algorithms ISSN

Size: px
Start display at page:

Download "algorithms ISSN"

Transcription

1 Algorthms 2008, 1, 30-42; DOI: /a Artcle OPEN ACCESS algorthms ISSN andomzed Compettve Analyss for Two Server Problems Wolfgang Ben 1,,, Kazuo Iwama 2 and Jun Kawahara 2 1 Center for the Advanced Study of Algorthms, School of Computer Scence, Unversty of Nevada, Las Vegas, Nevada 89154, USA 2 School of Informatcs, Kyoto Unversty, Kyoto , Japan Emal addresses: ben@cs.unlv.edu; wama@kus.kyoto-u.ac.jp; jkawahara@kus.kyoto-u.ac.jp Author to whom correspondence should be addressed. esearch done whle vstng Kyoto Unversty as Kyoto Unversty Vstng Professor. eceved: 13 August 2008 / Accepted: 18 September 2008 / Publshed: 19 September 2008 Abstract: We prove that there exsts a randomzed onlne algorthm for the 2-server 3-pont problem whose expected compettve rato s at most Ths s the frst nontrval upper bound for randomzed k-server algorthms n a general metrc space whose compettve rato s well below the correspondng determnstc lower bound (= 2 n the 2-server case). Keywords: andomzed Algorthms; Onlne Algorthms; Server Problems. 1. Introducton The k-server problem, ntroduced by Manasse, McGeoch and Sleator [1], s one of the most fundamental onlne problems. In ths problem the nput s gven as k ntal server postons and a sequence p 1, p 2, of requests n the Eucldean space, or more generally n any metrc space. For each request p, the onlne player has to select, wthout any knowledge of future requests, one of the k servers and move t to p. The goal s to mnmze the total movng dstance of the servers. The k-server problem s wdely consdered nstructve to the understandng of onlne problems n general, yet, there are only scattered results. The most notable open problem s perhaps the k-server conjecture, whch states that the k-server problem s k-compettve. The conjecture remans open for k 3, despte years of effort by many researchers; t s solved for a very few specal cases, and remans open even for 3 servers when the metrc space has more than 6-ponts. The current best upper bound s 2k 1 gven by Koutsoupas and Papadmtrou n 1994 [2]. The conjecture s true for k = 2, for the

2 Algorthms 2008, a b c Fgure 1. 3 ponts on a lne C 1 L d 1 d 2 Fgure 2. Trangle CL lne [3], trees [4], and on fxed k + 1 or k + 2 ponts [5]. It s stll open for the 3-server problem on more than sx ponts and also on the crcle [6]. The lower bound s k whch s shown n the orgnal paper [1]. In the randomzed case, even less s known. Indeed, one of hardest problems n the area of onlne algorthms s to determne the exact randomzed compettveness of the k-server problem, that s, the mnmum compettveness of any randomzed onlne algorthm for the server problem. (As s customary, we mean by compettve rato of a randomzed algorthm ts expected compete rato.) Very lttle s known for general k. Bartal et al. [7] have an asymptotc lower bound, namely that the compettveness of any randomzed onlne algorthm for an arbtrary metrc space s Ω(log k/ log 2 log k). Even the case k = 2 s open for the randomzed 2-server problem, and, despte much effort, no randomzed algorthm for general metrc spaces wth compettveness strctly lower than 2 has been found. Surprsngly, the classc algorthm ANDOM SLACK [8], a very smple trackless algorthm, has been the algorthm wth best compettve rato for almost two decades now. Karln et al. [9] gave a lower e bound of, whch s the bound for the classcal sk rental problem. Ths bound s derved n a space e 1 wth three ponts, where two ponts are located closely together and the thrd pont s far from both of these. The best known lower bound s 1 + e , but ths lower bound requres a space wth at least four ponts, see [10]. (A lower bound very slghtly larger than 1 + e 1 2 s stated n [10], but wthout proof.) It s ndeed surprsng that no randomzed algorthm wth compettve rato better than 2 has been found, snce t seems ntutve that randomzaton should help. It should be noted that generally randomzaton s qute powerful for onlne problems, snce t obvously reduces the power of the adversary. Such seems to be the case for the 2-server problem as well. To gve ntuton, consder a smple 2-server problem on the three equally spaced ponts a, b and c on a lne (See Fg. 1). It s easy to prove a lower bound of 2 for the compettve rato of any determnstc algorthm: The adversary always gves a request on the pont the server s mssng. Thus for any onlne algorthm, A, ts total cost s at least n the number of requests. But t turns out by a smple case analyss that the offlne cost s n/2. Suppose nstead that A s randomzed. Now f the request comes on b (wth mssng server), then A can decde by a con flp whch server (a or c) to move. An (oblvous) adversary knows A s algorthm completely but does not know the result of the con flp and hence cannot determne whch pont (a or c) has the server mssng n the next step. The adversary would make the next request on a but ths tme a has a server wth probablty 1/2 and A can reduce ts cost. Wthout gvng detals, t s not hard to show that ths algorthm A wth the randomzed acton for a request to b and a greedy acton one for others has a compettve rato of 1.5. Indeed, one would magne that t mght be qute straghtforward to desgn randomzed algorthms whch perform sgnfcantly better than determnstc ones for the 2-server problem. As mentoned above

