On Network Coding of Independent and Dependent Sources in Line Networks
|
|
- Antony Francis
- 6 years ago
- Views:
Transcription
1 On Network Codng of Independent and Dependent Sources n Lne Networks Mayank Baksh, Mchelle Effros, WeHsn Gu, Ralf Koetter Department of Electrcal Engneerng Department of Electrcal Engneerng Calforna Insttute of Technology Unversty of Illnos at Urbana-Champagn Pasadena, Calforna, CA 95, USA Urbana, IL 680, USA Emal: {mayank, effros, wgu}@caltech.edu Emal: koetter@uuc.edu Abstract We nvestgate the network codng capacty for lne networks. For ndependent sources and a specal class of dependent sources, we fully characterze the capacty regon of lne networks for all possble demand structures (e.g., multple uncast, mxtures of uncasts and multcasts, etc.) Our achevablty bound s derved by frst decomposng a lne network nto sngle-demand components and then addng the component rate regons to get rates for the parent network. For general dependent sources, we gve an achevablty result and provde examples where the result s and s not tght. I. INTRODUCTION To date, the feld of network codng has focused prmarly on fndng solutons for famles of problems defned by a broad class of networks (e.g., networks representable by drected, acyclc graphs) and a narrow class of demands (e.g., multcast or multple uncast demands). We here nvestgate a famly of network codng problems defned by a completely general demand structure and a narrow famly of networks. Precsely, we gve the complete soluton to the problem of network codng wth ndependent sources and arbtrary demands on a drected lne network. We then generalze that soluton to accommodate specal cases of dependent sources. Theorem summarzes those results. Theorem : Gven an n-node lne network N (shown n Fg. ) wth memoryless sources,..., n and demands,..., n satsfyng H(,..., ) 0 for all {,..., n}, the rate vector (R,..., R n ) s achevable f and only f, for < n, R H( j +,..., j, +,..., j ), () j+ provded one of the followng condtons holds: A. Sources,..., n are ndependent and each s a subset of the sources,...,. B. Sources,..., n have arbtrary dependences and each s ether a constant or the vector (,..., n ). C. Each source s a (potentally) dstnct subset of ndependent sources W,..., W k and each demand s any subset of those W,..., W k that appear n,...,. Lemmas 3, 4, and 5 of Sectons III-B, III-C, and III-D gve formal statements and proofs of ths result under condtons A, B, and C, respectvely. Case B s the multcast result of [] 3 n n R R R n n 3 Fg.. An n-node lne network wth sources,..., n and demands,..., n generalzed to many sources and specalzed to lne networks. We nclude a new proof of ths result for ths specal case as t provdes an mportant example n developng our approach. Central to our dscusson s a formal network decomposton descrbed n Secton II. The decomposton breaks an arbtrary lne network nto a famly of component lne networks. Each component network preserves the orgnal node demands at exactly one node and assumes that all demands at pror nodes n the lne network have already been met. (See Fg. for an llustraton. Formal defntons follow n Secton II.) Sequentally applyng the component network solutons n the parent network to meet frst the frst node s demands, then the second node s demands assumng that the frst node s demands are met, and so on, acheves a rate equal to the sum of the rates on the component networks. The gven soluton always yelds an achevablty result. The proofs of Lemmas 3, 4, and 5 addtonally demonstrate that the gven achevablty result s tght under each of condtons A, B, and C. Theorem shows that the achevablty result gven by our addtve soluton s tght for an extremely broad class of sources and demands n 3-node lne networks. In partcular, ths result allows arbtrary dependences between the sources and also allows demands that can be (restrcted) functons of those sources (rather than smply the sources themselves). The form of our soluton lends nsght nto the types of codng suffcent to acheve optmal performance n the gven famles of problems. Prmary among these are entropy codes, ncludng Slepan-Wolf codes for examples wth dependent courses. These codes can be mplemented, for example, usng lnear encoders and typcal set or mnmum entropy decoders []. The other feature llustrated by our decomposton s the need to retreve nformaton from the nearest precedng node where t s avalable (whch may be a snk), thereby n n n
