Parallel Recursion: Powerlists. Greg Plaxton Theory in Programming Practice, Fall 2005 Department of Computer Science University of Texas at Austin

Size: px
Start display at page:

Download "Parallel Recursion: Powerlists. Greg Plaxton Theory in Programming Practice, Fall 2005 Department of Computer Science University of Texas at Austin"

Transcription

1 Parallel Recursion: Powerlists Greg Plaxton Theory in Programming Practice, Fall 2005 Department of Computer Science University of Texas at Austin

2 Overview Definition of a powerlist Basic operations on powerlists Powerlist formulation of Batcher s bitonic merge Powerlist formulation of FFT

3 Powerlist A powerlist is a list of length 2 d for some nonnegative integer d We will refer to d as the dimension of the powerlist As in Haskell, all of the elements of a powerlist are required to be of the same type Two powerlists p and q are similar if they have equal dimension and the elements of p are of the same type as the elements of q Here are a couple of examples: We write the dimension 0 powerlist containing the sole element x as x We write the dimension 2 powerlist corresponding to the sequence of integers 1, 7, 5, 3 as

4 Basic Operations on Powerlists Given two similar powerlists p and q, we can form a larger powerlist (dimension one higher) in one of two basic ways The powerlist p q is the powerlist obtained by concatenating p and q The powerlist p q is the powerlist obtained by alternately taking elements from p and q, starting with p Here are a couple of examples: = =

5 Deconstruction of Powerlists For any non-singleton powerlist p, there is a unique set of similar powerlists a, b, c, d such that p = a b and p = c d

6 Batcher s Bitonic Sort Revisited Recall that Batcher s bitonic sort is a comparator network, so by the zero-one principle it is sufficient to study its behavior on zero-one inputs Throughout our discussion of bitonic sort, we restrict our attention to zero-one powerlists Recall that the key component of Batcher s bitonic sort is the bitonic merge We will give a powerlist-based presentation and analysis of bitonic merge

7 Bitonic Merge The bitonic merge takes as input a bitonic sequence and permutes it into sorted order If the input sequence is of the form 0 a 1 b 0 c, the output is 0 a+c 1 b If the input sequence is of the form 1 a 0 b 1 c, the output is 0 b 1 a+c Before presenting a powerlist-based version of bitonic merge, we define some useful auxiliary functions

8 Bitonic Merge: Auxiliary Functions It will be useful to define the min function over an arbitrary pair of similar powerlists We can do so as follows: x min y = min(x, y) (p q) min(r s) = (p min r) (q min s) We define max similarly The following operator will be particularly useful in our presentation of bitonic merge p q = (p min q) (p max q) Finally, we define z(p) as the number of zeros in the powerlist p

9 Bitonic Merge Let f denote the powerlist function defined as follows f( x ) = x f(p q) = f(p) f(q) In the slides that follow, we prove that for any bitonic powerlist p, f(p) is sorted (ascending) and z(f(p)) = z(p) The proof is by induction on the dimension of the argument of f The base case, where the dimension is zero, is easy We focus on the induction step in what follows First we establish a few useful lemmas

10 Lemma 1: If p q is bitonic, then so are p and q To see this, note that any subsequence of a bitonic sequence is bitonic

11 Lemma 2: If p q is bitonic, then z(p) z(q) 1 If p q is of the form 0 a 1 b 0 c, then z(p) = a/2 + c/2 and z(q) = a/2 + c/2 Thus z(p) z(q) 1 A symmetric argument may be used for the case where p q is of the form 1 a 0 b 1 c

12 Lemma 3: If p is sorted, q is sorted, and z(p) z(q) 1, then p q is sorted By symmetry (note that is a symmetric operator, since min and max are symmetric operators), it is sufficient to consider the following two cases Case 1: z(p) = z(q) Thus p and q are both of the form 0 a 1 b, so p min q = p max q = 0 a 1 b Thus p q = 0 a 1 b 0 a 1 b = 0 2a 1 2b, which is sorted Case 2: z(p) = z(q) + 1 Thus p and q are of the form 0 a+1 1 b 1 and 0 a 1 b, respectively, so p min q = 0 a+1 1 b 1 and p max q = 0 a 1 b Thus p q = 0 a+1 1 b 1 0 a 1 b = 0 2a+1 1 2b 1, which is sorted

13 Lemma 4: z(p q) = z(p) + z(q) We have z(p q) = z((p min q) (p max q)) = z(p min q) + z(p max q) It is easy to prove by induction on the dimension of p (and q) that z(p min q) + z(p max q) = z(p) + z(q)

14 Correctness of Bitonic Merge We need to prove that for any bitonic powerlist p q, f(p q) is sorted and z(f(p q)) = z(p q) By Lemma 1, p and q are each bitonic, so we can inductively assume that f(p) and f(q) are both sorted, z(f(p)) = z(p), and z(f(q) = z(q) By Lemma 2, z(p) z(q) 1 By Lemma 3, f(p) f(q) is sorted By Lemma 4, z(f(p) f(q)) = z(f(p)) + z(f(q)) = z(p) + z(q) This completes the proof since f(p q) is defined as f(p) f(q) and z(p q) = z(p) + z(q)

15 FFT Revisited: Overview Polynomial evaluation Some useful definitions Powerlist formulation of FFT Proof of correctness