3 Algorthms 2008, 1 32 ths has not been the case. Only few specal cases have yelded success. Bartal, Chrobak, and Larmore gave a randomzed algorthm for the 2-server problem on the lne, whose compettve rato s slghtly better than 2 ( ) [11]. One other result by Ben et. al. [12] uses a novel technque, the 78 knowledge state method, to derve a compettve randomzed algorthm for the specal case of Cross Polytope Spaces. Usng smlar technques a new result for pagng (the k-server problem n unform spaces) was recently obtaned. Ben et al. [13] gave an H k -compettve randomzed algorthm whch requres only O(k) memory for k-pagng. (Though the technques n the current paper are nspred by ths work, the knowledge state method s not used here.) Lund and engold showed that f specfc three postons are gven, then an optmal randomzed algorthm for the 2-server problem over those three ponts can be derved n prncple by usng lnear programmng [14]. However, they do not gve actual values of ts compettve rato and to ths date the problem s stll open even for the 2-server 3-ponts case. Fnally, we menton other somewhat related work n the realm of onlne computaton: see the work of Karln et al. [15] for sk-rental problems, engold et al. [16] for lst access problems, and Fat et al. [17] for pagng. Our Contrbuton. In ths paper, we prove that the randomzed compettve rato of the 2-server 3-pont problem n a general metrc space s at most and also we conjecture that t s at most e/(e 1) Thus we gve an upper bound that matches the lower bound wthn a small ε. The underlyng dea s to fnd a fnte set S of trangles (.e. three ponts) such that f the compettve rato for each trangle n S s at most c, then the compettve rato for all trangles n any metrc space s at most c δ(s) where δ(s) 1 s a value determned by S. To bound the compettve rato for each trangle n S, we apply lnear programmng. As we consder larger sets, the value of δ(s) becomes smaller and approaches 1. Thus the upper bound of the general compettve rato also approaches the maxmum compettve rato of trangles n S and we can obtan arbtrarly close upper bounds by ncreasng the sze of the computaton. Our result n ths paper strongly depends on computer smulatons smlar to earler work based on knowledge states. Indeed, there are several successful examples of such an approach, whch usually conssts of two stages; () reducng nfntely many cases of a mathematcal proof to fntely many cases (where ths number s stll too large for a standard proof ) and () usng computer programs to analyze the fntely many cases. See the work n [18 22] for desgn and analyss of such algorthms. In partcular, for onlne compettve analyss, Seden proved the currently best upper bound, , for onlne bnpackng [23]. Also wth ths approach, Horyama et al. [24] obtaned an optmal compettve rato for the onlne knapsack problem wth resource augmentaton by buffer bns. 2. Our Approach Snce we consder only three fxed ponts, we can assume wthout loss of generalty that they are gven n the two-dmensonal Eucldean space. The three ponts are denoted by L, C and, furthermore let d(c, L) = 1, d(c, ) = d 1, and d(l, ) = d 2 (see Fg. 2). Wthout loss of generalty we assume that 1 d 1 d 2 d 1 + 1, snce the actual lengths of the trangle s sdes are rrelevant and only ther ratos matter. The 2-server problem on L, C and s denoted by (1, d 1, d 2 ), where the two servers are