2 avodng sendng multple copes of the same nformaton over any lnk (as can happen n pure routng solutons). Unfortunately, the gven decomposton fals to capture all of the nformaton known to pror nodes n some cases, and thus the achevablty result gven by the addtve constructon s not tght n general. Theorem 3 gves a 3-node network where the bound s provably loose. The falure of addtvty n ths functonal source codng example arses snce the component network decomposton fals to capture nformaton that ntermedate nodes can learn beyond ther explct demands. The same problem can also be replcated n a 4-node network, where all demands also appear as sources n the network. Theorem 4 shows that the gap between the addtve soluton and the optmal soluton can be large. II. PRELIMINARIES The followng notaton s useful n the dscusson that follows. For random varables A,..., A n, set S {,..., n}, and ndces, j {,..., n}, A S (A : S) and A j (A,..., A j ) denote vectors of A varables and A j ( m) (A j (),..., Aj (m)) denotes consecutve samples of Aj. An n-node lne network (N, n, n ) s a drected graph N (V, E) wth V {,..., n} and E {(, ),..., (n, n)}, as shown n Fg.. Node observes source and requres demand. The random process ( n ( ), n ( )) s drawn..d. accordng to probablty mass functon p(x n, y n ). A rate allocaton for the n- node lne network N s a vector (R : < n), where R s the rate on lnk (, + ). We assume that there are no errors on any of the lnks. Lne networks have been studed earler n the context of relable communcaton (e.g., [3]). A smple lne network s a lne network wth exactly one demand ( c at all but one node n the network). We next defne the component networks N,..., N n for an n-node lne network N wth sources n and demands n. (See Fg..) For each n, component N s an -node smple lne network. For each j <, the source and demand at node j of network N j are () j ( j, ) and () j c, respectvely; the source and demand at node are ()... and (). 3 n n R R R n N N N n R 3 n n Fg.. Component networks n n III. RESULTS A. Cutset bounds and Lne Networks Lemmas and relate the cutset bound to the achevable rate regon. Lemma : In an n-node lne network (N, n, n ), the cutset bounds are satsfed f and only f R max H( j + j+ j + ) < n () Proof: The reverse part s mmedate snce () s a subset of the cutset bounds. For the forward part, let (R : < n) satsfy (), and let T be a cut. Each cut s a unon of ntervals (T l kt (k) wth T (k) {m(k),..., m(k)+l(k) } {,..., n} and m(k ) + l(k ) < m(k)). Then, k R m(k) k max j0 m(k)+j H(m(k) m(k)+j m(k) ) H( T (k) T (k) ) k H( T T ). (3) Snce T s arbtrary, (3) gves the cutset bounds. Lemma : Let (N, 3, 3 ) be a 3-node lne network for whch the cutset bounds are tght on each of the component networks. Then, the achevable rate regon s the set R {(R, R ) : R > R m }, where R m H( ) + H( 3 3, ), R m H( 3 3 ). Proof: Converse: Let C and C be rate R and R m- dmensonal codes for lnks (, ) and (, 3) of N, and suppose (/m)h( ( m) ( m), C ) ɛ. Then, mr H(C ) mh( 3 3 ), mr H(C ) H( ( m), C ( m)) Now, mh( ) + H(C ( m), ( m)). H(C ( m), ( m)) I(C ; 3 ( m) ( 3, )( m)) mh( 3 3, ) H( 3 ( m) C, 3 ( m)) mh( 3, 3 ) mɛ. So R H( )+H( 3 3, ) ɛ and R H( 3 3 ), mplyng that by pckng arbtrarly small ɛ, (R, R ) R. and H(C C ) < ɛ. Achevablty: Let R R m + ɛ. Snce the cutset bound s tght on the components N and N 3 for suffcently large m, there exst m-dmensonal codes C, C, 3 and C 3 for the lnks (, ) n N, (, ) n N 3, and (, 3) n N 3 for whch m H(C ) H( ) + ɛ 3, (4) m H(C3 ) H( 3 3, ) + ɛ 3, (5) m H(C3 ) H( 3 3 ) + ɛ 3, (6)
3 and m H( ( m) ( m), C ) 3 for, 3. Let C CC 3 and C C. 3 Then, (C, C ) s a code for N satsfyng m H(C ) < R for, 3, m H( ( m) ( m), C ) < ɛ for,, and H(C C ) < ɛ. Thus, (C, C ) acheves rate (R, R ). B. Independent sources, arbtrary demands Lemma 3: Consder an n-node lne network (N, n, n ) wth n ndependent and D(), D() {,..., } for each n. Then, the rate regon s fully characterzed by the cutset bounds. In partcular, R H( jk+ D()\{k+,...,n}) < n s achevable. Proof: Let Q(, k) jk D(j). By Lemma, the cut-set bound gves R max k H( Q(,k), k +) max max k k H( Q(,k)\{,...,k}) j Q(,k)\{,...,k} H( j ). (7) Snce D() {,..., }, Q(, k) {,..., k} and Q(, k) \ {,..., k} Q(, k + ) \ {,..., k + }. Thus (7) becomes H( j ). R j Q(,n)\{,...,n} We wsh to acheve ths bound by codng for the component networks separately. Let R H( Q(+,n)\{+,...,n} ) + ɛ for < n. Snce the demand n network N j s D(j), by calculatng the demand across the varous lnks startng from the very last lnk, the followng rate allocaton s feasble: R j j H( D(j)\{j} ) + ɛ n R j j H( (D(j)\{j})\(D(j ) {j }) ) + ɛ n H( D(j)\({j,j} Q(j,j )) ) + ɛ n. R j H( D(j)\({,...,j} Q(,j )) ) + ɛ n. Addng the rates from component networks gves R j H( D(j)\({+,...,j} Q(+,j )) ) + ɛ n j+ j+ j+ j+ H( D(j)\({+,...,n} Q(+,j )) ) + ɛ n H( (D(j)\Q(+,j ))\{+,...,n} ) + ɛ n H( ( n j+ D(j))\{+,...,n}) + ɛ H( Q(+,n)\{+,...,n} ) + ɛ R C. Dependent sources, multcast Lemma 4: Let (N, n, n ) be an n-node lne network wth n arbtrarly dependent and n feasble