16 Polynomial Evaluation We represent a polynomial with coefficients c 0,..., c n 1, where n is a power of 2, by the powerlist c 0 c n 1 For any pair of powerlists p and q (of possible unequal length), we define p q as the powerlist of the same length as q for which the ith component is equal to the value of the polynomial associated with p evaluated at the ith component of q Example: Suppose p = 1 2 and q = Then p corresponds to the polynomial 1 + 2x, and p q is equal to

17 Some Properties of Property 1: (p q) r = (p r 2 ) + (r (q r 2 )) Note that the addition and multiplication (including squaring) operations performed above are pointwise Example: The square of is Property 2: p (u v) = (p u) (p v)

18 Some Useful Definitions As in our earlier discussion of FFT, for any positive integer n, let ω n denote e 2πi/n Recall that ω n n = 1 and ω 2 2n = ω n For any length-n powerlist p, let f(p) denote the powerlist ω 0 n, ω 1 n,..., ω n 1 n Thus [f(p q)] 2 = f(p) f(q) For any length-n powerlist p, let g(p) denote the powerlist ω 0 2n, ω 1 2n,..., ω n 1 2n Thus f(p q) = g(p) g(p)

19 Fast Fourier Transform We wish to compute p f(p) efficiently We will show that the following powerlist function h (corresponding to the FFT) does the job h( x ) = x h(p q) = (a + c b) (a c b) where a and b are recursively defined as h(p) and h(q), respectively, and c = g(p) We prove the claim by induction on the dimension of the argument of h The base case, where the dimension is zero, is easy We focus on the induction step in what follows

20 FFT Correctness We now successively rewrite the expression (p q) f(p q) into the desired form By Property 1 of, we can rewrite the preceding expression as p [f(p q)] 2 + f(p q) (q [f(p q)] 2 ) Since [f(p q)] 2 = f(p) f(q), the preceding expression is equal to p (f(p) f(q)) + f(p q) (q (f(p) f(q))) By Property 2 of, the preceding expression is equal to ((p f(p)) (p f(q))) + f(p q) ((q f(p)) (q f(q)))

21 FFT Correctness (continued) Thus far we have argued that the Fourier transform of p q is equal to ((p f(p)) (p f(q))) + f(p q) ((q f(p)) (q f(q))) Note that f(p) = f(q) Furthermore, we may inductively assume that p f(p), the Fourier transform of p, is equal to h(p) Similarly, we may assume that q f(q) is equal to h(q) Recall that f(p q) = g(p) g(p) Thus the Fourier transform of p q is equal to (h(p) h(p)) + (g(p) g(p)) (h(q) h(q))

22 FFT Correctness (continued) Thus far we have shown that the Fourier transform of p q is equal to (a a) + (c c) (b b) where a = h(p), b = h(q), and c = g(p) Because is a pointwise operator, any expression of the form (p q) (r s) is equal to (p r) (q s) Thus the Fourier transform of p q is equal to (a a) + ((c b) ( c b))

23 FFT Correctness (continued) Thus far we have shown that the Fourier transform of p q is equal to (a a) + ((c b) ( c b)) where a = h(p), b = h(q), and c = g(p) Because + is a pointwise operator, any expression of the form (p q) + (r s) is equal to (p + r) (q + s) Thus we can rewrite the preceding expression as (a + c b) (a c b) The latter expression coincides with the definition of h(p q), completing the proof

Error Detection and Correction: Small Applications of Exclusive-Or

Error Detection and Correction: Small Applications of Exclusive-Or Error Detection and Correction: Small Applications of Exclusive-Or Greg Plaxton Theory in Programming Practice, Fall 2005 Department of Computer Science University of Texas at Austin Exclusive-Or (XOR,

More information

Error Detection and Correction: Hamming Code; Reed-Muller Code

Error Detection and Correction: Hamming Code; Reed-Muller Code Error Detection and Correction: Hamming Code; Reed-Muller Code Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Hamming Code: Motivation

More information

FFT: Fast Polynomial Multiplications

FFT: Fast Polynomial Multiplications FFT: Fast Polynomial Multiplications Jie Wang University of Massachusetts Lowell Department of Computer Science J. Wang (UMass Lowell) FFT: Fast Polynomial Multiplications 1 / 20 Overview So far we have

More information

Homework #2 Solutions Due: September 5, for all n N n 3 = n2 (n + 1) 2 4

Homework #2 Solutions Due: September 5, for all n N n 3 = n2 (n + 1) 2 4 Do the following exercises from the text: Chapter (Section 3):, 1, 17(a)-(b), 3 Prove that 1 3 + 3 + + n 3 n (n + 1) for all n N Proof The proof is by induction on n For n N, let S(n) be the statement

More information

Relational Database: Identities of Relational Algebra; Example of Query Optimization

Relational Database: Identities of Relational Algebra; Example of Query Optimization Relational Database: Identities of Relational Algebra; Example of Query Optimization Greg Plaxton Theory in Programming Practice, Fall 2005 Department of Computer Science University of Texas at Austin

More information

1 Examples of Weak Induction

1 Examples of Weak Induction More About Mathematical Induction Mathematical induction is designed for proving that a statement holds for all nonnegative integers (or integers beyond an initial one). Here are some extra examples of

More information

Cryptography: Joining the RSA Cryptosystem

Cryptography: Joining the RSA Cryptosystem Cryptography: Joining the RSA Cryptosystem Greg Plaxton Theory in Programming Practice, Fall 2005 Department of Computer Science University of Texas at Austin Joining the RSA Cryptosystem: Overview First,

