On the Maximum Number of Codewords of X-Codes of Constant Weight Three

Size: px
Start display at page:

Download "On the Maximum Number of Codewords of X-Codes of Constant Weight Three"

Transcription

1 On the Maxiu Nuber of Codewords of X-Codes of Constant Weight Three arxiv: v1 [cs.it] 2 Mar 2019 Yu Tsunoda Graduate School of Science and Engineering Chiba University 1- Yayoi-Cho Inage-Ku, Chiba Eail: yu.tsunoda@chiba-u.jp Abstract X-codes for a special class of linear aps which were originally introduced for data copression in LSI testing and are also known to give special parity-check atrices for linear codes suitable for error-erasure channels. In the context of circuit testing, an (,n,d,x X-code copresses n-bit output data R fro the circuit under test into bits, while allowing for detecting the existence of an up to d-bit-wise anoaly in R even if up to x bits of the original uncopressed R are unknowable to the tester. Using probabilistic cobinatorics, we give a nontrivial lower bound for any d 2 on the axiu nuber n of codewords such that an (,n,d,2 X-code of constant weight exists. This is the first result that shows the existence of an infinite sequence of X-codes whose copaction ratio tends to infinity for any fixed d under severe weight restrictions. We also give a deterinistic polynoial-tie algorith that produces X- codes that achieve our bound. I. INTRODUCTION ery-large-scale integration (LSI testing is vital part of digital circuit production and ais to iniize the nuber of defective circuits due to iperfect anufacturing processes. In typical digital circuit testing, the tester applies test patterns to the circuit under test and checks whether it outputs correct responses. In short, LSI testing ais to detect a discrepancy between expected and observed responses of the circuit under test. While this type of siple coparison-based testing ay see trivial to perfor, it is not always an easy job. Indeed, the ever growing coplexity of odern LSI circuits is aking the volue of required input and output patterns extreely large, resulting in prohibitively long test tie and unacceptably large tester-eory requireents [1]. For this reason, various cost reduction techniques, such as scan-based logic built-in self-test (BIST [2], have been developed to ake odern digital circuits testable []. One iportant developent in test cost reduction is response data copression, where a well-designed copactor hashes the expected and observed responses fro the circuit under test in such a way that, if the original observed data contain unexpected bits signaling a defect, the copressed versions of expected and observed responses also exhibit discrepancies []. With this ethod, the aount of data we should copare becoes saller than if we naively copare every actual output against the expected behavior bit by bit. Yuichiro Fujiwara Division of Matheatics and Inforatics Chiba University 1- Yayoi-Cho Inage-Ku, Chiba Eail: yuichiro.fujiwara@chiba-u.jp This idea of copressing responses is very siilar to nonadaptive group testing such as pooling designs for DNA library screening [5]. However, there is a key difference between group testing in bioinforatics and test copression for LSI circuits, which is the existence of unknowable bits, called Xs, in the case of LSI testing. Ideally, the tester would like to perfectly predict the behavior of a non-defective circuit for any input pattern. However, this is not the case in general with a coplex odern circuit due to various factors such as uninitialized eory eleents, bus contention, floating triple-states, and iperfect siulations []. Thus, the data to be copressed during circuit testing ay contain Xs, that is, logic values that are unknowable to the tester beforehand, coplicating the otherwise classic codingtheoretic proble of hashing a pair of data sets while avoiding collisions if they differ. X-copact [], [7] is a siple ethod to hash responses while aintaining test quality even in the presence of Xs. A response data copactor for X-copact is called an X-code and restricted to a linear ap []. In the language of LSI testing, an (,n,d,x X-code copresses n-bit output fro the circuit under test into bits while allowing for detecting the existence of up to d-bit-wise discrepancies between the observed and correct responses even if up to x bits of the correct behavior are unknowable. Hence, all else being equal, given d and x, X-codes of higher copaction ratio n are desirable. It is notable that X-codes are also known to be useful for error-erasure separation in coding theory [9], where achieving larger n for given, d, and x is again desirable. Because X-codes are linear aps, we ay regard an (,n,d,x X-code as a well-designed n atrix H over the finite field F 2 of order 2 that copresses n-diensional vectors a F n 2 into the corresponding -diensional vectors Ha T F 2. When seen this way, desirable X-codes are those with ore coluns and fewer rows that achieve a higher copaction ratio. The ability to detect discrepancies and high copaction ratio are not the only required properties, however. For practical reasons such as power requireents, copactor delay, and wirability, it is also desirable for the nuber of 1s in each colun to be as sall as possible [], [10]. However, a colun of weight less that or equal to x in an (,n,d,x X-code