multcast demands ( c or n for each ). Then Theorem holds. Proof: Let M{ n : n } be the multcast recevers. We denote the vertces of M by {m,..., m k }, where m < m j when < j. For each n, let d() mn{m M : m > }. Consder an achevable rate allocaton (R : < n) for N. For any < n, the cutset bound on R s tghtest possble f we choose the set of vertces for the cutset to be the set { +,..., d()}. Ths s true because addng extra vertces to ths set adds addtonal sources to t wthout ncreasng the set of demands. Therefore, for all < n, R H( n d() + ) H(d() d() + ) H( d() + ) (8) where the frst equalty follows snce H( n d() ) 0 as the demand s feasble for the network. Next, we show that for the component networks {N j } jn, there exst rate allocatons {(R j : j )} n j whch come arbtrarly close to satsfyng the above bounds wth equalty. Observe that t suffces to restrct our attenton to the networks {N j } j M. Fx ɛ > 0 and consder any m M. When, t suffces to encode j at rate H( j m j+ )+ ɛ/n [4]. Summng the over all sources that use use lnk (r, r+ ) rate achevable rate R m r R m r r j for network N m, where H( j m j+ ) + ɛ n H( r m r+ ) + ɛ H( r d(r) r+ ) + ɛ. (9) When >, n are avalable at the node m. Hence, the rate requred over the lnk (r, r + ) s zero for all r < m. for m r < m, [4] agan gves r Rr m H( n m m ) + + H( j m j+ ) + ɛ n H( r m r+ ) + ɛ jm + H( r d(r) r+ ) + ɛ. (0) Fnally, addng the rates over component networks gves R j Rd() H( d() + ) + ɛ R + ɛ. j+ Ths shows that the cutset bound n (8) s tght and s achevable by the approach based on component networks. Further, each R j s of the form H( j j +, j + ). D. A class of dependent sources wth dependent demands In ths secton, we consder sources and demands that are dependent n the followng way. We assume the exstence of underlyng ndependent sources W k such that the sources are W S() and the demands are W D() for n for {S()} n and {D()}n subsets of {,..., k}. In order
4 for the demands to be feasble, we requre D() j S(j) for each n. Lemma 5 characterzes the rate regon for lne networks wth the above knd of sources and demands. We need the followng notaton n order to state the lemma. For j < n, defne d (j) and s (j) as the frst occurrence after the vertex j of W n a demand and source respectvely. Lemma 5: Let (N, n, n ) be an n-node lne network wth W S() and W D() as defned above. Then the achevable rate regon s R j :s (j)>d (j) H(W ) j < n. Proof: We proceed by frst decomposng the network N nto k dfferent networks {N } k, each correspondng to a dfferent W out W k. For each k and A {,..., k}, let A W f A and A c otherwse. Let N be an n-node lne network wth sources S(),..., S(n) and demands D(),..., D(n). Note that each N s a lne network n whch both the sources and demands are ether W or constant. By result of Sec. III-C, t follows that the cutset bound s tght for such network and the rate allocaton (R j, : j < n}), defned by R j, { H(W ) f s (j) > d (j) 0 otherwse s achevable. Thus, for the parent network N, the rate allocaton (R j : j {,..., n}) s achevable, where R j k R j,. Further, as all the sources are ndependent, ths approach s optmal. Therefore, the rate regon for the network N s gven by all (R j : j {,..., n}) such that R j :s (j)>d (j) H(W ). Next, we show that the same can be obtaned by decomposng N nto smple networks N,..., N n. To ths end, we frst decompose the network N nto smple networks N,..., Nn, notng that the mnmum rate Rj, l requred for the lnk (j, j + ) n Nl s 0 f there s a demand or a source present n one of the nodes j +,..., l and H(W ) otherwse. Hence, Rj, l H( D(l) S(j+),..., S(l), D(j+),..., D(l ) ). Ths s an optmal decomposton, snce R j, Rj,. l lj+ Addng the rates over components N, R l j R l j, H( D(l) l tj+ S(t), l tj+ D(t)) H( D(l) l tj+, l tj+ D(t) ) () s achevable for N l. Fnally, note that lj+ R l j lj+ Rj, l R j, R j. Thus the rates for N can also be obtaned by summng lnkwse the rates for the component networks. By (), the sum s of the form clamed n Theorem -C. E. 3-node lne networks wth dependent sources We now restrct our attenton to 3-node lne networks of the knd shown n Fg. 3. Sources 3 are arbtrarly dependent and ther alphabets are fnte; demands 3 take the form f( ) and 3 g( 3 ) for some f : and g : 3. The followng result shows the tghtness of our decomposton appoach n ths case. Theorem : Gven ɛ > 0, for every rate vector (R, R ) achevable for N, there exst achevable rate allocatons R and (R, 3 R) 3 for component networks N and N 3 such that R + R 3 < R + ɛ and R 3 R + ɛ. 3 Fg. 3. f( ) g(,, ) 3 3 The three node lne network Proof: Let (R, R ) be achevable for N. Then, for m large enough, there exst codes (a m, b m ) for the frst and second lnk, respectvely such that (/m)h(a m ( ( m))) < R + ɛ, (/m)h(b m (a m ( ( m)))) < R + ɛ, and P r(ŷ 3 ( m) 3 ( m)) < ɛ. Let B m (k) b m (a m ( (m(k )+ mk))), F m (k) (f( (m(k )+),..., f( (mk))),,m (k) (m(k ) + mk). Allowng a probablty of error ɛ, the problem of codng for the network N can be reformulated as a functonal source codng problem for the network N () wth sources, and, and the demand (F, B ) as shown n Fg 4. Pror results on functonal codng ([5], [6], [7]) can Fg. 4.,, F An equvalent functonal codng problem now be appled. Specfcally, by evaluatng the functonal rate dstorton functon n [6], [7] at zero dstorton, the mnmal rate at whch, can be coded s gven by R nf b, I(, ;,, ) B
