Saddle Points in Random Matrices: Analysis of Knuth Search Algorithms

Size: px
Start display at page:

Download "Saddle Points in Random Matrices: Analysis of Knuth Search Algorithms"

Transcription

1 Saddle Points in Rando Matrices: Analysis of Knuth Search Algoriths Micha Hofri Philippe Jacquet Dept. of Coputer Science INRIA, Doaine de Voluceau - Rice University Rocquencourt - B.P. 05 Houston TX Le Chesnay Cedex, France e-ail: hofri@cs.rice.edu e-ail: Philippe.Jacquet@inria.fr Abstract We present an analysis of algoriths for finding saddle points in a rando atrix, presented by Donald E. Knuth as exercise in The Art of Coputer Prograing. We estiate the average coputing costs of three saddle point search algoriths. Ausingly, the asyptotic results in this analysis about atrix saddle points uses the sae approach that leads to the celebrated saddle point ethod in coplex analysis.. Introduction A atrix saddle point is defined in [3] as an eleent of the atrix which is the sallest in its row, and the largest in its colun. Exercise there shows two algoriths to find such saddle points, and suggests a third. In this paper we respond to exercise there, and analyze the average cost of these three saddle point search algoriths. Soe of the results are only given explicit for asyptotically, as the nubers of both rows and coluns tend to infinity. Note: while we selected here a direct approach to derive the asyptotics, by a curious coincidence they also follow fro recent depoissonization results of the second author and Wociech Szpankowski [2], results which were obtained via the saddle point ethod of coplex analysis. This is shown in an Appendix. The calculations below concern the rando variables one needs in order to copute expected processing ties. In particular, unlike the custo in [3], we do not count the instructions and their execution ties in a MIX progra, to deterine the ultipliers of these variables. We consider atrices with distinct values. The scenario where values ay be repeated introduces additional difficulties, which are not addressed here, except in the last section. We do not quite follow the way the proble is presented a atrix with distinct eleents with all its perutations equally

2 likely since one can avoid looking at all possible rearrangeents of a fixed set of eleents by using the following result: Theore : Let an algorith operate on an n nuerical atrix in such a way that only orderrelations between the ters affect its operation (never the actual values). Then the sae probabilistic behavior is observed under the following two scenarios: () All the atrix eleents are distinct, and all (n)! possible rearrangeents of the eleents are equally likely. (2) The atrix eleents are drawn independently using the sae continuous, ato-less distribution. The proof is direct: since a atrix can be associated with a sequence in a consistent way (e.g. by catenating successive rows), and each sequence constructed by ethod (2) can be naturally related to a perutation fro the syetric group S n (using the relative order of its eleents), we only need to show inductively on the size of the sequence that each such eber is obtained in probability =(n)! an iediate calculation. 2. Notation and Assuptions We denote the nuber of rows and coluns by and n respectively. Rows are nubered through etc. The values of the iniu eleent of row i and the axiu eleent of colun are denoted by R i and C, respectively. In our odel they are rando variables. The operations of finding row-inia or colun-axia in each of the algoriths are independent of each other, and each takes a tie as discussed in [3, x.2.0], over n or entries. These durations are denoted by T n and T respectively. It is known that E[T n ] = α + βn + νlnn, where the Greek letters represent instruction counts and ties that depend on the ipleentation. We use the abbreviations pdf for probability distribution function and df for such a density function. Let the pdf fro which the eleents are drawn be F() with the corresponding density f (). Since any continuous ato-less pdf would do, we could pick a particular one, even the ever-so-convenient U(0; ). Keeping the sybol F akes soe of the calculations ore transparent. An arbitrary atrix ter is denoted by X. 2. The inax and axin inequality The following theore is shown in [3] by eleentary considerations: Theore 2: For an arbitrary nuerical atrix let inax be the iniu value of all coluns axia, and siilarly, let axin be the axiu value of all row inia. Then 2

3 axin inax; The atrix has a saddle point if and only if inax = axin, and then this is the value of the saddle point. A atrix with distinct ters can have one saddle point at ost. 2.2 Saddle point probability The likelihood that a saddle point occurs in a distinct-values atrix is coputed in [3], and is shown there to be quite sall: P n Pr[An n atrix has a saddle point] = + n : () This quantity is n ties the probability of occurrence of a saddle point at any given position in the atrix. The last observation allows us to rederive the result in [3] fro the equivalent odel, by theore. Let x be the value of a specific eleent. The probability that the other n? ters of its row are greater than x is (? F(x)) n?. Siilarly, the probability that the other? ters in its colun are saller than x is F(x)?. Therefore the probability of occurrence of saddle point in the specified R position is? F(x)? (? F(x)) n? f (x)dx = n(n+)(n+?) (?)(?2). Multiplying by n reproduces the above result.? +n n 3. Knuth s saddle point search algoriths These algoriths coe with no clai of being optial or even particularly good. They are used as tutorial prograing exaples in The Art of Coputer Prograing. Correspondingly, the following should be considered an exercise in analysis of algoriths, in the sense that although the analyses point to various possible iproveents in the algoriths, we rarely follow these issues. Note: We discuss soe of these aspects briefly in the last section. A ore sophisticated approach to searching for saddle points is described in []. 3. Algorith I: row-oriented At the level of detail needed here, this algorith does the following:. For rows i = through, 2. Locate inia R i, (only one is found in the current scenario) 3