2 akes no essential contribution to the achievable copaction ratio [], [11]. Hence, our focus will be on X-codes with the largest possible nuber M x+1 (,d,x of coluns for given nuber of rows and other two test quality paraeters d and x under the condition that the colun weights are all restricted to x+1, naely optial X-codes of constant weight x+1. The siplest case is when x = 1, where the copactor is only required to tolerate a single X. In this case, an (,n,d,1 X-code of constant weight 2 can be shown to be equivalent to a graph of girth d+2 in graph theory [10]. More details on X-codes of constant weight 2 and their connection to graph theory can be found in [10] and references therein. While tolerance of a single X is sufficient in soe cases, ultiple Xs can occur in practice. Unfortunately, our knowledge on X-codes of constant weight x+1 for x 2 is quite liited. As we will briefly review in the next section, even for the next siplest case of x = 2, the precise asyptotic behavior of M (,d,2 is only known for d = 1, which is M (,1,2 = Θ( 2 [11]. For larger d, as far as the authors are aware, the only non-trivial result is an upper bound, which states that M (,d,2 = o( 2 for d, proved by using a tool fro extreal graph theory [12]. While this bound suggests that the asyptotic behavior of M (,d,2 is not so siple, whether M x+1 (,d,x can be superlinear for any fixed d and x has reained an open proble. Here, we ake a substantial step towards understanding the asyptotic behavior of M (,d,2 by proving the existence of an infinite sequence of (,n,d,2 X-codes of constant weight whose copaction ratio tends to infinity for any d. Theore 1.1: For any positive integer, Ω( for d = 2, M (,d,2 = Ω( 5 for d =, Ω( 5 for d. We first give a short and nonconstructive proof based on probabilistic cobinatorics and then provide a deterinistic polynoial-tie algorith that produces X-codes that achieve the above lower bound. In Section II, we briefly review the basic properties of X- codes and known results. Section III gives our new bound on M (,d,2 as well as a deterinistic algorith for constructing X-codes attaining this bound that runs in tie polynoial in for fixed d. Section I concludes this paper with soe rearks. II. PRELIMINARIES Here, we give a foral atheatical definition of X-codes. Basic facts and known results are also briefly reviewed. Let, and n be positive integers. The superiposed su of two binary coluns a = (a 1,a 2,...,a T, b = (b 1,b 2,...,b T F 2 is defined to be a b = (a 1 b 1,a 2 b 2,...,a b T, where a i b i = 0 if a i = b i = 0 and 1 otherwise. The addition of a + b between two coluns a,b F 2 is assued to be the coordinatewise su over F 2 as usual. A binary colun a is said to be contained in another binary colun b if a b = b. For positive integer d and non-negative integer x, an n binary atrix H is an (,n,d,x X-code if the superiposed su of any x coluns does not contain the addition of any other up to d coluns. The coluns of an X-code are the codewords, while the nuber of rows is the length. By definition, an (,n,d,x X-code with d 2 is an (,n,d 1,x X-code. For d 2 and x 1, an (,n,d,x X-code is also an (,n,d+1,x 1 X-code []. It is notable that the definition of an (,n,1,x X-code coincides with that of an x-disjunct atrix [1] of size n for group testing. Disjunct atrices are also known as cover-free failies [1] and superiposed codes [15]. An (,n,d,0 X-code fors a parity-check atrix for a linear code of length n, diension at least n, and iniu distance at least d+1. For x 1, an (,n,d,x X-code can be seen as a special parity-check atrix that can treat errors and erasures separately over an error-erasure channel [9]. Now, to see how X-codes work in LSI testing, let us consider the following (,,1,1 X-code H. H = Assue that a and b are -diensional vectors over {0, 1, X} that represent the observed and expected responses fro the circuit under test, respectively. Because X represents an unknowable logic value, coputation involving X is defined by a + X = X + a = X, 0 X = X 0 = 0, and 1 X = X 1 = X. LSI testing with the X-code H copares -diensional vectors Ha T and Hb T instead of a and b. The property of H as a (,,1,1 X-code guarantees that a discrepancy of no ore than one bit between the actual output a and the correct output b can be detected by coparing the shrunk responses a and b even if up to 1 bit of the correct behavior is unknowable. For exaple, when a = (0,1,1,0,0,0 and b = (X,1,1,1,0,0, the shrunk responses are Ha T = (0,1,0,1 T and Hb T = (X, X,1,1 T. As can be seen easily, there exists a discrepancy between the last bits of Ha T and Hb T, so that we can find the circuit under test is defective. As a linear function for copaction, all else being equal, it is desirable for an (,n,d,x X-code to have as large n as possible for given,d, and x. Recall that M x+1 (,d,x is the axiu nuber n for which there exists an (,n,d,x X-code of constant weight x+1. For d = 1 and x = 2, it is known that M (,1,2 ( 1 with equality if and only if 1, (od [11]. Because M (,d,2 M (,1,2 by definition, the above upper bound holds for all d 2 as well. While the above inequality says that M (,1,2 = Θ( 2, it is also known that M (,d,2 = o( 2 for any d [12]. Therefore, we have the following theore.

