit only one ffl time. In terms of probabilistic counting, the probability of the occurrence ffl of the 0 pattern 1 like is equal 2 to since 0 and 1 are equally likely. j 1 j ffl We count the number of hits in any position of the bitmap, but we count the number of hits only up to some value d + 1, whered is a given parameter. The bitmap is a d + 1-ary string. Clearly, the bitmap will contain a lot of ffl + 1 s at the beginning of the string. d

15 F n (u) = ef (z; u) = uf d (z=2) e F (z=2;u) + (u 1)(fd (z=2) 1) : Parameter of Interest The cardinality of M can be estimated based on N;d = minfk : BITMAP(k) < d + 1 R and for 0» i < k BITMAP(i) = d + 1g : all Ford = 3 Example: we may bitmap = z } have Then R N;3 = 11. Functional Equations R N;3 Let F n (u) = E[u R n;d ].Then X n d 1 dx n 2 n + u k k=0 n 2 n F k (u) : k and the Poisson transform satisfies k=0 where f d (z) = 1 e d (z)e z and e d (z) = 1 + z1 zd + : + d! 1!

16 g n z n eg(z) = z k n! e z ) g n ο e G(n): Basic Idea of Depoissonization Basic Problem: How to recover g n from asymptotics of eg(z) = X n 0 when e G(z) is only known in the cone as z! 1. Example. From Table 1 we know that for g n = n(n 1) (n k +1) ο n k we have

17 Does Depoissonization Always Work? For g n = ( 1) n the Poisson transform is e G(z) = e 2z g n 6ο e G(n):

18 What about this one? Figure 4: Poisson Transform of sin 2 (log n).

19 g n = n![z n ] n!(e z=m 1) m k Algebraic Depoissonization In the exact or algebraic depoissonization one g extracts n from its Poisson transform, that is, e z e G(z) Example: n Consider balls (items) thrown randomly and uniformly into urns. What is the probability P k (n) that precisely k specified urns are m empty? In the Poisson model we replace stream of balls by a Poisson process with mean z. Each urn receives an independent Poisson processes of mean z=m. : k (z) = e kz=m (1 e z=m ) m k = e z (e z=m 1) m k : P Depoissonizing it we have Prfempty urns = kg = n![z n ](e z P k (z)) = [z n ] = k)! (m n n n m n kψ where denote the Stirling numbers of the second kind. Φ m k o ;

20 Analytic Depoissonization Heuristics We first propose a heuristic derivation. As we observede G(z) = E[g N ], where N is a Poisson with mean z = n. Taylor s expansion around n is g(n) = g(n) + (N n)g 0 (n) g00 (n)(n n) 2 + : Taking the expectation we obtain eg(n) = e G(z)j z=n = E[g(N)] = g(n) g00 (n)n + since E[N n] = 0 and E[N n] 2 = n. Solving the above for g(n) = g n Provided that g n ß e G(n) 1 2 ng00 (n) + = e G(n) + O(ng 00 (n)): we have ng 00 (n) = o(g(n)); g n ο e G(n):

21 Examples Consider the following examples: Let = for which fi e fi G(n) = n + O(n fi 1 ),andg 00 (n) = O(n ), fi 2 ffl n g(n) thus n e 00 G(n) + O(ng (n)) = e fi 1 G(n) + O(n ); g = which is true. Consider g(n) ff now ff > with Thistimee 1. n e G(z) = g, (n) = ffl z(ff 1) = ff, and it 00 is not true that g n ο e ff 2 log n G(n). Nowweassumeg = e n. In this case, it is harder to find the Poisson ffl transform, but one suggests nfi that ο e zfi G(z). We also g have (n) = e 00 O(n 2fi 2 e nfi ). Observe that g n = e G(n) + O(ng 00 (n)) = e G(n) + O(n 2fi 1 e nfi ) and the error is small as long 0 < fi < as 1 2 depoissonization. (the so called exponential

22 n S n w = ne i n - x Basic Depoissonization Theorem Theorem e 1. Let G(z) be an entire function and let S be a complex cone around real < axis with. If the following two conditions hold: 2 ß (I) z 2 S : fi = O(z ) G(z) for some e fi; =2 S (O) e : z = O(e ffjzj ) G(z)e for ff < some z 1, then Even better g n = e G(n) + O(n fi 1=2 ): g n = e G(n) + O(n fi 1 ): y 6 (0;n) C(h)

23 g n = it z=ne = r n 2ß r n 2ß Z I e G(z)e z n+1 z ß Z Sketch of the Proof From the Cauchy and Stirling formulas we have n! dz 2ßi n! eg(ne it ) exp it e nit dt ne ß n n 2ßi = (1 + O(n))(I n (t) + E n (t)) where I n (t) = eg(ne it ;u) exp it 1 it dt e n E n (t) = eg(ne it ;u) exp it 1 it dt e n Z jtj2[ ;ß] Outside the Cone S : n (t) = O( n! E neffn ) = O(e (1 ff)n )! 1 n

24 Saddle Point theta Inside the Cone S (Saddle point method): t 0 =t= p n = n I 1 Z p n p 2ß eg(ne it=p n )exp n n 1 it= p n dt: it=p e p n

25 exp n e it= p n 1 it= p n = e t2 =2 it3 ψ1 t6 t4 + 24n 72n + O ψ 9 log n p n 6 eg(ne it=p n ) = eg(n) + it p n eg 0 (n) + t 2 n(t); eg 0 (z) = O(z fi 1 ) n p n!!

26 eg(z)e z = e jzj for arg(z) = ß : Counterexamples to (I) and (O) Example: (Violation of (O)) Let n ( 1) n e 2z G(z) = e : g = Condition (I) inside the cone is true. But, in this case the condition (O) outside S the cone does not hold because Clearly, g n 6ο e G(n). Example: (Violation of (I)) Take now g n = (1 + t) n e G(z) = e tz : Condition outside (O) the cone S holds for some such that (1+t) cos < 1. But the condition inside (I) the cone S does not hold since e G(z) has not a polynomial growth. Again g n 6ο e G(n).