4 3. Copare R i against eleents in its colun: 4. If a larger eleent is found, continue to next row, 5. Else return the iniu and its location: a saddle point has been found. Exit. 3.2 Algorith II: two-phase algorith Phase one: scan coluns.. For coluns = through n, 2. Locate axia C, (only one is found in the current scenario) 3. Copare C against the sallest found so far, and keep the record in µ. At the end of this phase the variable µ holds the value of inax. Phase two: scan rows. 4. For row i = through, 5. Search the row for an eleent saller than µ. 6. If the search succeeds, continue to the next row. 7. If the search fails, µ is the value of the saddle point; by virtue of theore 2 µ itself is found in that row. Exit. 3.3 Algorith III: algorith II + theore 2 The third algorith has two phases like algorith II, and the first phase is nearly identical with the first one there: the only difference is that in addition to recording the sallest colun axiu found so far in µ, it also records the row in which each new record is found, denoted by ρ. By the coent at the end of the previous subsection, it suffices, during phase 2, to check that µ is indeed the sallest ter of row ρ. 4. Average case analysis of the search algoriths 4. Analysis of the first algorith Locating each row iniu R i is independent of all other operations and requires the duration T n. Now we exaine the nuber of coparisons of R i with eleents in its colun, denoted by D i. Consider row. Since R is a iniu of n iid F-rando variables, its pdf is? (? F (x)) n. Since the first coparison is of R with itself, D 2. We copute the distribution of D. This is easy to do exactly. We shall then ake an approxiation, and clai that up to a detail we treat explicitly, the sae distribution applies for all the other R i. The detail is that while each R i is copared with 4

5 the ters in its colun, if a larger value is not found in the first i? trials, the next coparison is duy when R i is copared with itself since it never terinates the search. Concerning the need for approxiation: If in any of the first i? rows the local row-iniu was found in the sae colun as R i, we know that it ight have been copared with R i before. This introduces a dependence between the coparisons. We rid ourselves of this coplicated dependence by a siple device: we odify the algorith. We assue that it does not terinate when a saddlepoint is found, as line 5 in x2. now says; instead, the algorith always exaines all row-inia. This accoplishes the goal, since now the fact that we reached row i provides no inforation about the outcoes of the coparisons done in the previous searches, aking the above clai that the D i have (essentially the sae) independent distributions precise. What is the effect of the odification? It only changes the operation of the algorith when a saddle point is found. This event is so rare, that the relative error it introduces, on the order of the probability given in (), is sufficiently sall that it can be safely disregarded. We illustrate this clai by an exaple below. No calculations are needed to see by syetry that u Pr[D = 2] = Pr[R < X] = n=(n + ): If R survives the coparison, in probability v? u = =(n + ), it is the second order-statistic aong n +, and has the density f (2) n+ (x) = n(n + )F(x) f (x) (? F(x))n?. We proceed in this way to find successive f n+ ( +) (x), the conditional df of R following + coparisons (including the duy one), given by f n+ ( +) n + (x) = f (x)f (x) (? F(x)) n? ; (2) ;;n? and v +, the probability that a variable with this distribution is larger than X, is given by With the natural definition u +? v + we have v + = + n + + ; (v 0 ): (3) p r? Pr[D = r] = v v 2 :::v r?2 u n n + r?? r? = ; 2 r : (4) r? n And our assuption is that for row i, 2 i the following holds: 8 >< p r r < i Pr[D i = r] = 0 r = i : (5) >: i < r p r? These probabilities do not su to one: if D i > we declare that R i is a saddle point We use this approach to copute once again the probability of such a atrix having a saddle point. It provides an exaple for our clai about the error our odification of the algorith introduces. We 5

6 copute the copleentary probability, of the event fall D i g, none overflows. For any row i we (?)! have Pr[D i ] =? v :::v? =?(n+?)!=n!, hence (? )!n! Pr[no saddle point]? =? P n ( + O(P n)); (6) (n +? )! where P n is the sall probability given in (). One can define a rando variable, R, the nuber of rows the unodified algorith uses, but again, unless the atrix is very sall, it equals with a probability so close to that it is not very useful. The expected values of the D i are directly available fro equations (4) and (5): i? E[D i ] = r + rp r? = r=rp r>i n n? +? n+i? i? : (7) Over the execution of the algorith i varies fro through, and the expected overall (odified) nuber of coparisons is then E[D] = i= E[D i ] = n( + ) n?? n n? Except for very sall and n, the second ter above is negligible.? +n? : (8) It is interesting to see if this analysis can suggest whether this algorith, when used on nonsquare atrices, should follow the above outline, or rotate the atrix and exchange the roles of rows and coluns, assuing no other considerations (such as virtual storage anageent) intervene. Surely the algorith logic is invariant under such a rotation (this holds, utatis utandis, for all three algoriths). The total ties in both cases can be written as T rows = T n + T (D rows ) and T coluns = nt + T (D coluns ). Adding ore detail for the expectations, with appropriate ultipliers (α 0 represents all the fixed overhead needed at each row/colun, but we disregard the setup costs that would be the sae in each orientation), copared with E[T rows ] = (α 0 + βn + νlnn) + δ E[T coluns ] = n(α 0 + β + νln) + δ n( + ) n?? n n? (n + )???? +n?? +n? n! ; (9)! : (0) The leading ter is the sae. The last ter is negligible, and otherwise the difference can be written as n? E[T rows ]? E[T coluns ] = (? n) α 0? δ + νln n (n? )(? ) n : () Typically α 0 > δ; also the ultiplier of δ is nearly, and that of ν is positive when n > ; since we also expect α 0 to exceed ν, it sees the algorith should proceed along the shorter diension (i.e. as above, if n > ) but actual estiates of these paraeters would be needed to ake a definite call. 6

