Computing the Longest Common Subsequence of Multiple RLE Strings

Size: px
Start display at page:

Download "Computing the Longest Common Subsequence of Multiple RLE Strings"

Transcription

1 The 29th Workshop on Combinatorial Mathematics an Computation Theory Computing the Longest Common Subsequence of Multiple RLE Strings Ling-Chih Yao an Kuan-Yu Chen Grauate Institute of Networking an Multimeia Department of Computer Science an Information Engineering National Taiwan University, Taipei, Taiwan 06 Abstract In this paper, we stuy the problem of computing the longest common subsequence (LCS) of multiple compresse strings. The input strings are all represente by run-length encoe format. We present two algorithms for the problem. Given strings, which are compresse into of n,..., n runs respectively, our algorithm computes the LCS of the strings in O(nm) time, where n = i= n i an m = i= n i. The secon algorithm achieves O(nρ Σ ) time, where ρ enotes the number of ark blocks plus one an Σ enotes the alphabet size. Introuction Longest common subsequence (LCS) serves as a well-known measure of the similarity between strings, while run-length encoing (RLE) is a classic metho to compress strings. In this paper, we stuy a problem which lies in the intersection of the two notions, i.e. the problem of computing the similarity between compresse strings. More specifically, we consier the problem of computing longest common subsequence (LCS) of run-length encoing (RLE) strings. Several works on computing the LCS of RLE strings have been propose. Bunke an Csirik [4] propose an algorithm running in O(Nl + km) time for strings of lengths M an N with l an k runs, respectively. The algorithm ivies the ynamic programming table into blocks an computes only the entries on the bounaries of the blocks. Apostolico et al. [3] gave an algorithm running in O(kl(k+l)) time which relies on the notion of force an corner paths. They next improve upon the time of the algorithm to O(kl log kl) time This is the footnote of this paper. by storing all the possible force paths in balance binary search trees. Ann an Yang et al. [2] propose an algorithm of O(kl + min{p, p 2 }) time, where blocks are ivie into ark an light blocks an p an p 2 enote the bottom an right bounaries of ark blocks. Computing the similarity between RLE strings has been stuie in more general istance settings. For example, computing the Levenshtein istance between RLE strings was explore in [5, 9]. Computing the optimal alignment between RLE strings uner unrestricte scoring matrices was investigate in [6, 8]. In this paper, we stuy the problem of computing the LCS between RLE strings. In particular, we consier a natural generalization of the problem, i.e. computing the LCS of multiple strings. In other wors, our algorithms are capable of computing the LCS between not only two RLE strings but multiple RLE strings. The paper is organize as follows. We first escribe an efficient algorithm which can irectly cope with compresse strings, without resorting to any ecompression. Given strings, which are compresse into n,..., n runs respectively, our first algorithm achieves the time complexity of O(nm) time, where n = i= n i an m = i= n i. We next present an improve algorithm which achieves O(nρ Σ ) time, where ρ enotes the number of ark blocks plus one an Σ enotes the alphabet size. 2 Preliminaries A string S is run-length encoe (RLE) if it is escribe as an orere sequence of pairs (σ, i), where σ is an alphabet symbol an i is a positive integer. Each pair correspons to a run of S which consists of i consecutive occurrences of σ. For example, aaabbbbcc can be encoe into 228

2 The 29th Workshop on Combinatorial Mathematics an Computation Theory a 3 b 4 c Notation Consier strings S i for i =, 2,..., over a finite alphabet Σ. Suppose that S i can be encoe as an RLE string of n i runs, enote by S i ()S i (2)... S i (n i ), where S i (j) is the j-th run of string S i. Note that we assume that the RLE string of S i is optimally encoe, i.e. each run S i (j) is a maximal run of ientical characters. We let S i (j) enote the run length an symbol(s i (j)) enote the encoe symbol of run S i (j). We let S (r) i enote the first r runs of S i, i.e. S (r) i = S i ()S i (2)... S i (r). We use LCS(S,,..., S ) to enote the length of LCS of strings S to S. Let M be a matrix of blocks, such that M[r, r 2,..., r ] contains the the value of LCS(S (r), S (r2) 2..., S (r ) ), where r i =, 2,..., n i. We say that block (r, r 2,..., r ) is ark if all the runs S (r ), (r 2 ),..., an S (r ) encoe an ientical symbol. Otherwise, we say that block (r, r 2,..., r ) is light. 2.2 Properties for LCS of two RLE strings Before escribing the Lemmas of multiple strings, we first review the known properties of LCS between two RLE strings. Lemma. (see [7]) Let S an be two strings an e r be a run encoing symbol e. Let S e r an e r enote the strings obtaine by appening the run e r to S an. We have that LCS(S e r, e r ) = LCS(S, ) + r. Lemma 2. (see [7]) Let S an be two strings an e r an e r 2 2 be two runs encoing istinct symbols e an e 2. Let S e r an e r 2 2 enote the strings obtaine by appening the run e r to S an the run e r 2 2 to. We have that LCS(S e r, S2er 2 2 ) = max{lcs(s e r, S2), LCS(S, S2er 2 2 )}. 3 LCS of multiple RLE strings We now escribe several properties of the LCS of multiple RLE strings. Lemma 3 is eicate to the case that all the input strings en with the same symbol, an Lemma 4 is eicate to the case that the input strings not en with the same symbol. Lemma 5 is eicate to the case when upating the value of a light block (r, r 2,...r ). Lemma 3. Let S,,..., S be strings an e r be a run. Let S e r, e r,..., S e r enote the strings obtaine by appening run e r to S,,..., S, respectively. We have that LCS(S e r, e r,..., S e r ) = LCS(S,,..., S ) + r. Proof. If LCS(S e, e,..., S e) = LCS(S,,..., S ) + hols, then the lemma can be obtaine by recursively applying the above result r times. Therefore, in the following we aim to show that LCS(S e, e,..., S e) = LCS(S,,..., S ) +. Note that the LCS of S e, e,..., an S e either en with symbol e or not. Case : if the LCS of S e, e,..., an S e en with symbol e, then wherever the ening symbol e appears in S i e for i =,...,, we can always replace it by the last e of S i e. Hence, we obtain that LCS(S e, e,..., S e) = LCS(S,,..., S ) +. Case 2: if the LCS of S e, e,..., an S e oes not en with symbol e, then we have that LCS(S e, e,..., S e) = LCS(S,,..., S ). This leas to a contraiction, for we can obtain a longer common subsequence by appening the last common e to the LCS of S,,..., an S. Lemma 4. Let S,,..., S be strings an let e, e 2,..., e be symbols which are not all the same, i.e. e = e 2 =... = e cannot hol. We have that for any σ {e, e 2,..., e }, LCS(S e r, e r 2 2,..., S e r { LCS(τ(Se r, σ), τ(e r 2 2, σ),..., τ(s e r = max, σ)), LCS( τ(s e r, σ), τ(e r 2 2, σ),..., τ(s e r, σ)), ) { where τ(s ie r i Sie r i, σ) = i i, if ei = σ; S i, otherwise, { τ(s ie r i Si, i, σ) = if e i = σ; S ie r i otherwise. i, an Proof. Given symbol σ {e, e 2,..., e }, we know that the LCS of strings S,,..., S either ens with σ or not. If the LCS ens with symbol σ, the last runs of the strings not encoing symbol σ nee not to be consiere, whereas the the last runs of the strings encoing symbol σ nee to be consiere. The function τ helps us to o this. On the other han, if the LCS oes not en with 229