27 g n = b ij n i e G hji (n) + O(n fi m 1 ) Full Asymptotic Expansion Theorem 2. Under same conditions as in Theorem 1, we have the following full expansion that holds for every fixed m: mx Xi+m i=0 j=0 b where ij are coefficients P of b ijx i y j = exp(x log(1 + y) xy): ij Remark: Gonnet-Munro (84) produced this expansion but without the validity conditions. Proof: 1. Use expansion of e G(z) knowing that e G hki (z) = O(z fi k ); 2. Use dominating convergence argument to prove that there is an expansion of g n as P b ij n i e G hji (n) for some bij. The first few terms of the above expansion are g n = e G(n) 1 2 n e G (2) (n) n e G (3) (n) n2 e G (4) (n) 1 4 n e G (4) (n) 1 6 n2 e G (5) (n) 1 n3 (6) (n) 1 n e (5) G (n) + 13 n2 e e (6) G (n) + 1 n3 e (7) G G (n) + 1 n4 e (8) G + (n) n (6) (n) 11 n2 e (7) G (n) 17 n3 e e (8) G (n) 1 n4 e (9) G G (n) 1 n5 e (10) G (n

28 n = log 2 n + fl g P 0(log 2 n)s log mx kx Example We are interested in asymptotic expansion of g n = 1X (1 2 k ) n : 1 k=0 The Poisson transform of g n is eg(z) = 1X e z2 k ; 1 k=0 and the jth derivative is e G (j) (z) = ( 1) j+1 P 1 k=0 2 jk e z2 k : By Theorem 2 one proves + ( 1) k+i+1 b i;k+i n k P k+i (log 2 n) + O(n m 1 log n) k=1 i=1

29 P 0 (log 2 x) = P j (log 2 x) = 1X (2ßi`= log 2)e 2ßi` log 2 x where 1 X log 2 `6=0 1 (j + 2ßi`= log 2)e 2ßi` log 2 x ; j 1: log 2 `= 1

30 1 2 Exponential Depoissonization Theorem 3. Let f(n) be a sequence whose Poisson transform is e F (z). (i) Assume that for z! 1 the following holds: (I) For z 2 S j e F (z)j» A exp(bjzj ν ) where 0» ν < 1=2, anda; B > 0 are constants. (O) For z =2 S F (z)ez j» A 1 exp(!jzj) je! < 1 for A and > 1 Thenforn! 1 0. = F (n) + O n (1 2ν) exp(bn ν ) : e f(n) (ii) Let conditions (I) and (O) hold again except that ν now in (I) satisfies ν < 1. Then colorblue < log f(n) = log e F (n) + O(n 2ν 1 ): Proof. Use the fact that j e F hki (z)j» Ajzj k(ν 1) exp(bjzj ν ).

31 = ec(z) (1 e z=2 ) e 8 z C ; 2 z Example Let us C study n defined below that appears in the analysis of the height of PATRICIA: nx n 2 n n k + 1 C k; n 2 k k=2 n = 4 C C with = 2 1. ItsPoisson transform satisfies and then F (z) = log z 2 e C(z)=2 has the following asymptotics in S as z! 1 (using Mellin transform) exp[f (z)] ο A p z2 1=12 exp " log 2 (z) 1 + Ψ(log # 2 z) ; 2 log 2 fl(1)+fl where is a fluctuating A = exp 2 =2 ß 2 =12 function and. log Ψ(z) 2 Exponential Depoissonization leads to C n ο A 1 2 n5=2 2 1=12 exp " log 2 (j) 1 + Ψ(log # 2 n) : 2 log 2

32 Poisson Mean and Variance For a random variable X n define by e X(z) and e V (z) the Poisson mean and Poisson variance, respectively. That is, they are the mean and the variance of X N where N is Poisson distributed. How the Bernoulli moments E[X n ] and Var[X n ] related to the corresponding Poisson moments e X(z) and e V (z)?. Theorem 4. Under previous hypotheses we have E[X n ] = e X(n) 1 2 n e X h2i (n) + O(n fi 2 ); Var[X n ] = e V (n) n[ e X 0 (n)] 2 + O(n fi 1 ) Example: Let Z 1 ;:::;Z n be a sequence of independently and identically distributed random variables with generating function P (u) = Eu Z 1 and mean μ and variance v. Then But E[X n ] = nμ; Var[X n ] = nv: 2 (z) (μ + v)z; e V = ] = e thus (n) n[ e0 2 X (n)] = (μ 2 + v)n nμ 2 = n V Var[X vn. ex(z) = zμ;

33 v n = q n (s n ) 2 Application: Variance of Tries Size Consider S the size n of a q trie. = E[S Let 2 n ], and the Poisson variance is n = Q(z) (S(z)) where 2 Q(z) is Poisson transform of q n. V (z) V (z) Observe that satisfies V (z) = V (pz) + V (qz) + (2S(z) 1 + (1 + z)e z )(1 + z)e z One proves (Jacquet-Regnier 87) (z) = C 1 z(1 + P 4 (log z)) + O(1) (p = q = 1=2) V Q(z) = O(z and ).Then 2 = Q(n) n 2 Qh2i (n) (S(n) n 2 Sh2i ) 2 + O(1) = V (n) n 2 (S0 (n)) 2 + O(1): Term n(s 0 (n)) 2 is of the same order as V (n) and cannot be neglected: Poisson variance differs from the Bernoulli variance on the second term asymptotics.

34 g n;k z n n! e z : Limiting Distributions g n;k Depoissonization techniques can also be used to derive limiting distributions. Such extension requires to analyze a double-index sequence ; for example n;k = PrfX n = kg; or g n;k = E[e tx n= sqrtv k ]: g Then Poisson transform is eg(z; u) = Eu XN = 1X n z e z n! 1X g n;k u k ; n=0 k=0 but often it is better to analyze a sequence of Poisson transforms eg k (z) = 1X n=1 How to infer limiting distribution (equivalently g n;k )from eg(z; u) or e Gk (z)?.

35 G n (u) = e G(n; u) + O(n fi 1 ) A Simple Depoissonization Theorem 5. Let e G(z; u) satisfy the hypothesis of previous depoissonization theorems, i.e., for some numbers < ß=2, A, B, ο > 0, fi, andff < 1 (I) and (O) hold for all u in a set U. Then uniformly for u 2 U. Theorem 6. e Suppose (z) = P 1 n=0 Gk n;k zn n! e z,fork belonging to some set K. If the following two conditions hold: g (I) z 2 S : Gk = O(z fi ) for some fi; e (z) =2 S (O) e : (z)e z = O(e ffjzj ) Gk for ff < some z 1, then uniformly in k 2 K g n;k = e Gk (n) + O(n fi 1 ) (4) and the error estimate does not depend on K.

36 ed(z; u) = u(p e D(zp; u) te[d p Var[Dn] E» e td n= p Var[Dn] n]= e Example PATRICIA Depth Example: DepthinPATRICIA. The depth D n in PATRICIA satisfies + q e D(zq; u))(1 u)(p e D(zp; u)e qz + q e D(zq; u)e pz ) : One can prove that conditions (I) and (O) hold (e.g., e D(z; u) = O(z " ) inside a cone). Using Mellin transform as z! 1 we prove that e t e X(z)=ff(z) e D(z; e t=ff(z) ) = e t2 =2 (1 + O(1=ff(z))); for u = e t, t complex, where e X(z) = O(log z) and ff 2 (z) = O(log z) (provided the source is biased). By previous result we can E[D prove ] ο e that n X(n) and ο Var[Dn ] (n). This suffices to establish the next result. 2 ff Theorem 7 (Rais, Jacquet and S., 1993). For complex t = e t2 =2 (1 + O(1= p log n)) ; that is, (D n E[D n ])= p Var[D n ] converges in distribution and in moments to the standard normal distribution.