5 where, the nfmum s over the set P consstng of all, for whch,,, forms a Markov chan and H(F, B,,, ) 0. We show that the above rate can be splt nto two parts - the rate requred to to encode, so as to reconstruct F wth, as the sde nformaton, and the rate requred to be able to reconstruct B wth, and F as the sde nformaton. To ths end, let F,B P. Then, the followng hold: I( F,B ;,, ) I( F,B, F ;,, ) I(F ;,,, F,B ) I( F,B, F ;,, ) H( F,B, F, ) H( F,B, F,,, ) H( F,B, F, ) H( F,B,,,,, F ) H(F, ) + H( F,B F,, ) H( F,B,,,,, F ) H(F, ) + I( F,B ;, F,, ). () Snce F s a functon of,, H(F, ) s an achevable rate for the network N. Further, snce F,B P, t follows that F,B, (F,, ) s a Markov chan. Combnng t wth the fact that, H(B ) F,B,,, F ) 0, we note that I( F,B ;, F,, ) s a suffcent rate for functonal source codng wth regards to the functon B gven, and F as the sde nformaton. Therefore, ( I( F,B;, F,, ), H(B )) s an achevable rate for the network N 3, hence provng the theorem. F. Networks where addtvty does not hold Theorem 3: There exsts a 3-node network (N, 3, 3 ), for whch addng the best rate allocatons from the component networks does not yeld an optmal code. Proof: Consder the example shown n Fg. 5(a). Rate 3 f(,) (a) Rate (b) f(,) Fg. 5. (a) A set of achevable rates for N. (b) An optmal rate allocaton for component N. Let be dstrbuted unformly on {0, } and be ndependently dstrbuted unformly on {0,,, 3}. Let { 0 (x, y) {(0, 0), (0, ), (, ), (, )} f(x, y) (x, y) {(0, ), (0, 3), (, 0), (, 3)} Fg. 5(a) shows an achevable rate allocaton that can be acheved by the transmttng over both lnks. We next show that best possble rateallocaton achevable by optmzng over the achevable rate regons of the component networks s strctly greater than the above rate allocaton. To ths end, consder N (see Fg. 5(b)). By [5], the best possble rate on lnk (,) s. To prove our clam, t suffces to show that the rate requred over lnk (, ) N s non-zero. Ths follows because H(, f(, )) > 0, and the cutset bound requres at least rate H(, f(, )) > 0 across lnk (, ). Theorem 4: For any n 3, there exsts a n-node network (N, n, n ), such that for any achevable (R j : < j) for N j, there exsts an achevable (R : < n) for N wth j+ R j > R + Ω(n). Proof: Let and be ndependent sources unformly dstrbuted over {0, } and {0,..., n} respectvely. Defne f : {0, } {0,..., n} {0,..., n} as { y f y {,..., n } f(x, y) x f y n Consder the n-node lne network (N, n, n ), where, 3..., n, n c, and f(, ( ) for n. By the functonal source codng bound, the rate requred on each lnk of the -th component s at least. Ths rate s acheved by sendng on all the lnks. Thus, n j+ Rj n. In contrast, rate s suffcent for network N (sendng over all the lnks). Therefore, n j+ Rj R n. The left sde s at most O(n) for a network wth n components. Hence, n j+ Rj R Ω(n). ACKNOWLEDGMENT Ths materal s based upon work partally supported by NSF Grant Nos. CCF-00039, CCR and Caltech s Lee Center for Advanced Networkng. REFERENCES [] T. Ho, R. Koetter, M. Médard, M. Effros, J. Sh, and D. Karger. A random lnear network codng approach to multcast. IEEE Transactons on Informaton Theory, 5(0): , October 006. [] Imre Csszar. Lnear codes for sources and source networks: Error exponents, unversal codng. IEEE Transactons on Informaton Theory, IT-8:585 59, July 98. [3] P. Pakzad, C. Fragoul, and A. Shokrollah. Codng schemes for lne networks. In Proceedngs of the IEEE Internatonal Symposum on Informaton Theory, Adelade, Australa, September 005. [4] D. Slepan and J. K. Wolf. Noseless codng of correlated nformaton sources. IEEE Transactons on Informaton Theory, IT-9:47 480, 973. [5] A. Orltsky and J. R. Roche. Codng for computng. In IEEE Symposum on Foundatons of Computer Scence, pages 50 5, 995. [6] H. amamoto. Wyner-zv theory for a general functon of correlated sources. IEEE Transactons on Informaton Theory, IT-8(5): , September 98. [7] H. Feng, M. Effros, and S. A. Savar. Functonal source codng for networks wth recever sde nformaton. In Proceedngs of the Allerton Conference on Communcaton, Control, and Computng, Montcello, IL, September 004.
