On Network Coding of Independent and Dependent Sources in Line Networks

Size: px
Start display at page:

Download "On Network Coding of Independent and Dependent Sources in Line Networks"

Transcription

1 On Network Codng of Independent and Dependent Sources n Lne Networks Mayank Baksh, Mchelle Effros, WeHsn Gu, Ralf Koetter Department of Electrcal Engneerng Department of Electrcal Engneerng Calforna Insttute of Technology Unversty of Illnos at Urbana-Champagn Pasadena, Calforna, CA 95, USA Urbana, IL 680, USA Emal: {mayank, effros, wgu}@caltech.edu Emal: koetter@uuc.edu Abstract We nvestgate the network codng capacty for lne networks. For ndependent sources and a specal class of dependent sources, we fully characterze the capacty regon of lne networks for all possble demand structures (e.g., multple uncast, mxtures of uncasts and multcasts, etc.) Our achevablty bound s derved by frst decomposng a lne network nto sngle-demand components and then addng the component rate regons to get rates for the parent network. For general dependent sources, we gve an achevablty result and provde examples where the result s and s not tght. I. INTRODUCTION To date, the feld of network codng has focused prmarly on fndng solutons for famles of problems defned by a broad class of networks (e.g., networks representable by drected, acyclc graphs) and a narrow class of demands (e.g., multcast or multple uncast demands). We here nvestgate a famly of network codng problems defned by a completely general demand structure and a narrow famly of networks. Precsely, we gve the complete soluton to the problem of network codng wth ndependent sources and arbtrary demands on a drected lne network. We then generalze that soluton to accommodate specal cases of dependent sources. Theorem summarzes those results. Theorem : Gven an n-node lne network N (shown n Fg. ) wth memoryless sources,..., n and demands,..., n satsfyng H(,..., ) 0 for all {,..., n}, the rate vector (R,..., R n ) s achevable f and only f, for < n, R H( j +,..., j, +,..., j ), () j+ provded one of the followng condtons holds: A. Sources,..., n are ndependent and each s a subset of the sources,...,. B. Sources,..., n have arbtrary dependences and each s ether a constant or the vector (,..., n ). C. Each source s a (potentally) dstnct subset of ndependent sources W,..., W k and each demand s any subset of those W,..., W k that appear n,...,. Lemmas 3, 4, and 5 of Sectons III-B, III-C, and III-D gve formal statements and proofs of ths result under condtons A, B, and C, respectvely. Case B s the multcast result of [] 3 n n R R R n n 3 Fg.. An n-node lne network wth sources,..., n and demands,..., n generalzed to many sources and specalzed to lne networks. We nclude a new proof of ths result for ths specal case as t provdes an mportant example n developng our approach. Central to our dscusson s a formal network decomposton descrbed n Secton II. The decomposton breaks an arbtrary lne network nto a famly of component lne networks. Each component network preserves the orgnal node demands at exactly one node and assumes that all demands at pror nodes n the lne network have already been met. (See Fg. for an llustraton. Formal defntons follow n Secton II.) Sequentally applyng the component network solutons n the parent network to meet frst the frst node s demands, then the second node s demands assumng that the frst node s demands are met, and so on, acheves a rate equal to the sum of the rates on the component networks. The gven soluton always yelds an achevablty result. The proofs of Lemmas 3, 4, and 5 addtonally demonstrate that the gven achevablty result s tght under each of condtons A, B, and C. Theorem shows that the achevablty result gven by our addtve soluton s tght for an extremely broad class of sources and demands n 3-node lne networks. In partcular, ths result allows arbtrary dependences between the sources and also allows demands that can be (restrcted) functons of those sources (rather than smply the sources themselves). The form of our soluton lends nsght nto the types of codng suffcent to acheve optmal performance n the gven famles of problems. Prmary among these are entropy codes, ncludng Slepan-Wolf codes for examples wth dependent courses. These codes can be mplemented, for example, usng lnear encoders and typcal set or mnmum entropy decoders []. The other feature llustrated by our decomposton s the need to retreve nformaton from the nearest precedng node where t s avalable (whch may be a snk), thereby n n n