4 Algorthms 2008, 1 33 on L and ntally and the nput s gven as a sequence σ of ponts {L, C, }. (1, d 1, d 2 ) s also used to denote the trangle tself. The cost of an onlne algorthm A for the nput sequence σ s denoted by ALG A (σ) and the cost of the offlne algorthm by OP T (σ). Suppose that for some constant α 0, E[ALG A (σ)] r OP T (σ) + α, holds for any nput sequence σ. Then we say that the compettve rato of A s at most r. We frst consder the case that the three ponts are on a lne and both d 1 and d 2 are ntegers. In ths case, we can desgn a general onlne algorthm as follows. The proof s gven n the next secton. Lemma 1 Let n be a postve nteger. Then there exsts an onlne algorthm for (1, n, n + 1) whose compettve rato s at most C n = (1+ 1 n )n 1 n+1. (1+ 1 n )n 1 Note that f trangles 1 and 2 are dfferent, then good algorthms for 1 and 2 are also dfferent. However, the next lemma says that f 1 and 2 do not dffer too much, then one can use an algorthm for 1 as an algorthm for 2 wth small sacrfce on the compettve rato. Lemma 2 Suppose that there are two trangles 1 = (1, a 1, b 1 ) and 2 = (1, a 2, b 2 ) such that a 1 a 2 and b 1 b 2 and that the compettve rato of algorthm A for 1 s at most r. Let α = max( a 1 a 2, b 1 b2 ). Then the compettve rato of A for 2 s at most r α. Proof. For α let α = (1/α, a 1 /α, b 1 /α). Fx an arbtrary nput sequence σ and let the optmal offlne cost aganst σ be OP T 1, OP T 2 and OP T α for 1, 2 and α, respectvely. Snce α s smlar to 1 and the length of each sde s 1/α, OP T α s obvously (1/α)OP T 1. Snce every sde of 2 s at least as long as the correspondng sde of α, OP T 2 OP T α = (1/α)OP T 1. Let the expected cost of A aganst σ for 1 and 2 be ALG 1 and ALG 2, respectvely. Note that A moves the servers exactly n the same (randomzed) way for 1 and 2. Snce each sde of 2 s at most as long as the correspondng sde of 1, ALG 2 ALG 1. We have ALG 2 OP T 2 ALG 1 (1/α)OP T 1 = max( a 1 a 2, b 1 b2 ) ALG 1 OP T 1. Thus we can approxmate all trangles, whose α-value s at most wthn some constant, by a fnte set S of trangles. More precsely we ntroduce the noton of an approxmaton set as follows: Suppose that a target compettve rato,.e. a compettve rato one wshes to acheve, s r 0. Then we frst calculate the mnmum nteger n 0 such that r 0 n 0+2 n 0 C n0 +1, where C n0 +1 s the value gven n the statement of Lemma 1. Next we construct a set S such that for any two numbers a and b wth 1 a n 0 and b a + 1, there exst two trangles 1 = (1, a 1, b 1 ) and 2 = (1, a 2, b 2 ) n S such that the followng condtons are met: () a 2 < a a 1 and b 2 < b b 1, () there exsts an algorthm for 1 whose compettve rato s r 1, and () r 1 max( a 1 a 2, b 1 b2 ) r 0. We call such a set an r 0 -approx set. Lemma 3 If one can construct an r 0 -approx set S, then there s an onlne algorthm for the 2-server problem on three ponts, whose compettve rato s at most r 0. Proof. Consder the followng algorthm A(a, b) whch takes the values a and b of the trangle (1, a, b). Note that A(a, b) s an nfnte set of dfferent algorthms from whch we select one due