3 The 29th Workshop on Combinatorial Mathematics an Computation Theory symbol σ, the function τ removes the last runs of the strings encoing symbol σ, while preserving the last runs of the strings not encoing symbol σ. for r 3, r 2 3, r 3 3 are alreay compute. We now show how to compute the value of LCS(S (4), S(4) 2, S(4) 3 ). We recursively apply Lemma 3 an Lemma 4 as follows: Lemma 5. Suppose that runs S (r ), (r 2),..., S (r ) o not encoe the same symbol, i.e. symbol(s (r ))=symbol((r 2))=...=symbol(S (r )) cannot hol. We have that LCS(S (r ), S (r 2) 2,..., S (r ) ) LCS(S (r ), S (r 2) 2,..., S (r ) ), LCS(S (r ), S (r 2 ) 2,..., S (r ) ), = max... LCS(S (r ), S (r 2) 2,..., S (r ) ). Proof. Suppose that the LCS of S (r), S (r2) 2,..., an S (r ) en with symbol σ Σ. Since symbol(s (r )) = symbol( (r 2 )) =... = symbol(s (r )) cannot hol, at least one of the runs S (r ), (r 2 ),..., S (r ) oes not encoe σ. In other wors, there is at least one string whose last run can be ignore. 4 The first algorithm Before escribing the etails of our algorithm, we first take an example to illustrate our basic iea. 4. The basic iea Given three strings S,, an, of n, n 2, an n 3 runs respectively, we aim to compute LCS(S (n), S (n2) 2, S (n3) 3 ). In the following example, n = 4, n 2 = 4, an n 3 = 4. S a 6 c 6 b 3 a 8 a 8 c 2 b 3 a 6 a 4 c 0 b 2 a 4. By Lemma 3, LCS(S (4), S(4) 2, S(4) 3 ) By Lemma 4, max{, S(3) 2, S(3) 3 ), LCS(S(3) 2 a2, S (2) 3 )}. 3. By Lemma 4, 2 a2, S (2) max{, S(3) 2, S(2) 3 ), LCS(S(3) 2 a2, S () 3 )}. 4. By Lemma 3, 2 a2, S () a2, S (3) 2, a2 ) By Lemma 4, a2, S (3) max{, S(3) 2, ɛ), LCS(S(3) a2, S (2) 2, a2 )}. 6. By Lemma 4, a2, S (2) max{, ɛ), LCS(S(3) a2, S () 2, a2 )}., S(2) 2 7. By Lemma 3, a2, S (), a6, ɛ) + 2. Combining the above equations, we can erive that: LCS(S (3), S(3) 2, S(3) 3 ) + 4, LCS(S (4), S(4) 2, S(4) max, S(3) 2, ɛ) + 6,, a6, ɛ) + 8 Since by assumption the value of, S(3) 2, S(3) 8 is alreay compute, an obviously, S(3) 2, ɛ) = 0 an, a6, ɛ) = 0, we obtain that LCS(S,, ) = max{8 + 4, 0 + 6, 0 + 8} = 2. Clearly, the time for the above proceure epens on the epth of the recursions. Figures (a) to () show that the epth of the recursions is no more than the total number of runs in S,, an. For clarity, we remove all the non- a runs of strings S,, an in our illustrations. Our algorithm runs in a ynamic fashion. Suppose that all the values of LCS(S (r), S (r2) 2, S (r3) 3 ) 230

4 The 29th Workshop on Combinatorial Mathematics an Computation Theory LCS(S (4) a 6 a S 8, S(4) 2, S(4) 3 ) a2, S (3) 2, a2 ) a 6 a 8 S By Lemma 3, LCS(S (4), S(4) 2, S(4) 3 )+4. (a) Initially, the vertical line begins at the right bounaries runs S (4), (4), an (4). When applying Lemma 3, the vertical line is move to the left by four characters, stopping at the location shown in Figure (b). a 6 a S 8 3 ) By Lemma 4 (twice), max { 2 a2, S () 3 ), LCS(S(3), S(3) 2, S(3) 3 )}. By Lemma 4 (twice), a2, S (3) max{ a2, S () 2, a2 ),, S(3) 2, ɛ)}. By Lemma 3, a2, S (), a6, ɛ)+2. (c) When applying Lemma 4 an then Lemma 3, the vertical line is move to the left by two characters, stopping at the location shown in Figure ()., a6, ɛ) a 6 a 8 S By Lemma 3, 2 a2, S () a2, S (3) 2, a2 )+2. (b) When applying Lemma 4 an then Lemma 3, the vertical line is move to the left by two characters, stopping at the location shown in Figure (c). () The vertical line reaches the left en of string an the recursion is terminate. 23

