Parallel Recursion: Powerlists. Greg Plaxton Theory in Programming Practice, Fall 2005 Department of Computer Science University of Texas at Austin
|
|
- Julian Benson
- 5 years ago
- Views:
Transcription
1 Parallel Recursion: Powerlists Greg Plaxton Theory in Programming Practice, Fall 2005 Department of Computer Science University of Texas at Austin
2 Overview Definition of a powerlist Basic operations on powerlists Powerlist formulation of Batcher s bitonic merge Powerlist formulation of FFT
3 Powerlist A powerlist is a list of length 2 d for some nonnegative integer d We will refer to d as the dimension of the powerlist As in Haskell, all of the elements of a powerlist are required to be of the same type Two powerlists p and q are similar if they have equal dimension and the elements of p are of the same type as the elements of q Here are a couple of examples: We write the dimension 0 powerlist containing the sole element x as x We write the dimension 2 powerlist corresponding to the sequence of integers 1, 7, 5, 3 as
4 Basic Operations on Powerlists Given two similar powerlists p and q, we can form a larger powerlist (dimension one higher) in one of two basic ways The powerlist p q is the powerlist obtained by concatenating p and q The powerlist p q is the powerlist obtained by alternately taking elements from p and q, starting with p Here are a couple of examples: = =
5 Deconstruction of Powerlists For any non-singleton powerlist p, there is a unique set of similar powerlists a, b, c, d such that p = a b and p = c d
6 Batcher s Bitonic Sort Revisited Recall that Batcher s bitonic sort is a comparator network, so by the zero-one principle it is sufficient to study its behavior on zero-one inputs Throughout our discussion of bitonic sort, we restrict our attention to zero-one powerlists Recall that the key component of Batcher s bitonic sort is the bitonic merge We will give a powerlist-based presentation and analysis of bitonic merge
7 Bitonic Merge The bitonic merge takes as input a bitonic sequence and permutes it into sorted order If the input sequence is of the form 0 a 1 b 0 c, the output is 0 a+c 1 b If the input sequence is of the form 1 a 0 b 1 c, the output is 0 b 1 a+c Before presenting a powerlist-based version of bitonic merge, we define some useful auxiliary functions
8 Bitonic Merge: Auxiliary Functions It will be useful to define the min function over an arbitrary pair of similar powerlists We can do so as follows: x min y = min(x, y) (p q) min(r s) = (p min r) (q min s) We define max similarly The following operator will be particularly useful in our presentation of bitonic merge p q = (p min q) (p max q) Finally, we define z(p) as the number of zeros in the powerlist p
9 Bitonic Merge Let f denote the powerlist function defined as follows f( x ) = x f(p q) = f(p) f(q) In the slides that follow, we prove that for any bitonic powerlist p, f(p) is sorted (ascending) and z(f(p)) = z(p) The proof is by induction on the dimension of the argument of f The base case, where the dimension is zero, is easy We focus on the induction step in what follows First we establish a few useful lemmas
10 Lemma 1: If p q is bitonic, then so are p and q To see this, note that any subsequence of a bitonic sequence is bitonic
11 Lemma 2: If p q is bitonic, then z(p) z(q) 1 If p q is of the form 0 a 1 b 0 c, then z(p) = a/2 + c/2 and z(q) = a/2 + c/2 Thus z(p) z(q) 1 A symmetric argument may be used for the case where p q is of the form 1 a 0 b 1 c
12 Lemma 3: If p is sorted, q is sorted, and z(p) z(q) 1, then p q is sorted By symmetry (note that is a symmetric operator, since min and max are symmetric operators), it is sufficient to consider the following two cases Case 1: z(p) = z(q) Thus p and q are both of the form 0 a 1 b, so p min q = p max q = 0 a 1 b Thus p q = 0 a 1 b 0 a 1 b = 0 2a 1 2b, which is sorted Case 2: z(p) = z(q) + 1 Thus p and q are of the form 0 a+1 1 b 1 and 0 a 1 b, respectively, so p min q = 0 a+1 1 b 1 and p max q = 0 a 1 b Thus p q = 0 a+1 1 b 1 0 a 1 b = 0 2a+1 1 2b 1, which is sorted
13 Lemma 4: z(p q) = z(p) + z(q) We have z(p q) = z((p min q) (p max q)) = z(p min q) + z(p max q) It is easy to prove by induction on the dimension of p (and q) that z(p min q) + z(p max q) = z(p) + z(q)
14 Correctness of Bitonic Merge We need to prove that for any bitonic powerlist p q, f(p q) is sorted and z(f(p q)) = z(p q) By Lemma 1, p and q are each bitonic, so we can inductively assume that f(p) and f(q) are both sorted, z(f(p)) = z(p), and z(f(q) = z(q) By Lemma 2, z(p) z(q) 1 By Lemma 3, f(p) f(q) is sorted By Lemma 4, z(f(p) f(q)) = z(f(p)) + z(f(q)) = z(p) + z(q) This completes the proof since f(p q) is defined as f(p) f(q) and z(p q) = z(p) + z(q)