5 Algorthms 2008, 1 34 to the values of a and b. If a n 0, then we select the maxmum nteger n such that a n. Then A(a, b) uses the algorthm for (1, n + 1, n + 2) of Lemma 1. Clearly we have a n + 1 and b n + 2. Therefore, by Lemma 2, the compettve rato of ths algorthm for (1, a, b) s at most (recall that C n+1 s the compettve rato of ths algorthm for (1, n + 1, n + 2) gven n Lemma 1) ( n + 1 max a, n + 2 ) C n+1 n + 2 b n C n+1 n C n0 +1 r 0. n 0 By a smple calculaton we have that n+2 C n n+1 = n+2 (1+ n) 1 n 1 n+1 monotoncally decreases, whch n (1+ n) 1 n 1 mples the nequalty second to last. If a < n 0, then we have the two trangles 1 and 2 satsfyng the condtons () to () above. Then we use the algorthm for 1 guaranteed by condton (). Its compettve rato for (1, a, b) s obvously at most r 0 by Lemma Three Ponts on a Lne We now prove Lemma 1. To ths end we make use of a state dagram, called the offset graph, whch ndcates the value of the work functon W (s, σ) [25]. ecall that W (s, σ) gves the optmal offlne cost under the assumpton that all requests gven by σ have been served and the fnal state after σ must be s, where s s one of (L, C), (L, ) and (C, ) n our stuaton. Fg. 3 shows the offset graph, G OP n T for (1, n, n + 1). Each state contans a trple (x, y, z), whch represents three values for the work functon; the frst for when (C, ) are covered (leavng L blank), the next for when (L, ) are covered, and the last for when (L, C) are covered. For nstance, n the fgure the top mddle state s the ntal state, whch s denoted by V L. ecall that the ntal server confguraton s (L, ). Ths state contans (n, 0, 1), whch means that W ((L, C), φ) = n, W ((L, ), φ) = 0, and W ((C, ), φ) = 1. For example, to see that W ((L, C), φ) = n, consder that ntally the request sequence s empty denoted by φ. The ntal server confguraton s (L, ); thus n order to change ths confguraton nto (L, C), one can optmally move a server from to C at cost n. Therefore, W ((L, C), φ) = n. Consder now state V 3 the fourth state from the top. Its trple gves the value of the work functon for the request sequence CLC, namely, W ((L, C), CLC), W ((L, ), CLC) and W ((C, ), CLC). Note that ths request sequence CLC s obtaned by concatenatng the labels of arrows from the ntal state V L to V 3. For the work functon value of W ((L, ), CLC) we have W ((L, ), CLC) = 4. Ths s calculated from the prevous state V 2 n the followng way: Server poston (L, ) can be reached from prevous confguraton (L, ) (= 2) plus 2 (= the cost of movng a server on L to C and back to L) or from prevous confguraton (C, ) (= 3) plus 1 (= the cost of movng a server on C to L),.e. n both cases a value of 4. From state V 3, there s an arrow to V C as a result of request. Carryng out a smlar calculaton, one can see that the trple should change from (n, 4, 3) to (n + 4, 4, 3) n ths transton. However, the trple n V C s (n + 1, 1, 0). Ths s because of an offset value of 3 on the arrow from V 3 to V C. Namely, (n + 1, 1, 0) n V C s obtaned from (n + 4, 4, 3) by reducng each value by 3. Because of the use of offset values a fnte graph can be used to represent the potentally nfntely many values of the work functon. Thus one can conclude that (n, 0, 1) n the ntal state V L also means