3 Theore 2.1 ( [11], [12]: It holds that Θ( 2 for d = 1, M (,d,2 = O( 2 for d = 2,, o( 2 for d. Although an attept has been ade to construct atrices siilar to (,n,d,2 X-codes of constant weight for large d in [12], to the best of the authors knowledge, no nontrivial lower bounds on M (,d,2 are known for d 2. III. MAIN RESULTS This section is divided into two subsections. In Section III-A, we derive a general lower bound on M (,d,2 by using the probabilistic ethod in cobinatorics [1]. Section III-B derandoizes the probabilistic proof to deonstrate that an (,n,d,2 X-code of constant weight which attains the derived lower bound can be constructed deterinistically in tie polynoial in. A. General lower bound on M (,d,2 Here, we prove the following general asyptotic bound. Theore.1: For sufficiently large, it holds that α for d = 2, M (,d,2 β 5 for d =, γ 5 for d, where α = 1 ( , 179 β = , and (15 (711 1 γ = 5 ( Note that Theore 1.1 iediately follows fro this bound. To prove the above theore, we will first show the following two leas. Lea.2: For sufficiently large, there exists an (,c,2,2 X-code of constant weight with c = 1 ( Lea.: For any d and any p [0,1], there exists an (,N(,d,p,d,2 X-code of constant weight, where ( (( (( ( (( N(,d,p = p p + p ( (( + i i 1 p i+2. i+2 i= To show these leas, we eploy a well-known class of cobinatorial designs. A set syste of order v is an ordered pair (,B such that is a finite set of points with = v and B is a faily of subsets of, called blocks. The pointby-block incidence atrix of a set syste (,B is the binary B atrix H = (h i,j such that rows and coluns are indexed by points and blocks, respectively, and h i,j = 1 if the ith point is contained in the jth block and h i,j = 0 otherwise. For a subset B of B, the odd-point union U of B is defined to be U = {a {B B a B} is odd}. It is straightforward to see that an (,n,d,x X-code whose rows and coluns are indexed by and B, respectively, is equivalent to a set syste (,B of order with B = n such that no union of x blocks contains the odd-point union of any other d or fewer blocks as a subset. We denote by ( the set of -subsets, called triples, of. X-codes of constant weight can be characterized by soe subsets of (. A configuration in a set syste (,B is a subset C of B. When C = i, a configuration C is an i- configuration. A configuration is (d, x-forbidden if it appears in no (,n,d,x X-codes of constant weight. We denote by C,d,x the set of (d,x-forbidden configurations on the point set. For instance, for {a,b,c,d}, a -configuration C = {{a,b,c},{b,c,d},{a,b,d}} is (1,2-forbidden, that is, C C,1,2, because the union{a,b,c,d} = {a,b,c} {b,c,d} contains {a,b,d} as a subset, aking it ipossible to appear in an (,n,1,2 X-code on the point set. The probabilistic proof of Leas.2 and. relies on the fact that it is enough to show the existence of a set syste that avoids all (d,2-forbidden configurations. The set C,d,2 of (d, 2-forbidden configurations can be partitioned into the following sets of configurations: C,d,2 = i d+2 C,d,2 (i, where C,d,2 (i is the set of i-configurations that are (d,2- forbidden. Note that C,d,2 (1 and C,d,2 (2 are epty sets since the set syste (, ( consists of distinct triples. Proof of Lea.2: Let = {1,2,...,}. Take a set B of triples by picking eleents of ( uniforly at rando with probability p. Let X = {C C,2,2 C B} be the rando variable that counts the nuber of (2, 2-forbidden configurations in B. Note that because discarding a triple T in B reoves the configuration containing T, deleting at ost one triple fro each (2, 2-forbidden configuration in B gives an (,n,2,2 X-code with n B X. Therefore, there exists an (,n,2,2 X-code with n E( B X. Let D be the set of -configurations in (, ( that consists of eleents of. Since every configuration in ( consists of distinct triples, the largest nuber of eleents of in a configuration in C,2,2 ( is, that is, C,2,2 ( D. Siilarly, C,2,2 ( D, where D is the set of - configurations in (, ( that consists of eleents of. Therefore, by linearity of expectation, we have E( B X = E( B E(X ( = p C,2,2 (i p i i= ( p D i p i i=

4 = ( p (( (( p + ( (( p. By settingp = 2( , the right-hand side of the above inequality is 1 ( f( with f( = o(, as desired. It is notable that precisely counting the nuber of configuration in C,2,2 (i instead of D i can only give asyptotically the sae bound. Lea. can be obtained by essentially the sae probabilistic arguent as in the proof of Lea.2. Proof of Lea.: Consider the rando variable Y = {C C,d,2 C B} that counts the nuber of (d,2- forbidden configuration in B and follow the sae arguent as in the proof of Theore.1 to show the existence of an (,n,d,2 X-code of constant weight with n E( B Y. Note that for any (i+2-configuration C in C,d,2 (i+2 with i d, it holds that i 1 T +, 2 T C where equality holds when i is even and C consists of i triples A 1,A 2,B 1,B 2,...B i such that A 1 A 2 =, (A 1 A 2 B j = φ for any 1 j i, and each eleent in the union 1 j i B j is contained in exactly 2 triples of {B 1,B 2,...,B i }, or when i is odd and C consists of i triples A 1,A 2,B 1,B 2,...B i such that A 1 A 2 = and there exists exactly one triple B in {B 1,...,B i } such that (A 1 A 2 B = 1, and each eleent in the union 1 j i B j except for an eleent in (A 1 A 2 B is contained in exactly 2 triples of {B 1,B 2,...,B i 2 }. Therefore, by linearity of expectation, we have E( B Y ( = p ( p C,d,2 (i+2 p i+2 i=1 (( (( + ( i= p + ( + i 1 (( p (( + i 1 i+2 p i+2 as desired. Now, we prove Theore.1. Proof of Theore.1: By Lea.2, it holds that M (,2,2 α, where α = 1 ( For d =, by setting p = 2 ( to axiize N(,d,p, we have N(,d,p = β 5 + g( with β = and g( = o(. 5 By Lea., it holds (15 (711 1 that M (,,2 β 5. Siilarly, for d, by setting p = 2 ( , we have N(,d,p = γ 5 +h( ( with γ = and h( = o( 5. By Lea., for d it holds that M (,d,2 γ 5, as desired., B. Construction algorith To extract a deterinistic algorith fro our probabilistic proof in the previous section, we follow the approach of [12], which uses the ethod of conditional expectations [1]. Let T i, 1 i ( (, be the triples in in arbitrary order. While the proof of Leas.2 and. randoly picks each triple in (, here we deterinistically decide whether to pickt i one by one frot 1 throught (. Note that the picked triples ay contain soe forbidden configurations in C,d,2. To reove the forbidden configurations, the final deletion process is done the sae way as in the probabilistic proof by discarding at ost one triple fro each realized forbidden configuration. Now we describe our derandoized algorith in detail. To record our decision on whether we pick a triple at each step, define t i = 1 if T i is included and 0 otherwise. For a given binary sequence t 1...t i of length i and forbidden configuration C C,d,2, define r = {T j C t j = 1,1 j i} and s(c = { p C r if {T j C t j = 0} = 0, 0 otherwise. Given the first i decisions t 1...t i on the triples, assue for the oent that we pick each of reaining ( i triples independently and uniforly at rando with probability 2( for d = 2, p = 2 ( for d =, 2 ( for d. This is equivalent to hypothetically regarding each t j for i+ 1 j ( as an independent rando variable such that t j = 1 with probability p and 0 with probability 1 p. Let B = {T j t j = 1,1 j ( }, and define X = {C C,d,2 C B}. B and X represent the sets of picked triples and fored forbidden configurations after the hypothetical rando sapling, respectively. If we started with fixed i decisions t 1,...,t i and perfored the rando sapling for the reaining triples, the nuber of triples after the deletion process would be at least the conditional expectation E( B X t i,...t i = {T j t j = 1,1 j i} (( + i p s(c. C C,d,2 For b = 0,1, define E((t i,t i+1=b = E( B X t i,...t i,t i+1 = b, which is the conditional expectation when the rando variable t i+1 is realized as b. When i = 0, we define Since E((t 0,t 1 = b = E( B X t 1 = b. E( B X t i,...t i = pe((t i,t i+1=1 +(1 pe((t i,t i+1=0,