5 The 29th Workshop on Combinatorial Mathematics an Computation Theory 4.2 The algorithm Our algorithm for computing the LCS of multiple RLE strings is given in Algorithm. Recall that block (r, r 2,..., r ) is a ark block when S (r ), (r 2 ),..., an S (r ) all encoe the same symbol, an we call the common encoe symbol the ark symbol of block (r, r 2,..., r ). Algorithm. lcs(s,,..., S ) Matrix M is initialize as a zero matrix; 2 for r = to n 3 for r 2 = to n for r = to n 6 if (block (r, r 2,..., r ) is light) 7 M[r, r 2,..., r ] = max{ M[r, r 2,..., r ], M[r, r 2,..., r ],... M[r, r 2,..., r ]}; 8 else 9 Let σ be the ark symbol of block (r, r 2,..., r ); 0 for i = to o D[i] = S i (r i ) ; matche = min{d[i] i =,..., }; 2 M[r, r 2,..., r ] = M[r, r 2,..., r ] + matche; 3 DarkP ath(r,..., r, M, matche, D, σ); in substring S i (r i )... S i(r i ) of string S i. In line 6, variable matche inicates the number of matche ark symbols σ which substrings S (r )... S (r ) to S (r )... S (r ) can contribute to the LCS. In line 7, the value of M[r, r 2,..., r ] is upate base on Lemma 3 an Lemma 4. The while-loop continues until there exists some string whose runs encoing ark symbol σ are completely exhauste. Since there are i= n i runs in total, the while-loop is execute no more than i= n i times. For each iteration of the while-loop, it takes O() time. Hence, the proceure of DarkPath spens O( i= n i) time. Theorem. Given strings S,..., S, compresse into n,..., n runs respectively, Algorithm computes the LCS of S,..., S in O(nm) time, where n = i= n i an m = i= n i. Proof. Each light block takes O() time to upate, while each ark block nees O(n) time to complete proceure DarkPath. As there are m blocks in total, the total time require is O(nm). In line 7, value of M[r, r 2,..., r ] can be upate irectly from Lemma 5. In line 0, D[i] is initialize to the number of ark symbols σ in run S i (r i ). In line, variable matche inicates the number of matche ark symbols σ which runs S (r ) to S (r ) can contribute to the LCS. DarkPath(r,..., r, M, matche, D, σ) r = r,..., r = r ; 2 while (every string contains at least one run encoing ark symbol σ which has not been exhauste) 3 for i = to 4 if (D[i] == matche) 5 upate r i to inicate the former run of S i (r i ) encoing ark symbol σ an upate D[i] to D[i] + S i (r i ) ; 6 matche = min{d[i] i =,..., }; 7 M[r,..., r ] = max{ M[r,..., r ] + matche, M[r,..., r ]}; In lines 3 5, proceure DarkPath ientifies those strings S i whose run S i (r i ) is exhauste. The proceure then upates r i to inicate the former run of S i (r i ) encoing ark symbol σ an upates D[i] to D[i] + S i (r i ). Note that in line 5, D[i] is upate to the number of ark symbols σ 5 A faster algorithm In this section, we improve upon the time of the first algorithm by exploiting the sparsity inherent in the LCS computation. Algorithm 2 will only store values of ark blocks. In aition, we propose Lemma 6 when we nee a value of an light block by comparing the values of ark blocks. Lemma 6. Suppose that runs S (r ), (r 2),..., S (r ) o not encoe the same symbol, i.e. symbol(s (r ))=symbol((r 2))=...=symbol(S (r )) cannot hol. We have that LCS(S (r ), S (r 2) 2,..., S (r ) ) = max{lcs( τ(s (r ), α), τ(s (r 2) 2, α),..., τ(s (r ), α)) α Σ}, where τ(s (r i) i, α) = S (r i) i if symbol(s i(r i)) = α, an τ(s (r i) i, α) = S (r i ) i otherwise. Here, S i(r i) is the former run of S i(r i) which encoes symbol α. Proof. Suppose that the LCS of S (r), S (r2) 2,..., an S (r ) ens with symbol α Σ. Then, the last runs of the strings encoing α nee to be consiere, whereas the last runs of the strings not encoing α nee not to be consiere. The function τ helps us to o this. 232

6 The 29th Workshop on Combinatorial Mathematics an Computation Theory Algorithm 2. lcs(s,..., S ) Matrix M is initialize as a zero matrix; 2 for r = to n 3 σ = symbol(s (r )) 4 for r 2 = [σ].begin to [σ].en for r = S [σ].begin to S [σ].en 7 for i = to o D[i] = S i (r i ) ; 8 matche = min{d[i] i =,..., }; 9 if (M[r,..., r ] == 0) 0 prematche = max{ M[pre(S, r, α),..., pre(s, r, α)] α Σ }; else prematche = M[r,..., r ]; 2 M[r,..., r ] = prematche + matche; 3 DarkBlockOnly(r,..., r, M, matche, D, σ); 4 if (M[n,..., n ] == 0) 5 M[n,..., n ] = max{ M[pre(S, n, α),..., pre(s, n, α)] α Σ } In line 3, symbol(s (r )) returns the encoe symbol σ of run S (r ). In lines 4 6, array S i [σ] recors the inices of runs encoing σ in S i. For example, for string S i = a 5 b 4 c 7 b 3 a 4, S i [ a ] = {, 5}. Preprocessing S i [σ] for σ Σ can be one in O( i= n i) time. Then after line 6, block (r, r 2,..., r ) is a ark block encoing symbol σ, i.e. σ is the ark symbol of block (r, r 2,..., r ). In line 7, D[i] is initialize as the number of ark symbols σ in run S i (r i ). In line 8, variable matche inicates the number of matche ark symbols σ which runs S (r ) to S (r ) can contribute to the LCS. In lines 9, variable prematche inicates value of the LCS of S (r ) to S (r ). If value of M[r,..., r ] is zero, i.e. block (r,..., r ) is light, we compute its value irectly from Lemma 6. Function pre(s i, r i, α) returns the inex of the former run of S i (r i ) which encoes symbol α (inclusive of S i (r i )). For example, for string S = a 5 b 4 c 7 b 3 a 4 c 3, pre(s, 6, a) = 5, pre(s, 3, c) = 3 an pre(s,, b) = 0. Preprocessing pre(s i, r i, α) for α Σ can be one in O( Σ i= n i) time. In lines 4 5, if value of M[n,..., n ] is zero, i.e. block (n,..., n ) is light, we compute its value irectly from Lemma 6 for the LCS of S to S. DarkBolckOnly(r,..., r, M, matche, D, σ) r = r,..., r = r ; 2 while (every string contains at least one run encoing ark symbol σ which has not been exhauste) 3 for i = to 4 if (D[i] == matche) 5 upate r i to inicate the former run of S i (r i ) encoing ark symbol σ an upate D[i] to D[i] + S i (r i ) ; 6 matche = min{d[i] i =,..., }; 7 if (M[r,..., r ] == 0) 8 prematche = max{ M[pre(S, r, α),..., pre(s, r, α)] α Σ } 9 else prematche = M[r,..., r ]; 0 M[r,..., r ] = max{ prematche + matche, M[r,..., r ]} In lines 3 5, proceure DarkBolckOnly ientifies those strings S i whose run S i (r i ) is exhauste. The proceure then upates r i to inicate the former run of S i (r i ) encoing ark symbol σ an upates D[i] to D[i] + S i (r i ). Note that in line 5, D[i] is upate to the number of ark symbols σ in substring S i (r i )... S i(r i ) of string S i. In line 6, variable matche inicates the number of matche ark symbols σ which substrings S (r )... S (r ) to S (r )... S (r ) can contribute to the LCS. In lines 7 9, variable prematche inicates value of the LCS of S (r ) to S (r ). If value of M[r,..., r ] is zero, i.e. block (r,..., r ) is light, we compute its value irectly from Lemma 6. It can be one in O( Σ ) time. In line 0, the value of M[r, r 2,..., r ] is upate base on Lemma 3 an Lemma 4. The while-loop continues until there exists some string whose runs encoing ark symbol σ are completely exhauste. Since there i= n i runs in total, the while-loop is execute no more than i= n i times. For each iteration of the whileloop, it takes O( Σ ) time. Hence, the proceure of DarkBolckOnly spens O( Σ i= n i) time. Theorem 2. Algorithm 2 takes O(nρ Σ ) times, where ρ enotes the number of ark blocks plus one an n = i= n i enotes the total number of runs of strings S,,..., S. Proof. The preprocessing for S i [σ], σ Σ, an pre(s i, r i, α), α Σ, can be one in O(n) an 233