2 avodng sendng multple copes of the same nformaton over any lnk (as can happen n pure routng solutons). Unfortunately, the gven decomposton fals to capture all of the nformaton known to pror nodes n some cases, and thus the achevablty result gven by the addtve constructon s not tght n general. Theorem 3 gves a 3-node network where the bound s provably loose. The falure of addtvty n ths functonal source codng example arses snce the component network decomposton fals to capture nformaton that ntermedate nodes can learn beyond ther explct demands. The same problem can also be replcated n a 4-node network, where all demands also appear as sources n the network. Theorem 4 shows that the gap between the addtve soluton and the optmal soluton can be large. II. PRELIMINARIES The followng notaton s useful n the dscusson that follows. For random varables A,..., A n, set S {,..., n}, and ndces, j {,..., n}, A S (A : S) and A j (A,..., A j ) denote vectors of A varables and A j ( m) (A j (),..., Aj (m)) denotes consecutve samples of Aj. An n-node lne network (N, n, n ) s a drected graph N (V, E) wth V {,..., n} and E {(, ),..., (n, n)}, as shown n Fg.. Node observes source and requres demand. The random process ( n ( ), n ( )) s drawn..d. accordng to probablty mass functon p(x n, y n ). A rate allocaton for the n- node lne network N s a vector (R : < n), where R s the rate on lnk (, + ). We assume that there are no errors on any of the lnks. Lne networks have been studed earler n the context of relable communcaton (e.g., [3]). A smple lne network s a lne network wth exactly one demand ( c at all but one node n the network). We next defne the component networks N,..., N n for an n-node lne network N wth sources n and demands n. (See Fg..) For each n, component N s an -node smple lne network. For each j <, the source and demand at node j of network N j are () j ( j, ) and () j c, respectvely; the source and demand at node are ()... and (). 3 n n R R R n N N N n R 3 n n Fg.. Component networks n n III. RESULTS A. Cutset bounds and Lne Networks Lemmas and relate the cutset bound to the achevable rate regon. Lemma : In an n-node lne network (N, n, n ), the cutset bounds are satsfed f and only f R max H( j + j+ j + ) < n () Proof: The reverse part s mmedate snce () s a subset of the cutset bounds. For the forward part, let (R : < n) satsfy (), and let T be a cut. Each cut s a unon of ntervals (T l kt (k) wth T (k) {m(k),..., m(k)+l(k) } {,..., n} and m(k ) + l(k ) < m(k)). Then, k R m(k) k max j0 m(k)+j H(m(k) m(k)+j m(k) ) H( T (k) T (k) ) k H( T T ). (3) Snce T s arbtrary, (3) gves the cutset bounds. Lemma : Let (N, 3, 3 ) be a 3-node lne network for whch the cutset bounds are tght on each of the component networks. Then, the achevable rate regon s the set R {(R, R ) : R > R m }, where R m H( ) + H( 3 3, ), R m H( 3 3 ). Proof: Converse: Let C and C be rate R and R m- dmensonal codes for lnks (, ) and (, 3) of N, and suppose (/m)h( ( m) ( m), C ) ɛ. Then, mr H(C ) mh( 3 3 ), mr H(C ) H( ( m), C ( m)) Now, mh( ) + H(C ( m), ( m)). H(C ( m), ( m)) I(C ; 3 ( m) ( 3, )( m)) mh( 3 3, ) H( 3 ( m) C, 3 ( m)) mh( 3, 3 ) mɛ. So R H( )+H( 3 3, ) ɛ and R H( 3 3 ), mplyng that by pckng arbtrarly small ɛ, (R, R ) R. and H(C C ) < ɛ. Achevablty: Let R R m + ɛ. Snce the cutset bound s tght on the components N and N 3 for suffcently large m, there exst m-dmensonal codes C, C, 3 and C 3 for the lnks (, ) n N, (, ) n N 3, and (, 3) n N 3 for whch m H(C ) H( ) + ɛ 3, (4) m H(C3 ) H( 3 3, ) + ɛ 3, (5) m H(C3 ) H( 3 3 ) + ɛ 3, (6)

3 and m H( ( m) ( m), C ) 3 for, 3. Let C CC 3 and C C. 3 Then, (C, C ) s a code for N satsfyng m H(C ) < R for, 3, m H( ( m) ( m), C ) < ɛ for,, and H(C C ) < ɛ. Thus, (C, C ) acheves rate (R, R ). B. Independent sources, arbtrary demands Lemma 3: Consder an n-node lne network (N, n, n ) wth n ndependent and D(), D() {,..., } for each n. Then, the rate regon s fully characterzed by the cutset bounds. In partcular, R H( jk+ D()\{k+,...,n}) < n s achevable. Proof: Let Q(, k) jk D(j). By Lemma, the cut-set bound gves R max k H( Q(,k), k +) max max k k H( Q(,k)\{,...,k}) j Q(,k)\{,...,k} H( j ). (7) Snce D() {,..., }, Q(, k) {,..., k} and Q(, k) \ {,..., k} Q(, k + ) \ {,..., k + }. Thus (7) becomes H( j ). R j Q(,n)\{,...,n} We wsh to acheve ths bound by codng for the component networks separately. Let R H( Q(+,n)\{+,...,n} ) + ɛ for < n. Snce the demand n network N j s D(j), by calculatng the demand across the varous lnks startng from the very last lnk, the followng rate allocaton s feasble: R j j H( D(j)\{j} ) + ɛ n R j j H( (D(j)\{j})\(D(j ) {j }) ) + ɛ n H( D(j)\({j,j} Q(j,j )) ) + ɛ n. R j H( D(j)\({,...,j} Q(,j )) ) + ɛ n. Addng the rates from component networks gves R j H( D(j)\({+,...,j} Q(+,j )) ) + ɛ n j+ j+ j+ j+ H( D(j)\({+,...,n} Q(+,j )) ) + ɛ n H( (D(j)\Q(+,j ))\{+,...,n} ) + ɛ n H( ( n j+ D(j))\{+,...,n}) + ɛ H( Q(+,n)\{+,...,n} ) + ɛ R C. Dependent sources, multcast Lemma 4: Let (N, n, n ) be an n-node lne network wth n arbtrarly dependent and n feasble multcast demands ( c or n for each ). Then Theorem holds. Proof: Let M{ n : n } be the multcast recevers. We denote the vertces of M by {m,..., m k }, where m < m j when < j. For each n, let d() mn{m M : m > }. Consder an achevable rate allocaton (R : < n) for N. For any < n, the cutset bound on R s tghtest possble f we choose the set of vertces for the cutset to be the set { +,..., d()}. Ths s true because addng extra vertces to ths set adds addtonal sources to t wthout ncreasng the set of demands. Therefore, for all < n, R H( n d() + ) H(d() d() + ) H( d() + ) (8) where the frst equalty follows snce H( n d() ) 0 as the demand s feasble for the network. Next, we show that for the component networks {N j } jn, there exst rate allocatons {(R j : j )} n j whch come arbtrarly close to satsfyng the above bounds wth equalty. Observe that t suffces to restrct our attenton to the networks {N j } j M. Fx ɛ > 0 and consder any m M. When, t suffces to encode j at rate H( j m j+ )+ ɛ/n [4]. Summng the over all sources that use use lnk (r, r+ ) rate achevable rate R m r R m r r j for network N m, where H( j m j+ ) + ɛ n H( r m r+ ) + ɛ H( r d(r) r+ ) + ɛ. (9) When >, n are avalable at the node m. Hence, the rate requred over the lnk (r, r + ) s zero for all r < m. for m r < m, [4] agan gves r Rr m H( n m m ) + + H( j m j+ ) + ɛ n H( r m r+ ) + ɛ jm + H( r d(r) r+ ) + ɛ. (0) Fnally, addng the rates over component networks gves R j Rd() H( d() + ) + ɛ R + ɛ. j+ Ths shows that the cutset bound n (8) s tght and s achevable by the approach based on component networks. Further, each R j s of the form H( j j +, j + ). D. A class of dependent sources wth dependent demands In ths secton, we consder sources and demands that are dependent n the followng way. We assume the exstence of underlyng ndependent sources W k such that the sources are W S() and the demands are W D() for n for {S()} n and {D()}n subsets of {,..., k}. In order