6 Algorthms 2008, 1 35 v LC v L v C (0, n, n+1), n (n, 0, 1) L, 1 (n+1, 1, 0) L, n, 2n-2 v 1, 2 v 2 v 3 v 2n-3 v 2n-2 (n, 2, 1) v 2n-1 C, 0, 1 L, 0 (n, 2, 3) C, 0 (n, 4, 3) L, 0 C, 0 (n, 2n-2, 2n-3) L, 0 (n, 2n-2, 2n-1) C, 0 (n, 2n, 2n-1), 3, 2n-3, 2n-1 S LC S L S C L L S 1 p 1-p 1 1 S 2 p 1-p 1 1 S 3 p 1-p 2 2 S 2n-3 p 1-p n-1 n-1 S 2n-2 p 1-p n-1 n-1 S 2n-1 p 1-p n n C L C L C L C Fgure 3. Offset graph Fgure 4. State dagram of the algorthm (n+4, 4, 5), (n+8, 8, 9), by traversng the cycle V L V 1 V 2 V 3 V C repeatedly. We leave t to the reader to formally verfy that Fg. 3 s a vald offset graph for (1, n, n + 1). We ntroduce another state graph, called the algorthm graph. Fg. 4 shows the algorthm graph, G ALG n, for (1, n, n + 1). Notce that G ALG n s smlar to G OP n T. Each state ncludes a trple (q 1, q 2, q 3 ) such that q 1 0, q 2 0, q 3 0 and q 1 +q 2 +q 3 = 1, whch means that the probabltes of confguratons (C, L), (L, ) and (C, ) are q 1, q 2 and q 3, respectvely. (Snce the most recent request must be served, one of the three values s zero. In the fgure, therefore, only two probabltes are gven. For example, n S 1, the probabltes for (L, C)(= p 1 ) and for (C, )(= 1 p 1 ) are gven. In our specfc algorthm G ALG n, we defne those values as follows: S LC = (1, 0, 0), S L = (0, 1, 0), S C = (0, 0, 1), S 2 1 = (p, 0, 1 p ) ( = 1,..., n), S 2 = (p, 1 p, 0) ( = 1,..., n 1) n where p s (1+ 1 n ) 1. n+1 (1+ 1 n )n 1 We descrbe how to transform an algorthm graph nto the actual algorthm. Suppose for example that the request sequence s CL. Assume the algorthm s n state S 2, and suppose that the next request s C. The state transton from S 2 to S 3 occurs. Suppose that S 2 has confguraton-probablty pars (C 1, q 1 ), (C 2, q 2 ), and (C 3, q 3 ) (C 1 = (L, C), C 2 = (L, ) and C 3 = (C, )) and S 3 has (C 1, r 1 ), (C 2, r 2 ), and (C 3, r 3 ). We ntroduce varables x j (, j = 1, 2, 3) such that x j s equal to the probablty that the

7 Algorthms 2008, 1 36 confguraton before the transton s C and the confguraton after the transton s C j. Indeed, by a slght abuse of notaton the x j values can be consdered to be the algorthm tself. The x j values also allow us to calculate the cost of the algorthm as descrbed next. The average cost for a transton s gven by cost = 3 3j=1 =1 x j d(c, C j ), where d(c, C j ) s the cost to change the confguraton from C to C j. We can select the values of x j n such a way that they mnmze the above cost under the condton that 3 j=1 x j = q, 3=1 x j = r j. In the case of three ponts on the lne, t s straghtforward to solve ths lnear program n general. If the servers are on L and C and the request s, then a greedy move (C ) s optmal. If the servers are on L and and the request s C, then the optmal probablty s just a proportonal dstrbuton due to d(l, C) and d(c, ). The x j values also show the actual moves of the servers. For example, f the servers are on L and n S 2, we move a server n L to C wth probablty x 23 /q 2 and to C wth probablty x 21 /q 2. From the values x j, one can also obtan the expected cost of an algorthm for each transton, as follows: cost(s LC, S L ) = n, cost(s C, S L ) = 1, cost(s L, S 1 ) = np p 1, cost(s 2 1, S 2 ) = 1 p ( = 1,..., n 1), cost(s 2, S 2+1 ) = n(p +1 p ) + 1 p +1 ( = 1,..., n 1), cost(s 2 1, S C ) = (n + 1)p ( = 1,..., n), cost(s 2, S L ) = np ( = 1,..., n 1), cost(s 2n 1, S LC ) = (n + 1)(1 p n ). We are now ready to prove Lemma 1. ecall that G OP T n and G ALG n sequence σ, we can thus assocate the same sequence, λ(σ), of transtons n G OP T n offlne cost for λ(σ) can be calculated from G OP T n and the onlne cost from G ALG n are the same graph. Wth a request and G ALG n. The. Consderng these two costs, we obtan the compettve rato for σ. We need only consder the cycles of the type consdered below, as other cycles can be obtaned as dsjont unons. (1) S 1, S 2,..., S 2h 1, S C, S L (h = 1,..., n 1) (2) S 1, S 2,..., S 2h, S L (h = 1,..., n 1) (3) S 1, S 2,..., S 2n 1, S LC, S L. For sequence (1), the OPT cost s 2h and ALG cost s 2np h + 2h 2 h 1 j=1 p j = 2hC n. Smlarly, for sequence (2), OP T = 2h and ALG < 2hC n and for sequence (3) OP T = 2n and ALG = 4n 2 n j=1 p j = 2nC n. Thus the compettve rato s at most C n for any of these sequences, whch proves the lemma. 4. Constructon of a Fnte Set of Trangles For trangle 1 = (1, a, b) and d > 0, let 2 = (1, a, b ) be any trangle such that a d a a and b d b b. Then as shown n Sec. 2 the compettve rato for 2, denoted by f( 2 ), can be wrtten as f( 2 ) max ( a a, b ) ( a f( b 1 ) max a d, ) b f( 1 ) b d a a d f( 1).