Refined Coding Bounds for Network Error Correction
Refned Codng Bounds for Network Error Correcton Shenghao Yang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong shyang5@e.cuhk.edu.hk Raymond W. Yeung Department
More informationMaximizing the number of nonnegative subsets
Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum
More informationCollege of Computer & Information Science Fall 2009 Northeastern University 20 October 2009
College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:
More informationGames of Threats. Elon Kohlberg Abraham Neyman. Working Paper
Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017
More informationMore metrics on cartesian products
More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of
More informationOn the Correlation between Boolean Functions of Sequences of Random Variables
On the Correlaton between Boolean Functons of Sequences of Random Varables Farhad Shran Chaharsoogh Electrcal Engneerng and Computer Scence Unversty of Mchgan Ann Arbor, Mchgan, 48105 Emal: fshran@umch.edu
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:
More informationIN THE paradigm of network coding, a set of source nodes
4496 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 6, JUNE 2018 Sngle-Uncast Secure Network Codng and Network Error Correcton are as Hard as Multple-Uncast Network Codng Wentao Huang, Tracey Ho,
More informationAssortment Optimization under MNL
Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.
More informationThe Fundamental Theorem of Distributed Storage Systems Revisited
The Fundamental Theorem of Dstrbuted Storage Systems Revsted Png Hu Department of Electronc Engneerng Cty Unversty of Hong Kong Emal: png.hu@my.ctyu.edu.h Kenneth W. Shum Insttute of Networ Codng the Chnese
More informationProblem Set 9 Solutions
Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem
More informationThe lower and upper bounds on Perron root of nonnegative irreducible matrices
Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College
More informationThe Order Relation and Trace Inequalities for. Hermitian Operators
Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence
More informationNP-Completeness : Proofs
NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem
More informationAffine transformations and convexity
Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/
More informationAppendix B. Criterion of Riemann-Stieltjes Integrability
Appendx B. Crteron of Remann-Steltes Integrablty Ths note s complementary to [R, Ch. 6] and [T, Sec. 3.5]. The man result of ths note s Theorem B.3, whch provdes the necessary and suffcent condtons for
More informationn ). This is tight for all admissible values of t, k and n. k t + + n t
MAXIMIZING THE NUMBER OF NONNEGATIVE SUBSETS NOGA ALON, HAROUT AYDINIAN, AND HAO HUANG Abstract. Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what
More informationRate-Memory Trade-off for the Two-User Broadcast Caching Network with Correlated Sources
Rate-Memory Trade-off for the Two-User Broadcast Cachng Network wth Correlated Sources Parsa Hassanzadeh, Antona M. Tulno, Jame Llorca, Elza Erkp arxv:705.0466v [cs.it] May 07 Abstract Ths paper studes
More informationModule 9. Lecture 6. Duality in Assignment Problems
Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept
More informationECE559VV Project Report
ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate
More informationConnecting Multiple-unicast and Network Error Correction: Reduction and Unachievability
Connectng Multple-uncast and Network Error Correcton: Reducton and Unachevablty Wentao Huang Calforna Insttute of Technology Mchael Langberg Unversty at Buffalo, SUNY Joerg Klewer New Jersey Insttute of
More informationLecture 3: Shannon s Theorem
CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts
More informationRandom Partitions of Samples
Random Parttons of Samples Klaus Th. Hess Insttut für Mathematsche Stochastk Technsche Unverstät Dresden Abstract In the present paper we construct a decomposton of a sample nto a fnte number of subsamples
More informationError Probability for M Signals
Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal
More informationCanonical transformations
Canoncal transformatons November 23, 2014 Recall that we have defned a symplectc transformaton to be any lnear transformaton M A B leavng the symplectc form nvarant, Ω AB M A CM B DΩ CD Coordnate transformatons,
More informationStructure and Drive Paul A. Jensen Copyright July 20, 2003
Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.
More information2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification
E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton
More informationEdge Isoperimetric Inequalities
November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary
More informationPsychology 282 Lecture #24 Outline Regression Diagnostics: Outliers
Psychology 282 Lecture #24 Outlne Regresson Dagnostcs: Outlers In an earler lecture we studed the statstcal assumptons underlyng the regresson model, ncludng the followng ponts: Formal statement of assumptons.