5 it holds that E( B X t i,...t i ax{e((t i,t i+1=1,e((t i,t i+1=0 }. Therefore, by starting fro no decisions on the triples and picking T i at the ith step if and only if E((t i,t i+1=1 > E((t i,t i+1=0, we end up with at least E( B X triples after the deletion process, which is precisely the guaranteed nuber of codewords of an X-code by Theore.1. Algorith 1 describes the above deterinistic procedure. Algorith 1 Derandoized algorith for Theore.1 Input: Point set of cardinality Output: (, B,d,2 X-code (,B of constant weight 1: B φ 2: Fix the order of {T 1,T 2,...T ( } = ( arbitrarily : C,d,2 set of all forbidden configurations in ( : for i = 1 to ( do 5: if (E((t i 1,t i = 1 > E((t i 1,t i = 0 then : B B {T i } 7: t i 1 : else 9: t i 0 10: end if 11: end for 12: while C C,d,2 s.t. C B do 1: B B \{T}, where T is an arbitrary triple in C 1: end while 15: return (, B In the reainder of this section, we show that Algorith 1 runs in tie polynoial in. Our analysis here is quite rough but enough to show that it is efficient in a technical sense. First, note that listing all forbidden configurations in C,d,2 only takes tie polynoial in because C,d,2 = d 1 + O(. The steps for picking triples require coputing two conditional expectations ( ties each. Since coputing a conditional expectation takes at osto( C,d,2 tie, d 1 9+ the steps for picking triples can be done in O(. Checking whether a given triple is contained in B takes O(log B tie by using the binary search. Therefore, the coplexity of the final deletion process is bounded fro above by C,d,2 log (. Hence, the total run tie will not exceed d 1 9+ O(, as required. I. CONCLUSION We have derived a lower bound on the axiu nuber n for which an (,n,d,2 X-code of constant weight exists. This is the first nontrivial lower bound on M (,d,2 for general d and deonstrates that constant-weight X-codes can substantially reduce the aount of response data under the presence of a ulti-bit discrepancy, ultiple unknowable bits, and a severe constraint on fan-out (see [11] and references therein for the background on the fan-out issue. We have also proved that such X-codes can be constructed deterinistically in tie polynoial in. This was done by first proving their existence through a probabilistic arguent and then derandoizing it by the ethod of conditional expectations. It is notable that this approach was also shown effective in [12] for a ore specific situation where ultiple Xs are rather rare but do occur. It would be interesting to see how widely this approach can be applied to siilar probles. Finally, it should be noted that while we have ade nontrivial progress towards understanding the asyptotic behavior of M (,d,2, there still reains a substantial gap between the sharpest upper and lower bounds on M (,d,2. In fact, for general d and x, the proble of deteriningm x+1 (,d,x is nearly copletely open. We hope that future work addresses these challenging areas. ACKNOWLEDGMENT This work was supported by JSPS KAKENHI Grant Nuber JP1J20 (Y.T. and KAKENHI Grant Nuber JP17K12 (Y.F.. REFERENCES [1] E. J. McCluskey, D. Burek, B. Koeneann, S. Mitra, J. H. Patel, J. Rajski, and J. A. Waicukauski, Test data copression, IEEE Design Test Coput., vol. 20, pp. 7 7, Mar./Apr [2] E. J. McCluskey, Logic Design Principles with Ephasis on Testable Sei-Custo Circuits. Englewood Cliffs, NJ: Prentice-Hall, 19. [] P. Girard, N. Nicolici, and X. Wen, Eds., Power-Aware Testing and Tes Strategies for Low Power Devices. New York: Springer, [] R. Kapur, S. Mitra, and T. W. Willias, Historical perspective on scan copression, IEEE Design Test Coput., vol. 25, no. 2, pp , March/April 200. [5] H. Q. Ngo and D.-Z. Du, A survey on cobinatorial group testing algoriths with applications to DNA library screening, DIMACS Series in Discrete Matheatics and Theoretical Coputer Science, vol. 55, no. 12, pp , Deceber [] S. Mitra, S. S. Luetta, M. Mitzenacher, and N. Patil, X-tolerant test response copaction, IEEE Des. Test. Coput., vol. 22, pp. 5 57, Nov [7] S. Mitra and K. S. Ki, X-copact: An efficient response copaction technique, IEEE Trans. Coput.-Aided Design Integr. Circuits Syst., vol. 2, pp. 21 2, Mar [] S. S. Luetta and S. Mitra, X-codes: Theory and applications of unknowable inputs, Center for Reliable and High-Perforance Coputing, Univ. of Illinois at Urbana Chapaign, Tech. Rep. CRHC-0-0 (also UILU-ENG , Aug [9] Y. Tsunoda, Y. Fujiwara, H. Ando, and P. andendriessche, Bounds on separating redundancy of linear codes and rates of X-codes, IEEE Trans. Inf. Theory, vol., no. 12, pp , 201. [10] P. Wohl and L. Huisan, Analysis and design of optial cobinational copactors, in Proc. 21st IEEE LSI Test Syp., April/May 200, pp [11] Y. Fujiwara and C. J. Colbourn, A cobinatorial approach to X-tolerant copaction circuits, IEEE Trans. Inf. Theory, vol. 5, pp , [12] Y. Tsunoda and Y. Fujiwara, Bounds and polynoial-tie construction algorith for X-codes of constant weight three, in Proc. IEEE Int. Syp. Inf. Theory, ail, CO, USA, June 201, pp [1] A. J. Macula, A siple construction of d-disjunct atrices with certain constant weights, Discrete Math., vol. 12, pp , 199. [1] P. Erdős, P. Frankl, and Z. Füredi, Failies of finite sets in which no set is covered by the union of r others, Israel J. Math., vol. 51, pp. 75 9, 195. [15] W. H. Kautz and R. R. Singleton, Nonrando binary superiposed codes, IEEE Trans. Inf. Theory, vol. 10, pp. 77, 19. [1] N. Alon and J. H. Spencer, The Probabilistic Method, th ed. John Wiley & Sons, 201.