7 4.2 Analysis of the second algorith The first phase requires tie of nt + T n and it finds the inax value, µ. The T n accounts for selecting µ fro the successively deterined C. Since this is not the sae as a direct search over n entries, the instruction counts in this T n would differ, but the sae variables appear. In the second phase the scan of any given row stops as soon as a ter strictly saller than µ is found. We now copute the distributions of lengths of these scans. The analysis requires the distributions of the relevant rando variables: the inax with value µ, the colun axia C with values (x ; : : :;x n ), which we condition on µ, and row eleents. The sae algorithic odification as before, aking the algorith search rows even when a saddle point is discovered, akes the distribution of the inspected row eleents independent of their row index, but once we condition the on (C ; : : :;C n ) = (x ; : : :;x n ), the distributions depend on their colun indices. The unconditional pdf of any C is Pr[C x] = F (x), and that of µ is Pr[µ x] =? (? F (x)) n. The distribution function of C conditioned on the value of inax being µ, and on its occurring in another colun, equals c (x µ) Pr[C x C > µ] = F (x)? F (µ)? F ; (x µ): (2) (µ) Finally, the conditional distribution of a atrix ter in position (i; ) is given by Pr[A i x C = x ] = F(x)=F(x ): We consider now the scan of an arbitrary row. Let q i (µ) be the probability that the scan overflows colun i, i.e., at least the first i scanned ters there are all greater than or equal to µ; clearly q 0 (µ) =. Let us look at q (µ); it equals Pr[A: µ]. Coputing it is easy using the above conditional distribution of A: given C = x, and the distribution of C given µ. There are additional considerations due to the following possibilities: (a) in probability = the first ter in the row is C, then A: = C µ and the scan continues, and (b) in probability =n the inax falls in the first colun, then C = µ > A: and the scan ends, except in the case covered in part (a) (and then C = µ = A:). Hence q (µ) = = + (? =n)(? =)Pr[A: µv], where V denotes the event finax is not in the first colun, and C is not in the scanned rowg. This last probability equals Z x µ? F(µ) F? (x ) F(x )? F f (x )dx ; (µ) and we find q (µ) = + (?? F (µ) n )? F? : (3) (µ) 7

8 For q (µ), n, we have a generalization of this result by noticing that the only way coputations for different coluns interact is via the above consideration (b). We use in (4) below the unusual notation (? n ), where its power (? n )k stands for (? n )(? n? )(? n?k ) =? k n. This is the probability that a given subset of k coluns does not contain inax. A consideration of the possible configurations of events that lead the scan to go beyond the first coluns allows us to write, even without the need to integrate over the axia x ; : : :;x explicitly, q (µ) = =? F(µ) +? F? (µ)? F (µ)? F (µ)? n + n (? n ) (4)? F (µ) : (5)? F(µ) The average nuber of coluns inspected in a row, after reoving the conditioning on the inax, is R µ=? (q 0(µ) ++q n (µ))nf? (µ)(?f (µ)) n? f (µ)dµ. It is possible to obtain a closed for for the su under the integral, but there is no advantage in doing so. The expressions siplify when we ake the change of variable under the integral of x and we can then write E[q ] = Z Z µ=? x=0 F(µ), q (µ)nf? (µ)(? F (µ)) n? f (µ)dµ (6)? x? x? n + n? x nx? (? x ) n? dx:? x We deterine an asyptotic expansion of this ean. In the process we shall discover that we need only few of these, since E[q + ] = o(e[q ]). R The basic expression we consider 2 is I k;n 0 (? x)k x? (? x ) n? dx: Distributing the first binoial and using the substitution t x produces an iediate integral: I k;n = r k r (?) r Γ( r + ) Γ(n) Γ(n + + r (7) ): The dependence of this value on the atrix size paraeters is not obvious, and we intend to clarify the issue via an asyptotic estiate. We assue that both n and!. In addition, we assue that their rates of growth are coparable; specifically, whenever we truncate expansions below we assue that = o(n lnn)and n = o( ln) (but not necessarily as close as = Θ(n)). The values of k above, and hence r, ay be assued sall (the largest value we actually use below is 2). We replace Γ( + r=) by its Taylor developent at, noting that it is at the sae tie a power series in r and and an asyptotic series in? : Γ( + r=) = 0 γ (r=), where γ = Γ ( ) ()=!. This expression ay also be written as (? n )k = (+ v )(? v n )k v=0. 2 We provide here a direct asyptotic evaluation of this integral. The appendix shows how to obtain for it an expansion using depoissonization, according to the results in [2], which are based on the coplex saddle-point ethod. 8

9 The ratio Γ(n)=Γ(n + + r=) is developed asyptotically as in [4, x4.5]. It is a direct calculation fro the standard representation of the gaa function at x by the integral R t0 e?t t x? dt, and to third order in =n and = produces Γ(n) Γ(n + + r=) = n?? r? r 2n? r2 2 2 n + r 2n 2 + O(?2 n?2 ) The salient feature of this is again that in the parenthesized factor all powers of r ust appear with like powers of?. In addition, except the first, they all coe with additional powers of n? sprinkled along. For n?r= we write the natural Taylor developent i0 (?r lnn=) i =i!.? Note that k r r (?) r r s with s a non-negative integer equals k!(?) k s k (where s k is the subset coefficient, or Stirling nuber of the second kind). Therefore it vanishes, unless s k. Hence only ters of order?k and higher (i.e., saller) survive the suation in (7). In particular, ters with r k produce the leading ter. Inserting all these into equation (7), and only keeping the leading ter, we find I k;n = n r = n = k t=0 k r n k t (?) r γ t t (?)k?t k t?r i ln i n r + O i! n r γ i lnn k?t (k?t)! k!(?)k + O b t ln k?t n lnn n + O lnn n (8) ; (9) where we use the notation b t (?) t t!γ t = (?) t t!γ ( ) (). The next order ter coes fro aditting the next two ters in the parenthesized factor of equation (8), as well as including those fro the collection [r k+ ]fγ( + r=)n?r= g, which we do not use below. In ters of these integrals, E[q ] = (n? )I ;n? + I?;n? +. The second ter is here of lower order than the first, and we find E[q ] = lnn t lnn b t ln k?t n + O t n : (20) The above clai, that E[q + ] = o(e[q ]), clearly holds. The replaceent of 0 E[q ] by the first three ters is then adequate at the order we aintain. We evaluate the and find E[Q] + lnn + γ + O lnn n The total expected coputation tie for the second algorith would then be, for soe suitable coefficient δ, given by nt + T n + δ( + (γ + ln n)=). Note that the doinant ter is in the nt part, siilar to what we had for the first algorith. (2) 9