37 (I) z 2 S, jzj 2 (n Dn; n + Dn): j e Gn (z)j» Bn fi (O) z =2 S, jzj = n: j e Gn (z)e z j» e n nff g n;n = ij i ehji G n (n) + O(nfi m 1 ) n b Diagonal Depoissonization When proving Central Limit Theorem we must deal with g n;k = E[e tx n= p V k]. But often we are only interested in g n;n. Diagonal Depoissonization is useful in this case. Theorem 8. Let e Gm (z) = P g n;m z n be a sequence of Poisson transforms. n! If there exists a ez cone and constants D > 0 B, ff < 1 and such S that Then mx Xi+m i=0 j=0 = G n (n) + O(n fi 1 )

38 j log e Gn (z)j» Bn fi n;n e Gn (n) exp( n g ( e0 G (n) )2 = )(1 + O(n 3fi 2 )): eg(n) 2 Diagonal Exponential Depoissonization Theorem 9. Sequence of Poisson e transforms Gn (z). There exists a S cone log( e where (z)) Gn exists. fi 2 (1=2; 2=3) Let an d B > A, ff < 0, 1. (I) z 2 S, jzj 2 (n Dn; n + Dn): (O) z =2 S, jzj = n: j e Gn (z)e z j» e n Anff, then Even more sophisticated depoissonization theorems can be proved with a combination of algebraic cones, diagonal and exponential depoissonization.

39 eg k (z) = (1 e z ) z=2 k Leader Election Distribution Consider the Poisson transform eg(z; u) = u(1 + e z=2 ) e G z 2 ;u + e z [(1 + z)(1 u) ue z=2 ] : Using Mellin transform we eg(z; u) ο zlog u ((1 u) (1 log u) (1 log u) + P (log u)) and then ln 2 z=2k 1 : e After applying the residue theorem, and P (H depoissonization < j) ο n j (n) we arrive at eg PrfH n» log n + kg = ρ(n) k 2 ρ(n) k ) 1 + O 1 pn exp(2 : where ρ(n) = log n blog nc. Observe that this does not give a limiting distribution.

40 eg(z; u) = uf d (z=2) e G(z=2;u) + (u 1)fd (z=2) Probabilistic Counting Asymptotic Distribution We have the following Poisson transform for the estimate R n;d where f d (z) = 1 e d (z) and e d (z) is truncate exponential function. Then:! ; k = k eg(z; u) ]ψ eg (z) [u u 1 '(z2 k 1 ) = '(z) where '(z) = 1Y f d (z2 j ) = 1Y e d (z2 j )e z2j : 1 This would lead to the following asymptotic distribution if we can prove the depoissonization: j=0 j=0 PrfR n;d» log 2 n + m 1g = 1 ' m ρ(n) + O(n 1=2 ) ; 2 where ρ(n) = log 2 n blog 2 nc.

41 s n = u X k p v n n p k q n k s k s n k k Distribution of Size of a Trie Let s n (u) = E[u Sn ].Thens 0 (u) = s 1 (u) = u, which reads as (Jacquet and Regnier, 1987) S(z; u) = us(pz; u)s(qz; u) (u 2 1)u(1 + z)e z : Mellin log(s(z; e analysis )) = S(z)t + V (z) ), t2 2 + O(zt3 ffl Diagonal depo: t Gn (z) = e ts n= p vn S(z; e ), t=pvn e ffl when z = O(n): ffl e Gn (z) = exp( S(z) s n log V (z) t2 =2 + o(n 1=2 )) = O(n ); 1=2 vn + Diagonal exponential e depo: n= p vn s ts (e t=pvn ) = exp(log e Gn (n) ffl n ((log e n (n)) 0 ) 2 )(1 + O(n Gn )). 1=2 2 Since log e Gn (n) = v(n) 2vn t2 + O(n 1=2 ) and (log e Gn (n)) 0 = s0 (n) p v n t + ffl 1 ) then O(n e (n) v(n) n(s0 (n)) 2 =2 log t 2 Gn =2 + o(n 1=2 t2 ) = = + o(n 1=2 ) 2 n v and the distribution is asymptotically normal.

42 L n+1 (u) = u n X L(z; u) = L(puz; u)l(quz; u) Digital Search Trees Define L n (u) = E[u Ln ].Then n p k q n k (L k (u) + L n k (u) k which leads to particularly differential-function equation with L(z; u) = e L(z; u)e z (exponential PGF). (Ugly nd dirty) asymptotic analysis provides log L(z; e t ) = O(z» (t)) with ffl t )»(t) + (qe t )»(t) = 1. (pe ffl Similarly to tries size but harder analysis that requires polynomial cone (not a linear cone) in order to prove limiting normal distribution. This result was used to find redundancy of Ziv-Lempel compression algorithm (Louchard, S., 1997)

Analytic Depoissonization and Its Applications

Analytic Depoissonization and Its Applications Analytic Depoissonization and Its Applications W. Szpankowski Department of Computer Science Purdue University W. Lafayette, IN 47907 April 29, 2008 AofA and IT logos This research is supported by NSF

More information

Asymptotic and Exact Poissonized Variance in the Analysis of Random Digital Trees (joint with Hsien-Kuei Hwang and Vytas Zacharovas)

Asymptotic and Exact Poissonized Variance in the Analysis of Random Digital Trees (joint with Hsien-Kuei Hwang and Vytas Zacharovas) Asymptotic and Exact Poissonized Variance in the Analysis of Random Digital Trees (joint with Hsien-Kuei Hwang and Vytas Zacharovas) Michael Fuchs Institute of Applied Mathematics National Chiao Tung University

More information

Introduction Consider a group of n people (users, computers, objects, etc.) sharing a scarce resource (e.g., channel, CPU, etc.). The following elimin

Introduction Consider a group of n people (users, computers, objects, etc.) sharing a scarce resource (e.g., channel, CPU, etc.). The following elimin ANALYSIS OF AN ASYMMETRIC LEADER ELECTION ALGORITHM September 3, 996 Svante Janson Wojciech Szpankowski Department of Mathematics Department of Computer Science Uppsala University Purdue University 756

More information

the electronic journal of combinatorics 4 (997), #R7 2 (unbiased) coin tossing process by Prodinger [9] (cf. also []), who provided the rst non-trivia

the electronic journal of combinatorics 4 (997), #R7 2 (unbiased) coin tossing process by Prodinger [9] (cf. also []), who provided the rst non-trivia ANALYSIS OF AN ASYMMETRIC LEADER ELECTION ALGORITHM Svante Janson Wojciech Szpankowski Department of Mathematics Department of Computer Science Uppsala University Purdue University 756 Uppsala W. Lafayette,

More information

Multiple Choice Tries and Distributed Hash Tables

Multiple Choice Tries and Distributed Hash Tables Multiple Choice Tries and Distributed Hash Tables Luc Devroye and Gabor Lugosi and Gahyun Park and W. Szpankowski January 3, 2007 McGill University, Montreal, Canada U. Pompeu Fabra, Barcelona, Spain U.