More information

Equivalence of Regular Expressions and FSMs

Equivalence of Regular Expressions and FSMs Equivalence of Regular Expressions and FSMs Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Regular Language Recall that a language

More information

Analysis of Algorithms I: Asymptotic Notation, Induction, and MergeSort

Analysis of Algorithms I: Asymptotic Notation, Induction, and MergeSort Analysis of Algorithms I: Asymptotic Notation, Induction, and MergeSort Xi Chen Columbia University We continue with two more asymptotic notation: o( ) and ω( ). Let f (n) and g(n) are functions that map

More information

Pattern Avoidance in Reverse Double Lists

Pattern Avoidance in Reverse Double Lists Pattern Avoidance in Reverse Double Lists Marika Diepenbroek, Monica Maus, Alex Stoll University of North Dakota, Minnesota State University Moorhead, Clemson University Advisor: Dr. Lara Pudwell Valparaiso

More information

Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018

Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018 CS17 Integrated Introduction to Computer Science Klein Contents Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018 1 Tree definitions 1 2 Analysis of mergesort using a binary tree 1 3 Analysis of

More information

LECTURE-15 : LOGARITHMS AND COMPLEX POWERS

LECTURE-15 : LOGARITHMS AND COMPLEX POWERS LECTURE-5 : LOGARITHMS AND COMPLEX POWERS VED V. DATAR The purpose of this lecture is twofold - first, to characterize domains on which a holomorphic logarithm can be defined, and second, to show that

More information

On Fast Bitonic Sorting Networks

On Fast Bitonic Sorting Networks On Fast Bitonic Sorting Networks Tamir Levi Ami Litman January 1, 2009 Abstract This paper studies fast Bitonic sorters of arbitrary width. It constructs such a sorter of width n and depth log(n) + 3,

More information

CSE101: Design and Analysis of Algorithms. Ragesh Jaiswal, CSE, UCSD

CSE101: Design and Analysis of Algorithms. Ragesh Jaiswal, CSE, UCSD Greedy s Greedy s Shortest path Claim 2: Let S be a subset of vertices containing s such that we know the shortest path length l(s, u) from s to any vertex in u S. Let e = (u, v) be an edge such that 1

More information

Corrigendum: The complexity of counting graph homomorphisms

Corrigendum: The complexity of counting graph homomorphisms Corrigendum: The complexity of counting graph homomorphisms Martin Dyer School of Computing University of Leeds Leeds, U.K. LS2 9JT dyer@comp.leeds.ac.uk Catherine Greenhill School of Mathematics The University

More information

CPSC 518 Introduction to Computer Algebra Schönhage and Strassen s Algorithm for Integer Multiplication

CPSC 518 Introduction to Computer Algebra Schönhage and Strassen s Algorithm for Integer Multiplication CPSC 518 Introduction to Computer Algebra Schönhage and Strassen s Algorithm for Integer Multiplication March, 2006 1 Introduction We have now seen that the Fast Fourier Transform can be applied to perform

More information

Algorithm Analysis Recurrence Relation. Chung-Ang University, Jaesung Lee

Algorithm Analysis Recurrence Relation. Chung-Ang University, Jaesung Lee Algorithm Analysis Recurrence Relation Chung-Ang University, Jaesung Lee Recursion 2 Recursion 3 Recursion in Real-world Fibonacci sequence = + Initial conditions: = 0 and = 1. = + = + = + 0, 1, 1, 2,

More information

CPSC 518 Introduction to Computer Algebra Asymptotically Fast Integer Multiplication

CPSC 518 Introduction to Computer Algebra Asymptotically Fast Integer Multiplication CPSC 518 Introduction to Computer Algebra Asymptotically Fast Integer Multiplication 1 Introduction We have now seen that the Fast Fourier Transform can be applied to perform polynomial multiplication

More information

CSE 548: Analysis of Algorithms. Lecture 4 ( Divide-and-Conquer Algorithms: Polynomial Multiplication )

CSE 548: Analysis of Algorithms. Lecture 4 ( Divide-and-Conquer Algorithms: Polynomial Multiplication ) CSE 548: Analysis of Algorithms Lecture 4 ( Divide-and-Conquer Algorithms: Polynomial Multiplication ) Rezaul A. Chowdhury Department of Computer Science SUNY Stony Brook Spring 2015 Coefficient Representation

More information

Regular Expressions. Definitions Equivalence to Finite Automata

Regular Expressions. Definitions Equivalence to Finite Automata Regular Expressions Definitions Equivalence to Finite Automata 1 RE s: Introduction Regular expressions are an algebraic way to describe languages. They describe exactly the regular languages. If E is

More information

Lecture 3. Frits Beukers. Arithmetic of values of E- and G-function. Lecture 3 E- and G-functions 1 / 20

Lecture 3. Frits Beukers. Arithmetic of values of E- and G-function. Lecture 3 E- and G-functions 1 / 20 Lecture 3 Frits Beukers Arithmetic of values of E- and G-function Lecture 3 E- and G-functions 1 / 20 G-functions, definition Definition An analytic function f (z) given by a powerseries a k z k k=0 with

More information

Optimizing the Dimensional Method for Performing Multidimensional, Multiprocessor, Out-of-Core FFTs

Optimizing the Dimensional Method for Performing Multidimensional, Multiprocessor, Out-of-Core FFTs Dartmouth College Computer Science Technical Report TR2001-402 Optimizing the Dimensional Method for Performing Multidimensional, Multiprocessor, Out-of-Core FFTs Jeremy T Fineman Dartmouth College Department

More information

MA3232 Summary 5. d y1 dy1. MATLAB has a number of built-in functions for solving stiff systems of ODEs. There are ode15s, ode23s, ode23t, ode23tb.