7 The 29th Workshop on Combinatorial Mathematics an Computation Theory O(n Σ ) time, respectively. The light blocks nee not to be upate, while the ark blocks take O(n Σ ) time to run the proceure of Dark- BolckOnly. Hence, the total time require is O(n)+O(n Σ )+ O(n Σ ) (ρ ) time. The time complexity thus follows. Note that Algorithm 2 limits the LCS computation to those ark blocks, whose number is specifie by parameter ρ. Since ρ = O(m), the time of algorithm 2 is never worse than that of algorithm for constant-size alphabets. In other wors, for cases where ark blocks are sparse, algorithm 2 is preferable over algorithm for small alphabets. On the other han, for ranom input strings the probability of the appearance of a ark block is, which implies that ρ = O( m). Hence, we obtain Σ Σ that in average case the time of algorithm 2 is O(nρ Σ ) = O(nm), which is superior to Σ 2 that of algorithm. 6 Concluing Remarks In this paper, we stuy the problem of computing LCS of multiple RLE strings. Two algorithms are presente, both can irectly cope with the RLE strings without resorting to ecompression. The first algorithm works in a ynamic fashion, recursively applying the lemmas escribe in Section 3. The secon algorithm improves upon the time by exploiting the sparsity inherent in the LCS computation. It remains open whether the time can be further reuce by utilizing more efficient ata structures an algorithmic techniques. Common Subsequence of Run-Length Encoe Strings. Information Processing Letters 08(6): , 2008 [3] Alberto Apostolico, Ga M. Lanau, an Steven Skiena: Matching for Run-Length Encoe Strings. Journal of Complexity 5():4 6, 999. [4] Horst Bunke an Janos Csirik: An Improve Algorithm for Computing the Eit Distance of Run-Length Coe Strings. Information Processing Letters 54(2): 93 96, 995. [5] Kuan-Yu Chen, Kun-Mao Chao: A Fully Compresse Algorithm for Computing the Eit Distance of Run-Length Encoe Strings. Algorithmica, to appear. [6] Maxime Crochemore, Ga M. Lanau, Michal Ziv-Ukelson: A Subquaratic Sequence Alignment Algorithm for Unrestricte Scoring Matrices. SIAM Journal on Computing 32(6): , [7] Valerio Freschi, Alessanro Bogliolo: Longest Common Subsequence between Run-Length- Encoe Strings: a New Algorithm with Improve Parallelism. Information Processing Letters 90(4): 67 73, [8] Guan-Shieng Huang, Jia Jie Liu, Yue- Li Wang: Sequence Alignment Algorithms for Run-Length-Encoe Strings. COCOON, , [9] Veli Mäkinen, Esko Ukkonen, Gonzalo Navarro: Approximate Matching of Run- Length Compresse Strings. Algorithmica 35(4): , Acknowlegements The authors woul like to thank Kun-Mao Chao for his constructive comments. References [] Amihoo Amir an Gary Benson: Efficient Two-Dimensional Compresse Matching. DCC : , 992. [2] Hsing-Yen Ann, Chang-Biau Yang, Chiou- Ting Tseng, Chiou-Yi Hor: A Fast an Simple Algorithm for Computing the Longest 234

Information Processing Letters. A fast and simple algorithm for computing the longest common subsequence of run-length encoded strings

Information Processing Letters. A fast and simple algorithm for computing the longest common subsequence of run-length encoded strings Information Processing Letters 108 (2008) 360 364 Contents lists available at ScienceDirect Information Processing Letters www.vier.com/locate/ipl A fast and simple algorithm for computing the longest

More information

arxiv: v1 [cs.ds] 31 May 2017

arxiv: v1 [cs.ds] 31 May 2017 Succinct Partial Sums an Fenwick Trees Philip Bille, Aners Roy Christiansen, Nicola Prezza, an Freerik Rye Skjoljensen arxiv:1705.10987v1 [cs.ds] 31 May 2017 Technical University of Denmark, DTU Compute,

More information

Finding All Approximate Gapped Palindromes

Finding All Approximate Gapped Palindromes Fining All Approximate Gappe Palinromes Ping-Hui Hsu 1, Kuan-Yu Chen 1, an Kun-Mao Chao 1,2,3 1 Department of Computer Science an Information Engineering 2 Grauate Institute of Biomeical Electronics an

More information

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013 Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing

More information

Efficient Algorithms for the Longest Common Subsequence Problem with Sequential Substring Constraints

Efficient Algorithms for the Longest Common Subsequence Problem with Sequential Substring Constraints 2011 11th IEEE International Conference on Bioinformatics and Bioengineering Efficient Algorithms for the Longest Common Subsequence Problem with Sequential Substring Constraints Chiou-Ting Tseng, Chang-Biau

More information

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION The Annals of Statistics 1997, Vol. 25, No. 6, 2313 2327 LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION By Eva Riccomagno, 1 Rainer Schwabe 2 an Henry P. Wynn 1 University of Warwick, Technische

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

Finding a longest common subsequence between a run-length-encoded string and an uncompressed string

Finding a longest common subsequence between a run-length-encoded string and an uncompressed string Journal of Complexity 24 (2008) 173 184 www.elsevier.com/locate/jco Finding a longest common subsequence between a run-length-encoded string and an uncompressed string J.J. Liu a, Y.L. Wang b,, R.C.T.

More information

Math 342 Partial Differential Equations «Viktor Grigoryan

Math 342 Partial Differential Equations «Viktor Grigoryan Math 342 Partial Differential Equations «Viktor Grigoryan 6 Wave equation: solution In this lecture we will solve the wave equation on the entire real line x R. This correspons to a string of infinite

More information

Efficiently Decodable Non-Adaptive Threshold Group Testing

Efficiently Decodable Non-Adaptive Threshold Group Testing Efficiently Decoable Non-Aaptive Threshol Group Testing arxiv:72759v3 [csit] 3 Jan 28 Thach V Bui, Minoru Kuribayashi, Mahi Cheraghchi, an Isao Echizen SOKENDAI The Grauate University for Avance Stuies),

More information

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k A Proof of Lemma 2 B Proof of Lemma 3 Proof: Since the support of LL istributions is R, two such istributions are equivalent absolutely continuous with respect to each other an the ivergence is well-efine

More information

Witt#5: Around the integrality criterion 9.93 [version 1.1 (21 April 2013), not completed, not proofread]

Witt#5: Around the integrality criterion 9.93 [version 1.1 (21 April 2013), not completed, not proofread] Witt vectors. Part 1 Michiel Hazewinkel Sienotes by Darij Grinberg Witt#5: Aroun the integrality criterion 9.93 [version 1.1 21 April 2013, not complete, not proofrea In [1, section 9.93, Hazewinkel states

More information

Lower Bounds for the Smoothed Number of Pareto optimal Solutions

Lower Bounds for the Smoothed Number of Pareto optimal Solutions Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.

More information

Schrödinger s equation.