15 FFT Revisited: Overview Polynomial evaluation Some useful definitions Powerlist formulation of FFT Proof of correctness
16 Polynomial Evaluation We represent a polynomial with coefficients c 0,..., c n 1, where n is a power of 2, by the powerlist c 0 c n 1 For any pair of powerlists p and q (of possible unequal length), we define p q as the powerlist of the same length as q for which the ith component is equal to the value of the polynomial associated with p evaluated at the ith component of q Example: Suppose p = 1 2 and q = Then p corresponds to the polynomial 1 + 2x, and p q is equal to
17 Some Properties of Property 1: (p q) r = (p r 2 ) + (r (q r 2 )) Note that the addition and multiplication (including squaring) operations performed above are pointwise Example: The square of is Property 2: p (u v) = (p u) (p v)
18 Some Useful Definitions As in our earlier discussion of FFT, for any positive integer n, let ω n denote e 2πi/n Recall that ω n n = 1 and ω 2 2n = ω n For any length-n powerlist p, let f(p) denote the powerlist ω 0 n, ω 1 n,..., ω n 1 n Thus [f(p q)] 2 = f(p) f(q) For any length-n powerlist p, let g(p) denote the powerlist ω 0 2n, ω 1 2n,..., ω n 1 2n Thus f(p q) = g(p) g(p)
19 Fast Fourier Transform We wish to compute p f(p) efficiently We will show that the following powerlist function h (corresponding to the FFT) does the job h( x ) = x h(p q) = (a + c b) (a c b) where a and b are recursively defined as h(p) and h(q), respectively, and c = g(p) We prove the claim by induction on the dimension of the argument of h The base case, where the dimension is zero, is easy We focus on the induction step in what follows
20 FFT Correctness We now successively rewrite the expression (p q) f(p q) into the desired form By Property 1 of, we can rewrite the preceding expression as p [f(p q)] 2 + f(p q) (q [f(p q)] 2 ) Since [f(p q)] 2 = f(p) f(q), the preceding expression is equal to p (f(p) f(q)) + f(p q) (q (f(p) f(q))) By Property 2 of, the preceding expression is equal to ((p f(p)) (p f(q))) + f(p q) ((q f(p)) (q f(q)))
21 FFT Correctness (continued) Thus far we have argued that the Fourier transform of p q is equal to ((p f(p)) (p f(q))) + f(p q) ((q f(p)) (q f(q))) Note that f(p) = f(q) Furthermore, we may inductively assume that p f(p), the Fourier transform of p, is equal to h(p) Similarly, we may assume that q f(q) is equal to h(q) Recall that f(p q) = g(p) g(p) Thus the Fourier transform of p q is equal to (h(p) h(p)) + (g(p) g(p)) (h(q) h(q))
22 FFT Correctness (continued) Thus far we have shown that the Fourier transform of p q is equal to (a a) + (c c) (b b) where a = h(p), b = h(q), and c = g(p) Because is a pointwise operator, any expression of the form (p q) (r s) is equal to (p r) (q s) Thus the Fourier transform of p q is equal to (a a) + ((c b) ( c b))
23 FFT Correctness (continued) Thus far we have shown that the Fourier transform of p q is equal to (a a) + ((c b) ( c b)) where a = h(p), b = h(q), and c = g(p) Because + is a pointwise operator, any expression of the form (p q) + (r s) is equal to (p + r) (q + s) Thus we can rewrite the preceding expression as (a + c b) (a c b) The latter expression coincides with the definition of h(p q), completing the proof
Error Detection and Correction: Small Applications of Exclusive-Or
Error Detection and Correction: Small Applications of Exclusive-Or Greg Plaxton Theory in Programming Practice, Fall 2005 Department of Computer Science University of Texas at Austin Exclusive-Or (XOR,
More informationError Detection and Correction: Hamming Code; Reed-Muller Code
Error Detection and Correction: Hamming Code; Reed-Muller Code Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Hamming Code: Motivation
More informationFFT: Fast Polynomial Multiplications
FFT: Fast Polynomial Multiplications Jie Wang University of Massachusetts Lowell Department of Computer Science J. Wang (UMass Lowell) FFT: Fast Polynomial Multiplications 1 / 20 Overview So far we have
More informationHomework #2 Solutions Due: September 5, for all n N n 3 = n2 (n + 1) 2 4
Do the following exercises from the text: Chapter (Section 3):, 1, 17(a)-(b), 3 Prove that 1 3 + 3 + + n 3 n (n + 1) for all n N Proof The proof is by induction on n For n N, let S(n) be the statement
More informationRelational Database: Identities of Relational Algebra; Example of Query Optimization
Relational Database: Identities of Relational Algebra; Example of Query Optimization Greg Plaxton Theory in Programming Practice, Fall 2005 Department of Computer Science University of Texas at Austin
More information1 Examples of Weak Induction
More About Mathematical Induction Mathematical induction is designed for proving that a statement holds for all nonnegative integers (or integers beyond an initial one). Here are some extra examples of