More information

Approximate Counting via the Poisson-Laplace-Mellin Method (joint with Chung-Kuei Lee and Helmut Prodinger)

Approximate Counting via the Poisson-Laplace-Mellin Method (joint with Chung-Kuei Lee and Helmut Prodinger) Approximate Counting via the Poisson-Laplace-Mellin Method (joint with Chung-Kuei Lee and Helmut Prodinger) Michael Fuchs Department of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan

More information

String Complexity. Dedicated to Svante Janson for his 60 Birthday

String Complexity. Dedicated to Svante Janson for his 60 Birthday String Complexity Wojciech Szpankowski Purdue University W. Lafayette, IN 47907 June 1, 2015 Dedicated to Svante Janson for his 60 Birthday Outline 1. Working with Svante 2. String Complexity 3. Joint

More information

From the Discrete to the Continuous, and Back... Philippe Flajolet INRIA, France

From the Discrete to the Continuous, and Back... Philippe Flajolet INRIA, France From the Discrete to the Continuous, and Back... Philippe Flajolet INRIA, France 1 Discrete structures in... Combinatorial mathematics Computer science: data structures & algorithms Information and communication

More information

Digital search trees JASS

Digital search trees JASS Digital search trees Analysis of different digital trees with Rice s integrals. JASS Nicolai v. Hoyningen-Huene 28.3.2004 28.3.2004 JASS 04 - Digital search trees 1 content Tree Digital search tree: Definition

More information

A Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence

A Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence A Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence Dedicated to Philippe Flajolet 1948-2011 July 4, 2013 Philippe Jacquet Charles Knessl 1 Wojciech Szpankowski 2 Bell Labs Dept. Math.

More information

Networks: Lectures 9 & 10 Random graphs

Networks: Lectures 9 & 10 Random graphs Networks: Lectures 9 & 10 Random graphs Heather A Harrington Mathematical Institute University of Oxford HT 2017 What you re in for Week 1: Introduction and basic concepts Week 2: Small worlds Week 3:

More information

Minimax Redundancy for Large Alphabets by Analytic Methods

Minimax Redundancy for Large Alphabets by Analytic Methods Minimax Redundancy for Large Alphabets by Analytic Methods Wojciech Szpankowski Purdue University W. Lafayette, IN 47907 March 15, 2012 NSF STC Center for Science of Information CISS, Princeton 2012 Joint

More information

Compact Suffix Trees Resemble Patricia Tries: Limiting Distribution of Depth

Compact Suffix Trees Resemble Patricia Tries: Limiting Distribution of Depth Purdue University Purdue e-pubs Department of Computer Science Technical Reports Department of Computer Science 1992 Compact Suffix Trees Resemble Patricia Tries: Limiting Distribution of Depth Philippe

More information

A One-to-One Code and Its Anti-Redundancy

A One-to-One Code and Its Anti-Redundancy A One-to-One Code and Its Anti-Redundancy W. Szpankowski Department of Computer Science, Purdue University July 4, 2005 This research is supported by NSF, NSA and NIH. Outline of the Talk. Prefix Codes

More information

Generating and characteristic functions. Generating and Characteristic Functions. Probability generating function. Probability generating function

Generating and characteristic functions. Generating and Characteristic Functions. Probability generating function. Probability generating function Generating and characteristic functions Generating and Characteristic Functions September 3, 03 Probability generating function Moment generating function Power series expansion Characteristic function

More information

Analytic Information Theory: From Shannon to Knuth and Back. Knuth80: Piteaa, Sweden, 2018 Dedicated to Don E. Knuth

Analytic Information Theory: From Shannon to Knuth and Back. Knuth80: Piteaa, Sweden, 2018 Dedicated to Don E. Knuth Analytic Information Theory: From Shannon to Knuth and Back Wojciech Szpankowski Center for Science of Information Purdue University January 7, 2018 Knuth80: Piteaa, Sweden, 2018 Dedicated to Don E. Knuth

More information

The Moments of the Profile in Random Binary Digital Trees

The Moments of the Profile in Random Binary Digital Trees Journal of mathematics and computer science 6(2013)176-190 The Moments of the Profile in Random Binary Digital Trees Ramin Kazemi and Saeid Delavar Department of Statistics, Imam Khomeini International

More information

Probabilistic analysis of the asymmetric digital search trees

Probabilistic analysis of the asymmetric digital search trees Int. J. Nonlinear Anal. Appl. 6 2015 No. 2, 161-173 ISSN: 2008-6822 electronic http://dx.doi.org/10.22075/ijnaa.2015.266 Probabilistic analysis of the asymmetric digital search trees R. Kazemi a,, M. Q.

More information

Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.

Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements. Lecture: Hélène Barcelo Analytic Combinatorics ECCO 202, Bogotá Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.. Tuesday, June 2, 202 Combinatorics is the study of finite structures that

More information

Solutions to Problem Set 4

Solutions to Problem Set 4 UC Berkeley, CS 174: Combinatorics and Discrete Probability (Fall 010 Solutions to Problem Set 4 1. (MU 5.4 In a lecture hall containing 100 people, you consider whether or not there are three people in

More information

Combinatorial/probabilistic analysis of a class of search-tree functionals

Combinatorial/probabilistic analysis of a class of search-tree functionals Combinatorial/probabilistic analysis of a class of search-tree functionals Jim Fill jimfill@jhu.edu http://www.mts.jhu.edu/ fill/ Mathematical Sciences The Johns Hopkins University Joint Statistical Meetings;

More information

Stat 134 Fall 2011: Notes on generating functions

Stat 134 Fall 2011: Notes on generating functions Stat 3 Fall 0: Notes on generating functions Michael Lugo October, 0 Definitions Given a random variable X which always takes on a positive integer value, we define the probability generating function

More information

HUB HUB RESEARCH PAPER. A Markov Binomial Distribution. Hogeschool Universiteit Brussel. E. Omey, J. Santos and S. Van Gulck

HUB HUB RESEARCH PAPER. A Markov Binomial Distribution. Hogeschool Universiteit Brussel. E. Omey, J. Santos and S. Van Gulck HUB HUB RESEARCH PAPER A Markov Binomial Distribution E. Omey, J. Santos and S. Van Gulck HUB RESEARCH PAPER 2007/5. SEPTEMBER 2007 Hogeschool Universiteit Brussel Stormstraat 2, 000 Brussel, Belgium T:

More information

Pattern Matching in Constrained Sequences

Pattern Matching in Constrained Sequences Pattern Matching in Constrained Sequences Yongwook Choi and Wojciech Szpankowski Department of Computer Science Purdue University W. Lafayette, IN 47907 U.S.A. Email: ywchoi@purdue.edu, spa@cs.purdue.edu

More information

Asymptotic results for silent elimination

Asymptotic results for silent elimination Discrete Mathematics and Theoretical Computer Science DMTCS vol. subm., by the authors, 1 1 Asymptotic results for silent elimination Guy Louchard 1 and Helmut Prodinger 2 1 Université Libre de Bruxelles,

More information

Analytic Pattern Matching: From DNA to Twitter. AxA Workshop, Venice, 2016 Dedicated to Alberto Apostolico

Analytic Pattern Matching: From DNA to Twitter. AxA Workshop, Venice, 2016 Dedicated to Alberto Apostolico Analytic Pattern Matching: From DNA to Twitter Wojciech Szpankowski Purdue University W. Lafayette, IN 47907 June 19, 2016 AxA Workshop, Venice, 2016 Dedicated to Alberto Apostolico Joint work with Philippe

More information

AVERAGE-CASE ANALYSIS OF COUSINS IN m-ary TRIES

AVERAGE-CASE ANALYSIS OF COUSINS IN m-ary TRIES J. Appl. Prob. 45, 888 9 (28) Printed in England Applied Probability Trust 28 AVERAGE-CASE ANALYSIS OF COUSINS IN m-ary TRIES HOSAM M. MAHMOUD, The George Washington University MARK DANIEL WARD, Purdue

More information

Part IA Probability. Definitions. Based on lectures by R. Weber Notes taken by Dexter Chua. Lent 2015

Part IA Probability. Definitions. Based on lectures by R. Weber Notes taken by Dexter Chua. Lent 2015 Part IA Probability Definitions Based on lectures by R. Weber Notes taken by Dexter Chua Lent 2015 These notes are not endorsed by the lecturers, and I have modified them (often significantly) after lectures.