Schrödinger s equation. Physics 342 Lecture 5 Schröinger s Equation Lecture 5 Physics 342 Quantum Mechanics I Wenesay, February 3r, 2010 Toay we iscuss Schröinger s equation an show that it supports the basic interpretation of

More information

Efficient Polynomial-Time Algorithms for Variants of the Multiple Constrained LCS Problem

Efficient Polynomial-Time Algorithms for Variants of the Multiple Constrained LCS Problem Efficient Polynomial-Time Algorithms for Variants of the Multiple Constrained LCS Problem Hsing-Yen Ann National Center for High-Performance Computing Tainan 74147, Taiwan Chang-Biau Yang and Chiou-Ting

More information

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS MARK SCHACHNER Abstract. When consiere as an algebraic space, the set of arithmetic functions equippe with the operations of pointwise aition an

More information

Robustness and Perturbations of Minimal Bases

Robustness and Perturbations of Minimal Bases Robustness an Perturbations of Minimal Bases Paul Van Dooren an Froilán M Dopico December 9, 2016 Abstract Polynomial minimal bases of rational vector subspaces are a classical concept that plays an important

More information

Ramsey numbers of some bipartite graphs versus complete graphs

Ramsey numbers of some bipartite graphs versus complete graphs Ramsey numbers of some bipartite graphs versus complete graphs Tao Jiang, Michael Salerno Miami University, Oxfor, OH 45056, USA Abstract. The Ramsey number r(h, K n ) is the smallest positive integer

More information

TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH

TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH English NUMERICAL MATHEMATICS Vol14, No1 Series A Journal of Chinese Universities Feb 2005 TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH He Ming( Λ) Michael K Ng(Ξ ) Abstract We

More information

Lie symmetry and Mei conservation law of continuum system

Lie symmetry and Mei conservation law of continuum system Chin. Phys. B Vol. 20, No. 2 20 020 Lie symmetry an Mei conservation law of continuum system Shi Shen-Yang an Fu Jing-Li Department of Physics, Zhejiang Sci-Tech University, Hangzhou 3008, China Receive

More information

05 The Continuum Limit and the Wave Equation

05 The Continuum Limit and the Wave Equation Utah State University DigitalCommons@USU Founations of Wave Phenomena Physics, Department of 1-1-2004 05 The Continuum Limit an the Wave Equation Charles G. Torre Department of Physics, Utah State University,

More information

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations Diophantine Approximations: Examining the Farey Process an its Metho on Proucing Best Approximations Kelly Bowen Introuction When a person hears the phrase irrational number, one oes not think of anything

More information

The Height of List-tries and TST

The Height of List-tries and TST Discrete Mathematics an Theoretical Computer Science (subm.), by the authors, 1 rev The Height of List-tries an TST N. Broutin 1 an L. Devroye 1 1 School of Computer Science, McGill University, 3480 University

More information

Regular tree languages definable in FO and in FO mod

Regular tree languages definable in FO and in FO mod Regular tree languages efinable in FO an in FO mo Michael Beneikt Luc Segoufin Abstract We consier regular languages of labele trees. We give an effective characterization of the regular languages over

More information

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21 Large amping in a structural material may be either esirable or unesirable, epening on the engineering application at han. For example, amping is a esirable property to the esigner concerne with limiting

More information

GLOBAL SOLUTIONS FOR 2D COUPLED BURGERS-COMPLEX-GINZBURG-LANDAU EQUATIONS

GLOBAL SOLUTIONS FOR 2D COUPLED BURGERS-COMPLEX-GINZBURG-LANDAU EQUATIONS Electronic Journal of Differential Equations, Vol. 015 015), No. 99, pp. 1 14. ISSN: 107-6691. URL: http://eje.math.txstate.eu or http://eje.math.unt.eu ftp eje.math.txstate.eu GLOBAL SOLUTIONS FOR D COUPLED

More information

arxiv: v2 [math.pr] 27 Nov 2018

arxiv: v2 [math.pr] 27 Nov 2018 Range an spee of rotor wals on trees arxiv:15.57v [math.pr] 7 Nov 1 Wilfrie Huss an Ecaterina Sava-Huss November, 1 Abstract We prove a law of large numbers for the range of rotor wals with ranom initial

More information

θ x = f ( x,t) could be written as

θ x = f ( x,t) could be written as 9. Higher orer PDEs as systems of first-orer PDEs. Hyperbolic systems. For PDEs, as for ODEs, we may reuce the orer by efining new epenent variables. For example, in the case of the wave equation, (1)

More information

One-dimensional I test and direction vector I test with array references by induction variable

One-dimensional I test and direction vector I test with array references by induction variable Int. J. High Performance Computing an Networking, Vol. 3, No. 4, 2005 219 One-imensional I test an irection vector I test with array references by inuction variable Minyi Guo School of Computer Science

More information

Combinatorica 9(1)(1989) A New Lower Bound for Snake-in-the-Box Codes. Jerzy Wojciechowski. AMS subject classification 1980: 05 C 35, 94 B 25

Combinatorica 9(1)(1989) A New Lower Bound for Snake-in-the-Box Codes. Jerzy Wojciechowski. AMS subject classification 1980: 05 C 35, 94 B 25 Combinatorica 9(1)(1989)91 99 A New Lower Boun for Snake-in-the-Box Coes Jerzy Wojciechowski Department of Pure Mathematics an Mathematical Statistics, University of Cambrige, 16 Mill Lane, Cambrige, CB2

More information

A Simple Linear Space Algorithm for Computing a Longest Common Increasing Subsequence

A Simple Linear Space Algorithm for Computing a Longest Common Increasing Subsequence A Simple Linear Space Algorithm for Computing a Longest Common Increasing Subsequence Danlin Cai, Daxin Zhu, Lei Wang, and Xiaodong Wang Abstract This paper presents a linear space algorithm for finding

More information

Similarity Measures for Categorical Data A Comparative Study. Technical Report

Similarity Measures for Categorical Data A Comparative Study. Technical Report Similarity Measures for Categorical Data A Comparative Stuy Technical Report Department of Computer Science an Engineering University of Minnesota 4-92 EECS Builing 200 Union Street SE Minneapolis, MN

More information

Switching Time Optimization in Discretized Hybrid Dynamical Systems

Switching Time Optimization in Discretized Hybrid Dynamical Systems Switching Time Optimization in Discretize Hybri Dynamical Systems Kathrin Flaßkamp, To Murphey, an Sina Ober-Blöbaum Abstract Switching time optimization (STO) arises in systems that have a finite set

More information

arxiv: v4 [cs.ds] 7 Mar 2014

arxiv: v4 [cs.ds] 7 Mar 2014 Analysis of Agglomerative Clustering Marcel R. Ackermann Johannes Blömer Daniel Kuntze Christian Sohler arxiv:101.697v [cs.ds] 7 Mar 01 Abstract The iameter k-clustering problem is the problem of partitioning

More information

Two formulas for the Euler ϕ-function

Two formulas for the Euler ϕ-function Two formulas for the Euler ϕ-function Robert Frieman A multiplication formula for ϕ(n) The first formula we want to prove is the following: Theorem 1. If n 1 an n 2 are relatively prime positive integers,

More information

Introduction to the Vlasov-Poisson system

Introduction to the Vlasov-Poisson system Introuction to the Vlasov-Poisson system Simone Calogero 1 The Vlasov equation Consier a particle with mass m > 0. Let x(t) R 3 enote the position of the particle at time t R an v(t) = ẋ(t) = x(t)/t its