10 4.3 Analysis of the third algorith The first phase of the third algorith is nearly identical to that of the second algorith. The only difference is that during its operation we now record the rows where the successive candidates for inax reside. This adds n? coparisons and, on the average, lnn replaceents of the current record value of inax. The second phase consists of the scan of a single selected row; the scan stops when a atrix eleent strictly saller than µ is found. This is the only algorith of the present trio in which we need ake no change to provide an accurate analysis. We use the ethodology developed for the analysis of the second algorith. Let r i (µ) be the probability that the row scan overflows colun i, with the convention that r 0 (µ) =. Here again we start with an evaluation of r (µ), for an equivalent of equation (3). The ain difference with the second algorith is that here, when the scan reaches the colun whose axiu is the inax, the atrix eleent equals µ and the scan is never terinated there, while in the second algorith this was the case with probability = only. For the coputation of r (µ), a convenient way to proceed is to separate the case where C is the inax, in probability =n, and the scan continues; otherwise, with a (conditional) probability of =; C is in the sae row and again the scan continues. If it is not, we need to evaluate an integral, identical to the one that led to equation (3). Writing it all in ters of the transforation we used for equation (6), we find r (x) = n +?? n + Z x!? xx x? dx? x : (22) Hence r (x) = n +(??x n )(?x ). With, siilar considerations to those used to produce equation (4) lead to the generalization: r (x) = =? x? x? x (? n )? x?? x n +?? x n? x : (23) The expected nuber of coparisons in phase 2 of the algorith is, as before, R 0 (r 0(x) + + r n (x))nx? (? x ) n? dx. Expressing E[r ] in ters of the integrals of type I k;n we see that E[r ] = I?;n? + + (n? )I ;n? ; 0

11 the sae integrals we needed for E[q ], albeit with different ultipliers. A siilar calculation produces E[r ln n ] = t bt t ln t + n n t? + O lnn lnn : Since these contributions to the expected nuber of coparisons decrease geoetrically in we only consider the first ones and find E[r ] = 0 lnn + + γ? + O n n + : (24) We use no further ters, since this value is two orders (in or n) below the cost of the first phase and unlike algorith II, it does not get ultiplied by. 5. Conclusion We have carried out probabilistic analyses of three soewhat siilar algoriths, and should not be surprised that their costs are siilar as well. Let us write for coparison the costs of all three, inserting Greek letters wherever needed to represent instruction and tie ultipliers, and using a letter and its pried version to denote siilar values. In C I we exchanged and n (rotated the atrix) for coparison purposes. C I = nt + δ(n + )? = n(α + β + νln + δ) + δ; C II = nt + T n + δ 0 ( + lnn + γ) = n(α + β + ν 0 ln + δ 0 (=n + lnn=n + γ=n)); C III = nt + T n + κlnn + δ 0 ( + ln n ) = n(α + β + ν 0 ln) + α 0 + βn + (ν + κ)ln n + δ 0 : Several coents are in order: () In each algorith cost, the first phase (in II and III, or the deterination of row inia in I) doinates. Moreover, the ain ter is the sae in all βn and since β and δ are siilar in agnitude, the costs of the first and third algorith are as close as it sees to atter, with a shade favoring algorith III, whereas algorith II is slightly ore expensive. When we consider that careful prograing (as deonstrated in the ipleentations of the first two algoriths presented in [3]) can result in nontrivial savings, by cobining various coponents of each algorith, we realize that uch of these differences ay be illusory. (2) The conclusions in coent () depend soewhat on our assuption that and n are of siilar order (see the discussion following equation (7)). If this were not the case, we would need to odify the to soe extent, but not drastically, since the leading ter in all the cost functions βn is syetrical in the atrix diensions. (3) While we spent uch effort on the probabilistic analysis of the second-phase costs, ost of the

12 cost there is deterinistic. Indeed, in all three algoriths, the difference between shortest and longest possible coputations ( best case and worst case ), is quite odest. (4) The algoriths we describe assue unlike the versions presented in [3] that all ters are distinct. At the level of our analysis the differences do not play a role. (5) The perforance of saddle point search algoriths when the ters ay not be all distinct can be quite different, as soe extree experients reported in the solution to exercise in [3] show. Clearly it is possible to design specialized algoriths for soe scenarios. An obvious case is when the atrix can have two distinct ters only; then we need only search for a row of high value ters, or a colun of low values. An algorith that does ust this would require on the average only 2( + n) coparisons. Interestingly, here the worst case ay exceed substantially the average one. With ore possible values, special algoriths will not bring nearly as uch savings, and are probably not cost effective. The next point is relevant here too. (6) As noted in [], not uch can be done for atrices with repeated values (when known to have ore than two levels) to obtain a ore efficient algorith. In particular, there is no escaping the ter βn. However, for atrices with distinct ters, it is possible to design an algorith with running tie bound by O(n lg3 ), where lg3 :585 : : : (this expression assues the atrix is square, and hides aterially higher nuerical coefficients than we have seen above). (7) The assuption of coparable growth rates for and n sees natural in this context, but does not affect the techniques needed for developing the asyptotic results only the ters that need to be collected, to get all that belong to a desired order. Acknowledgeent We would like to thank Donald E. Knuth who pointed out this unsolved exercise in his Art of Coputer Prograing, and gave valuable coents and iproveents to the solution we proposed. Appendix Depoissonization Asyptotics This is a different approach to coputing an asyptotic expansion of the integral I k;n. It is convenient to change here slightly the notation, and look instead at Z k I k;n+ g ;n = k (? x) k x? (? x ) n dx; 0 for a fixed k, and n and both tending to infinity. We eploy the Poisson generating function G (z) = n z n g ;n n! e?z and use the depoissonization leas presented by Jacquet and Szpankowski in 2