MA3232 Summary 5. d y1 dy1. MATLAB has a number of built-in functions for solving stiff systems of ODEs. There are ode15s, ode23s, ode23t, ode23tb. umerical solutions of higher order ODE We can convert a high order ODE into a system of first order ODEs and then apply RK method to solve it. Stiff ODEs Stiffness is a special problem that can arise in

More information

Lower Bounds for Sorting Networks. 1 Introduction

Lower Bounds for Sorting Networks. 1 Introduction Lower Bounds for Sorting Networks Nabil Kahale 1;2 Tom Leighton 3 Yuan Ma 1;4 C. Greg Plaxton 1;5 Torsten Suel 1;6 Endre Szemeredi 7 Abstract We establish a lower bound of (1:12? o(1)) n log n on the size

More information

This means that we can assume each list ) is

This means that we can assume each list ) is This means that we can assume each list ) is of the form ),, ( )with < and Since the sizes of the items are integers, there are at most +1pairs in each list Furthermore, if we let = be the maximum possible

More information

Math 40510, Algebraic Geometry

Math 40510, Algebraic Geometry Math 40510, Algebraic Geometry Problem Set 1, due February 10, 2016 1. Let k = Z p, the field with p elements, where p is a prime. Find a polynomial f k[x, y] that vanishes at every point of k 2. [Hint:

More information

Legendre s Equation. PHYS Southern Illinois University. October 18, 2016

Legendre s Equation. PHYS Southern Illinois University. October 18, 2016 Legendre s Equation PHYS 500 - Southern Illinois University October 18, 2016 PHYS 500 - Southern Illinois University Legendre s Equation October 18, 2016 1 / 11 Legendre s Equation Recall We are trying

More information

CSE 421 Algorithms. T(n) = at(n/b) + n c. Closest Pair Problem. Divide and Conquer Algorithms. What you really need to know about recurrences

CSE 421 Algorithms. T(n) = at(n/b) + n c. Closest Pair Problem. Divide and Conquer Algorithms. What you really need to know about recurrences CSE 421 Algorithms Richard Anderson Lecture 13 Divide and Conquer What you really need to know about recurrences Work per level changes geometrically with the level Geometrically increasing (x > 1) The

More information

1 Basic Definitions. 2 Proof By Contradiction. 3 Exchange Argument

1 Basic Definitions. 2 Proof By Contradiction. 3 Exchange Argument 1 Basic Definitions A Problem is a relation from input to acceptable output. For example, INPUT: A list of integers x 1,..., x n OUTPUT: One of the three smallest numbers in the list An algorithm A solves

More information

Advanced Counting Techniques. Chapter 8

Advanced Counting Techniques. Chapter 8 Advanced Counting Techniques Chapter 8 Chapter Summary Applications of Recurrence Relations Solving Linear Recurrence Relations Homogeneous Recurrence Relations Nonhomogeneous Recurrence Relations Divide-and-Conquer

More information

Pairs of a tree and a nontree graph with the same status sequence

Pairs of a tree and a nontree graph with the same status sequence arxiv:1901.09547v1 [math.co] 28 Jan 2019 Pairs of a tree and a nontree graph with the same status sequence Pu Qiao, Xingzhi Zhan Department of Mathematics, East China Normal University, Shanghai 200241,

More information

The Littlewood-Richardson Rule

The Littlewood-Richardson Rule REPRESENTATIONS OF THE SYMMETRIC GROUP The Littlewood-Richardson Rule Aman Barot B.Sc.(Hons.) Mathematics and Computer Science, III Year April 20, 2014 Abstract We motivate and prove the Littlewood-Richardson

More information

An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees

An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees Francesc Rosselló 1, Gabriel Valiente 2 1 Department of Mathematics and Computer Science, Research Institute

More information

Chapter 1 Divide and Conquer Algorithm Theory WS 2016/17 Fabian Kuhn

Chapter 1 Divide and Conquer Algorithm Theory WS 2016/17 Fabian Kuhn Chapter 1 Divide and Conquer Algorithm Theory WS 2016/17 Fabian Kuhn Formulation of the D&C principle Divide-and-conquer method for solving a problem instance of size n: 1. Divide n c: Solve the problem

More information

ABSTRACT NONSINGULAR CURVES

ABSTRACT NONSINGULAR CURVES ABSTRACT NONSINGULAR CURVES Affine Varieties Notation. Let k be a field, such as the rational numbers Q or the complex numbers C. We call affine n-space the collection A n k of points P = a 1, a,..., a

More information

Factorization in Polynomial Rings

Factorization in Polynomial Rings Factorization in Polynomial Rings Throughout these notes, F denotes a field. 1 Long division with remainder We begin with some basic definitions. Definition 1.1. Let f, g F [x]. We say that f divides g,

More information

Game Theory. Greg Plaxton Theory in Programming Practice, Spring 2004 Department of Computer Science University of Texas at Austin

Game Theory. Greg Plaxton Theory in Programming Practice, Spring 2004 Department of Computer Science University of Texas at Austin Game Theory Greg Plaxton Theory in Programming Practice, Spring 2004 Department of Computer Science University of Texas at Austin Bimatrix Games We are given two real m n matrices A = (a ij ), B = (b ij