More information

Analytic Algorithmics, Combinatorics, and Information Theory

Analytic Algorithmics, Combinatorics, and Information Theory Analytic Algorithmics, Combinatorics, and Information Theory W. Szpankowski Department of Computer Science Purdue University W. Lafayette, IN 47907 September 11, 2006 AofA and IT logos Research supported

More information

Spring 2012 Math 541B Exam 1

Spring 2012 Math 541B Exam 1 Spring 2012 Math 541B Exam 1 1. A sample of size n is drawn without replacement from an urn containing N balls, m of which are red and N m are black; the balls are otherwise indistinguishable. Let X denote

More information

A Master Theorem for Discrete Divide and Conquer Recurrences. Dedicated to PHILIPPE FLAJOLET

A Master Theorem for Discrete Divide and Conquer Recurrences. Dedicated to PHILIPPE FLAJOLET A Master Theorem for Discrete Divide and Conquer Recurrences Wojciech Szpankowski Department of Computer Science Purdue University U.S.A. September 6, 2012 Uniwersytet Jagieloński, Kraków, 2012 Dedicated

More information

THE QUEEN S UNIVERSITY OF BELFAST

THE QUEEN S UNIVERSITY OF BELFAST THE QUEEN S UNIVERSITY OF BELFAST 0SOR20 Level 2 Examination Statistics and Operational Research 20 Probability and Distribution Theory Wednesday 4 August 2002 2.30 pm 5.30 pm Examiners { Professor R M

More information

Considering our result for the sum and product of analytic functions, this means that for (a 0, a 1,..., a N ) C N+1, the polynomial.

Considering our result for the sum and product of analytic functions, this means that for (a 0, a 1,..., a N ) C N+1, the polynomial. Lecture 3 Usual complex functions MATH-GA 245.00 Complex Variables Polynomials. Construction f : z z is analytic on all of C since its real and imaginary parts satisfy the Cauchy-Riemann relations and

More information

The variance for partial match retrievals in k-dimensional bucket digital trees

The variance for partial match retrievals in k-dimensional bucket digital trees The variance for partial match retrievals in k-dimensional ucket digital trees Michael FUCHS Department of Applied Mathematics National Chiao Tung University January 12, 21 Astract The variance of partial

More information

Asymptotic Statistics-III. Changliang Zou

Asymptotic Statistics-III. Changliang Zou Asymptotic Statistics-III Changliang Zou The multivariate central limit theorem Theorem (Multivariate CLT for iid case) Let X i be iid random p-vectors with mean µ and and covariance matrix Σ. Then n (

More information

Limiting Distributions

Limiting Distributions Limiting Distributions We introduce the mode of convergence for a sequence of random variables, and discuss the convergence in probability and in distribution. The concept of convergence leads us to the

More information

Algorithmic Tools for the Asymptotics of Diagonals

Algorithmic Tools for the Asymptotics of Diagonals Algorithmic Tools for the Asymptotics of Diagonals Bruno Salvy Inria & ENS de Lyon Lattice walks at the Interface of Algebra, Analysis and Combinatorics September 19, 2017 Asymptotics & Univariate Generating

More information

Dependence between Path Lengths and Size in Random Trees (joint with H.-H. Chern, H.-K. Hwang and R. Neininger)

Dependence between Path Lengths and Size in Random Trees (joint with H.-H. Chern, H.-K. Hwang and R. Neininger) Dependence between Path Lengths and Size in Random Trees (joint with H.-H. Chern, H.-K. Hwang and R. Neininger) Michael Fuchs Institute of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan

More information

n! (k 1)!(n k)! = F (X) U(0, 1). (x, y) = n(n 1) ( F (y) F (x) ) n 2

n! (k 1)!(n k)! = F (X) U(0, 1). (x, y) = n(n 1) ( F (y) F (x) ) n 2 Order statistics Ex. 4. (*. Let independent variables X,..., X n have U(0, distribution. Show that for every x (0,, we have P ( X ( < x and P ( X (n > x as n. Ex. 4.2 (**. By using induction or otherwise,

More information

Diagonals: Combinatorics, Asymptotics and Computer Algebra

Diagonals: Combinatorics, Asymptotics and Computer Algebra Diagonals: Combinatorics, Asymptotics and Computer Algebra Bruno Salvy Inria & ENS de Lyon Families of Generating Functions (a n ) 7! A(z) := X n 0 a n z n counts the number of objects of size n captures

More information

Algorithmic Tools for the Asymptotics of Linear Recurrences

Algorithmic Tools for the Asymptotics of Linear Recurrences Algorithmic Tools for the Asymptotics of Linear Recurrences Bruno Salvy Inria & ENS de Lyon Computer Algebra in Combinatorics, Schrödinger Institute, Vienna, Nov. 2017 Motivation p 0 (n)a n+k + + p k (n)a

More information

Asymptotic variance of random symmetric digital search trees

Asymptotic variance of random symmetric digital search trees Discrete Mathematics and Theoretical Computer Science DMTCS vol. :,, 3 66 Asymptotic variance of random symmetric digital search trees Hsien-Kuei Hwang, Michael Fuchs and Vytas Zacharovas Institute of

More information

PROBABILISTIC BEHAVIOR OF ASYMMETRIC LEVEL COMPRESSED TRIES

PROBABILISTIC BEHAVIOR OF ASYMMETRIC LEVEL COMPRESSED TRIES PROBABILISTIC BEAVIOR OF ASYMMETRIC LEVEL COMPRESSED TRIES Luc Devroye Wojcieh Szpankowski School of Computer Science Department of Computer Sciences McGill University Purdue University 3450 University

More information

or E ( U(X) ) e zx = e ux e ivx = e ux( cos(vx) + i sin(vx) ), B X := { u R : M X (u) < } (4)

or E ( U(X) ) e zx = e ux e ivx = e ux( cos(vx) + i sin(vx) ), B X := { u R : M X (u) < } (4) :23 /4/2000 TOPIC Characteristic functions This lecture begins our study of the characteristic function φ X (t) := Ee itx = E cos(tx)+ie sin(tx) (t R) of a real random variable X Characteristic functions

More information

Part IA Probability. Theorems. Based on lectures by R. Weber Notes taken by Dexter Chua. Lent 2015

Part IA Probability. Theorems. Based on lectures by R. Weber Notes taken by Dexter Chua. Lent 2015 Part IA Probability Theorems Based on lectures by R. Weber Notes taken by Dexter Chua Lent 2015 These notes are not endorsed by the lecturers, and I have modified them (often significantly) after lectures.