13 [2]. Corollary there states that if a sequence of Poisson generating functions G (z) are all entire, and satisfy the following two properties, uniforly in :. For all z in a linear cone including the positive real axis 3, the functions G (z) are uniforly in O(z β L(z)), with L(z) a slowly varying function For all z outside the linear cone, G (z)e z = P(z)e z, where P(z) decreases faster than the reciprocal of any polynoial. Then g ;n = G (n) + O(n β? L(n)). Note: The expansion can be further continued, to any order: i=k g ;n = i=0 i+k? b i; n i G (i) (n) + O(n β?k? L(n)) ; =0 where G (i) (n) is the ith derivative of G (z) at z = n. The coefficients b i; are obtained fro the Taylor power series developent: i; b i; x i y = exp(xln(+y)?xy): They can coputed recursively, starting with b 0;0 = through: b i; + =?( b i; +b i?;? )=( +). The recursion iplies that b i; = 0, for all < 2i. We do not use this extension below. We show first that the Poisson generation functions of the double sequence g ;n satisfy the above two conditions. The suation to obtain the functions is iediate: G (z) = k R 0 (? x)k x? e?xz dx, and they are clearly entire. For this function, G (z) G (R(z)). Hence, when we prove condition for a z which is real and positive, we have shown that it holds for an entire linear cone S θ (in the right half coplex plane i.e., 0 < θ < π=2). Since z R(z), condition 2 is satisfied trivially for this function. Let z be real and positive. We prove that G (z) (lnz)k z by transforing it. The change of variable x = e?y leads to: G R (z) = k 0 (? e?y= ) k e?y exp[?ze?y ]dy. Since?e?x x for all positive x, we find G (z) Z 0 y k e?y exp[?ze?y ]dy: (25) We only add O(e?z ) to the integral when we extend the liit of integration to? (and this is shown below to be negligible). Hence, G (z) R? yk e?y exp[?ze?y ]dy + O(e?z ). 3 Such a cone is a region in the coplex plane defined by S θ = fz : argz θ; 0 < θ < π=2g. 4 L(z) is a slowly varying function (at infinity) in the cone S θ if li u! L(aue iρ )=L(u)=, for all a > 0 and ρ < θ. 3

14 By obvious change R of variable we get G R (z) z? (x + lnz)k e?x exp[?e?x ]dx. The integral? (?x) e?x exp[?e?x ]dx equals the th derivative of the gaa function at (using the sae representation that leads to (8)), which is bounded by!, hence as z increases the leading ter in the above bound is (lnz) k =z. Therefore condition is proved with β =? and L(z) = (lnz) k. To obtain our expansion we evaluate G (z) as above, up to the expression leading to equation (27), but avoid siplifying. Instead we consider G (z) = z Z? k (? e?(y+lnz)= ) k e?y exp[?e?y ]dy + O(e?z ) ; and expand the exponential in k (? e?(y+lnz)= ) k by powers of y: G (z) = z Z? (y + lnz) " k (?) i+ i0 (i + )! # y + ln z i k e?y exp[?e?y ]dy + O(e?z ) : Keeping the first ter (i = 0) only leads to Z G lnz (z) = (y + lnz) k e?y exp[?e?y ]dy + O z? z = z k ln k? (z)(?) Γ ( ) lnz () + O 0 z Note that we have lost, as proised, the contribution of O(e?z ). The depoissonization lea then gives g ;n = n 0 k lnn b ln k? n + O ; (26) n where b = (?) Γ ( ) (). This is the exact analog of the result obtained by direct calculation. We expect that for higher-order ters this approach is likely to prove ore anageable. : References [] D. Bienstock, F. Chung, M. Fredan, A. Schäffer, P. Shor, and S. Suri, A note on finding a strict saddle-point, Aerican Math. Monthly 98, (99). [2] P. Jacquet, W. Szpankowski, Analytical depoissonization and its applications, subitted for Theor. Cop. Science, as a Fundaental Study, 997. [3] D. Knuth, The Art of Coputer Prograing, Addison-Wesley, volue : Fundaental Algoriths, rd. Ed [4] F. W. J. Olver, Asyptotics and Special Functions, Acadeic Press, New York,

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

4 = (0.02) 3 13, = 0.25 because = 25. Simi-

4 = (0.02) 3 13, = 0.25 because = 25. Simi- Theore. Let b and be integers greater than. If = (. a a 2 a i ) b,then for any t N, in base (b + t), the fraction has the digital representation = (. a a 2 a i ) b+t, where a i = a i + tk i with k i =

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product.

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product. Coding Theory Massoud Malek Reed-Muller Codes An iportant class of linear block codes rich in algebraic and geoetric structure is the class of Reed-Muller codes, which includes the Extended Haing code.

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels Extension of CSRSM for the Paraetric Study of the Face Stability of Pressurized Tunnels Guilhe Mollon 1, Daniel Dias 2, and Abdul-Haid Soubra 3, M.ASCE 1 LGCIE, INSA Lyon, Université de Lyon, Doaine scientifique

More information

COS 424: Interacting with Data. Written Exercises

COS 424: Interacting with Data. Written Exercises COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words) 1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu

More information

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information

The Euler-Maclaurin Formula and Sums of Powers

The Euler-Maclaurin Formula and Sums of Powers DRAFT VOL 79, NO 1, FEBRUARY 26 1 The Euler-Maclaurin Forula and Sus of Powers Michael Z Spivey University of Puget Sound Tacoa, WA 98416 spivey@upsedu Matheaticians have long been intrigued by the su

More information

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest

More information

a a a a a a a m a b a b

a a a a a a a m a b a b Algebra / Trig Final Exa Study Guide (Fall Seester) Moncada/Dunphy Inforation About the Final Exa The final exa is cuulative, covering Appendix A (A.1-A.5) and Chapter 1. All probles will be ultiple choice

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths

More information

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

Interactive Markov Models of Evolutionary Algorithms

Interactive Markov Models of Evolutionary Algorithms Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article appeared in a ournal published by Elsevier. The attached copy is furnished to the author for internal non-coercial research and education use, including for instruction at the authors institution

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

Sharp Time Data Tradeoffs for Linear Inverse Problems

Sharp Time Data Tradeoffs for Linear Inverse Problems Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used

More information

A Note on the Applied Use of MDL Approximations

A Note on the Applied Use of MDL Approximations A Note on the Applied Use of MDL Approxiations Daniel J. Navarro Departent of Psychology Ohio State University Abstract An applied proble is discussed in which two nested psychological odels of retention