More information

CTL Model Checking. Prof. P.H. Schmitt. Formal Systems II. Institut für Theoretische Informatik Fakultät für Informatik Universität Karlsruhe (TH)

CTL Model Checking. Prof. P.H. Schmitt. Formal Systems II. Institut für Theoretische Informatik Fakultät für Informatik Universität Karlsruhe (TH) CTL Model Checking Prof. P.H. Schmitt Institut für Theoretische Informatik Fakultät für Informatik Universität Karlsruhe (TH) Formal Systems II Prof. P.H. Schmitt CTLMC Summer 2009 1 / 26 Fixed Point Theory

More information

CHAPTER 8: EXPLORING R

CHAPTER 8: EXPLORING R CHAPTER 8: EXPLORING R LECTURE NOTES FOR MATH 378 (CSUSM, SPRING 2009). WAYNE AITKEN In the previous chapter we discussed the need for a complete ordered field. The field Q is not complete, so we constructed

More information

Introduction to Algorithms

Introduction to Algorithms Introduction to Algorithms (2 nd edition) by Cormen, Leiserson, Rivest & Stein Chapter 3: Growth of Functions (slides enhanced by N. Adlai A. DePano) Overview Order of growth of functions provides a simple

More information

5 Structure of 2-transitive groups

5 Structure of 2-transitive groups Structure of 2-transitive groups 25 5 Structure of 2-transitive groups Theorem 5.1 (Burnside) Let G be a 2-transitive permutation group on a set Ω. Then G possesses a unique minimal normal subgroup N and

More information

Harmonic Analysis. 1. Hermite Polynomials in Dimension One. Recall that if L 2 ([0 2π] ), then we can write as

Harmonic Analysis. 1. Hermite Polynomials in Dimension One. Recall that if L 2 ([0 2π] ), then we can write as Harmonic Analysis Recall that if L 2 ([0 2π] ), then we can write as () Z e ˆ (3.) F:L where the convergence takes place in L 2 ([0 2π] ) and ˆ is the th Fourier coefficient of ; that is, ˆ : (2π) [02π]

More information

MATH 802: ENUMERATIVE COMBINATORICS ASSIGNMENT 2

MATH 802: ENUMERATIVE COMBINATORICS ASSIGNMENT 2 MATH 80: ENUMERATIVE COMBINATORICS ASSIGNMENT KANNAPPAN SAMPATH Facts Recall that, the Stirling number S(, n of the second ind is defined as the number of partitions of a [] into n non-empty blocs. We

More information

Randomized Smoothing Networks

Randomized Smoothing Networks Randomized Smoothing Netorks Maurice Herlihy Computer Science Dept., Bron University, Providence, RI, USA Srikanta Tirthapura Dept. of Electrical and Computer Engg., Ioa State University, Ames, IA, USA

More information

Exercises for Unit VI (Infinite constructions in set theory)

Exercises for Unit VI (Infinite constructions in set theory) Exercises for Unit VI (Infinite constructions in set theory) VI.1 : Indexed families and set theoretic operations (Halmos, 4, 8 9; Lipschutz, 5.3 5.4) Lipschutz : 5.3 5.6, 5.29 5.32, 9.14 1. Generalize

More information

A Classification of Integral Apollonian Circle Packings

A Classification of Integral Apollonian Circle Packings A Classification of Integral Apollonian Circle Pacings Tabes Bridges Warren Tai Advised by: Karol Koziol 5 July 011 Abstract We review the basic notions related to Apollonian circle pacings, in particular

More information

Lines With Many Points On Both Sides

Lines With Many Points On Both Sides Lines With Many Points On Both Sides Rom Pinchasi Hebrew University of Jerusalem and Massachusetts Institute of Technology September 13, 2002 Abstract Let G be a finite set of points in the plane. A line

More information

8 Further theory of function limits and continuity

8 Further theory of function limits and continuity 8 Further theory of function limits and continuity 8.1 Algebra of limits and sandwich theorem for real-valued function limits The following results give versions of the algebra of limits and sandwich theorem

More information

Approximation Algorithms (Load Balancing)

Approximation Algorithms (Load Balancing) July 6, 204 Problem Definition : We are given a set of n jobs {J, J 2,..., J n }. Each job J i has a processing time t i 0. We are given m identical machines. Problem Definition : We are given a set of

More information

Chapter 1 Divide and Conquer Polynomial Multiplication Algorithm Theory WS 2015/16 Fabian Kuhn

Chapter 1 Divide and Conquer Polynomial Multiplication Algorithm Theory WS 2015/16 Fabian Kuhn Chapter 1 Divide and Conquer Polynomial Multiplication Algorithm Theory WS 2015/16 Fabian Kuhn Formulation of the D&C principle Divide-and-conquer method for solving a problem instance of size n: 1. Divide

More information

5th-order differentiation

5th-order differentiation ARBITRARY-ORDER REAL-TIME EXACT ROBUST DIFFERENTIATION A. Levant Applied Mathematics Dept., Tel-Aviv University, Israel E-mail: levant@post.tau.ac.il Homepage: http://www.tau.ac.il/~levant/ 5th-order differentiation

More information

Quadratic reciprocity and the Jacobi symbol Stephen McAdam Department of Mathematics University of Texas at Austin

Quadratic reciprocity and the Jacobi symbol Stephen McAdam Department of Mathematics University of Texas at Austin Quadratic reciprocity and the Jacobi symbol Stephen McAdam Department of Mathematics University of Texas at Austin mcadam@math.utexas.edu Abstract: We offer a proof of quadratic reciprocity that arises