More informationCryptography: Joining the RSA Cryptosystem
Cryptography: Joining the RSA Cryptosystem Greg Plaxton Theory in Programming Practice, Fall 2005 Department of Computer Science University of Texas at Austin Joining the RSA Cryptosystem: Overview First,
More informationEquivalence of Regular Expressions and FSMs
Equivalence of Regular Expressions and FSMs Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Regular Language Recall that a language
More informationAnalysis of Algorithms I: Asymptotic Notation, Induction, and MergeSort
Analysis of Algorithms I: Asymptotic Notation, Induction, and MergeSort Xi Chen Columbia University We continue with two more asymptotic notation: o( ) and ω( ). Let f (n) and g(n) are functions that map
More informationPattern Avoidance in Reverse Double Lists
Pattern Avoidance in Reverse Double Lists Marika Diepenbroek, Monica Maus, Alex Stoll University of North Dakota, Minnesota State University Moorhead, Clemson University Advisor: Dr. Lara Pudwell Valparaiso
More informationLecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018
CS17 Integrated Introduction to Computer Science Klein Contents Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018 1 Tree definitions 1 2 Analysis of mergesort using a binary tree 1 3 Analysis of
More informationLECTURE-15 : LOGARITHMS AND COMPLEX POWERS
LECTURE-5 : LOGARITHMS AND COMPLEX POWERS VED V. DATAR The purpose of this lecture is twofold - first, to characterize domains on which a holomorphic logarithm can be defined, and second, to show that
More informationOn Fast Bitonic Sorting Networks
On Fast Bitonic Sorting Networks Tamir Levi Ami Litman January 1, 2009 Abstract This paper studies fast Bitonic sorters of arbitrary width. It constructs such a sorter of width n and depth log(n) + 3,
More informationCSE101: Design and Analysis of Algorithms. Ragesh Jaiswal, CSE, UCSD
Greedy s Greedy s Shortest path Claim 2: Let S be a subset of vertices containing s such that we know the shortest path length l(s, u) from s to any vertex in u S. Let e = (u, v) be an edge such that 1
More informationCorrigendum: The complexity of counting graph homomorphisms
Corrigendum: The complexity of counting graph homomorphisms Martin Dyer School of Computing University of Leeds Leeds, U.K. LS2 9JT dyer@comp.leeds.ac.uk Catherine Greenhill School of Mathematics The University
More informationCPSC 518 Introduction to Computer Algebra Schönhage and Strassen s Algorithm for Integer Multiplication
CPSC 518 Introduction to Computer Algebra Schönhage and Strassen s Algorithm for Integer Multiplication March, 2006 1 Introduction We have now seen that the Fast Fourier Transform can be applied to perform
More informationAlgorithm Analysis Recurrence Relation. Chung-Ang University, Jaesung Lee
Algorithm Analysis Recurrence Relation Chung-Ang University, Jaesung Lee Recursion 2 Recursion 3 Recursion in Real-world Fibonacci sequence = + Initial conditions: = 0 and = 1. = + = + = + 0, 1, 1, 2,
More informationCPSC 518 Introduction to Computer Algebra Asymptotically Fast Integer Multiplication
CPSC 518 Introduction to Computer Algebra Asymptotically Fast Integer Multiplication 1 Introduction We have now seen that the Fast Fourier Transform can be applied to perform polynomial multiplication
More informationCSE 548: Analysis of Algorithms. Lecture 4 ( Divide-and-Conquer Algorithms: Polynomial Multiplication )
CSE 548: Analysis of Algorithms Lecture 4 ( Divide-and-Conquer Algorithms: Polynomial Multiplication ) Rezaul A. Chowdhury Department of Computer Science SUNY Stony Brook Spring 2015 Coefficient Representation
More informationRegular Expressions. Definitions Equivalence to Finite Automata
Regular Expressions Definitions Equivalence to Finite Automata 1 RE s: Introduction Regular expressions are an algebraic way to describe languages. They describe exactly the regular languages. If E is
More informationLecture 3. Frits Beukers. Arithmetic of values of E- and G-function. Lecture 3 E- and G-functions 1 / 20
Lecture 3 Frits Beukers Arithmetic of values of E- and G-function Lecture 3 E- and G-functions 1 / 20 G-functions, definition Definition An analytic function f (z) given by a powerseries a k z k k=0 with
More informationOptimizing the Dimensional Method for Performing Multidimensional, Multiprocessor, Out-of-Core FFTs
Dartmouth College Computer Science Technical Report TR2001-402 Optimizing the Dimensional Method for Performing Multidimensional, Multiprocessor, Out-of-Core FFTs Jeremy T Fineman Dartmouth College Department
More informationMA3232 Summary 5. d y1 dy1. MATLAB has a number of built-in functions for solving stiff systems of ODEs. There are ode15s, ode23s, ode23t, ode23tb.