More information

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5

More information

Proof of SPNs as Mixture of Trees

Proof of SPNs as Mixture of Trees A Proof of SPNs as Mixture of Trees Theorem 1. If T is an inuce SPN from a complete an ecomposable SPN S, then T is a tree that is complete an ecomposable. Proof. Argue by contraiction that T is not a

More information

The Subtree Size Profile of Plane-oriented Recursive Trees

The Subtree Size Profile of Plane-oriented Recursive Trees The Subtree Size Profile of Plane-oriente Recursive Trees Michael FUCHS Department of Applie Mathematics National Chiao Tung University Hsinchu, 3, Taiwan Email: mfuchs@math.nctu.eu.tw Abstract In this

More information

The NP-hardness and APX-hardness of the Two-Dimensional Largest Common Substructure Problems

The NP-hardness and APX-hardness of the Two-Dimensional Largest Common Substructure Problems The NP-hardness and APX-hardness of the Two-Dimensional Largest Common Substructure Problems Syuan-Zong Chiou a, Chang-Biau Yang a and Yung-Hsing Peng b a Department of Computer Science and Engineering

More information

Discrete Mathematics

Discrete Mathematics Discrete Mathematics 309 (009) 86 869 Contents lists available at ScienceDirect Discrete Mathematics journal homepage: wwwelseviercom/locate/isc Profile vectors in the lattice of subspaces Dániel Gerbner

More information

Acute sets in Euclidean spaces

Acute sets in Euclidean spaces Acute sets in Eucliean spaces Viktor Harangi April, 011 Abstract A finite set H in R is calle an acute set if any angle etermine by three points of H is acute. We examine the maximal carinality α() of

More information

On combinatorial approaches to compressed sensing

On combinatorial approaches to compressed sensing On combinatorial approaches to compresse sensing Abolreza Abolhosseini Moghaam an Hayer Raha Department of Electrical an Computer Engineering, Michigan State University, East Lansing, MI, U.S. Emails:{abolhos,raha}@msu.eu

More information

Optimization of Geometries by Energy Minimization

Optimization of Geometries by Energy Minimization Optimization of Geometries by Energy Minimization by Tracy P. Hamilton Department of Chemistry University of Alabama at Birmingham Birmingham, AL 3594-140 hamilton@uab.eu Copyright Tracy P. Hamilton, 1997.

More information

arxiv:hep-th/ v1 3 Feb 1993

arxiv:hep-th/ v1 3 Feb 1993 NBI-HE-9-89 PAR LPTHE 9-49 FTUAM 9-44 November 99 Matrix moel calculations beyon the spherical limit arxiv:hep-th/93004v 3 Feb 993 J. Ambjørn The Niels Bohr Institute Blegamsvej 7, DK-00 Copenhagen Ø,

More information

Linear First-Order Equations

Linear First-Order Equations 5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)

More information

arxiv: v1 [physics.flu-dyn] 8 May 2014

arxiv: v1 [physics.flu-dyn] 8 May 2014 Energetics of a flui uner the Boussinesq approximation arxiv:1405.1921v1 [physics.flu-yn] 8 May 2014 Kiyoshi Maruyama Department of Earth an Ocean Sciences, National Defense Acaemy, Yokosuka, Kanagawa

More information

Energy behaviour of the Boris method for charged-particle dynamics

Energy behaviour of the Boris method for charged-particle dynamics Version of 25 April 218 Energy behaviour of the Boris metho for charge-particle ynamics Ernst Hairer 1, Christian Lubich 2 Abstract The Boris algorithm is a wiely use numerical integrator for the motion

More information

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012 CS-6 Theory Gems November 8, 0 Lecture Lecturer: Alesaner Mąry Scribes: Alhussein Fawzi, Dorina Thanou Introuction Toay, we will briefly iscuss an important technique in probability theory measure concentration

More information

Tractability results for weighted Banach spaces of smooth functions

Tractability results for weighted Banach spaces of smooth functions Tractability results for weighte Banach spaces of smooth functions Markus Weimar Mathematisches Institut, Universität Jena Ernst-Abbe-Platz 2, 07740 Jena, Germany email: markus.weimar@uni-jena.e March

More information

The Press-Schechter mass function

The Press-Schechter mass function The Press-Schechter mass function To state the obvious: It is important to relate our theories to what we can observe. We have looke at linear perturbation theory, an we have consiere a simple moel for

More information

Chaos, Solitons and Fractals Nonlinear Science, and Nonequilibrium and Complex Phenomena

Chaos, Solitons and Fractals Nonlinear Science, and Nonequilibrium and Complex Phenomena Chaos, Solitons an Fractals (7 64 73 Contents lists available at ScienceDirect Chaos, Solitons an Fractals onlinear Science, an onequilibrium an Complex Phenomena journal homepage: www.elsevier.com/locate/chaos

More information

On colour-blind distinguishing colour pallets in regular graphs

On colour-blind distinguishing colour pallets in regular graphs J Comb Optim (2014 28:348 357 DOI 10.1007/s10878-012-9556-x On colour-blin istinguishing colour pallets in regular graphs Jakub Przybyło Publishe online: 25 October 2012 The Author(s 2012. This article

More information

Construction of the Electronic Radial Wave Functions and Probability Distributions of Hydrogen-like Systems

Construction of the Electronic Radial Wave Functions and Probability Distributions of Hydrogen-like Systems Construction of the Electronic Raial Wave Functions an Probability Distributions of Hyrogen-like Systems Thomas S. Kuntzleman, Department of Chemistry Spring Arbor University, Spring Arbor MI 498 tkuntzle@arbor.eu

More information

Quantum mechanical approaches to the virial

Quantum mechanical approaches to the virial Quantum mechanical approaches to the virial S.LeBohec Department of Physics an Astronomy, University of Utah, Salt Lae City, UT 84112, USA Date: June 30 th 2015 In this note, we approach the virial from

More information

arxiv: v2 [cond-mat.stat-mech] 11 Nov 2016

arxiv: v2 [cond-mat.stat-mech] 11 Nov 2016 Noname manuscript No. (will be inserte by the eitor) Scaling properties of the number of ranom sequential asorption iterations neee to generate saturate ranom packing arxiv:607.06668v2 [con-mat.stat-mech]

More information

Markov Chains in Continuous Time

Markov Chains in Continuous Time Chapter 23 Markov Chains in Continuous Time Previously we looke at Markov chains, where the transitions betweenstatesoccurreatspecifietime- steps. That it, we mae time (a continuous variable) avance in

More information

Assignment 1. g i (x 1,..., x n ) dx i = 0. i=1

Assignment 1. g i (x 1,..., x n ) dx i = 0. i=1 Assignment 1 Golstein 1.4 The equations of motion for the rolling isk are special cases of general linear ifferential equations of constraint of the form g i (x 1,..., x n x i = 0. i=1 A constraint conition