4 for the demands to be feasble, we requre D() j S(j) for each n. Lemma 5 characterzes the rate regon for lne networks wth the above knd of sources and demands. We need the followng notaton n order to state the lemma. For j < n, defne d (j) and s (j) as the frst occurrence after the vertex j of W n a demand and source respectvely. Lemma 5: Let (N, n, n ) be an n-node lne network wth W S() and W D() as defned above. Then the achevable rate regon s R j :s (j)>d (j) H(W ) j < n. Proof: We proceed by frst decomposng the network N nto k dfferent networks {N } k, each correspondng to a dfferent W out W k. For each k and A {,..., k}, let A W f A and A c otherwse. Let N be an n-node lne network wth sources S(),..., S(n) and demands D(),..., D(n). Note that each N s a lne network n whch both the sources and demands are ether W or constant. By result of Sec. III-C, t follows that the cutset bound s tght for such network and the rate allocaton (R j, : j < n}), defned by R j, { H(W ) f s (j) > d (j) 0 otherwse s achevable. Thus, for the parent network N, the rate allocaton (R j : j {,..., n}) s achevable, where R j k R j,. Further, as all the sources are ndependent, ths approach s optmal. Therefore, the rate regon for the network N s gven by all (R j : j {,..., n}) such that R j :s (j)>d (j) H(W ). Next, we show that the same can be obtaned by decomposng N nto smple networks N,..., N n. To ths end, we frst decompose the network N nto smple networks N,..., Nn, notng that the mnmum rate Rj, l requred for the lnk (j, j + ) n Nl s 0 f there s a demand or a source present n one of the nodes j +,..., l and H(W ) otherwse. Hence, Rj, l H( D(l) S(j+),..., S(l), D(j+),..., D(l ) ). Ths s an optmal decomposton, snce R j, Rj,. l lj+ Addng the rates over components N, R l j R l j, H( D(l) l tj+ S(t), l tj+ D(t)) H( D(l) l tj+, l tj+ D(t) ) () s achevable for N l. Fnally, note that lj+ R l j lj+ Rj, l R j, R j. Thus the rates for N can also be obtaned by summng lnkwse the rates for the component networks. By (), the sum s of the form clamed n Theorem -C. E. 3-node lne networks wth dependent sources We now restrct our attenton to 3-node lne networks of the knd shown n Fg. 3. Sources 3 are arbtrarly dependent and ther alphabets are fnte; demands 3 take the form f( ) and 3 g( 3 ) for some f : and g : 3. The followng result shows the tghtness of our decomposton appoach n ths case. Theorem : Gven ɛ > 0, for every rate vector (R, R ) achevable for N, there exst achevable rate allocatons R and (R, 3 R) 3 for component networks N and N 3 such that R + R 3 < R + ɛ and R 3 R + ɛ. 3 Fg. 3. f( ) g(,, ) 3 3 The three node lne network Proof: Let (R, R ) be achevable for N. Then, for m large enough, there exst codes (a m, b m ) for the frst and second lnk, respectvely such that (/m)h(a m ( ( m))) < R + ɛ, (/m)h(b m (a m ( ( m)))) < R + ɛ, and P r(ŷ 3 ( m) 3 ( m)) < ɛ. Let B m (k) b m (a m ( (m(k )+ mk))), F m (k) (f( (m(k )+),..., f( (mk))),,m (k) (m(k ) + mk). Allowng a probablty of error ɛ, the problem of codng for the network N can be reformulated as a functonal source codng problem for the network N () wth sources, and, and the demand (F, B ) as shown n Fg 4. Pror results on functonal codng ([5], [6], [7]) can Fg. 4.,, F An equvalent functonal codng problem now be appled. Specfcally, by evaluatng the functonal rate dstorton functon n [6], [7] at zero dstorton, the mnmal rate at whch, can be coded s gven by R nf b, I(, ;,, ) B