More information

Fast Convolution; Strassen s Method

Fast Convolution; Strassen s Method Fast Convolution; Strassen s Method 1 Fast Convolution reduction to subquadratic time polynomial evaluation at complex roots of unity interpolation via evaluation at complex roots of unity 2 The Master

More information

ALTERNATIVE SECTION 12.2 SUPPLEMENT TO BECK AND GEOGHEGAN S ART OF PROOF

ALTERNATIVE SECTION 12.2 SUPPLEMENT TO BECK AND GEOGHEGAN S ART OF PROOF ALTERNATIVE SECTION 12.2 SUPPLEMENT TO BECK AND GEOGHEGAN S ART OF PROOF MICHAEL P. COHEN Remark. The purpose of these notes is to serve as an alternative Section 12.2 for Beck and Geoghegan s Art of Proof.

More information

Discrete Applied Mathematics

Discrete Applied Mathematics Discrete Applied Mathematics 159 (011) 1398 1417 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam Recursive merge sort with erroneous

More information

DIFFERENCE EQUATIONS

DIFFERENCE EQUATIONS Chapter 3 DIFFERENCE EQUATIONS 3.1 Introduction Differential equations are applicable for continuous systems and cannot be used for discrete variables. Difference equations are the discrete equivalent

More information

Nearest Neighbor Search with Keywords: Compression

Nearest Neighbor Search with Keywords: Compression Nearest Neighbor Search with Keywords: Compression Yufei Tao KAIST June 3, 2013 In this lecture, we will continue our discussion on: Problem (Nearest Neighbor Search with Keywords) Let P be a set of points

More information

Competitive Weighted Matching in Transversal Matroids

Competitive Weighted Matching in Transversal Matroids Competitive Weighted Matching in Transversal Matroids Nedialko B. Dimitrov and C. Greg Plaxton University of Texas at Austin 1 University Station C0500 Austin, Texas 78712 0233 {ned,plaxton}@cs.utexas.edu

More information

Sequences of Real Numbers

Sequences of Real Numbers Chapter 8 Sequences of Real Numbers In this chapter, we assume the existence of the ordered field of real numbers, though we do not yet discuss or use the completeness of the real numbers. In the next

More information

A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees

A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees Yoshimi Egawa Department of Mathematical Information Science, Tokyo University of

More information

Linearizing Symmetric Matrix Polynomials via Fiedler pencils with Repetition

Linearizing Symmetric Matrix Polynomials via Fiedler pencils with Repetition Linearizing Symmetric Matrix Polynomials via Fiedler pencils with Repetition Kyle Curlett Maribel Bueno Cachadina, Advisor March, 2012 Department of Mathematics Abstract Strong linearizations of a matrix

More information

Algorithms Exam TIN093 /DIT602

Algorithms Exam TIN093 /DIT602 Algorithms Exam TIN093 /DIT602 Course: Algorithms Course code: TIN 093, TIN 092 (CTH), DIT 602 (GU) Date, time: 21st October 2017, 14:00 18:00 Building: SBM Responsible teacher: Peter Damaschke, Tel. 5405

More information

18. Cyclotomic polynomials II

18. Cyclotomic polynomials II 18. Cyclotomic polynomials II 18.1 Cyclotomic polynomials over Z 18.2 Worked examples Now that we have Gauss lemma in hand we can look at cyclotomic polynomials again, not as polynomials with coefficients

More information

Optimal Conclusive Sets for Comparator Networks

Optimal Conclusive Sets for Comparator Networks Optimal Conclusive Sets for Comparator Networks Guy Even Tamir Levi Ami Litman January 25, 2007 Abstract A set of input vectors S is conclusive if correct functionality for all input vectors is implied

More information

CSCE 750 Final Exam Answer Key Wednesday December 7, 2005

CSCE 750 Final Exam Answer Key Wednesday December 7, 2005 CSCE 750 Final Exam Answer Key Wednesday December 7, 2005 Do all problems. Put your answers on blank paper or in a test booklet. There are 00 points total in the exam. You have 80 minutes. Please note

More information

Product measures, Tonelli s and Fubini s theorems For use in MAT4410, autumn 2017 Nadia S. Larsen. 17 November 2017.

Product measures, Tonelli s and Fubini s theorems For use in MAT4410, autumn 2017 Nadia S. Larsen. 17 November 2017. Product measures, Tonelli s and Fubini s theorems For use in MAT4410, autumn 017 Nadia S. Larsen 17 November 017. 1. Construction of the product measure The purpose of these notes is to prove the main

More information

Descents in Parking Functions

Descents in Parking Functions 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 21 (2018), Article 18.2.3 Descents in Parking Functions Paul R. F. Schumacher 1512 Oakview Street Bryan, TX 77802 USA Paul.R.F.Schumacher@gmail.com Abstract

More information

arxiv: v1 [math.ra] 13 Jan 2009

arxiv: v1 [math.ra] 13 Jan 2009 A CONCISE PROOF OF KRUSKAL S THEOREM ON TENSOR DECOMPOSITION arxiv:0901.1796v1 [math.ra] 13 Jan 2009 JOHN A. RHODES Abstract. A theorem of J. Kruskal from 1977, motivated by a latent-class statistical

More information

Introduction to Divide and Conquer

Introduction to Divide and Conquer Introduction to Divide and Conquer Sorting with O(n log n) comparisons and integer multiplication faster than O(n 2 ) Periklis A. Papakonstantinou York University Consider a problem that admits a straightforward