More information

EE 595 (PMP) Introduction to Security and Privacy Homework 4

EE 595 (PMP) Introduction to Security and Privacy Homework 4 EE 595 (PMP) Introuction to Security an Privacy Homework 4 Assigne: Monay, February 12, 2017, Due: Sunay, March 5, 2017 Instructor: Tamara Bonaci Department of Electrical Engineering University of Washington,

More information

Interconnected Systems of Fliess Operators

Interconnected Systems of Fliess Operators Interconnecte Systems of Fliess Operators W. Steven Gray Yaqin Li Department of Electrical an Computer Engineering Ol Dominion University Norfolk, Virginia 23529 USA Abstract Given two analytic nonlinear

More information

EVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION OF UNIVARIATE TAYLOR SERIES

EVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION OF UNIVARIATE TAYLOR SERIES MATHEMATICS OF COMPUTATION Volume 69, Number 231, Pages 1117 1130 S 0025-5718(00)01120-0 Article electronically publishe on February 17, 2000 EVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION

More information

Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets

Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Proceeings of the 4th East-European Conference on Avances in Databases an Information Systems ADBIS) 200 Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Eleftherios Tiakas, Apostolos.

More information

A Look at the ABC Conjecture via Elliptic Curves

A Look at the ABC Conjecture via Elliptic Curves A Look at the ABC Conjecture via Elliptic Curves Nicole Cleary Brittany DiPietro Alexaner Hill Gerar D.Koffi Beihua Yan Abstract We stuy the connection between elliptic curves an ABC triples. Two important

More information

JUST THE MATHS UNIT NUMBER DIFFERENTIATION 2 (Rates of change) A.J.Hobson

JUST THE MATHS UNIT NUMBER DIFFERENTIATION 2 (Rates of change) A.J.Hobson JUST THE MATHS UNIT NUMBER 10.2 DIFFERENTIATION 2 (Rates of change) by A.J.Hobson 10.2.1 Introuction 10.2.2 Average rates of change 10.2.3 Instantaneous rates of change 10.2.4 Derivatives 10.2.5 Exercises

More information

On the enumeration of partitions with summands in arithmetic progression

On the enumeration of partitions with summands in arithmetic progression AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 8 (003), Pages 149 159 On the enumeration of partitions with summans in arithmetic progression M. A. Nyblom C. Evans Department of Mathematics an Statistics

More information

Minimal Height and Sequence Constrained Longest Increasing Subsequence

Minimal Height and Sequence Constrained Longest Increasing Subsequence Minimal Height and Sequence Constrained Longest Increasing Subsequence Chiou-Ting Tseng, Chang-Biau Yang and Hsing-Yen Ann Department of Computer Science and Engineering National Sun Yat-sen University,

More information

A study on ant colony systems with fuzzy pheromone dispersion

A study on ant colony systems with fuzzy pheromone dispersion A stuy on ant colony systems with fuzzy pheromone ispersion Louis Gacogne LIP6 104, Av. Kenney, 75016 Paris, France gacogne@lip6.fr Sanra Sanri IIIA/CSIC Campus UAB, 08193 Bellaterra, Spain sanri@iiia.csic.es

More information

Agmon Kolmogorov Inequalities on l 2 (Z d )

Agmon Kolmogorov Inequalities on l 2 (Z d ) Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,

More information

Technion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels.

Technion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels. Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Constraine Coes for Two-Dimensional Channels Keren Censor Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Technion

More information

Experiment 2, Physics 2BL

Experiment 2, Physics 2BL Experiment 2, Physics 2BL Deuction of Mass Distributions. Last Upate: 2009-05-03 Preparation Before this experiment, we recommen you review or familiarize yourself with the following: Chapters 4-6 in Taylor

More information

Topic 7: Convergence of Random Variables

Topic 7: Convergence of Random Variables Topic 7: Convergence of Ranom Variables Course 003, 2016 Page 0 The Inference Problem So far, our starting point has been a given probability space (S, F, P). We now look at how to generate information

More information

On classical orthogonal polynomials and differential operators

On classical orthogonal polynomials and differential operators INSTITUTE OF PHYSICS PUBLISHING JOURNAL OF PHYSICS A: MATHEMATICAL AND GENERAL J. Phys. A: Math. Gen. 38 2005) 6379 6383 oi:10.1088/0305-4470/38/28/010 On classical orthogonal polynomials an ifferential

More information

Range and speed of rotor walks on trees

Range and speed of rotor walks on trees Range an spee of rotor wals on trees Wilfrie Huss an Ecaterina Sava-Huss May 15, 1 Abstract We prove a law of large numbers for the range of rotor wals with ranom initial configuration on regular trees

More information

BEYOND THE CONSTRUCTION OF OPTIMAL SWITCHING SURFACES FOR AUTONOMOUS HYBRID SYSTEMS. Mauro Boccadoro Magnus Egerstedt Paolo Valigi Yorai Wardi

BEYOND THE CONSTRUCTION OF OPTIMAL SWITCHING SURFACES FOR AUTONOMOUS HYBRID SYSTEMS. Mauro Boccadoro Magnus Egerstedt Paolo Valigi Yorai Wardi BEYOND THE CONSTRUCTION OF OPTIMAL SWITCHING SURFACES FOR AUTONOMOUS HYBRID SYSTEMS Mauro Boccaoro Magnus Egerstet Paolo Valigi Yorai Wari {boccaoro,valigi}@iei.unipg.it Dipartimento i Ingegneria Elettronica

More information

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs Lectures - Week 10 Introuction to Orinary Differential Equations (ODES) First Orer Linear ODEs When stuying ODEs we are consiering functions of one inepenent variable, e.g., f(x), where x is the inepenent

More information

INVERSE PROBLEM OF A HYPERBOLIC EQUATION WITH AN INTEGRAL OVERDETERMINATION CONDITION

INVERSE PROBLEM OF A HYPERBOLIC EQUATION WITH AN INTEGRAL OVERDETERMINATION CONDITION Electronic Journal of Differential Equations, Vol. 216 (216), No. 138, pp. 1 7. ISSN: 172-6691. URL: http://eje.math.txstate.eu or http://eje.math.unt.eu INVERSE PROBLEM OF A HYPERBOLIC EQUATION WITH AN

More information

Notes on Lie Groups, Lie algebras, and the Exponentiation Map Mitchell Faulk

Notes on Lie Groups, Lie algebras, and the Exponentiation Map Mitchell Faulk Notes on Lie Groups, Lie algebras, an the Exponentiation Map Mitchell Faulk 1. Preliminaries. In these notes, we concern ourselves with special objects calle matrix Lie groups an their corresponing Lie

More information

Lower Bounds for Local Monotonicity Reconstruction from Transitive-Closure Spanners

Lower Bounds for Local Monotonicity Reconstruction from Transitive-Closure Spanners Lower Bouns for Local Monotonicity Reconstruction from Transitive-Closure Spanners Arnab Bhattacharyya Elena Grigorescu Mahav Jha Kyomin Jung Sofya Raskhonikova Davi P. Wooruff Abstract Given a irecte

More information

. Using a multinomial model gives us the following equation for P d. , with respect to same length term sequences.