5 where, the nfmum s over the set P consstng of all, for whch,,, forms a Markov chan and H(F, B,,, ) 0. We show that the above rate can be splt nto two parts - the rate requred to to encode, so as to reconstruct F wth, as the sde nformaton, and the rate requred to be able to reconstruct B wth, and F as the sde nformaton. To ths end, let F,B P. Then, the followng hold: I( F,B ;,, ) I( F,B, F ;,, ) I(F ;,,, F,B ) I( F,B, F ;,, ) H( F,B, F, ) H( F,B, F,,, ) H( F,B, F, ) H( F,B,,,,, F ) H(F, ) + H( F,B F,, ) H( F,B,,,,, F ) H(F, ) + I( F,B ;, F,, ). () Snce F s a functon of,, H(F, ) s an achevable rate for the network N. Further, snce F,B P, t follows that F,B, (F,, ) s a Markov chan. Combnng t wth the fact that, H(B ) F,B,,, F ) 0, we note that I( F,B ;, F,, ) s a suffcent rate for functonal source codng wth regards to the functon B gven, and F as the sde nformaton. Therefore, ( I( F,B;, F,, ), H(B )) s an achevable rate for the network N 3, hence provng the theorem. F. Networks where addtvty does not hold Theorem 3: There exsts a 3-node network (N, 3, 3 ), for whch addng the best rate allocatons from the component networks does not yeld an optmal code. Proof: Consder the example shown n Fg. 5(a). Rate 3 f(,) (a) Rate (b) f(,) Fg. 5. (a) A set of achevable rates for N. (b) An optmal rate allocaton for component N. Let be dstrbuted unformly on {0, } and be ndependently dstrbuted unformly on {0,,, 3}. Let { 0 (x, y) {(0, 0), (0, ), (, ), (, )} f(x, y) (x, y) {(0, ), (0, 3), (, 0), (, 3)} Fg. 5(a) shows an achevable rate allocaton that can be acheved by the transmttng over both lnks. We next show that best possble rateallocaton achevable by optmzng over the achevable rate regons of the component networks s strctly greater than the above rate allocaton. To ths end, consder N (see Fg. 5(b)). By [5], the best possble rate on lnk (,) s. To prove our clam, t suffces to show that the rate requred over lnk (, ) N s non-zero. Ths follows because H(, f(, )) > 0, and the cutset bound requres at least rate H(, f(, )) > 0 across lnk (, ). Theorem 4: For any n 3, there exsts a n-node network (N, n, n ), such that for any achevable (R j : < j) for N j, there exsts an achevable (R : < n) for N wth j+ R j > R + Ω(n). Proof: Let and be ndependent sources unformly dstrbuted over {0, } and {0,..., n} respectvely. Defne f : {0, } {0,..., n} {0,..., n} as { y f y {,..., n } f(x, y) x f y n Consder the n-node lne network (N, n, n ), where, 3..., n, n c, and f(, ( ) for n. By the functonal source codng bound, the rate requred on each lnk of the -th component s at least. Ths rate s acheved by sendng on all the lnks. Thus, n j+ Rj n. In contrast, rate s suffcent for network N (sendng over all the lnks). Therefore, n j+ Rj R n. The left sde s at most O(n) for a network wth n components. Hence, n j+ Rj R Ω(n). ACKNOWLEDGMENT Ths materal s based upon work partally supported by NSF Grant Nos. CCF-00039, CCR and Caltech s Lee Center for Advanced Networkng. REFERENCES [] T. Ho, R. Koetter, M. Médard, M. Effros, J. Sh, and D. Karger. A random lnear network codng approach to multcast. IEEE Transactons on Informaton Theory, 5(0): , October 006. [] Imre Csszar. Lnear codes for sources and source networks: Error exponents, unversal codng. IEEE Transactons on Informaton Theory, IT-8:585 59, July 98. [3] P. Pakzad, C. Fragoul, and A. Shokrollah. Codng schemes for lne networks. In Proceedngs of the IEEE Internatonal Symposum on Informaton Theory, Adelade, Australa, September 005. [4] D. Slepan and J. K. Wolf. Noseless codng of correlated nformaton sources. IEEE Transactons on Informaton Theory, IT-9:47 480, 973. [5] A. Orltsky and J. R. Roche. Codng for computng. In IEEE Symposum on Foundatons of Computer Scence, pages 50 5, 995. [6] H. amamoto. Wyner-zv theory for a general functon of correlated sources. IEEE Transactons on Informaton Theory, IT-8(5): , September 98. [7] H. Feng, M. Effros, and S. A. Savar. Functonal source codng for networks wth recever sde nformaton. In Proceedngs of the Allerton Conference on Communcaton, Control, and Computng, Montcello, IL, September 004.