More information

3 Integration and Expectation

3 Integration and Expectation 3 Integration and Expectation 3.1 Construction of the Lebesgue Integral Let (, F, µ) be a measure space (not necessarily a probability space). Our objective will be to define the Lebesgue integral R fdµ

More information

Integer Sorting on the word-ram

Integer Sorting on the word-ram Integer Sorting on the word-rm Uri Zwick Tel viv University May 2015 Last updated: June 30, 2015 Integer sorting Memory is composed of w-bit words. rithmetical, logical and shift operations on w-bit words

More information

The Skorokhod reflection problem for functions with discontinuities (contractive case)

The Skorokhod reflection problem for functions with discontinuities (contractive case) The Skorokhod reflection problem for functions with discontinuities (contractive case) TAKIS KONSTANTOPOULOS Univ. of Texas at Austin Revised March 1999 Abstract Basic properties of the Skorokhod reflection

More information

Admissible Monomials (Lecture 6)

Admissible Monomials (Lecture 6) Admissible Monomials (Lecture 6) July 11, 2008 Recall that we have define the big Steenrod algebra A Big to be the quotient of the free associated F 2 - algebra F 2 {..., Sq 1, Sq 0, Sq 1,...} obtained

More information

Part III, Sequences and Series CS131 Mathematics for Computer Scientists II Note 16 RECURRENCES

Part III, Sequences and Series CS131 Mathematics for Computer Scientists II Note 16 RECURRENCES CS131 Part III, Sequences and Series CS131 Mathematics for Computer Scientists II Note 16 RECURRENCES A recurrence is a rule which defines each term of a sequence using the preceding terms. The Fibonacci

More information

Computing Posterior Probabilities. Vassilis Athitsos CSE 4308/5360: Artificial Intelligence I University of Texas at Arlington

Computing Posterior Probabilities. Vassilis Athitsos CSE 4308/5360: Artificial Intelligence I University of Texas at Arlington Computing Posterior Probabilities Vassilis Athitsos CSE 4308/5360: Artificial Intelligence I University of Texas at Arlington 1 Overview of Candy Bag Example As described in Russell and Norvig, for Chapter

More information

Divide and Conquer. Recurrence Relations

Divide and Conquer. Recurrence Relations Divide and Conquer Recurrence Relations Divide-and-Conquer Strategy: Break up problem into parts. Solve each part recursively. Combine solutions to sub-problems into overall solution. 2 MergeSort Mergesort.

More information

FINITELY-GENERATED ABELIAN GROUPS

FINITELY-GENERATED ABELIAN GROUPS FINITELY-GENERATED ABELIAN GROUPS Structure Theorem for Finitely-Generated Abelian Groups Let G be a finitely-generated abelian group Then there exist a nonnegative integer t and (if t > 0) integers 1

More information

Divide and Conquer. Maximum/minimum. Median finding. CS125 Lecture 4 Fall 2016

Divide and Conquer. Maximum/minimum. Median finding. CS125 Lecture 4 Fall 2016 CS125 Lecture 4 Fall 2016 Divide and Conquer We have seen one general paradigm for finding algorithms: the greedy approach. We now consider another general paradigm, known as divide and conquer. We have

More information

Ch6 Addition Proofs of Theorems on permutations.

Ch6 Addition Proofs of Theorems on permutations. Ch6 Addition Proofs of Theorems on permutations. Definition Two permutations ρ and π of a set A are disjoint if every element moved by ρ is fixed by π and every element moved by π is fixed by ρ. (In other

More information

Lower Bounds for Shellsort. April 20, Abstract. We show lower bounds on the worst-case complexity of Shellsort.

Lower Bounds for Shellsort. April 20, Abstract. We show lower bounds on the worst-case complexity of Shellsort. Lower Bounds for Shellsort C. Greg Plaxton 1 Torsten Suel 2 April 20, 1996 Abstract We show lower bounds on the worst-case complexity of Shellsort. In particular, we give a fairly simple proof of an (n

More information

On m-ary Overpartitions

On m-ary Overpartitions On m-ary Overpartitions Øystein J. Rødseth Department of Mathematics, University of Bergen, Johs. Brunsgt. 1, N 5008 Bergen, Norway E-mail: rodseth@mi.uib.no James A. Sellers Department of Mathematics,

More information

Continuous Solutions of a Functional Equation Involving the Harmonic and Arithmetic Means

Continuous Solutions of a Functional Equation Involving the Harmonic and Arithmetic Means Continuous Solutions o a Functional Equation Involving the Harmonic and Arithmetic Means Rebecca Whitehead and Bruce Ebanks aculty advisor) Department o Mathematics and Statistics Mississippi State University

More information

Advanced Counting Techniques

Advanced Counting Techniques . All rights reserved. Authorized only for instructor use in the classroom. No reproduction or further distribution permitted without the prior written consent of McGraw-Hill Education. Advanced Counting

More information

The Uniformization Theorem. Donald E. Marshall

The Uniformization Theorem. Donald E. Marshall The Uniformization Theorem Donald E. Marshall The Koebe uniformization theorem is a generalization of the Riemann mapping Theorem. It says that a simply connected Riemann surface is conformally equivalent

More information

LECTURE 22: COUNTABLE AND UNCOUNTABLE SETS

LECTURE 22: COUNTABLE AND UNCOUNTABLE SETS LECTURE 22: COUNTABLE AND UNCOUNTABLE SETS 1. Introduction To end the course we will investigate various notions of size associated to subsets of R. The simplest example is that of cardinality - a very