More information

A Master Theorem for Discrete Divide and Conquer Recurrences

A Master Theorem for Discrete Divide and Conquer Recurrences A Master Theorem for Discrete Divide and Conquer Recurrences Wojciech Szpankowski Department of Computer Science Purdue University W. Lafayette, IN 47907 January 20, 2011 NSF CSoI SODA, 2011 Research supported

More information

8 Laws of large numbers

8 Laws of large numbers 8 Laws of large numbers 8.1 Introduction We first start with the idea of standardizing a random variable. Let X be a random variable with mean µ and variance σ 2. Then Z = (X µ)/σ will be a random variable

More information

7 Asymptotics for Meromorphic Functions

7 Asymptotics for Meromorphic Functions Lecture G jacques@ucsd.edu 7 Asymptotics for Meromorphic Functions Hadamard s Theorem gives a broad description of the exponential growth of coefficients in power series, but the notion of exponential

More information

Characteristic Functions and the Central Limit Theorem

Characteristic Functions and the Central Limit Theorem Chapter 6 Characteristic Functions and the Central Limit Theorem 6.1 Characteristic Functions 6.1.1 Transforms and Characteristic Functions. There are several transforms or generating functions used in

More information

GAUSSIAN LAWS MICHÈLE SORIA. 8 october 2015 IHP Séminaire Flajolet IN ANALYTIC COMBINATORICS

GAUSSIAN LAWS MICHÈLE SORIA. 8 october 2015 IHP Séminaire Flajolet IN ANALYTIC COMBINATORICS GAUSSIAN LAWS IN ANALYTIC COMBINATORICS MICHÈLE SORIA 8 october 205 IHP Séminaire Flajolet / 43 Michèle Soria Gaussian Laws in Analytic Combinatorics Analytic Combinatorics Estimate properties of large

More information

1 Assignment 1: Nonlinear dynamics (due September

1 Assignment 1: Nonlinear dynamics (due September Assignment : Nonlinear dynamics (due September 4, 28). Consider the ordinary differential equation du/dt = cos(u). Sketch the equilibria and indicate by arrows the increase or decrease of the solutions.

More information

Qualifying Exam Complex Analysis (Math 530) January 2019

Qualifying Exam Complex Analysis (Math 530) January 2019 Qualifying Exam Complex Analysis (Math 53) January 219 1. Let D be a domain. A function f : D C is antiholomorphic if for every z D the limit f(z + h) f(z) lim h h exists. Write f(z) = f(x + iy) = u(x,

More information

A = A U. U [n] P(A U ). n 1. 2 k(n k). k. k=1

A = A U. U [n] P(A U ). n 1. 2 k(n k). k. k=1 Lecture I jacques@ucsd.edu Notation: Throughout, P denotes probability and E denotes expectation. Denote (X) (r) = X(X 1)... (X r + 1) and let G n,p denote the Erdős-Rényi model of random graphs. 10 Random

More information

On rational approximation of algebraic functions. Julius Borcea. Rikard Bøgvad & Boris Shapiro

On rational approximation of algebraic functions. Julius Borcea. Rikard Bøgvad & Boris Shapiro On rational approximation of algebraic functions http://arxiv.org/abs/math.ca/0409353 Julius Borcea joint work with Rikard Bøgvad & Boris Shapiro 1. Padé approximation: short overview 2. A scheme of rational

More information

X (z) = n= 1. Ã! X (z) x [n] X (z) = Z fx [n]g x [n] = Z 1 fx (z)g. r n x [n] ª e jnω

X (z) = n= 1. Ã! X (z) x [n] X (z) = Z fx [n]g x [n] = Z 1 fx (z)g. r n x [n] ª e jnω 3 The z-transform ² Two advantages with the z-transform:. The z-transform is a generalization of the Fourier transform for discrete-time signals; which encompasses a broader class of sequences. The z-transform

More information

ROSENA R.X. DU AND HELMUT PRODINGER. Dedicated to Philippe Flajolet ( )

ROSENA R.X. DU AND HELMUT PRODINGER. Dedicated to Philippe Flajolet ( ) ON PROTECTED NODES IN DIGITAL SEARCH TREES ROSENA R.X. DU AND HELMUT PRODINGER Dedicated to Philippe Flajolet (98 2) Abstract. Recently, 2-protected nodes were studied in the context of ordered trees and

More information

Unlabelled Structures: Restricted Constructions

Unlabelled Structures: Restricted Constructions Gao & Šana, Combinatorial Enumeration Notes 5 Unlabelled Structures: Restricted Constructions Let SEQ k (B denote the set of sequences of exactly k elements from B, and SEQ k (B denote the set of sequences

More information

The Subtree Size Profile of Plane-oriented Recursive Trees

The Subtree Size Profile of Plane-oriented Recursive Trees The Subtree Size Profile of Plane-oriented Recursive Trees Michael Fuchs Department of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan ANALCO11, January 22nd, 2011 Michael Fuchs (NCTU)

More information

STAT 200C: High-dimensional Statistics

STAT 200C: High-dimensional Statistics STAT 200C: High-dimensional Statistics Arash A. Amini May 30, 2018 1 / 59 Classical case: n d. Asymptotic assumption: d is fixed and n. Basic tools: LLN and CLT. High-dimensional setting: n d, e.g. n/d

More information

This ODE arises in many physical systems that we shall investigate. + ( + 1)u = 0. (λ + s)x λ + s + ( + 1) a λ. (s + 1)(s + 2) a 0

This ODE arises in many physical systems that we shall investigate. + ( + 1)u = 0. (λ + s)x λ + s + ( + 1) a λ. (s + 1)(s + 2) a 0 Legendre equation This ODE arises in many physical systems that we shall investigate We choose We then have Substitution gives ( x 2 ) d 2 u du 2x 2 dx dx + ( + )u u x s a λ x λ a du dx λ a λ (λ + s)x

More information

Digital Trees and Memoryless Sources: from Arithmetics to Analysis

Digital Trees and Memoryless Sources: from Arithmetics to Analysis Digital Trees and Memoryless Sources: from Arithmetics to Analysis Philippe Flajolet, Mathieu Roux, Brigitte Vallée AofA 2010, Wien 1 What is a digital tree, aka TRIE? = a data structure for dynamic dictionaries

More information

Combinatorial Proof of the Hot Spot Theorem

Combinatorial Proof of the Hot Spot Theorem Combinatorial Proof of the Hot Spot Theorem Ernie Croot May 30, 2006 1 Introduction A problem which has perplexed mathematicians for a long time, is to decide whether the digits of π are random-looking,