More information

Explicit solution of the polynomial least-squares approximation problem on Chebyshev extrema nodes

Explicit solution of the polynomial least-squares approximation problem on Chebyshev extrema nodes Explicit solution of the polynoial least-squares approxiation proble on Chebyshev extrea nodes Alfredo Eisinberg, Giuseppe Fedele Dipartiento di Elettronica Inforatica e Sisteistica, Università degli Studi

More information

Lecture 21. Interior Point Methods Setup and Algorithm

Lecture 21. Interior Point Methods Setup and Algorithm Lecture 21 Interior Point Methods In 1984, Kararkar introduced a new weakly polynoial tie algorith for solving LPs [Kar84a], [Kar84b]. His algorith was theoretically faster than the ellipsoid ethod and

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13 CSE55: Randoied Algoriths and obabilistic Analysis May 6, Lecture Lecturer: Anna Karlin Scribe: Noah Siegel, Jonathan Shi Rando walks and Markov chains This lecture discusses Markov chains, which capture

More information

Understanding Machine Learning Solution Manual

Understanding Machine Learning Solution Manual Understanding Machine Learning Solution Manual Written by Alon Gonen Edited by Dana Rubinstein Noveber 17, 2014 2 Gentle Start 1. Given S = ((x i, y i )), define the ultivariate polynoial p S (x) = i []:y

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

3.8 Three Types of Convergence

3.8 Three Types of Convergence 3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to

More information

arxiv: v1 [stat.ot] 7 Jul 2010

arxiv: v1 [stat.ot] 7 Jul 2010 Hotelling s test for highly correlated data P. Bubeliny e-ail: bubeliny@karlin.ff.cuni.cz Charles University, Faculty of Matheatics and Physics, KPMS, Sokolovska 83, Prague, Czech Republic, 8675. arxiv:007.094v

More information

Spine Fin Efficiency A Three Sided Pyramidal Fin of Equilateral Triangular Cross-Sectional Area

Spine Fin Efficiency A Three Sided Pyramidal Fin of Equilateral Triangular Cross-Sectional Area Proceedings of the 006 WSEAS/IASME International Conference on Heat and Mass Transfer, Miai, Florida, USA, January 18-0, 006 (pp13-18) Spine Fin Efficiency A Three Sided Pyraidal Fin of Equilateral Triangular

More information

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40 On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

Characterization of the Line Complexity of Cellular Automata Generated by Polynomial Transition Rules. Bertrand Stone

Characterization of the Line Complexity of Cellular Automata Generated by Polynomial Transition Rules. Bertrand Stone Characterization of the Line Coplexity of Cellular Autoata Generated by Polynoial Transition Rules Bertrand Stone Abstract Cellular autoata are discrete dynaical systes which consist of changing patterns

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

Testing Properties of Collections of Distributions

Testing Properties of Collections of Distributions Testing Properties of Collections of Distributions Reut Levi Dana Ron Ronitt Rubinfeld April 9, 0 Abstract We propose a fraework for studying property testing of collections of distributions, where the

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

Descent polynomials. Mohamed Omar Department of Mathematics, Harvey Mudd College, 301 Platt Boulevard, Claremont, CA , USA,

Descent polynomials. Mohamed Omar Department of Mathematics, Harvey Mudd College, 301 Platt Boulevard, Claremont, CA , USA, Descent polynoials arxiv:1710.11033v2 [ath.co] 13 Nov 2017 Alexander Diaz-Lopez Departent of Matheatics and Statistics, Villanova University, 800 Lancaster Avenue, Villanova, PA 19085, USA, alexander.diaz-lopez@villanova.edu

More information

Ch 12: Variations on Backpropagation

Ch 12: Variations on Backpropagation Ch 2: Variations on Backpropagation The basic backpropagation algorith is too slow for ost practical applications. It ay take days or weeks of coputer tie. We deonstrate why the backpropagation algorith

More information

3.3 Variational Characterization of Singular Values

3.3 Variational Characterization of Singular Values 3.3. Variational Characterization of Singular Values 61 3.3 Variational Characterization of Singular Values Since the singular values are square roots of the eigenvalues of the Heritian atrices A A and

More information

The Distribution of the Covariance Matrix for a Subset of Elliptical Distributions with Extension to Two Kurtosis Parameters

The Distribution of the Covariance Matrix for a Subset of Elliptical Distributions with Extension to Two Kurtosis Parameters journal of ultivariate analysis 58, 96106 (1996) article no. 0041 The Distribution of the Covariance Matrix for a Subset of Elliptical Distributions with Extension to Two Kurtosis Paraeters H. S. Steyn

More information

Fairness via priority scheduling

Fairness via priority scheduling Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation

More information

Chaotic Coupled Map Lattices

Chaotic Coupled Map Lattices Chaotic Coupled Map Lattices Author: Dustin Keys Advisors: Dr. Robert Indik, Dr. Kevin Lin 1 Introduction When a syste of chaotic aps is coupled in a way that allows the to share inforation about each

More information

EE5900 Spring Lecture 4 IC interconnect modeling methods Zhuo Feng

EE5900 Spring Lecture 4 IC interconnect modeling methods Zhuo Feng EE59 Spring Parallel LSI AD Algoriths Lecture I interconnect odeling ethods Zhuo Feng. Z. Feng MTU EE59 So far we ve considered only tie doain analyses We ll soon see that it is soeties preferable to odel

More information

Some Perspective. Forces and Newton s Laws

Some Perspective. Forces and Newton s Laws Soe Perspective The language of Kineatics provides us with an efficient ethod for describing the otion of aterial objects, and we ll continue to ake refineents to it as we introduce additional types of

More information

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs International Cobinatorics Volue 2011, Article ID 872703, 9 pages doi:10.1155/2011/872703 Research Article On the Isolated Vertices and Connectivity in Rando Intersection Graphs Yilun Shang Institute for