umerical solutions of higher order ODE We can convert a high order ODE into a system of first order ODEs and then apply RK method to solve it. Stiff ODEs Stiffness is a special problem that can arise in
More informationLower Bounds for Sorting Networks. 1 Introduction
Lower Bounds for Sorting Networks Nabil Kahale 1;2 Tom Leighton 3 Yuan Ma 1;4 C. Greg Plaxton 1;5 Torsten Suel 1;6 Endre Szemeredi 7 Abstract We establish a lower bound of (1:12? o(1)) n log n on the size
More informationThis means that we can assume each list ) is
This means that we can assume each list ) is of the form ),, ( )with < and Since the sizes of the items are integers, there are at most +1pairs in each list Furthermore, if we let = be the maximum possible
More informationMath 40510, Algebraic Geometry
Math 40510, Algebraic Geometry Problem Set 1, due February 10, 2016 1. Let k = Z p, the field with p elements, where p is a prime. Find a polynomial f k[x, y] that vanishes at every point of k 2. [Hint:
More informationLegendre s Equation. PHYS Southern Illinois University. October 18, 2016
Legendre s Equation PHYS 500 - Southern Illinois University October 18, 2016 PHYS 500 - Southern Illinois University Legendre s Equation October 18, 2016 1 / 11 Legendre s Equation Recall We are trying
More informationCSE 421 Algorithms. T(n) = at(n/b) + n c. Closest Pair Problem. Divide and Conquer Algorithms. What you really need to know about recurrences
CSE 421 Algorithms Richard Anderson Lecture 13 Divide and Conquer What you really need to know about recurrences Work per level changes geometrically with the level Geometrically increasing (x > 1) The
More information1 Basic Definitions. 2 Proof By Contradiction. 3 Exchange Argument
1 Basic Definitions A Problem is a relation from input to acceptable output. For example, INPUT: A list of integers x 1,..., x n OUTPUT: One of the three smallest numbers in the list An algorithm A solves
More informationAdvanced Counting Techniques. Chapter 8
Advanced Counting Techniques Chapter 8 Chapter Summary Applications of Recurrence Relations Solving Linear Recurrence Relations Homogeneous Recurrence Relations Nonhomogeneous Recurrence Relations Divide-and-Conquer
More informationPairs of a tree and a nontree graph with the same status sequence
arxiv:1901.09547v1 [math.co] 28 Jan 2019 Pairs of a tree and a nontree graph with the same status sequence Pu Qiao, Xingzhi Zhan Department of Mathematics, East China Normal University, Shanghai 200241,
More informationThe Littlewood-Richardson Rule
REPRESENTATIONS OF THE SYMMETRIC GROUP The Littlewood-Richardson Rule Aman Barot B.Sc.(Hons.) Mathematics and Computer Science, III Year April 20, 2014 Abstract We motivate and prove the Littlewood-Richardson
More informationAn Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees
An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees Francesc Rosselló 1, Gabriel Valiente 2 1 Department of Mathematics and Computer Science, Research Institute
More informationChapter 1 Divide and Conquer Algorithm Theory WS 2016/17 Fabian Kuhn
Chapter 1 Divide and Conquer Algorithm Theory WS 2016/17 Fabian Kuhn Formulation of the D&C principle Divide-and-conquer method for solving a problem instance of size n: 1. Divide n c: Solve the problem
More informationABSTRACT NONSINGULAR CURVES
ABSTRACT NONSINGULAR CURVES Affine Varieties Notation. Let k be a field, such as the rational numbers Q or the complex numbers C. We call affine n-space the collection A n k of points P = a 1, a,..., a
More informationFactorization in Polynomial Rings
Factorization in Polynomial Rings Throughout these notes, F denotes a field. 1 Long division with remainder We begin with some basic definitions. Definition 1.1. Let f, g F [x]. We say that f divides g,
More informationGame Theory. Greg Plaxton Theory in Programming Practice, Spring 2004 Department of Computer Science University of Texas at Austin
Game Theory Greg Plaxton Theory in Programming Practice, Spring 2004 Department of Computer Science University of Texas at Austin Bimatrix Games We are given two real m n matrices A = (a ij ), B = (b ij
More informationCTL Model Checking. Prof. P.H. Schmitt. Formal Systems II. Institut für Theoretische Informatik Fakultät für Informatik Universität Karlsruhe (TH)
CTL Model Checking Prof. P.H. Schmitt Institut für Theoretische Informatik Fakultät für Informatik Universität Karlsruhe (TH) Formal Systems II Prof. P.H. Schmitt CTLMC Summer 2009 1 / 26 Fixed Point Theory