More information

1. Find the Taylor series expansion about 0 of the following functions:

1. Find the Taylor series expansion about 0 of the following functions: MAP 4305 Section 0642 3 Intermediate Differential Equations Assignment 1 Solutions 1. Find the Taylor series expansion about 0 of the following functions: (i) f(z) = ln 1 z 1+z (ii) g(z) = 1 cos z z 2

More information

RENEWAL THEORY IN ANALYSIS OF TRIES AND STRINGS: EXTENDED ABSTRACT

RENEWAL THEORY IN ANALYSIS OF TRIES AND STRINGS: EXTENDED ABSTRACT RENEWAL THEORY IN ANALYSIS OF TRIES AND STRINGS: EXTENDED ABSTRACT SVANTE JANSON Abstract. We give a survey of a number of simple applications of renewal theory to problems on random strings, in particular

More information

Chapter 5. Chapter 5 sections

Chapter 5. Chapter 5 sections 1 / 43 sections Discrete univariate distributions: 5.2 Bernoulli and Binomial distributions Just skim 5.3 Hypergeometric distributions 5.4 Poisson distributions Just skim 5.5 Negative Binomial distributions

More information

On (Effective) Analytic Combinatorics

On (Effective) Analytic Combinatorics On (Effective) Analytic Combinatorics Bruno Salvy Inria & ENS de Lyon Séminaire Algorithmes Dec. 2017 Combinatorics, Randomness and Analysis From simple local rules, a global structure arises. A quest

More information

Formulas for probability theory and linear models SF2941

Formulas for probability theory and linear models SF2941 Formulas for probability theory and linear models SF2941 These pages + Appendix 2 of Gut) are permitted as assistance at the exam. 11 maj 2008 Selected formulae of probability Bivariate probability Transforms

More information

Mod-φ convergence I: examples and probabilistic estimates

Mod-φ convergence I: examples and probabilistic estimates Mod-φ convergence I: examples and probabilistic estimates Valentin Féray (joint work with Pierre-Loïc Méliot and Ashkan Nikeghbali) Institut für Mathematik, Universität Zürich Summer school in Villa Volpi,

More information

MS 3011 Exercises. December 11, 2013

MS 3011 Exercises. December 11, 2013 MS 3011 Exercises December 11, 2013 The exercises are divided into (A) easy (B) medium and (C) hard. If you are particularly interested I also have some projects at the end which will deepen your understanding

More information

Moment Generating Function. STAT/MTHE 353: 5 Moment Generating Functions and Multivariate Normal Distribution

Moment Generating Function. STAT/MTHE 353: 5 Moment Generating Functions and Multivariate Normal Distribution Moment Generating Function STAT/MTHE 353: 5 Moment Generating Functions and Multivariate Normal Distribution T. Linder Queen s University Winter 07 Definition Let X (X,...,X n ) T be a random vector and

More information

On Bank-Laine functions

On Bank-Laine functions Computational Methods and Function Theory Volume 00 0000), No. 0, 000 000 XXYYYZZ On Bank-Laine functions Alastair Fletcher Keywords. Bank-Laine functions, zeros. 2000 MSC. 30D35, 34M05. Abstract. In this

More information

Analytic Pattern Matching: From DNA to Twitter. Information Theory, Learning, and Big Data, Berkeley, 2015

Analytic Pattern Matching: From DNA to Twitter. Information Theory, Learning, and Big Data, Berkeley, 2015 Analytic Pattern Matching: From DNA to Twitter Wojciech Szpankowski Purdue University W. Lafayette, IN 47907 March 10, 2015 Information Theory, Learning, and Big Data, Berkeley, 2015 Jont work with Philippe

More information

Analytic Information Theory and Beyond

Analytic Information Theory and Beyond Analytic Information Theory and Beyond W. Szpankowski Department of Computer Science Purdue University W. Lafayette, IN 47907 May 12, 2010 AofA and IT logos Frankfurt 2010 Research supported by NSF Science

More information

Asymptotic Statistics-VI. Changliang Zou

Asymptotic Statistics-VI. Changliang Zou Asymptotic Statistics-VI Changliang Zou Kolmogorov-Smirnov distance Example (Kolmogorov-Smirnov confidence intervals) We know given α (0, 1), there is a well-defined d = d α,n such that, for any continuous

More information

Statistical Methods in Particle Physics

Statistical Methods in Particle Physics Statistical Methods in Particle Physics. Probability Distributions Prof. Dr. Klaus Reygers (lectures) Dr. Sebastian Neubert (tutorials) Heidelberg University WS 07/8 Gaussian g(x; µ, )= p exp (x µ) https://en.wikipedia.org/wiki/normal_distribution

More information

FINAL EXAM: Monday 8-10am

FINAL EXAM: Monday 8-10am ECE 30: Probabilistic Methods in Electrical and Computer Engineering Fall 016 Instructor: Prof. A. R. Reibman FINAL EXAM: Monday 8-10am Fall 016, TTh 3-4:15pm (December 1, 016) This is a closed book exam.

More information

The Subtree Size Profile of Bucket Recursive Trees

The Subtree Size Profile of Bucket Recursive Trees Iranian Journal of Mathematical Sciences and Informatics Vol., No. (206, pp - DOI: 0.7508/ijmsi.206.0.00 The Subtree Size Profile of Bucket Recursive Trees Ramin Kazemi Department of Statistics, Imam Khomeini

More information

6.207/14.15: Networks Lecture 3: Erdös-Renyi graphs and Branching processes

6.207/14.15: Networks Lecture 3: Erdös-Renyi graphs and Branching processes 6.207/14.15: Networks Lecture 3: Erdös-Renyi graphs and Branching processes Daron Acemoglu and Asu Ozdaglar MIT September 16, 2009 1 Outline Erdös-Renyi random graph model Branching processes Phase transitions

More information

Convergence Rates for Renewal Sequences

Convergence Rates for Renewal Sequences Convergence Rates for Renewal Sequences M. C. Spruill School of Mathematics Georgia Institute of Technology Atlanta, Ga. USA January 2002 ABSTRACT The precise rate of geometric convergence of nonhomogeneous

More information

Counting Markov Types

Counting Markov Types Counting Markov Types Philippe Jacquet, Charles Knessl, Wojciech Szpankowski To cite this version: Philippe Jacquet, Charles Knessl, Wojciech Szpankowski. Counting Markov Types. Drmota, Michael and Gittenberger,

More information

Part 3.3 Differentiation Taylor Polynomials

Part 3.3 Differentiation Taylor Polynomials Part 3.3 Differentiation 3..3.1 Taylor Polynomials Definition 3.3.1 Taylor 1715 and Maclaurin 1742) If a is a fixed number, and f is a function whose first n derivatives exist at a then the Taylor polynomial

More information

Gaussian vectors and central limit theorem

Gaussian vectors and central limit theorem Gaussian vectors and central limit theorem Samy Tindel Purdue University Probability Theory 2 - MA 539 Samy T. Gaussian vectors & CLT Probability Theory 1 / 86 Outline 1 Real Gaussian random variables

More information

Limiting Distributions

Limiting Distributions We introduce the mode of convergence for a sequence of random variables, and discuss the convergence in probability and in distribution. The concept of convergence leads us to the two fundamental results