More informationA new construction of 3-separable matrices via an improved decoding of Macula s construction
Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula
More informationDIFFERENTIAL FORMS BRIAN OSSERMAN
DIFFERENTIAL FORMS BRIAN OSSERMAN Dfferentals are an mportant topc n algebrac geometry, allowng the use of some classcal geometrc arguments n the context of varetes over any feld. We wll use them to defne
More informationMin Cut, Fast Cut, Polynomial Identities
Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.
More informationLossy Compression. Compromise accuracy of reconstruction for increased compression.
Lossy Compresson Compromse accuracy of reconstructon for ncreased compresson. The reconstructon s usually vsbly ndstngushable from the orgnal mage. Typcally, one can get up to 0:1 compresson wth almost
More informationMASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.65/15.070J Fall 013 Lecture 1 10/1/013 Martngale Concentraton Inequaltes and Applcatons Content. 1. Exponental concentraton for martngales wth bounded ncrements.
More informationThe Feynman path integral
The Feynman path ntegral Aprl 3, 205 Hesenberg and Schrödnger pctures The Schrödnger wave functon places the tme dependence of a physcal system n the state, ψ, t, where the state s a vector n Hlbert space
More informationNotes on Frequency Estimation in Data Streams
Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to
More informationExercise Solutions to Real Analysis
xercse Solutons to Real Analyss Note: References refer to H. L. Royden, Real Analyss xersze 1. Gven any set A any ɛ > 0, there s an open set O such that A O m O m A + ɛ. Soluton 1. If m A =, then there
More informationAPPENDIX A Some Linear Algebra
APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,
More informationEstimation: Part 2. Chapter GREG estimation
Chapter 9 Estmaton: Part 2 9. GREG estmaton In Chapter 8, we have seen that the regresson estmator s an effcent estmator when there s a lnear relatonshp between y and x. In ths chapter, we generalzed the
More informationCSCE 790S Background Results
CSCE 790S Background Results Stephen A. Fenner September 8, 011 Abstract These results are background to the course CSCE 790S/CSCE 790B, Quantum Computaton and Informaton (Sprng 007 and Fall 011). Each
More informationLecture 12: Discrete Laplacian
Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly
More informationECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006)
ECE 534: Elements of Informaton Theory Solutons to Mdterm Eam (Sprng 6) Problem [ pts.] A dscrete memoryless source has an alphabet of three letters,, =,, 3, wth probabltes.4,.4, and., respectvely. (a)
More informationU.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017
U.C. Berkeley CS94: Beyond Worst-Case Analyss Handout 4s Luca Trevsan September 5, 07 Summary of Lecture 4 In whch we ntroduce semdefnte programmng and apply t to Max Cut. Semdefnte Programmng Recall that
More informationThe Minimum Universal Cost Flow in an Infeasible Flow Network
Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran
More informationTHE CHVÁTAL-ERDŐS CONDITION AND 2-FACTORS WITH A SPECIFIED NUMBER OF COMPONENTS
Dscussones Mathematcae Graph Theory 27 (2007) 401 407 THE CHVÁTAL-ERDŐS CONDITION AND 2-FACTORS WITH A SPECIFIED NUMBER OF COMPONENTS Guantao Chen Department of Mathematcs and Statstcs Georga State Unversty,
More informationAPPROXIMATE PRICES OF BASKET AND ASIAN OPTIONS DUPONT OLIVIER. Premia 14
APPROXIMAE PRICES OF BASKE AND ASIAN OPIONS DUPON OLIVIER Prema 14 Contents Introducton 1 1. Framewor 1 1.1. Baset optons 1.. Asan optons. Computng the prce 3. Lower bound 3.1. Closed formula for the prce
More informationOn the correction of the h-index for career length
1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat
More informationLecture Notes on Linear Regression
Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume
More information2.3 Nilpotent endomorphisms
s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms
More informationExact-Regenerating Codes between MBR and MSR Points
Exact-Regeneratng Codes between BR SR Ponts arxv:1304.5357v1 [cs.dc] 19 Apr 2013 Abstract In ths paper we study dstrbuted storage systems wth exact repar. We gve a constructon for regeneratng codes between
More informationResource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud
Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal
More informationREAL ANALYSIS I HOMEWORK 1
REAL ANALYSIS I HOMEWORK CİHAN BAHRAN The questons are from Tao s text. Exercse 0.0.. If (x α ) α A s a collecton of numbers x α [0, + ] such that x α
More informationa b a In case b 0, a being divisible by b is the same as to say that
Secton 6.2 Dvsblty among the ntegers An nteger a ε s dvsble by b ε f there s an nteger c ε such that a = bc. Note that s dvsble by any nteger b, snce = b. On the other hand, a s dvsble by only f a = :
More informationHMMT February 2016 February 20, 2016
HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,
More informationON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EQUATION
Advanced Mathematcal Models & Applcatons Vol.3, No.3, 2018, pp.215-222 ON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EUATION
More informationEcon107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)
I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes
More information6.854J / J Advanced Algorithms Fall 2008
MIT OpenCourseWare http://ocw.mt.edu 6.854J / 18.415J Advanced Algorthms Fall 2008 For nformaton about ctng these materals or our Terms of Use, vst: http://ocw.mt.edu/terms. 18.415/6.854 Advanced Algorthms
More informationFor now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.
Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson
More informationRemarks on the Properties of a Quasi-Fibonacci-like Polynomial Sequence
Remarks on the Propertes of a Quas-Fbonacc-lke Polynomal Sequence Brce Merwne LIU Brooklyn Ilan Wenschelbaum Wesleyan Unversty Abstract Consder the Quas-Fbonacc-lke Polynomal Sequence gven by F 0 = 1,
More informationState Amplification and State Masking for the Binary Energy Harvesting Channel
State Amplfcaton and State Maskng for the Bnary Energy Harvestng Channel Kaya Tutuncuoglu, Omur Ozel 2, Ayln Yener, and Sennur Ulukus 2 Department of Electrcal Engneerng, The Pennsylvana State Unversty,
More information10.34 Fall 2015 Metropolis Monte Carlo Algorithm
10.34 Fall 2015 Metropols Monte Carlo Algorthm The Metropols Monte Carlo method s very useful for calculatng manydmensonal ntegraton. For e.g. n statstcal mechancs n order to calculate the prospertes of
More informationFACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP
C O L L O Q U I U M M A T H E M A T I C U M VOL. 80 1999 NO. 1 FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP BY FLORIAN K A I N R A T H (GRAZ) Abstract. Let H be a Krull monod wth nfnte class
More informationOn the Multicriteria Integer Network Flow Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of
More informationSystem in Weibull Distribution
Internatonal Matheatcal Foru 4 9 no. 9 94-95 Relablty Equvalence Factors of a Seres-Parallel Syste n Webull Dstrbuton M. A. El-Dacese Matheatcs Departent Faculty of Scence Tanta Unversty Tanta Egypt eldacese@yahoo.co
More informationFINITELY-GENERATED MODULES OVER A PRINCIPAL IDEAL DOMAIN
FINITELY-GENERTED MODULES OVER PRINCIPL IDEL DOMIN EMMNUEL KOWLSKI Throughout ths note, s a prncpal deal doman. We recall the classfcaton theorem: Theorem 1. Let M be a fntely-generated -module. (1) There
More informationAppendix for Causal Interaction in Factorial Experiments: Application to Conjoint Analysis
A Appendx for Causal Interacton n Factoral Experments: Applcaton to Conjont Analyss Mathematcal Appendx: Proofs of Theorems A. Lemmas Below, we descrbe all the lemmas, whch are used to prove the man theorems
More informationOnline Appendix. t=1 (p t w)q t. Then the first order condition shows that
Artcle forthcomng to ; manuscrpt no (Please, provde the manuscrpt number!) 1 Onlne Appendx Appendx E: Proofs Proof of Proposton 1 Frst we derve the equlbrum when the manufacturer does not vertcally ntegrate
More informationDifference Equations
Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1
More informationVolume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2].
Bulletn of Mathematcal Scences and Applcatons Submtted: 016-04-07 ISSN: 78-9634, Vol. 18, pp 1-10 Revsed: 016-09-08 do:10.1805/www.scpress.com/bmsa.18.1 Accepted: 016-10-13 017 ScPress Ltd., Swtzerland
More information3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X
Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number
More informationEconomics 101. Lecture 4 - Equilibrium and Efficiency
Economcs 0 Lecture 4 - Equlbrum and Effcency Intro As dscussed n the prevous lecture, we wll now move from an envronment where we looed at consumers mang decsons n solaton to analyzng economes full of
More informationConvexity preserving interpolation by splines of arbitrary degree
Computer Scence Journal of Moldova, vol.18, no.1(52), 2010 Convexty preservng nterpolaton by splnes of arbtrary degree Igor Verlan Abstract In the present paper an algorthm of C 2 nterpolaton of dscrete
More informationMATH 5707 HOMEWORK 4 SOLUTIONS 2. 2 i 2p i E(X i ) + E(Xi 2 ) ä i=1. i=1
MATH 5707 HOMEWORK 4 SOLUTIONS CİHAN BAHRAN 1. Let v 1,..., v n R m, all lengths v are not larger than 1. Let p 1,..., p n [0, 1] be arbtrary and set w = p 1 v 1 + + p n v n. Then there exst ε 1,..., ε
More informationPerfect Competition and the Nash Bargaining Solution
Perfect Competton and the Nash Barganng Soluton Renhard John Department of Economcs Unversty of Bonn Adenauerallee 24-42 53113 Bonn, Germany emal: rohn@un-bonn.de May 2005 Abstract For a lnear exchange
More informationBOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS
BOUNDEDNESS OF THE IESZ TANSFOM WITH MATIX A WEIGHTS Introducton Let L = L ( n, be the functon space wth norm (ˆ f L = f(x C dx d < For a d d matrx valued functon W : wth W (x postve sem-defnte for all
More informationAnti-van der Waerden numbers of 3-term arithmetic progressions.