More informationCHAPTER 8: EXPLORING R
CHAPTER 8: EXPLORING R LECTURE NOTES FOR MATH 378 (CSUSM, SPRING 2009). WAYNE AITKEN In the previous chapter we discussed the need for a complete ordered field. The field Q is not complete, so we constructed
More informationIntroduction to Algorithms
Introduction to Algorithms (2 nd edition) by Cormen, Leiserson, Rivest & Stein Chapter 3: Growth of Functions (slides enhanced by N. Adlai A. DePano) Overview Order of growth of functions provides a simple
More information5 Structure of 2-transitive groups
Structure of 2-transitive groups 25 5 Structure of 2-transitive groups Theorem 5.1 (Burnside) Let G be a 2-transitive permutation group on a set Ω. Then G possesses a unique minimal normal subgroup N and
More informationHarmonic Analysis. 1. Hermite Polynomials in Dimension One. Recall that if L 2 ([0 2π] ), then we can write as
Harmonic Analysis Recall that if L 2 ([0 2π] ), then we can write as () Z e ˆ (3.) F:L where the convergence takes place in L 2 ([0 2π] ) and ˆ is the th Fourier coefficient of ; that is, ˆ : (2π) [02π]
More informationMATH 802: ENUMERATIVE COMBINATORICS ASSIGNMENT 2
MATH 80: ENUMERATIVE COMBINATORICS ASSIGNMENT KANNAPPAN SAMPATH Facts Recall that, the Stirling number S(, n of the second ind is defined as the number of partitions of a [] into n non-empty blocs. We
More informationRandomized Smoothing Networks
Randomized Smoothing Netorks Maurice Herlihy Computer Science Dept., Bron University, Providence, RI, USA Srikanta Tirthapura Dept. of Electrical and Computer Engg., Ioa State University, Ames, IA, USA
More informationExercises for Unit VI (Infinite constructions in set theory)
Exercises for Unit VI (Infinite constructions in set theory) VI.1 : Indexed families and set theoretic operations (Halmos, 4, 8 9; Lipschutz, 5.3 5.4) Lipschutz : 5.3 5.6, 5.29 5.32, 9.14 1. Generalize
More informationA Classification of Integral Apollonian Circle Packings
A Classification of Integral Apollonian Circle Pacings Tabes Bridges Warren Tai Advised by: Karol Koziol 5 July 011 Abstract We review the basic notions related to Apollonian circle pacings, in particular
More informationLines With Many Points On Both Sides
Lines With Many Points On Both Sides Rom Pinchasi Hebrew University of Jerusalem and Massachusetts Institute of Technology September 13, 2002 Abstract Let G be a finite set of points in the plane. A line
More information8 Further theory of function limits and continuity
8 Further theory of function limits and continuity 8.1 Algebra of limits and sandwich theorem for real-valued function limits The following results give versions of the algebra of limits and sandwich theorem
More informationApproximation Algorithms (Load Balancing)
July 6, 204 Problem Definition : We are given a set of n jobs {J, J 2,..., J n }. Each job J i has a processing time t i 0. We are given m identical machines. Problem Definition : We are given a set of
More informationChapter 1 Divide and Conquer Polynomial Multiplication Algorithm Theory WS 2015/16 Fabian Kuhn
Chapter 1 Divide and Conquer Polynomial Multiplication Algorithm Theory WS 2015/16 Fabian Kuhn Formulation of the D&C principle Divide-and-conquer method for solving a problem instance of size n: 1. Divide
More information5th-order differentiation
ARBITRARY-ORDER REAL-TIME EXACT ROBUST DIFFERENTIATION A. Levant Applied Mathematics Dept., Tel-Aviv University, Israel E-mail: levant@post.tau.ac.il Homepage: http://www.tau.ac.il/~levant/ 5th-order differentiation
More informationQuadratic reciprocity and the Jacobi symbol Stephen McAdam Department of Mathematics University of Texas at Austin
Quadratic reciprocity and the Jacobi symbol Stephen McAdam Department of Mathematics University of Texas at Austin mcadam@math.utexas.edu Abstract: We offer a proof of quadratic reciprocity that arises
More informationFast Convolution; Strassen s Method
Fast Convolution; Strassen s Method 1 Fast Convolution reduction to subquadratic time polynomial evaluation at complex roots of unity interpolation via evaluation at complex roots of unity 2 The Master
More informationALTERNATIVE SECTION 12.2 SUPPLEMENT TO BECK AND GEOGHEGAN S ART OF PROOF
ALTERNATIVE SECTION 12.2 SUPPLEMENT TO BECK AND GEOGHEGAN S ART OF PROOF MICHAEL P. COHEN Remark. The purpose of these notes is to serve as an alternative Section 12.2 for Beck and Geoghegan s Art of Proof.