More information

Search Algorithms. Analysis of Algorithms. John Reif, Ph.D. Prepared by

Search Algorithms. Analysis of Algorithms. John Reif, Ph.D. Prepared by Search Algorithms Analysis of Algorithms Prepared by John Reif, Ph.D. Search Algorithms a) Binary Search: average case b) Interpolation Search c) Unbounded Search (Advanced material) Readings Reading Selection:

More information

Analysis of the multiplicity matching parameter in suffix trees

Analysis of the multiplicity matching parameter in suffix trees 2005 International Conference on Analysis of Algorithms DMTCS proc. AD, 2005, 307 322 Analysis of the multiplicity matching parameter in suffix trees Mark Daniel Ward and Wojciech Szpankoski 2 Department

More information

An example of generalization of the Bernoulli numbers and polynomials to any dimension

An example of generalization of the Bernoulli numbers and polynomials to any dimension An example of generalization of the Bernoulli numbers and polynomials to any dimension Olivier Bouillot, Villebon-Georges Charpak institute, France C.A.L.I.N. team seminary. Tuesday, 29 th March 26. Introduction

More information

Lecture 5: Moment Generating Functions

Lecture 5: Moment Generating Functions Lecture 5: Moment Generating Functions IB Paper 7: Probability and Statistics Carl Edward Rasmussen Department of Engineering, University of Cambridge February 28th, 2018 Rasmussen (CUED) Lecture 5: Moment

More information

Continued Fraction Digit Averages and Maclaurin s Inequalities

Continued Fraction Digit Averages and Maclaurin s Inequalities Continued Fraction Digit Averages and Maclaurin s Inequalities Steven J. Miller, Williams College sjm1@williams.edu, Steven.Miller.MC.96@aya.yale.edu Joint with Francesco Cellarosi, Doug Hensley and Jake

More information

EXPECTED WORST-CASE PARTIAL MATCH IN RANDOM QUADTRIES

EXPECTED WORST-CASE PARTIAL MATCH IN RANDOM QUADTRIES EXPECTED WORST-CASE PARTIAL MATCH IN RANDOM QUADTRIES Luc Devroye School of Computer Science McGill University Montreal, Canada H3A 2K6 luc@csmcgillca Carlos Zamora-Cura Instituto de Matemáticas Universidad

More information

Multiple Random Variables

Multiple Random Variables Multiple Random Variables Joint Probability Density Let X and Y be two random variables. Their joint distribution function is F ( XY x, y) P X x Y y. F XY ( ) 1, < x

More information

Asymptotic Nonequivalence of Nonparametric Experiments When the Smoothness Index is ½

Asymptotic Nonequivalence of Nonparametric Experiments When the Smoothness Index is ½ University of Pennsylvania ScholarlyCommons Statistics Papers Wharton Faculty Research 1998 Asymptotic Nonequivalence of Nonparametric Experiments When the Smoothness Index is ½ Lawrence D. Brown University

More information

Homework 6: Solutions Sid Banerjee Problem 1: (The Flajolet-Martin Counter) ORIE 4520: Stochastics at Scale Fall 2015

Homework 6: Solutions Sid Banerjee Problem 1: (The Flajolet-Martin Counter) ORIE 4520: Stochastics at Scale Fall 2015 Problem 1: (The Flajolet-Martin Counter) In class (and in the prelim!), we looked at an idealized algorithm for finding the number of distinct elements in a stream, where we sampled uniform random variables

More information

Discrete Distributions Chapter 6

Discrete Distributions Chapter 6 Discrete Distributions Chapter 6 Negative Binomial Distribution section 6.3 Consider k r, r +,... independent Bernoulli trials with probability of success in one trial being p. Let the random variable

More information

Introduction to Probability and Stocastic Processes - Part I

Introduction to Probability and Stocastic Processes - Part I Introduction to Probability and Stocastic Processes - Part I Lecture 2 Henrik Vie Christensen vie@control.auc.dk Department of Control Engineering Institute of Electronic Systems Aalborg University Denmark

More information

HEAGAN & CO., OPP. f>, L. & W. DEPOT, DOYER, N. J, OUR MOTTO! ould Iwv ia immediate vltlui. VEEY BEST NEW Creamery Butter 22c ib,

HEAGAN & CO., OPP. f>, L. & W. DEPOT, DOYER, N. J, OUR MOTTO! ould Iwv ia immediate vltlui. VEEY BEST NEW Creamery Butter 22c ib, #4 NN N G N N % XX NY N Y FY N 2 88 N 28 k N k F P X Y N Y /» 2«X ««!!! 8 P 3 N 0»9! N k 25 F $ 60 $3 00 $3000 k k N 30 Y F00 6 )P 0» «{ N % X zz» «3 0««5 «N «XN» N N 00/ N 4 GN N Y 07 50 220 35 2 25 0

More information

n! (k 1)!(n k)! = F (X) U(0, 1). (x, y) = n(n 1) ( F (y) F (x) ) n 2

n! (k 1)!(n k)! = F (X) U(0, 1). (x, y) = n(n 1) ( F (y) F (x) ) n 2 Order statistics Ex. 4.1 (*. Let independent variables X 1,..., X n have U(0, 1 distribution. Show that for every x (0, 1, we have P ( X (1 < x 1 and P ( X (n > x 1 as n. Ex. 4.2 (**. By using induction

More information

E[X n ]= dn dt n M X(t). ). What is the mgf? Solution. Found this the other day in the Kernel matching exercise: 1 M X (t) =

E[X n ]= dn dt n M X(t). ). What is the mgf? Solution. Found this the other day in the Kernel matching exercise: 1 M X (t) = Chapter 7 Generating functions Definition 7.. Let X be a random variable. The moment generating function is given by M X (t) =E[e tx ], provided that the expectation exists for t in some neighborhood of

More information

It can be shown that if X 1 ;X 2 ;:::;X n are independent r.v. s with

It can be shown that if X 1 ;X 2 ;:::;X n are independent r.v. s with Example: Alternative calculation of mean and variance of binomial distribution A r.v. X has the Bernoulli distribution if it takes the values 1 ( success ) or 0 ( failure ) with probabilities p and (1

More information

MAS223 Statistical Inference and Modelling Exercises

MAS223 Statistical Inference and Modelling Exercises MAS223 Statistical Inference and Modelling Exercises The exercises are grouped into sections, corresponding to chapters of the lecture notes Within each section exercises are divided into warm-up questions,

More information

14 EE 2402 Engineering Mathematics III Solutions to Tutorial 3 1. For n =0; 1; 2; 3; 4; 5 verify that P n (x) is a solution of Legendre's equation wit

14 EE 2402 Engineering Mathematics III Solutions to Tutorial 3 1. For n =0; 1; 2; 3; 4; 5 verify that P n (x) is a solution of Legendre's equation wit EE 0 Engineering Mathematics III Solutions to Tutorial. For n =0; ; ; ; ; verify that P n (x) is a solution of Legendre's equation with ff = n. Solution: Recall the Legendre's equation from your text or

More information