8 Algorthms 2008, 1 37 b fnte set of squares (trangles) X 0 g(x ) = 0 n0 n C n0 b [2, 3; 1] 2 X d (a,b ); C = r g(x ) = a a - d r [3, 4; 2] [2, 2; 1] 0 a 0 1 a Fgure 6. Dvson of a square Fgure 5. Coverng Ω (The last nequalty comes from the fact that a b.) ecall that trangle (1, a, b) always satsfes 1 a b a + 1, whch means that (a, b) s n the shaded area of Fg. 5, whch we denote by Ω. Consder pont (a, b ) n ths area and the square X of sze d, whose rght upper corner s (a, b ) (Fg. 5). Such a square s also denoted by [a, b ; d ]. Then for any trangle whose (a, b )-values are wthn ths square a (some porton of t may be outsde Ω), ts compettve rato can be bounded by a d f( (1, a, b )), whch we call the compettve rato of the square X and denote by g(x ) or g([a, b ; d ]). Addtonally, for = 0 the value g(x 0 ) s bounded by n 0 C n 0 2 n 0. Consder a fnte set of squares X 0, X 1,..., X k = [a k, b k ; d k ],..., X m wth the followng propertes (see also Fg. 5): (1) The rght-upper corners of all the squares are n Ω. (2) X 0 s the rghtmost square, whch must be [, + 1; 2] for some. (3) The area of Ω between a = 1 and must be covered by those squares, or any pont (a, b) n Ω such that 1 a must be n some square. Suppose that all the values of g(x ) for 0 m are at most r 0. Then one can easly see that the set S = =0,m { (1, a, b ), (1, a d, b d )} of trangles satsfes condtons () to () gven n Sec. 2,.e., we have obtaned the algorthm whose compettve rato s at most r 0. The ssue s how to generate those squares effcently. Note that g(x) decreases f the sze d of the square X decreases. Specfcally, we can subdvde each square nto squares of smaller sze to obtan an mproved compettve rato. However, t s not the best polcy to subdvde all squares evenly snce g(x) for a square X of the same sze substantally dffers n dfferent postons wthn Ω. Note ths phenomenon especally between postons close to the orgn (.e., both a and b are small) and those far from the orgn (the former s larger). Thus our approach s to subdvde squares X dynamcally, or to dvde the one wth the largest g(x) value n each step. Also observe that as squares move to the rght n Fg. 5 then the g value decreases due to Lemma 1.