. Using a multinomial model gives us the following equation for P d. , with respect to same length term sequences. S 63 Lecture 8 2/2/26 Lecturer Lillian Lee Scribes Peter Babinski, Davi Lin Basic Language Moeling Approach I. Special ase of LM-base Approach a. Recap of Formulas an Terms b. Fixing θ? c. About that Multinomial

More information

LIAISON OF MONOMIAL IDEALS

LIAISON OF MONOMIAL IDEALS LIAISON OF MONOMIAL IDEALS CRAIG HUNEKE AND BERND ULRICH Abstract. We give a simple algorithm to ecie whether a monomial ieal of nite colength in a polynomial ring is licci, i.e., in the linkage class

More information

u!i = a T u = 0. Then S satisfies

u!i = a T u = 0. Then S satisfies Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace

More information

A. Incorrect! The letter t does not appear in the expression of the given integral

A. Incorrect! The letter t does not appear in the expression of the given integral AP Physics C - Problem Drill 1: The Funamental Theorem of Calculus Question No. 1 of 1 Instruction: (1) Rea the problem statement an answer choices carefully () Work the problems on paper as neee (3) Question

More information

A nonlinear inverse problem of the Korteweg-de Vries equation

A nonlinear inverse problem of the Korteweg-de Vries equation Bull. Math. Sci. https://oi.org/0.007/s3373-08-025- A nonlinear inverse problem of the Korteweg-e Vries equation Shengqi Lu Miaochao Chen 2 Qilin Liu 3 Receive: 0 March 207 / Revise: 30 April 208 / Accepte:

More information

Concentration of Measure Inequalities for Compressive Toeplitz Matrices with Applications to Detection and System Identification

Concentration of Measure Inequalities for Compressive Toeplitz Matrices with Applications to Detection and System Identification Concentration of Measure Inequalities for Compressive Toeplitz Matrices with Applications to Detection an System Ientification Borhan M Sananaji, Tyrone L Vincent, an Michael B Wakin Abstract In this paper,

More information

Implicit Differentiation

Implicit Differentiation Implicit Differentiation Thus far, the functions we have been concerne with have been efine explicitly. A function is efine explicitly if the output is given irectly in terms of the input. For instance,

More information

Iterative Karatsuba For Multivariate Polynomial Multiplication

Iterative Karatsuba For Multivariate Polynomial Multiplication Iterative Karatsuba For Multivariate Polynomial Multiplication Alberto Zanoni Centro Vito Volterra Università i Roma Tor Vergata Via Columbia 2 033 Roma, Italy zanoni@volterra.uniroma2.it Abstract. This

More information

Separation of Variables

Separation of Variables Physics 342 Lecture 1 Separation of Variables Lecture 1 Physics 342 Quantum Mechanics I Monay, January 25th, 2010 There are three basic mathematical tools we nee, an then we can begin working on the physical

More information

An Iterative Incremental Learning Algorithm for Complex-Valued Hopfield Associative Memory

An Iterative Incremental Learning Algorithm for Complex-Valued Hopfield Associative Memory An Iterative Incremental Learning Algorithm for Complex-Value Hopfiel Associative Memory aoki Masuyama (B) an Chu Kiong Loo Faculty of Computer Science an Information Technology, University of Malaya,

More information

Free rotation of a rigid body 1 D. E. Soper 2 University of Oregon Physics 611, Theoretical Mechanics 5 November 2012

Free rotation of a rigid body 1 D. E. Soper 2 University of Oregon Physics 611, Theoretical Mechanics 5 November 2012 Free rotation of a rigi boy 1 D. E. Soper 2 University of Oregon Physics 611, Theoretical Mechanics 5 November 2012 1 Introuction In this section, we escribe the motion of a rigi boy that is free to rotate

More information

Selection principles and the Minimal Tower problem

Selection principles and the Minimal Tower problem Note i Matematica 22, n. 2, 2003, 53 81. Selection principles an the Minimal Tower problem Boaz Tsaban i Department of Mathematics an Computer Science, Bar-Ilan University, Ramat-Gan 52900, Israel tsaban@macs.biu.ac.il,

More information

A Course in Machine Learning

A Course in Machine Learning A Course in Machine Learning Hal Daumé III 12 EFFICIENT LEARNING So far, our focus has been on moels of learning an basic algorithms for those moels. We have not place much emphasis on how to learn quickly.

More information

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors Math 18.02 Notes on ifferentials, the Chain Rule, graients, irectional erivative, an normal vectors Tangent plane an linear approximation We efine the partial erivatives of f( xy, ) as follows: f f( x+

More information

On the minimum distance of elliptic curve codes

On the minimum distance of elliptic curve codes On the minimum istance of elliptic curve coes Jiyou Li Department of Mathematics Shanghai Jiao Tong University Shanghai PRChina Email: lijiyou@sjtueucn Daqing Wan Department of Mathematics University of

More information

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments 2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor

More information

DIFFERENTIAL GEOMETRY, LECTURE 15, JULY 10

DIFFERENTIAL GEOMETRY, LECTURE 15, JULY 10 DIFFERENTIAL GEOMETRY, LECTURE 15, JULY 10 5. Levi-Civita connection From now on we are intereste in connections on the tangent bunle T X of a Riemanninam manifol (X, g). Out main result will be a construction

More information

Resistant Polynomials and Stronger Lower Bounds for Depth-Three Arithmetical Formulas

Resistant Polynomials and Stronger Lower Bounds for Depth-Three Arithmetical Formulas Resistant Polynomials an Stronger Lower Bouns for Depth-Three Arithmetical Formulas Maurice J. Jansen University at Buffalo Kenneth W.Regan University at Buffalo Abstract We erive quaratic lower bouns

More information

Some properties of random staircase tableaux

Some properties of random staircase tableaux Some properties of ranom staircase tableaux Sanrine Dasse Hartaut Pawe l Hitczenko Downloae /4/7 to 744940 Reistribution subject to SIAM license or copyright; see http://wwwsiamorg/journals/ojsaphp Abstract

More information

Permanent vs. Determinant

Permanent vs. Determinant Permanent vs. Determinant Frank Ban Introuction A major problem in theoretical computer science is the Permanent vs. Determinant problem. It asks: given an n by n matrix of ineterminates A = (a i,j ) an

More information

A simple model for the small-strain behaviour of soils

A simple model for the small-strain behaviour of soils A simple moel for the small-strain behaviour of soils José Jorge Naer Department of Structural an Geotechnical ngineering, Polytechnic School, University of São Paulo 05508-900, São Paulo, Brazil, e-mail:

More information

A Novel Decoupled Iterative Method for Deep-Submicron MOSFET RF Circuit Simulation

A Novel Decoupled Iterative Method for Deep-Submicron MOSFET RF Circuit Simulation A Novel ecouple Iterative Metho for eep-submicron MOSFET RF Circuit Simulation CHUAN-SHENG WANG an YIMING LI epartment of Mathematics, National Tsing Hua University, National Nano evice Laboratories, an

More information