Refined Coding Bounds for Network Error Correction

Refined Coding Bounds for Network Error Correction Refned Codng Bounds for Network Error Correcton Shenghao Yang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong shyang5@e.cuhk.edu.hk Raymond W. Yeung Department

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

On the Correlation between Boolean Functions of Sequences of Random Variables

On the Correlation between Boolean Functions of Sequences of Random Variables On the Correlaton between Boolean Functons of Sequences of Random Varables Farhad Shran Chaharsoogh Electrcal Engneerng and Computer Scence Unversty of Mchgan Ann Arbor, Mchgan, 48105 Emal: fshran@umch.edu

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

IN THE paradigm of network coding, a set of source nodes

IN THE paradigm of network coding, a set of source nodes 4496 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 6, JUNE 2018 Sngle-Uncast Secure Network Codng and Network Error Correcton are as Hard as Multple-Uncast Network Codng Wentao Huang, Tracey Ho,

More information

Assortment Optimization under MNL

Assortment Optimization under MNL Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.

More information

The Fundamental Theorem of Distributed Storage Systems Revisited

The Fundamental Theorem of Distributed Storage Systems Revisited The Fundamental Theorem of Dstrbuted Storage Systems Revsted Png Hu Department of Electronc Engneerng Cty Unversty of Hong Kong Emal: png.hu@my.ctyu.edu.h Kenneth W. Shum Insttute of Networ Codng the Chnese

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

The lower and upper bounds on Perron root of nonnegative irreducible matrices

The lower and upper bounds on Perron root of nonnegative irreducible matrices Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

Affine transformations and convexity

Affine transformations and convexity Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/

More information

Appendix B. Criterion of Riemann-Stieltjes Integrability

Appendix B. Criterion of Riemann-Stieltjes Integrability Appendx B. Crteron of Remann-Steltes Integrablty Ths note s complementary to [R, Ch. 6] and [T, Sec. 3.5]. The man result of ths note s Theorem B.3, whch provdes the necessary and suffcent condtons for

More information

n ). This is tight for all admissible values of t, k and n. k t + + n t

n ). This is tight for all admissible values of t, k and n. k t + + n t MAXIMIZING THE NUMBER OF NONNEGATIVE SUBSETS NOGA ALON, HAROUT AYDINIAN, AND HAO HUANG Abstract. Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what

More information

Rate-Memory Trade-off for the Two-User Broadcast Caching Network with Correlated Sources

Rate-Memory Trade-off for the Two-User Broadcast Caching Network with Correlated Sources Rate-Memory Trade-off for the Two-User Broadcast Cachng Network wth Correlated Sources Parsa Hassanzadeh, Antona M. Tulno, Jame Llorca, Elza Erkp arxv:705.0466v [cs.it] May 07 Abstract Ths paper studes

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

Connecting Multiple-unicast and Network Error Correction: Reduction and Unachievability

Connecting Multiple-unicast and Network Error Correction: Reduction and Unachievability Connectng Multple-uncast and Network Error Correcton: Reducton and Unachevablty Wentao Huang Calforna Insttute of Technology Mchael Langberg Unversty at Buffalo, SUNY Joerg Klewer New Jersey Insttute of

More information

Lecture 3: Shannon s Theorem

Lecture 3: Shannon s Theorem CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts

More information

Random Partitions of Samples

Random Partitions of Samples Random Parttons of Samples Klaus Th. Hess Insttut für Mathematsche Stochastk Technsche Unverstät Dresden Abstract In the present paper we construct a decomposton of a sample nto a fnte number of subsamples

More information

Error Probability for M Signals

Error Probability for M Signals Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal

More information

Canonical transformations

Canonical transformations Canoncal transformatons November 23, 2014 Recall that we have defned a symplectc transformaton to be any lnear transformaton M A B leavng the symplectc form nvarant, Ω AB M A CM B DΩ CD Coordnate transformatons,

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

Edge Isoperimetric Inequalities

Edge Isoperimetric Inequalities November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary

More information

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers Psychology 282 Lecture #24 Outlne Regresson Dagnostcs: Outlers In an earler lecture we studed the statstcal assumptons underlyng the regresson model, ncludng the followng ponts: Formal statement of assumptons.

More information

A new construction of 3-separable matrices via an improved decoding of Macula s construction

A new construction of 3-separable matrices via an improved decoding of Macula s construction Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula

More information

DIFFERENTIAL FORMS BRIAN OSSERMAN

DIFFERENTIAL FORMS BRIAN OSSERMAN DIFFERENTIAL FORMS BRIAN OSSERMAN Dfferentals are an mportant topc n algebrac geometry, allowng the use of some classcal geometrc arguments n the context of varetes over any feld. We wll use them to defne

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

Lossy Compression. Compromise accuracy of reconstruction for increased compression.

Lossy Compression. Compromise accuracy of reconstruction for increased compression. Lossy Compresson Compromse accuracy of reconstructon for ncreased compresson. The reconstructon s usually vsbly ndstngushable from the orgnal mage. Typcally, one can get up to 0:1 compresson wth almost

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.65/15.070J Fall 013 Lecture 1 10/1/013 Martngale Concentraton Inequaltes and Applcatons Content. 1. Exponental concentraton for martngales wth bounded ncrements.