More informationDiscrete Applied Mathematics
Discrete Applied Mathematics 159 (011) 1398 1417 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam Recursive merge sort with erroneous
More informationDIFFERENCE EQUATIONS
Chapter 3 DIFFERENCE EQUATIONS 3.1 Introduction Differential equations are applicable for continuous systems and cannot be used for discrete variables. Difference equations are the discrete equivalent
More informationNearest Neighbor Search with Keywords: Compression
Nearest Neighbor Search with Keywords: Compression Yufei Tao KAIST June 3, 2013 In this lecture, we will continue our discussion on: Problem (Nearest Neighbor Search with Keywords) Let P be a set of points
More informationCompetitive Weighted Matching in Transversal Matroids
Competitive Weighted Matching in Transversal Matroids Nedialko B. Dimitrov and C. Greg Plaxton University of Texas at Austin 1 University Station C0500 Austin, Texas 78712 0233 {ned,plaxton}@cs.utexas.edu
More informationSequences of Real Numbers
Chapter 8 Sequences of Real Numbers In this chapter, we assume the existence of the ordered field of real numbers, though we do not yet discuss or use the completeness of the real numbers. In the next
More informationA necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees
A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees Yoshimi Egawa Department of Mathematical Information Science, Tokyo University of
More informationLinearizing Symmetric Matrix Polynomials via Fiedler pencils with Repetition
Linearizing Symmetric Matrix Polynomials via Fiedler pencils with Repetition Kyle Curlett Maribel Bueno Cachadina, Advisor March, 2012 Department of Mathematics Abstract Strong linearizations of a matrix
More informationAlgorithms Exam TIN093 /DIT602
Algorithms Exam TIN093 /DIT602 Course: Algorithms Course code: TIN 093, TIN 092 (CTH), DIT 602 (GU) Date, time: 21st October 2017, 14:00 18:00 Building: SBM Responsible teacher: Peter Damaschke, Tel. 5405
More information18. Cyclotomic polynomials II
18. Cyclotomic polynomials II 18.1 Cyclotomic polynomials over Z 18.2 Worked examples Now that we have Gauss lemma in hand we can look at cyclotomic polynomials again, not as polynomials with coefficients
More informationOptimal Conclusive Sets for Comparator Networks
Optimal Conclusive Sets for Comparator Networks Guy Even Tamir Levi Ami Litman January 25, 2007 Abstract A set of input vectors S is conclusive if correct functionality for all input vectors is implied
More informationCSCE 750 Final Exam Answer Key Wednesday December 7, 2005
CSCE 750 Final Exam Answer Key Wednesday December 7, 2005 Do all problems. Put your answers on blank paper or in a test booklet. There are 00 points total in the exam. You have 80 minutes. Please note
More informationProduct measures, Tonelli s and Fubini s theorems For use in MAT4410, autumn 2017 Nadia S. Larsen. 17 November 2017.