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

Fixed-to-Variable Length Distribution Matching

Fixed-to-Variable Length Distribution Matching Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

1 Proof of learning bounds

1 Proof of learning bounds COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #4 Scribe: Akshay Mittal February 13, 2013 1 Proof of learning bounds For intuition of the following theore, suppose there exists a

More information

Note on generating all subsets of a finite set with disjoint unions

Note on generating all subsets of a finite set with disjoint unions Note on generating all subsets of a finite set with disjoint unions David Ellis e-ail: dce27@ca.ac.uk Subitted: Dec 2, 2008; Accepted: May 12, 2009; Published: May 20, 2009 Matheatics Subject Classification:

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3 A. Find all ordered pairs a, b) of positive integers for which a + b = 3 08. Answer. The six ordered pairs are 009, 08), 08, 009), 009 337, 674) = 35043, 674), 009 346, 673) = 3584, 673), 674, 009 337)

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate The Siplex Method is Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010 Abstract In this note we prove that the classic siplex ethod with the ost-negativereduced-cost

More information

The Frequent Paucity of Trivial Strings

The Frequent Paucity of Trivial Strings The Frequent Paucity of Trivial Strings Jack H. Lutz Departent of Coputer Science Iowa State University Aes, IA 50011, USA lutz@cs.iastate.edu Abstract A 1976 theore of Chaitin can be used to show that

More information

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest

More information

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product.

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product. Coding Theory Massoud Malek Reed-Muller Codes An iportant class of linear block codes rich in algebraic and geoetric structure is the class of Reed-Muller codes, which includes the Extended Haing code.

More information

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,

More information

arxiv: v2 [math.co] 8 Mar 2018

arxiv: v2 [math.co] 8 Mar 2018 Restricted lonesu atrices arxiv:1711.10178v2 [ath.co] 8 Mar 2018 Beáta Bényi Faculty of Water Sciences, National University of Public Service, Budapest beata.benyi@gail.co March 9, 2018 Keywords: enueration,

More information

A Bernstein-Markov Theorem for Normed Spaces

A Bernstein-Markov Theorem for Normed Spaces A Bernstein-Markov Theore for Nored Spaces Lawrence A. Harris Departent of Matheatics, University of Kentucky Lexington, Kentucky 40506-0027 Abstract Let X and Y be real nored linear spaces and let φ :

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

Handout 7. and Pr [M(x) = χ L (x) M(x) =? ] = 1.

Handout 7. and Pr [M(x) = χ L (x) M(x) =? ] = 1. Notes on Coplexity Theory Last updated: October, 2005 Jonathan Katz Handout 7 1 More on Randoized Coplexity Classes Reinder: so far we have seen RP,coRP, and BPP. We introduce two ore tie-bounded randoized

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths

More information

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40 On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering

More information

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words) 1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas

More information

A Generalized Permanent Estimator and its Application in Computing Multi- Homogeneous Bézout Number

A Generalized Permanent Estimator and its Application in Computing Multi- Homogeneous Bézout Number Research Journal of Applied Sciences, Engineering and Technology 4(23): 5206-52, 202 ISSN: 2040-7467 Maxwell Scientific Organization, 202 Subitted: April 25, 202 Accepted: May 3, 202 Published: Deceber

More information

1 Identical Parallel Machines

1 Identical Parallel Machines FB3: Matheatik/Inforatik Dr. Syaantak Das Winter 2017/18 Optiizing under Uncertainty Lecture Notes 3: Scheduling to Miniize Makespan In any standard scheduling proble, we are given a set of jobs J = {j