More information

The Feynman path integral

The Feynman path integral The Feynman path ntegral Aprl 3, 205 Hesenberg and Schrödnger pctures The Schrödnger wave functon places the tme dependence of a physcal system n the state, ψ, t, where the state s a vector n Hlbert space

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

Exercise Solutions to Real Analysis

Exercise Solutions to Real Analysis xercse Solutons to Real Analyss Note: References refer to H. L. Royden, Real Analyss xersze 1. Gven any set A any ɛ > 0, there s an open set O such that A O m O m A + ɛ. Soluton 1. If m A =, then there

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

Estimation: Part 2. Chapter GREG estimation

Estimation: Part 2. Chapter GREG estimation Chapter 9 Estmaton: Part 2 9. GREG estmaton In Chapter 8, we have seen that the regresson estmator s an effcent estmator when there s a lnear relatonshp between y and x. In ths chapter, we generalzed the

More information

CSCE 790S Background Results

CSCE 790S Background Results CSCE 790S Background Results Stephen A. Fenner September 8, 011 Abstract These results are background to the course CSCE 790S/CSCE 790B, Quantum Computaton and Informaton (Sprng 007 and Fall 011). Each

More information

Lecture 12: Discrete Laplacian

Lecture 12: Discrete Laplacian Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly

More information

ECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006)

ECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006) ECE 534: Elements of Informaton Theory Solutons to Mdterm Eam (Sprng 6) Problem [ pts.] A dscrete memoryless source has an alphabet of three letters,, =,, 3, wth probabltes.4,.4, and., respectvely. (a)

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017 U.C. Berkeley CS94: Beyond Worst-Case Analyss Handout 4s Luca Trevsan September 5, 07 Summary of Lecture 4 In whch we ntroduce semdefnte programmng and apply t to Max Cut. Semdefnte Programmng Recall that

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

THE CHVÁTAL-ERDŐS CONDITION AND 2-FACTORS WITH A SPECIFIED NUMBER OF COMPONENTS

THE CHVÁTAL-ERDŐS CONDITION AND 2-FACTORS WITH A SPECIFIED NUMBER OF COMPONENTS Dscussones Mathematcae Graph Theory 27 (2007) 401 407 THE CHVÁTAL-ERDŐS CONDITION AND 2-FACTORS WITH A SPECIFIED NUMBER OF COMPONENTS Guantao Chen Department of Mathematcs and Statstcs Georga State Unversty,

More information

APPROXIMATE PRICES OF BASKET AND ASIAN OPTIONS DUPONT OLIVIER. Premia 14

APPROXIMATE PRICES OF BASKET AND ASIAN OPTIONS DUPONT OLIVIER. Premia 14 APPROXIMAE PRICES OF BASKE AND ASIAN OPIONS DUPON OLIVIER Prema 14 Contents Introducton 1 1. Framewor 1 1.1. Baset optons 1.. Asan optons. Computng the prce 3. Lower bound 3.1. Closed formula for the prce

More information

On the correction of the h-index for career length

On the correction of the h-index for career length 1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

2.3 Nilpotent endomorphisms

2.3 Nilpotent endomorphisms s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms

More information

Exact-Regenerating Codes between MBR and MSR Points

Exact-Regenerating Codes between MBR and MSR Points Exact-Regeneratng Codes between BR SR Ponts arxv:1304.5357v1 [cs.dc] 19 Apr 2013 Abstract In ths paper we study dstrbuted storage systems wth exact repar. We gve a constructon for regeneratng codes between

More information

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal

More information

REAL ANALYSIS I HOMEWORK 1

REAL ANALYSIS I HOMEWORK 1 REAL ANALYSIS I HOMEWORK CİHAN BAHRAN The questons are from Tao s text. Exercse 0.0.. If (x α ) α A s a collecton of numbers x α [0, + ] such that x α

More information

a b a In case b 0, a being divisible by b is the same as to say that

a b a In case b 0, a being divisible by b is the same as to say that Secton 6.2 Dvsblty among the ntegers An nteger a ε s dvsble by b ε f there s an nteger c ε such that a = bc. Note that s dvsble by any nteger b, snce = b. On the other hand, a s dvsble by only f a = :

More information

HMMT February 2016 February 20, 2016

HMMT February 2016 February 20, 2016 HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,

More information

ON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EQUATION

ON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EQUATION Advanced Mathematcal Models & Applcatons Vol.3, No.3, 2018, pp.215-222 ON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EUATION

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpenCourseWare http://ocw.mt.edu 6.854J / 18.415J Advanced Algorthms Fall 2008 For nformaton about ctng these materals or our Terms of Use, vst: http://ocw.mt.edu/terms. 18.415/6.854 Advanced Algorthms

More information

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results. Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson

More information

Remarks on the Properties of a Quasi-Fibonacci-like Polynomial Sequence

Remarks on the Properties of a Quasi-Fibonacci-like Polynomial Sequence Remarks on the Propertes of a Quas-Fbonacc-lke Polynomal Sequence Brce Merwne LIU Brooklyn Ilan Wenschelbaum Wesleyan Unversty Abstract Consder the Quas-Fbonacc-lke Polynomal Sequence gven by F 0 = 1,

More information

State Amplification and State Masking for the Binary Energy Harvesting Channel

State Amplification and State Masking for the Binary Energy Harvesting Channel State Amplfcaton and State Maskng for the Bnary Energy Harvestng Channel Kaya Tutuncuoglu, Omur Ozel 2, Ayln Yener, and Sennur Ulukus 2 Department of Electrcal Engneerng, The Pennsylvana State Unversty,