More information

Lecture 04: Secret Sharing Schemes (2) Secret Sharing

Lecture 04: Secret Sharing Schemes (2) Secret Sharing Lecture 04: Schemes (2) Recall: Goal We want to Share a secret s Z p to n parties, such that {1,..., n} Z p, Any two parties can reconstruct the secret s, and No party alone can predict the secret s Recall:

More information

The Fast Fourier Transform

The Fast Fourier Transform The Fast Fourier Transform 1 Motivation: digital signal processing The fast Fourier transform (FFT) is the workhorse of digital signal processing To understand how it is used, consider any signal: any

More information

Hamiltonian paths in tournaments A generalization of sorting DM19 notes fall 2006

Hamiltonian paths in tournaments A generalization of sorting DM19 notes fall 2006 Hamiltonian paths in tournaments A generalization of sorting DM9 notes fall 2006 Jørgen Bang-Jensen Imada, SDU 30. august 2006 Introduction and motivation Tournaments which we will define mathematically

More information

FFTs in Graphics and Vision. Homogenous Polynomials and Irreducible Representations

FFTs in Graphics and Vision. Homogenous Polynomials and Irreducible Representations FFTs in Graphics and Vision Homogenous Polynomials and Irreducible Representations 1 Outline The 2π Term in Assignment 1 Homogenous Polynomials Representations of Functions on the Unit-Circle Sub-Representations

More information

Design and Analysis of Algorithms March 12, 2015 Massachusetts Institute of Technology Profs. Erik Demaine, Srini Devadas, and Nancy Lynch Quiz 1

Design and Analysis of Algorithms March 12, 2015 Massachusetts Institute of Technology Profs. Erik Demaine, Srini Devadas, and Nancy Lynch Quiz 1 Design and Analysis of Algorithms March 12, 2015 Massachusetts Institute of Technology 6.046J/18.410J Profs. Erik Demaine, Srini Devadas, and Nancy Lynch Quiz 1 Quiz 1 Do not open this quiz booklet until

More information

SUBSPACE LATTICES OF FINITE VECTOR SPACES ARE 5-GENERATED

SUBSPACE LATTICES OF FINITE VECTOR SPACES ARE 5-GENERATED SUBSPACE LATTICES OF FINITE VECTOR SPACES ARE 5-GENERATED LÁSZLÓ ZÁDORI To the memory of András Huhn Abstract. Let n 3. From the description of subdirectly irreducible complemented Arguesian lattices with

More information

CSE548, AMS542: Analysis of Algorithms, Fall 2017 Date: October 11. In-Class Midterm. ( 7:05 PM 8:20 PM : 75 Minutes )

CSE548, AMS542: Analysis of Algorithms, Fall 2017 Date: October 11. In-Class Midterm. ( 7:05 PM 8:20 PM : 75 Minutes ) CSE548, AMS542: Analysis of Algorithms, Fall 2017 Date: October 11 In-Class Midterm ( 7:05 PM 8:20 PM : 75 Minutes ) This exam will account for either 15% or 30% of your overall grade depending on your

More information

Find an Element x in an Unsorted Array

Find an Element x in an Unsorted Array Find an Element x in an Unsorted Array What if we try to find a lower bound for the case where the array is not necessarily sorted? J.-L. De Carufel (U. of O.) Design & Analysis of Algorithms Fall 2017

More information

Automorphism groups of wreath product digraphs

Automorphism groups of wreath product digraphs Automorphism groups of wreath product digraphs Edward Dobson Department of Mathematics and Statistics Mississippi State University PO Drawer MA Mississippi State, MS 39762 USA dobson@math.msstate.edu Joy

More information

A first order divided difference

A first order divided difference A first order divided difference For a given function f (x) and two distinct points x 0 and x 1, define f [x 0, x 1 ] = f (x 1) f (x 0 ) x 1 x 0 This is called the first order divided difference of f (x).

More information

Divide and Conquer algorithms

Divide and Conquer algorithms Divide and Conquer algorithms Another general method for constructing algorithms is given by the Divide and Conquer strategy. We assume that we have a problem with input that can be split into parts in

More information

Lecture 9: Dynamics in Load Balancing

Lecture 9: Dynamics in Load Balancing Computational Game Theory Spring Semester, 2003/4 Lecture 9: Dynamics in Load Balancing Lecturer: Yishay Mansour Scribe: Anat Axelrod, Eran Werner 9.1 Lecture Overview In this lecture we consider dynamics

More information

Section II.2. Finitely Generated Abelian Groups

Section II.2. Finitely Generated Abelian Groups II.2. Finitely Generated Abelian Groups 1 Section II.2. Finitely Generated Abelian Groups Note. In this section we prove the Fundamental Theorem of Finitely Generated Abelian Groups. Recall that every

More information

Chapter 2: Real solutions to univariate polynomials

Chapter 2: Real solutions to univariate polynomials Chapter 2: Real solutions to univariate polynomials Before we study the real solutions to systems of multivariate polynomials, we will review some of what is known for univariate polynomials. The strength

More information

13 More on free abelian groups

13 More on free abelian groups 13 More on free abelian groups Recall. G is a free abelian group if G = i I Z for some set I. 13.1 Definition. Let G be an abelian group. A set B G is a basis of G if B generates G if for some x 1,...x

More information