More information

IN modern society that various systems have become more

IN modern society that various systems have become more Developent of Reliability Function in -Coponent Standby Redundant Syste with Priority Based on Maxiu Entropy Principle Ryosuke Hirata, Ikuo Arizono, Ryosuke Toohiro, Satoshi Oigawa, and Yasuhiko Takeoto

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

Physics 215 Winter The Density Matrix

Physics 215 Winter The Density Matrix Physics 215 Winter 2018 The Density Matrix The quantu space of states is a Hilbert space H. Any state vector ψ H is a pure state. Since any linear cobination of eleents of H are also an eleent of H, it

More information

Biostatistics Department Technical Report

Biostatistics Department Technical Report Biostatistics Departent Technical Report BST006-00 Estiation of Prevalence by Pool Screening With Equal Sized Pools and a egative Binoial Sapling Model Charles R. Katholi, Ph.D. Eeritus Professor Departent

More information

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool Constant-Space String-Matching in Sublinear Average Tie (Extended Abstract) Maxie Crocheore Universite de Marne-la-Vallee Leszek Gasieniec y Max-Planck Institut fur Inforatik Wojciech Rytter z Warsaw University

More information

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving

More information

Distributed Subgradient Methods for Multi-agent Optimization

Distributed Subgradient Methods for Multi-agent Optimization 1 Distributed Subgradient Methods for Multi-agent Optiization Angelia Nedić and Asuan Ozdaglar October 29, 2007 Abstract We study a distributed coputation odel for optiizing a su of convex objective functions

More information

Ph 20.3 Numerical Solution of Ordinary Differential Equations

Ph 20.3 Numerical Solution of Ordinary Differential Equations Ph 20.3 Nuerical Solution of Ordinary Differential Equations Due: Week 5 -v20170314- This Assignent So far, your assignents have tried to failiarize you with the hardware and software in the Physics Coputing

More information

Fourier Series Summary (From Salivahanan et al, 2002)

Fourier Series Summary (From Salivahanan et al, 2002) Fourier Series Suary (Fro Salivahanan et al, ) A periodic continuous signal f(t), - < t

More information

Statistical properties of contact maps

Statistical properties of contact maps PHYSICAL REVIEW E VOLUME 59, NUMBER 1 JANUARY 1999 Statistical properties of contact aps Michele Vendruscolo, 1 Balakrishna Subraanian, 2 Ido Kanter, 3 Eytan Doany, 1 and Joel Lebowitz 2 1 Departent of

More information

Necessity of low effective dimension

Necessity of low effective dimension Necessity of low effective diension Art B. Owen Stanford University October 2002, Orig: July 2002 Abstract Practitioners have long noticed that quasi-monte Carlo ethods work very well on functions that

More information

The Hilbert Schmidt version of the commutator theorem for zero trace matrices

The Hilbert Schmidt version of the commutator theorem for zero trace matrices The Hilbert Schidt version of the coutator theore for zero trace atrices Oer Angel Gideon Schechtan March 205 Abstract Let A be a coplex atrix with zero trace. Then there are atrices B and C such that

More information

1 Identical Parallel Machines

1 Identical Parallel Machines FB3: Matheatik/Inforatik Dr. Syaantak Das Winter 2017/18 Optiizing under Uncertainty Lecture Notes 3: Scheduling to Miniize Makespan In any standard scheduling proble, we are given a set of jobs J = {j

More information

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS A Thesis Presented to The Faculty of the Departent of Matheatics San Jose State University In Partial Fulfillent of the Requireents

More information

Birthday Paradox Calculations and Approximation

Birthday Paradox Calculations and Approximation Birthday Paradox Calculations and Approxiation Joshua E. Hill InfoGard Laboratories -March- v. Birthday Proble In the birthday proble, we have a group of n randoly selected people. If we assue that birthdays

More information

arxiv: v1 [cs.ds] 17 Mar 2016

arxiv: v1 [cs.ds] 17 Mar 2016 Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass

More information

A new type of lower bound for the largest eigenvalue of a symmetric matrix

A new type of lower bound for the largest eigenvalue of a symmetric matrix Linear Algebra and its Applications 47 7 9 9 www.elsevier.co/locate/laa A new type of lower bound for the largest eigenvalue of a syetric atrix Piet Van Mieghe Delft University of Technology, P.O. Box

More information

Homework 3 Solutions CSE 101 Summer 2017

Homework 3 Solutions CSE 101 Summer 2017 Hoework 3 Solutions CSE 0 Suer 207. Scheduling algoriths The following n = 2 jobs with given processing ties have to be scheduled on = 3 parallel and identical processors with the objective of iniizing

More information

Supplementary Information for Design of Bending Multi-Layer Electroactive Polymer Actuators

Supplementary Information for Design of Bending Multi-Layer Electroactive Polymer Actuators Suppleentary Inforation for Design of Bending Multi-Layer Electroactive Polyer Actuators Bavani Balakrisnan, Alek Nacev, and Elisabeth Sela University of Maryland, College Park, Maryland 074 1 Analytical

More information

OBJECTIVES INTRODUCTION

OBJECTIVES INTRODUCTION M7 Chapter 3 Section 1 OBJECTIVES Suarize data using easures of central tendency, such as the ean, edian, ode, and idrange. Describe data using the easures of variation, such as the range, variance, and

More information

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds

More information

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul

More information

On Conditions for Linearity of Optimal Estimation

On Conditions for Linearity of Optimal Estimation On Conditions for Linearity of Optial Estiation Erah Akyol, Kuar Viswanatha and Kenneth Rose {eakyol, kuar, rose}@ece.ucsb.edu Departent of Electrical and Coputer Engineering University of California at

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

arxiv: v2 [math.co] 3 Dec 2008

arxiv: v2 [math.co] 3 Dec 2008 arxiv:0805.2814v2 [ath.co] 3 Dec 2008 Connectivity of the Unifor Rando Intersection Graph Sion R. Blacburn and Stefanie Gere Departent of Matheatics Royal Holloway, University of London Egha, Surrey TW20