Ant-van der Waerden numbers of 3-term arthmetc progressons. Zhanar Berkkyzy, Alex Schulte, and Mchael Young Aprl 24, 2016 Abstract The ant-van der Waerden number, denoted by aw([n], k), s the smallest
More informationRandić Energy and Randić Estrada Index of a Graph
EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS Vol. 5, No., 202, 88-96 ISSN 307-5543 www.ejpam.com SPECIAL ISSUE FOR THE INTERNATIONAL CONFERENCE ON APPLIED ANALYSIS AND ALGEBRA 29 JUNE -02JULY 20, ISTANBUL
More informationLecture 4. Instructor: Haipeng Luo
Lecture 4 Instructor: Hapeng Luo In the followng lectures, we focus on the expert problem and study more adaptve algorthms. Although Hedge s proven to be worst-case optmal, one may wonder how well t would
More informationSL n (F ) Equals its Own Derived Group
Internatonal Journal of Algebra, Vol. 2, 2008, no. 12, 585-594 SL n (F ) Equals ts Own Derved Group Jorge Macel BMCC-The Cty Unversty of New York, CUNY 199 Chambers street, New York, NY 10007, USA macel@cms.nyu.edu
More information6. Stochastic processes (2)
Contents Markov processes Brth-death processes Lect6.ppt S-38.45 - Introducton to Teletraffc Theory Sprng 5 Markov process Consder a contnuous-tme and dscrete-state stochastc process X(t) wth state space
More informationGlobal Sensitivity. Tuesday 20 th February, 2018
Global Senstvty Tuesday 2 th February, 28 ) Local Senstvty Most senstvty analyses [] are based on local estmates of senstvty, typcally by expandng the response n a Taylor seres about some specfc values
More information20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness.
20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The frst dea s connectedness. Essentally, we want to say that a space cannot be decomposed
More information6. Stochastic processes (2)
6. Stochastc processes () Lect6.ppt S-38.45 - Introducton to Teletraffc Theory Sprng 5 6. Stochastc processes () Contents Markov processes Brth-death processes 6. Stochastc processes () Markov process
More informationSolutions to exam in SF1811 Optimization, Jan 14, 2015
Solutons to exam n SF8 Optmzaton, Jan 4, 25 3 3 O------O -4 \ / \ / The network: \/ where all lnks go from left to rght. /\ / \ / \ 6 O------O -5 2 4.(a) Let x = ( x 3, x 4, x 23, x 24 ) T, where the varable
More informationFinding Dense Subgraphs in G(n, 1/2)
Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng
More informationRandom Walks on Digraphs
Random Walks on Dgraphs J. J. P. Veerman October 23, 27 Introducton Let V = {, n} be a vertex set and S a non-negatve row-stochastc matrx (.e. rows sum to ). V and S defne a dgraph G = G(V, S) and a drected
More informationLearning Theory: Lecture Notes
Learnng Theory: Lecture Notes Lecturer: Kamalka Chaudhur Scrbe: Qush Wang October 27, 2012 1 The Agnostc PAC Model Recall that one of the constrants of the PAC model s that the data dstrbuton has to be
More informationChapter 7 Channel Capacity and Coding
Wreless Informaton Transmsson System Lab. Chapter 7 Channel Capacty and Codng Insttute of Communcatons Engneerng atonal Sun Yat-sen Unversty Contents 7. Channel models and channel capacty 7.. Channel models
More informationarxiv: v1 [math.co] 1 Mar 2014
Unon-ntersectng set systems Gyula O.H. Katona and Dánel T. Nagy March 4, 014 arxv:1403.0088v1 [math.co] 1 Mar 014 Abstract Three ntersecton theorems are proved. Frst, we determne the sze of the largest
More informationMMA and GCMMA two methods for nonlinear optimization
MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons
More informationprinceton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg
prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there
More informationThe Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction
ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also
More informationCoding over an Erasure Channel with a Large Alphabet Size
1 Codng over an Erasure Channel wth a Large Alphabet Sze Shervan Fashand, Shahab Oves Gharan and Amr K. Khandan ECE Dept., Unversty of Waterloo, Waterloo, O, Canada, 2L3G1 emal: sfashand,shahab,khandan}@cst.uwaterloo.ca
More informationand problem sheet 2
-8 and 5-5 problem sheet Solutons to the followng seven exercses and optonal bonus problem are to be submtted through gradescope by :0PM on Wednesday th September 08. There are also some practce problems,
More informationSimultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals
Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,
More informationCOMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
More informationCONJUGACY IN THOMPSON S GROUP F. 1. Introduction
CONJUGACY IN THOMPSON S GROUP F NICK GILL AND IAN SHORT Abstract. We complete the program begun by Brn and Squer of charactersng conjugacy n Thompson s group F usng the standard acton of F as a group of
More informationLectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix
Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could
More informationStanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011
Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected
More informationA CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS
Journal of Mathematcal Scences: Advances and Applcatons Volume 25, 2014, Pages 1-12 A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS JIA JI, WEN ZHANG and XIAOFEI QI Department of Mathematcs
More information