More information

Ch 12: Variations on Backpropagation

Ch 12: Variations on Backpropagation Ch 2: Variations on Backpropagation The basic backpropagation algorith is too slow for ost practical applications. It ay take days or weeks of coputer tie. We deonstrate why the backpropagation algorith

More information

Lecture 9 November 23, 2015

Lecture 9 November 23, 2015 CSC244: Discrepancy Theory in Coputer Science Fall 25 Aleksandar Nikolov Lecture 9 Noveber 23, 25 Scribe: Nick Spooner Properties of γ 2 Recall that γ 2 (A) is defined for A R n as follows: γ 2 (A) = in{r(u)

More information

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool Constant-Space String-Matching in Sublinear Average Tie (Extended Abstract) Maxie Crocheore Universite de Marne-la-Vallee Leszek Gasieniec y Max-Planck Institut fur Inforatik Wojciech Rytter z Warsaw University

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul

More information

Homework 3 Solutions CSE 101 Summer 2017

Homework 3 Solutions CSE 101 Summer 2017 Hoework 3 Solutions CSE 0 Suer 207. Scheduling algoriths The following n = 2 jobs with given processing ties have to be scheduled on = 3 parallel and identical processors with the objective of iniizing

More information

Interactive Markov Models of Evolutionary Algorithms

Interactive Markov Models of Evolutionary Algorithms Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary

More information

Multi-Dimensional Hegselmann-Krause Dynamics

Multi-Dimensional Hegselmann-Krause Dynamics Multi-Diensional Hegselann-Krause Dynaics A. Nedić Industrial and Enterprise Systes Engineering Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu B. Touri Coordinated Science Laboratory

More information

4 = (0.02) 3 13, = 0.25 because = 25. Simi-

4 = (0.02) 3 13, = 0.25 because = 25. Simi- Theore. Let b and be integers greater than. If = (. a a 2 a i ) b,then for any t N, in base (b + t), the fraction has the digital representation = (. a a 2 a i ) b+t, where a i = a i + tk i with k i =

More information

arxiv: v1 [math.nt] 14 Sep 2014

arxiv: v1 [math.nt] 14 Sep 2014 ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row

More information

Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson) February 5,

Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson) February 5, Sequence Analysis, WS 14/15, D. Huson & R. Neher (this part by D. Huson) February 5, 2015 31 11 Motif Finding Sources for this section: Rouchka, 1997, A Brief Overview of Gibbs Sapling. J. Buhler, M. Topa:

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

Lower Bounds for Quantized Matrix Completion

Lower Bounds for Quantized Matrix Completion Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &

More information

Convex Programming for Scheduling Unrelated Parallel Machines

Convex Programming for Scheduling Unrelated Parallel Machines Convex Prograing for Scheduling Unrelated Parallel Machines Yossi Azar Air Epstein Abstract We consider the classical proble of scheduling parallel unrelated achines. Each job is to be processed by exactly

More information

M ath. Res. Lett. 15 (2008), no. 2, c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS. Van H. Vu. 1.

M ath. Res. Lett. 15 (2008), no. 2, c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS. Van H. Vu. 1. M ath. Res. Lett. 15 (2008), no. 2, 375 388 c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS Van H. Vu Abstract. Let F q be a finite field of order q and P be a polynoial in F q[x

More information

Supplementary Material for Fast and Provable Algorithms for Spectrally Sparse Signal Reconstruction via Low-Rank Hankel Matrix Completion

Supplementary Material for Fast and Provable Algorithms for Spectrally Sparse Signal Reconstruction via Low-Rank Hankel Matrix Completion Suppleentary Material for Fast and Provable Algoriths for Spectrally Sparse Signal Reconstruction via Low-Ran Hanel Matrix Copletion Jian-Feng Cai Tianing Wang Ke Wei March 1, 017 Abstract We establish

More information

arxiv: v1 [cs.ds] 17 Mar 2016

arxiv: v1 [cs.ds] 17 Mar 2016 Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass

More information

A := A i : {A i } S. is an algebra. The same object is obtained when the union in required to be disjoint.

A := A i : {A i } S. is an algebra. The same object is obtained when the union in required to be disjoint. 59 6. ABSTRACT MEASURE THEORY Having developed the Lebesgue integral with respect to the general easures, we now have a general concept with few specific exaples to actually test it on. Indeed, so far

More information

Kernel Methods and Support Vector Machines

Kernel Methods and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic

More information

Testing Properties of Collections of Distributions

Testing Properties of Collections of Distributions Testing Properties of Collections of Distributions Reut Levi Dana Ron Ronitt Rubinfeld April 9, 0 Abstract We propose a fraework for studying property testing of collections of distributions, where the

More information

IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 60, NO. 2, FEBRUARY ETSP stands for the Euclidean traveling salesman problem.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 60, NO. 2, FEBRUARY ETSP stands for the Euclidean traveling salesman problem. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 60, NO., FEBRUARY 015 37 Target Assignent in Robotic Networks: Distance Optiality Guarantees and Hierarchical Strategies Jingjin Yu, Meber, IEEE, Soon-Jo Chung,

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information

THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT

THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT PETER BORWEIN AND KWOK-KWONG STEPHEN CHOI Abstract. Let n be any integer and ( n ) X F n : a i z i : a i, ± i be the set of all polynoials of height and

More information

Characterization of the Line Complexity of Cellular Automata Generated by Polynomial Transition Rules. Bertrand Stone