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

General Properties of Radiation Detectors Supplements

General Properties of Radiation Detectors Supplements Phys. 649: Nuclear Techniques Physics Departent Yarouk University Chapter 4: General Properties of Radiation Detectors Suppleents Dr. Nidal M. Ershaidat Overview Phys. 649: Nuclear Techniques Physics Departent

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

Hybrid System Identification: An SDP Approach

Hybrid System Identification: An SDP Approach 49th IEEE Conference on Decision and Control Deceber 15-17, 2010 Hilton Atlanta Hotel, Atlanta, GA, USA Hybrid Syste Identification: An SDP Approach C Feng, C M Lagoa, N Ozay and M Sznaier Abstract The

More information

lecture 36: Linear Multistep Mehods: Zero Stability

lecture 36: Linear Multistep Mehods: Zero Stability 95 lecture 36: Linear Multistep Mehods: Zero Stability 5.6 Linear ultistep ethods: zero stability Does consistency iply convergence for linear ultistep ethods? This is always the case for one-step ethods,

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

Lean Walsh Transform

Lean Walsh Transform Lean Walsh Transfor Edo Liberty 5th March 007 inforal intro We show an orthogonal atrix A of size d log 4 3 d (α = log 4 3) which is applicable in tie O(d). By applying a rando sign change atrix S to the

More information

A PROBABILISTIC AND RIPLESS THEORY OF COMPRESSED SENSING. Emmanuel J. Candès Yaniv Plan. Technical Report No November 2010

A PROBABILISTIC AND RIPLESS THEORY OF COMPRESSED SENSING. Emmanuel J. Candès Yaniv Plan. Technical Report No November 2010 A PROBABILISTIC AND RIPLESS THEORY OF COMPRESSED SENSING By Eanuel J Candès Yaniv Plan Technical Report No 200-0 Noveber 200 Departent of Statistics STANFORD UNIVERSITY Stanford, California 94305-4065

More information

Page 1 Lab 1 Elementary Matrix and Linear Algebra Spring 2011

Page 1 Lab 1 Elementary Matrix and Linear Algebra Spring 2011 Page Lab Eleentary Matri and Linear Algebra Spring 0 Nae Due /03/0 Score /5 Probles through 4 are each worth 4 points.. Go to the Linear Algebra oolkit site ransforing a atri to reduced row echelon for

More information

Support recovery in compressed sensing: An estimation theoretic approach

Support recovery in compressed sensing: An estimation theoretic approach Support recovery in copressed sensing: An estiation theoretic approach Ain Karbasi, Ali Horati, Soheil Mohajer, Martin Vetterli School of Coputer and Counication Sciences École Polytechnique Fédérale de

More information

Hermite s Rule Surpasses Simpson s: in Mathematics Curricula Simpson s Rule. Should be Replaced by Hermite s

Hermite s Rule Surpasses Simpson s: in Mathematics Curricula Simpson s Rule. Should be Replaced by Hermite s International Matheatical Foru, 4, 9, no. 34, 663-686 Herite s Rule Surpasses Sipson s: in Matheatics Curricula Sipson s Rule Should be Replaced by Herite s Vito Lapret University of Lublana Faculty of

More information

The degree of a typical vertex in generalized random intersection graph models

The degree of a typical vertex in generalized random intersection graph models Discrete Matheatics 306 006 15 165 www.elsevier.co/locate/disc The degree of a typical vertex in generalized rando intersection graph odels Jerzy Jaworski a, Michał Karoński a, Dudley Stark b a Departent

More information

Introduction to Optimization Techniques. Nonlinear Programming

Introduction to Optimization Techniques. Nonlinear Programming Introduction to Optiization echniques Nonlinear Prograing Optial Solutions Consider the optiization proble in f ( x) where F R n xf Definition : x F is optial (global iniu) for this proble, if f( x ) f(

More information

A remark on a success rate model for DPA and CPA

A remark on a success rate model for DPA and CPA A reark on a success rate odel for DPA and CPA A. Wieers, BSI Version 0.5 andreas.wieers@bsi.bund.de Septeber 5, 2018 Abstract The success rate is the ost coon evaluation etric for easuring the perforance

More information

Numerical Studies of a Nonlinear Heat Equation with Square Root Reaction Term

Numerical Studies of a Nonlinear Heat Equation with Square Root Reaction Term Nuerical Studies of a Nonlinear Heat Equation with Square Root Reaction Ter Ron Bucire, 1 Karl McMurtry, 1 Ronald E. Micens 2 1 Matheatics Departent, Occidental College, Los Angeles, California 90041 2

More information

The Fundamental Basis Theorem of Geometry from an algebraic point of view

The Fundamental Basis Theorem of Geometry from an algebraic point of view Journal of Physics: Conference Series PAPER OPEN ACCESS The Fundaental Basis Theore of Geoetry fro an algebraic point of view To cite this article: U Bekbaev 2017 J Phys: Conf Ser 819 012013 View the article

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel

Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel 1 Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel Rai Cohen, Graduate Student eber, IEEE, and Yuval Cassuto, Senior eber, IEEE arxiv:1510.05311v2 [cs.it] 24 ay 2016 Abstract In

More information

Solving initial value problems by residual power series method

Solving initial value problems by residual power series method Theoretical Matheatics & Applications, vol.3, no.1, 13, 199-1 ISSN: 179-9687 (print), 179-979 (online) Scienpress Ltd, 13 Solving initial value probles by residual power series ethod Mohaed H. Al-Sadi

More information

Left-to-right maxima in words and multiset permutations

Left-to-right maxima in words and multiset permutations Left-to-right axia in words and ultiset perutations Ay N. Myers Saint Joseph s University Philadelphia, PA 19131 Herbert S. Wilf University of Pennsylvania Philadelphia, PA 19104

More information

Statistics and Probability Letters

Statistics and Probability Letters Statistics and Probability Letters 79 2009 223 233 Contents lists available at ScienceDirect Statistics and Probability Letters journal hoepage: www.elsevier.co/locate/stapro A CLT for a one-diensional

More information