Product measures, Tonelli s and Fubini s theorems For use in MAT4410, autumn 017 Nadia S. Larsen 17 November 017. 1. Construction of the product measure The purpose of these notes is to prove the main
More informationDescents in Parking Functions
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 21 (2018), Article 18.2.3 Descents in Parking Functions Paul R. F. Schumacher 1512 Oakview Street Bryan, TX 77802 USA Paul.R.F.Schumacher@gmail.com Abstract
More informationarxiv: v1 [math.ra] 13 Jan 2009
A CONCISE PROOF OF KRUSKAL S THEOREM ON TENSOR DECOMPOSITION arxiv:0901.1796v1 [math.ra] 13 Jan 2009 JOHN A. RHODES Abstract. A theorem of J. Kruskal from 1977, motivated by a latent-class statistical
More informationIntroduction to Divide and Conquer
Introduction to Divide and Conquer Sorting with O(n log n) comparisons and integer multiplication faster than O(n 2 ) Periklis A. Papakonstantinou York University Consider a problem that admits a straightforward
More information3 Integration and Expectation
3 Integration and Expectation 3.1 Construction of the Lebesgue Integral Let (, F, µ) be a measure space (not necessarily a probability space). Our objective will be to define the Lebesgue integral R fdµ
More informationInteger Sorting on the word-ram
Integer Sorting on the word-rm Uri Zwick Tel viv University May 2015 Last updated: June 30, 2015 Integer sorting Memory is composed of w-bit words. rithmetical, logical and shift operations on w-bit words
More informationThe Skorokhod reflection problem for functions with discontinuities (contractive case)
The Skorokhod reflection problem for functions with discontinuities (contractive case) TAKIS KONSTANTOPOULOS Univ. of Texas at Austin Revised March 1999 Abstract Basic properties of the Skorokhod reflection
More informationAdmissible Monomials (Lecture 6)
Admissible Monomials (Lecture 6) July 11, 2008 Recall that we have define the big Steenrod algebra A Big to be the quotient of the free associated F 2 - algebra F 2 {..., Sq 1, Sq 0, Sq 1,...} obtained
More informationPart III, Sequences and Series CS131 Mathematics for Computer Scientists II Note 16 RECURRENCES
CS131 Part III, Sequences and Series CS131 Mathematics for Computer Scientists II Note 16 RECURRENCES A recurrence is a rule which defines each term of a sequence using the preceding terms. The Fibonacci
More informationComputing Posterior Probabilities. Vassilis Athitsos CSE 4308/5360: Artificial Intelligence I University of Texas at Arlington
Computing Posterior Probabilities Vassilis Athitsos CSE 4308/5360: Artificial Intelligence I University of Texas at Arlington 1 Overview of Candy Bag Example As described in Russell and Norvig, for Chapter
More informationDivide and Conquer. Recurrence Relations
Divide and Conquer Recurrence Relations Divide-and-Conquer Strategy: Break up problem into parts. Solve each part recursively. Combine solutions to sub-problems into overall solution. 2 MergeSort Mergesort.
More informationFINITELY-GENERATED ABELIAN GROUPS
FINITELY-GENERATED ABELIAN GROUPS Structure Theorem for Finitely-Generated Abelian Groups Let G be a finitely-generated abelian group Then there exist a nonnegative integer t and (if t > 0) integers 1
More informationDivide and Conquer. Maximum/minimum. Median finding. CS125 Lecture 4 Fall 2016
CS125 Lecture 4 Fall 2016 Divide and Conquer We have seen one general paradigm for finding algorithms: the greedy approach. We now consider another general paradigm, known as divide and conquer. We have
More informationCh6 Addition Proofs of Theorems on permutations.
Ch6 Addition Proofs of Theorems on permutations. Definition Two permutations ρ and π of a set A are disjoint if every element moved by ρ is fixed by π and every element moved by π is fixed by ρ. (In other
More informationLower Bounds for Shellsort. April 20, Abstract. We show lower bounds on the worst-case complexity of Shellsort.