Characterization of the Line Complexity of Cellular Automata Generated by Polynomial Transition Rules. Bertrand Stone Characterization of the Line Coplexity of Cellular Autoata Generated by Polynoial Transition Rules Bertrand Stone Abstract Cellular autoata are discrete dynaical systes which consist of changing patterns

More information

Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel

Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel 1 Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel Rai Cohen, Graduate Student eber, IEEE, and Yuval Cassuto, Senior eber, IEEE arxiv:1510.05311v2 [cs.it] 24 ay 2016 Abstract In

More information

Short Papers. Test Data Compression and Decompression Based on Internal Scan Chains and Golomb Coding

Short Papers. Test Data Compression and Decompression Based on Internal Scan Chains and Golomb Coding IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 1, NO. 6, JUNE 00 715 Short Papers Test Data Copression and Decopression Based on Internal Scan Chains and Golob Coding

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

Introduction to Discrete Optimization

Introduction to Discrete Optimization Prof. Friedrich Eisenbrand Martin Nieeier Due Date: March 9 9 Discussions: March 9 Introduction to Discrete Optiization Spring 9 s Exercise Consider a school district with I neighborhoods J schools and

More information

Support recovery in compressed sensing: An estimation theoretic approach

Support recovery in compressed sensing: An estimation theoretic approach Support recovery in copressed sensing: An estiation theoretic approach Ain Karbasi, Ali Horati, Soheil Mohajer, Martin Vetterli School of Coputer and Counication Sciences École Polytechnique Fédérale de

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

Lecture 21. Interior Point Methods Setup and Algorithm

Lecture 21. Interior Point Methods Setup and Algorithm Lecture 21 Interior Point Methods In 1984, Kararkar introduced a new weakly polynoial tie algorith for solving LPs [Kar84a], [Kar84b]. His algorith was theoretically faster than the ellipsoid ethod and

More information

Complexity reduction in low-delay Farrowstructure-based. filters utilizing linear-phase subfilters

Complexity reduction in low-delay Farrowstructure-based. filters utilizing linear-phase subfilters Coplexity reduction in low-delay Farrowstructure-based variable fractional delay FIR filters utilizing linear-phase subfilters Air Eghbali and Håkan Johansson Linköping University Post Print N.B.: When

More information

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES S. E. Ahed, R. J. Tokins and A. I. Volodin Departent of Matheatics and Statistics University of Regina Regina,

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

Efficient Filter Banks And Interpolators

Efficient Filter Banks And Interpolators Efficient Filter Banks And Interpolators A. G. DEMPSTER AND N. P. MURPHY Departent of Electronic Systes University of Westinster 115 New Cavendish St, London W1M 8JS United Kingdo Abstract: - Graphical

More information

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models 2014 IEEE International Syposiu on Inforation Theory Copression and Predictive Distributions for Large Alphabet i.i.d and Markov odels Xiao Yang Departent of Statistics Yale University New Haven, CT, 06511

More information

#A52 INTEGERS 10 (2010), COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES

#A52 INTEGERS 10 (2010), COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES #A5 INTEGERS 10 (010), 697-703 COMBINATORIAL INTERPRETATIONS OF BINOMIAL COEFFICIENT ANALOGUES RELATED TO LUCAS SEQUENCES Bruce E Sagan 1 Departent of Matheatics, Michigan State University, East Lansing,

More information

Ştefan ŞTEFĂNESCU * is the minimum global value for the function h (x)

Ştefan ŞTEFĂNESCU * is the minimum global value for the function h (x) 7Applying Nelder Mead s Optiization Algorith APPLYING NELDER MEAD S OPTIMIZATION ALGORITHM FOR MULTIPLE GLOBAL MINIMA Abstract Ştefan ŞTEFĂNESCU * The iterative deterinistic optiization ethod could not

More information

Energy-Efficient Threshold Circuits Computing Mod Functions

Energy-Efficient Threshold Circuits Computing Mod Functions Energy-Efficient Threshold Circuits Coputing Mod Functions Akira Suzuki Kei Uchizawa Xiao Zhou Graduate School of Inforation Sciences, Tohoku University Araaki-aza Aoba 6-6-05, Aoba-ku, Sendai, 980-8579,

More information

1 Generalization bounds based on Rademacher complexity

1 Generalization bounds based on Rademacher complexity COS 5: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #0 Scribe: Suqi Liu March 07, 08 Last tie we started proving this very general result about how quickly the epirical average converges

More information

time time δ jobs jobs

time time δ jobs jobs Approxiating Total Flow Tie on Parallel Machines Stefano Leonardi Danny Raz y Abstract We consider the proble of optiizing the total ow tie of a strea of jobs that are released over tie in a ultiprocessor

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

Effective joint probabilistic data association using maximum a posteriori estimates of target states

Effective joint probabilistic data association using maximum a posteriori estimates of target states Effective joint probabilistic data association using axiu a posteriori estiates of target states 1 Viji Paul Panakkal, 2 Rajbabu Velurugan 1 Central Research Laboratory, Bharat Electronics Ltd., Bangalore,

More information

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels Extension of CSRSM for the Paraetric Study of the Face Stability of Pressurized Tunnels Guilhe Mollon 1, Daniel Dias 2, and Abdul-Haid Soubra 3, M.ASCE 1 LGCIE, INSA Lyon, Université de Lyon, Doaine scientifique

More information

Generalized Alignment Chain: Improved Converse Results for Index Coding

Generalized Alignment Chain: Improved Converse Results for Index Coding Generalized Alignent Chain: Iproved Converse Results for Index Coding Yucheng Liu and Parastoo Sadeghi Research School of Electrical, Energy and Materials Engineering Australian National University, Canberra,