More information

10.34 Fall 2015 Metropolis Monte Carlo Algorithm

10.34 Fall 2015 Metropolis Monte Carlo Algorithm 10.34 Fall 2015 Metropols Monte Carlo Algorthm The Metropols Monte Carlo method s very useful for calculatng manydmensonal ntegraton. For e.g. n statstcal mechancs n order to calculate the prospertes of

More information

FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP

FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP C O L L O Q U I U M M A T H E M A T I C U M VOL. 80 1999 NO. 1 FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP BY FLORIAN K A I N R A T H (GRAZ) Abstract. Let H be a Krull monod wth nfnte class

More information

On the Multicriteria Integer Network Flow Problem

On the Multicriteria Integer Network Flow Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of

More information

System in Weibull Distribution

System in Weibull Distribution Internatonal Matheatcal Foru 4 9 no. 9 94-95 Relablty Equvalence Factors of a Seres-Parallel Syste n Webull Dstrbuton M. A. El-Dacese Matheatcs Departent Faculty of Scence Tanta Unversty Tanta Egypt eldacese@yahoo.co

More information

FINITELY-GENERATED MODULES OVER A PRINCIPAL IDEAL DOMAIN

FINITELY-GENERATED MODULES OVER A PRINCIPAL IDEAL DOMAIN FINITELY-GENERTED MODULES OVER PRINCIPL IDEL DOMIN EMMNUEL KOWLSKI Throughout ths note, s a prncpal deal doman. We recall the classfcaton theorem: Theorem 1. Let M be a fntely-generated -module. (1) There

More information

Appendix for Causal Interaction in Factorial Experiments: Application to Conjoint Analysis

Appendix for Causal Interaction in Factorial Experiments: Application to Conjoint Analysis A Appendx for Causal Interacton n Factoral Experments: Applcaton to Conjont Analyss Mathematcal Appendx: Proofs of Theorems A. Lemmas Below, we descrbe all the lemmas, whch are used to prove the man theorems

More information

Online Appendix. t=1 (p t w)q t. Then the first order condition shows that

Online Appendix. t=1 (p t w)q t. Then the first order condition shows that Artcle forthcomng to ; manuscrpt no (Please, provde the manuscrpt number!) 1 Onlne Appendx Appendx E: Proofs Proof of Proposton 1 Frst we derve the equlbrum when the manufacturer does not vertcally ntegrate

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2].

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2]. Bulletn of Mathematcal Scences and Applcatons Submtted: 016-04-07 ISSN: 78-9634, Vol. 18, pp 1-10 Revsed: 016-09-08 do:10.1805/www.scpress.com/bmsa.18.1 Accepted: 016-10-13 017 ScPress Ltd., Swtzerland

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

Economics 101. Lecture 4 - Equilibrium and Efficiency

Economics 101. Lecture 4 - Equilibrium and Efficiency Economcs 0 Lecture 4 - Equlbrum and Effcency Intro As dscussed n the prevous lecture, we wll now move from an envronment where we looed at consumers mang decsons n solaton to analyzng economes full of

More information

Convexity preserving interpolation by splines of arbitrary degree

Convexity preserving interpolation by splines of arbitrary degree Computer Scence Journal of Moldova, vol.18, no.1(52), 2010 Convexty preservng nterpolaton by splnes of arbtrary degree Igor Verlan Abstract In the present paper an algorthm of C 2 nterpolaton of dscrete

More information

MATH 5707 HOMEWORK 4 SOLUTIONS 2. 2 i 2p i E(X i ) + E(Xi 2 ) ä i=1. i=1

MATH 5707 HOMEWORK 4 SOLUTIONS 2. 2 i 2p i E(X i ) + E(Xi 2 ) ä i=1. i=1 MATH 5707 HOMEWORK 4 SOLUTIONS CİHAN BAHRAN 1. Let v 1,..., v n R m, all lengths v are not larger than 1. Let p 1,..., p n [0, 1] be arbtrary and set w = p 1 v 1 + + p n v n. Then there exst ε 1,..., ε

More information

Perfect Competition and the Nash Bargaining Solution

Perfect Competition and the Nash Bargaining Solution Perfect Competton and the Nash Barganng Soluton Renhard John Department of Economcs Unversty of Bonn Adenauerallee 24-42 53113 Bonn, Germany emal: rohn@un-bonn.de May 2005 Abstract For a lnear exchange

More information

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS BOUNDEDNESS OF THE IESZ TANSFOM WITH MATIX A WEIGHTS Introducton Let L = L ( n, be the functon space wth norm (ˆ f L = f(x C dx d < For a d d matrx valued functon W : wth W (x postve sem-defnte for all

More information

Anti-van der Waerden numbers of 3-term arithmetic progressions.