Lower Bounds for Shellsort C. Greg Plaxton 1 Torsten Suel 2 April 20, 1996 Abstract We show lower bounds on the worst-case complexity of Shellsort. In particular, we give a fairly simple proof of an (n
More informationOn m-ary Overpartitions
On m-ary Overpartitions Øystein J. Rødseth Department of Mathematics, University of Bergen, Johs. Brunsgt. 1, N 5008 Bergen, Norway E-mail: rodseth@mi.uib.no James A. Sellers Department of Mathematics,
More informationContinuous Solutions of a Functional Equation Involving the Harmonic and Arithmetic Means
Continuous Solutions o a Functional Equation Involving the Harmonic and Arithmetic Means Rebecca Whitehead and Bruce Ebanks aculty advisor) Department o Mathematics and Statistics Mississippi State University
More informationAdvanced Counting Techniques
. All rights reserved. Authorized only for instructor use in the classroom. No reproduction or further distribution permitted without the prior written consent of McGraw-Hill Education. Advanced Counting
More informationThe Uniformization Theorem. Donald E. Marshall
The Uniformization Theorem Donald E. Marshall The Koebe uniformization theorem is a generalization of the Riemann mapping Theorem. It says that a simply connected Riemann surface is conformally equivalent
More informationLECTURE 22: COUNTABLE AND UNCOUNTABLE SETS
LECTURE 22: COUNTABLE AND UNCOUNTABLE SETS 1. Introduction To end the course we will investigate various notions of size associated to subsets of R. The simplest example is that of cardinality - a very
More informationLecture 04: Secret Sharing Schemes (2) Secret Sharing
Lecture 04: Schemes (2) Recall: Goal We want to Share a secret s Z p to n parties, such that {1,..., n} Z p, Any two parties can reconstruct the secret s, and No party alone can predict the secret s Recall:
More informationThe Fast Fourier Transform
The Fast Fourier Transform 1 Motivation: digital signal processing The fast Fourier transform (FFT) is the workhorse of digital signal processing To understand how it is used, consider any signal: any
More informationHamiltonian paths in tournaments A generalization of sorting DM19 notes fall 2006
Hamiltonian paths in tournaments A generalization of sorting DM9 notes fall 2006 Jørgen Bang-Jensen Imada, SDU 30. august 2006 Introduction and motivation Tournaments which we will define mathematically
More informationFFTs in Graphics and Vision. Homogenous Polynomials and Irreducible Representations
FFTs in Graphics and Vision Homogenous Polynomials and Irreducible Representations 1 Outline The 2π Term in Assignment 1 Homogenous Polynomials Representations of Functions on the Unit-Circle Sub-Representations
More informationDesign and Analysis of Algorithms March 12, 2015 Massachusetts Institute of Technology Profs. Erik Demaine, Srini Devadas, and Nancy Lynch Quiz 1
Design and Analysis of Algorithms March 12, 2015 Massachusetts Institute of Technology 6.046J/18.410J Profs. Erik Demaine, Srini Devadas, and Nancy Lynch Quiz 1 Quiz 1 Do not open this quiz booklet until
More informationSUBSPACE LATTICES OF FINITE VECTOR SPACES ARE 5-GENERATED
SUBSPACE LATTICES OF FINITE VECTOR SPACES ARE 5-GENERATED LÁSZLÓ ZÁDORI To the memory of András Huhn Abstract. Let n 3. From the description of subdirectly irreducible complemented Arguesian lattices with
More informationCSE548, AMS542: Analysis of Algorithms, Fall 2017 Date: October 11. In-Class Midterm. ( 7:05 PM 8:20 PM : 75 Minutes )
CSE548, AMS542: Analysis of Algorithms, Fall 2017 Date: October 11 In-Class Midterm ( 7:05 PM 8:20 PM : 75 Minutes ) This exam will account for either 15% or 30% of your overall grade depending on your
More informationFind an Element x in an Unsorted Array
Find an Element x in an Unsorted Array What if we try to find a lower bound for the case where the array is not necessarily sorted? J.-L. De Carufel (U. of O.) Design & Analysis of Algorithms Fall 2017
More informationAutomorphism groups of wreath product digraphs
Automorphism groups of wreath product digraphs Edward Dobson Department of Mathematics and Statistics Mississippi State University PO Drawer MA Mississippi State, MS 39762 USA dobson@math.msstate.edu Joy
More informationA first order divided difference
A first order divided difference For a given function f (x) and two distinct points x 0 and x 1, define f [x 0, x 1 ] = f (x 1) f (x 0 ) x 1 x 0 This is called the first order divided difference of f (x).
More informationDivide and Conquer algorithms
Divide and Conquer algorithms Another general method for constructing algorithms is given by the Divide and Conquer strategy. We assume that we have a problem with input that can be split into parts in
More informationLecture 9: Dynamics in Load Balancing
Computational Game Theory Spring Semester, 2003/4 Lecture 9: Dynamics in Load Balancing Lecturer: Yishay Mansour Scribe: Anat Axelrod, Eran Werner 9.1 Lecture Overview In this lecture we consider dynamics
More informationSection II.2. Finitely Generated Abelian Groups
II.2. Finitely Generated Abelian Groups 1 Section II.2. Finitely Generated Abelian Groups Note. In this section we prove the Fundamental Theorem of Finitely Generated Abelian Groups. Recall that every
More informationChapter 2: Real solutions to univariate polynomials
Chapter 2: Real solutions to univariate polynomials Before we study the real solutions to systems of multivariate polynomials, we will review some of what is known for univariate polynomials. The strength
More information13 More on free abelian groups
13 More on free abelian groups Recall. G is a free abelian group if G = i I Z for some set I. 13.1 Definition. Let G be an abelian group. A set B G is a basis of G if B generates G if for some x 1,...x
More information