More information

IN modern society that various systems have become more

IN modern society that various systems have become more Developent of Reliability Function in -Coponent Standby Redundant Syste with Priority Based on Maxiu Entropy Principle Ryosuke Hirata, Ikuo Arizono, Ryosuke Toohiro, Satoshi Oigawa, and Yasuhiko Takeoto

More information

On Conditions for Linearity of Optimal Estimation

On Conditions for Linearity of Optimal Estimation On Conditions for Linearity of Optial Estiation Erah Akyol, Kuar Viswanatha and Kenneth Rose {eakyol, kuar, rose}@ece.ucsb.edu Departent of Electrical and Coputer Engineering University of California at

More information

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe PROPERTIES OF MULTIVARIATE HOMOGENEOUS ORTHOGONAL POLYNOMIALS Brahi Benouahane y Annie Cuyt? Keywords Abstract It is well-known that the denoinators of Pade approxiants can be considered as orthogonal

More information

Acyclic Colorings of Directed Graphs

Acyclic Colorings of Directed Graphs Acyclic Colorings of Directed Graphs Noah Golowich Septeber 9, 014 arxiv:1409.7535v1 [ath.co] 6 Sep 014 Abstract The acyclic chroatic nuber of a directed graph D, denoted χ A (D), is the iniu positive

More information

The Hilbert Schmidt version of the commutator theorem for zero trace matrices

The Hilbert Schmidt version of the commutator theorem for zero trace matrices The Hilbert Schidt version of the coutator theore for zero trace atrices Oer Angel Gideon Schechtan March 205 Abstract Let A be a coplex atrix with zero trace. Then there are atrices B and C such that

More information

Prerequisites. We recall: Theorem 2 A subset of a countably innite set is countable.

Prerequisites. We recall: Theorem 2 A subset of a countably innite set is countable. Prerequisites 1 Set Theory We recall the basic facts about countable and uncountable sets, union and intersection of sets and iages and preiages of functions. 1.1 Countable and uncountable sets We can

More information

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna

More information

Judicious partitions and related problems

Judicious partitions and related problems Judicious partitions and related probles Alex Scott Abstract Many classical partitioning probles in cobinatorics ask for a single quantity to be axiized or iniized over a set of partitions of a cobinatorial

More information

Fairness via priority scheduling

Fairness via priority scheduling Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation

More information

Weighted Superimposed Codes and Constrained Integer Compressed Sensing

Weighted Superimposed Codes and Constrained Integer Compressed Sensing Weighted Superiposed Codes and Constrained Integer Copressed Sensing Wei Dai and Olgica Milenovic Dept. of Electrical and Coputer Engineering University of Illinois, Urbana-Chapaign Abstract We introduce

More information

A Markov Framework for the Simple Genetic Algorithm

A Markov Framework for the Simple Genetic Algorithm A arkov Fraework for the Siple Genetic Algorith Thoas E. Davis*, Jose C. Principe Electrical Engineering Departent University of Florida, Gainesville, FL 326 *WL/NGS Eglin AFB, FL32542 Abstract This paper

More information

Hybrid System Identification: An SDP Approach

Hybrid System Identification: An SDP Approach 49th IEEE Conference on Decision and Control Deceber 15-17, 2010 Hilton Atlanta Hotel, Atlanta, GA, USA Hybrid Syste Identification: An SDP Approach C Feng, C M Lagoa, N Ozay and M Sznaier Abstract The

More information

An Algorithm for Quantization of Discrete Probability Distributions

An Algorithm for Quantization of Discrete Probability Distributions An Algorith for Quantization of Discrete Probability Distributions Yuriy A. Reznik Qualco Inc., San Diego, CA Eail: yreznik@ieee.org Abstract We study the proble of quantization of discrete probability

More information

Graphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes

Graphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes Graphical Models in Local, Asyetric Multi-Agent Markov Decision Processes Ditri Dolgov and Edund Durfee Departent of Electrical Engineering and Coputer Science University of Michigan Ann Arbor, MI 48109

More information

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm Acta Polytechnica Hungarica Vol., No., 04 Sybolic Analysis as Universal Tool for Deriving Properties of Non-linear Algoriths Case study of EM Algorith Vladiir Mladenović, Miroslav Lutovac, Dana Porrat

More information

Computable Shell Decomposition Bounds

Computable Shell Decomposition Bounds Coputable Shell Decoposition Bounds John Langford TTI-Chicago jcl@cs.cu.edu David McAllester TTI-Chicago dac@autoreason.co Editor: Leslie Pack Kaelbling and David Cohn Abstract Haussler, Kearns, Seung

More information

Upper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition

Upper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition Upper bound on false alar rate for landine detection and classification using syntactic pattern recognition Ahed O. Nasif, Brian L. Mark, Kenneth J. Hintz, and Nathalia Peixoto Dept. of Electrical and

More information

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials Inforation Processing Letters 107 008 11 15 www.elsevier.co/locate/ipl Low coplexity bit parallel ultiplier for GF generated by equally-spaced trinoials Haibin Shen a,, Yier Jin a,b a Institute of VLSI

More information

Linear recurrences and asymptotic behavior of exponential sums of symmetric boolean functions

Linear recurrences and asymptotic behavior of exponential sums of symmetric boolean functions Linear recurrences and asyptotic behavior of exponential sus of syetric boolean functions Francis N. Castro Departent of Matheatics University of Puerto Rico, San Juan, PR 00931 francis.castro@upr.edu

More information