Anti-van der Waerden numbers of 3-term arithmetic progressions. Ant-van der Waerden numbers of 3-term arthmetc progressons. Zhanar Berkkyzy, Alex Schulte, and Mchael Young Aprl 24, 2016 Abstract The ant-van der Waerden number, denoted by aw([n], k), s the smallest

More information

Randić Energy and Randić Estrada Index of a Graph

Randić Energy and Randić Estrada Index of a Graph EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS Vol. 5, No., 202, 88-96 ISSN 307-5543 www.ejpam.com SPECIAL ISSUE FOR THE INTERNATIONAL CONFERENCE ON APPLIED ANALYSIS AND ALGEBRA 29 JUNE -02JULY 20, ISTANBUL

More information

Lecture 4. Instructor: Haipeng Luo

Lecture 4. Instructor: Haipeng Luo Lecture 4 Instructor: Hapeng Luo In the followng lectures, we focus on the expert problem and study more adaptve algorthms. Although Hedge s proven to be worst-case optmal, one may wonder how well t would

More information

SL n (F ) Equals its Own Derived Group

SL n (F ) Equals its Own Derived Group Internatonal Journal of Algebra, Vol. 2, 2008, no. 12, 585-594 SL n (F ) Equals ts Own Derved Group Jorge Macel BMCC-The Cty Unversty of New York, CUNY 199 Chambers street, New York, NY 10007, USA macel@cms.nyu.edu

More information

6. Stochastic processes (2)

6. Stochastic processes (2) Contents Markov processes Brth-death processes Lect6.ppt S-38.45 - Introducton to Teletraffc Theory Sprng 5 Markov process Consder a contnuous-tme and dscrete-state stochastc process X(t) wth state space

More information

Global Sensitivity. Tuesday 20 th February, 2018

Global Sensitivity. Tuesday 20 th February, 2018 Global Senstvty Tuesday 2 th February, 28 ) Local Senstvty Most senstvty analyses [] are based on local estmates of senstvty, typcally by expandng the response n a Taylor seres about some specfc values

More information

20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness.

20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness. 20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The frst dea s connectedness. Essentally, we want to say that a space cannot be decomposed

More information

6. Stochastic processes (2)

6. Stochastic processes (2) 6. Stochastc processes () Lect6.ppt S-38.45 - Introducton to Teletraffc Theory Sprng 5 6. Stochastc processes () Contents Markov processes Brth-death processes 6. Stochastc processes () Markov process

More information

Solutions to exam in SF1811 Optimization, Jan 14, 2015

Solutions to exam in SF1811 Optimization, Jan 14, 2015 Solutons to exam n SF8 Optmzaton, Jan 4, 25 3 3 O------O -4 \ / \ / The network: \/ where all lnks go from left to rght. /\ / \ / \ 6 O------O -5 2 4.(a) Let x = ( x 3, x 4, x 23, x 24 ) T, where the varable

More information

Finding Dense Subgraphs in G(n, 1/2)

Finding Dense Subgraphs in G(n, 1/2) Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng

More information

Random Walks on Digraphs

Random Walks on Digraphs Random Walks on Dgraphs J. J. P. Veerman October 23, 27 Introducton Let V = {, n} be a vertex set and S a non-negatve row-stochastc matrx (.e. rows sum to ). V and S defne a dgraph G = G(V, S) and a drected

More information

Learning Theory: Lecture Notes

Learning Theory: Lecture Notes Learnng Theory: Lecture Notes Lecturer: Kamalka Chaudhur Scrbe: Qush Wang October 27, 2012 1 The Agnostc PAC Model Recall that one of the constrants of the PAC model s that the data dstrbuton has to be

More information

Chapter 7 Channel Capacity and Coding

Chapter 7 Channel Capacity and Coding Wreless Informaton Transmsson System Lab. Chapter 7 Channel Capacty and Codng Insttute of Communcatons Engneerng atonal Sun Yat-sen Unversty Contents 7. Channel models and channel capacty 7.. Channel models

More information

arxiv: v1 [math.co] 1 Mar 2014

arxiv: v1 [math.co] 1 Mar 2014 Unon-ntersectng set systems Gyula O.H. Katona and Dánel T. Nagy March 4, 014 arxv:1403.0088v1 [math.co] 1 Mar 014 Abstract Three ntersecton theorems are proved. Frst, we determne the sze of the largest

More information

MMA and GCMMA two methods for nonlinear optimization

MMA and GCMMA two methods for nonlinear optimization MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there

More information

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also

More information

Coding over an Erasure Channel with a Large Alphabet Size

Coding over an Erasure Channel with a Large Alphabet Size 1 Codng over an Erasure Channel wth a Large Alphabet Sze Shervan Fashand, Shahab Oves Gharan and Amr K. Khandan ECE Dept., Unversty of Waterloo, Waterloo, O, Canada, 2L3G1 emal: sfashand,shahab,khandan}@cst.uwaterloo.ca

More information

and problem sheet 2

and problem sheet 2 -8 and 5-5 problem sheet Solutons to the followng seven exercses and optonal bonus problem are to be submtted through gradescope by :0PM on Wednesday th September 08. There are also some practce problems,

More information

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

CONJUGACY IN THOMPSON S GROUP F. 1. Introduction

CONJUGACY IN THOMPSON S GROUP F. 1. Introduction CONJUGACY IN THOMPSON S GROUP F NICK GILL AND IAN SHORT Abstract. We complete the program begun by Brn and Squer of charactersng conjugacy n Thompson s group F usng the standard acton of F as a group of

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011 Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected

More information

A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS

A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS Journal of Mathematcal Scences: Advances and Applcatons Volume 25, 2014, Pages 1-12 A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS JIA JI, WEN ZHANG and XIAOFEI QI Department of Mathematcs

More information