9 Algorthms 2008, states g-value = , , states g-value = Fgure 7. Approxmaton of a square We gve now an nformal descrpton of the procedure for generatng the squares, the formal descrpton s gven n Procedures 1 and 2. Broadly speakng one starts wth square near the orgn, then subdvdes ths square, and contnues by creatng a new square to the rght. Due to Lemma 1 ths process s bounded. The procedure begns wth a sngle square [2, 3; 2]. Note that ts g-value s poor (n fact, not bounded). Next, square [2, 3; 2] s splt nto four squares of sze 1 as shown n Fg. 6: [1, 3; 1], [1, 2; 1], [2, 2; 1] and [2, 3; 1]. For each of these squares, the g-value s then calculated n the followng way: If the square s of the form [, + 1; l] for some, l, the g-value can be calculated mmedately by Lemma 1. Otherwse, we use the lnear program descrbed n [14] to determne the compettve rato of trangle (1, a, b). Note that ths lnear program makes use of state graphs smlar to those n Fg. 3 and Fg. 4. Next, square [3, 4; 2] of sze 2 s added. In general, f the procedure dvdes [, + 1; 2] of sze 2 and [ + 1, + 2; 2] of sze 2 does not exst, then square [ + 1, + 2; 2] s added. Thus at ths stage there are four squares of sze 1 (two of these are, n fact, outsde Ω) and one square of sze 2. The procedure further dvdes that square (nsde Ω) whose g value s the worst. One contnues n ths way and takes the worst g-value as an upper bound of the compettve rato. An ssue regardng the effcency of the procedure s that the number of states of the state dagram used by the algorthm for a small square (or for the correspondng trangle) becomes large. Ths leads to potentally excessve computaton tmes for the LP nvolved. Consder, for example, the trangle (1, 170, ) (or the square [, 213; 1 ]). It turns out that one needs 514 states for the dagram and substantal computaton tme n solvng the LP s requred. However, note that there s a slghtly larger trangle, (1, 4, 5) (or the square [ 4, 5; 5 ]), whch needs only 12 states to solve the LP (Fg. 7). Thus one can shorten computaton tme by usng [ 4 3, 5 3 ; ] nstead of [, 213; 1 ], thereby tradng off the g-value of the former (= ), for that of the latter (= ). Although we do not have an exact relaton between the trangle and the number of states, we have observed that f the rato of the three sdes of the trangle can be represented by three small ntegers then the number of states s also small. In the procedure, therefore, we do not smply calculate g(x) for a square X, but we attempt to fnd X whch contans X and has such desrable propertes. Procedure 1 and 2 gve a formal descrpton of our method. Each square X = [a, b; d] s represented by p = (a, b, d, r), where r s an upper bound of g(x). The man procedure SQUAEGENEATION dvdes the square, whose g value s the worst, nto four half-szed squares and, f necessary, also creates a new rghtmost square of sze 2. Then the g-values of those new squares are calculated by procedure

10 Algorthms 2008, 1 39 d (a 2, b 2 ) (a 4, b 4 ) d d = 2 (a, b) = (a 1, b 1 ) (a 3, b 3 ) d + e 0 e 0 d + e 0 (a, b) d (a 0, b 0 ) y - b (a, b) x - a x, y Fgure 8. Lnes 9-13 Fgure 9. Lne 27 Fgure 10. Lnes CALCULATEC. As dscussed above, our method attempts to fnd a more sutable square, such that the number of states can be kept manageable. More formally, let the current square be X = [a, b; d]. Then one seeks to fnd X = [ã, b; d] whch contans X and where ã can be represented by β, such that α both α and β are ntegers and α s at most 31. (Smlarly for b.) We have confrmed that the number of states and LP computaton tme are reasonably small f α s at most ths sze; for detals, see also FINDAPPOXPOINT n Procedure 2. We note that we scan the value of α only n the range from 17 to 31. Ths s suffcent; for example, α = 10 can be covered by α = 20. The value α = 16 s not needed ether snce t should have been calculated prevously n the subdvson process. If g( X) s smaller than the g-value of the orgnal square (of double sze), then we use that value as the g-value of X. Otherwse we abandon such an approxmaton and calculate g(x) drectly. Now suppose that SQUAEGENEATION has termnated. Then for any p = (a, b, d, r) n P, t s guaranteed that r 0. Ths means that the set of squares whch satsfy the condtons (1) to (3) have been created. As mentoned there, we have also created the set of trangles satsfyng the condtons of Sec. 2. Thus by Lemma 3, we can conclude: Theorem 1 There s an onlne algorthm for the 2-server 3-pont problem whose compettve rato s at most 0. We now gve results of our computer experments: For the entre area Ω, the current upper bound s (recall that the conjecture s ). The number N of squares generated s 13285, n whch the sze m of smallest squares s 1/256 and the sze M of largest squares s 2. We also conducted experments for small subareas of Ω: (1) For [5/4, 7/4, 1/16]: The upper bound s (better than the conjecture but ths s not a contradcton snce our trangles are restrcted). (N, M, m) = (69, 1/64, 1/128). (2) For [7/4, 9/4, 1/4]: The upper bound s (N, M, m) = (555, 1/64, 1/2048). (3) For [10, 11, 1]: The upper bound s (N, M, m) = (135, 1/16, 1/32). We note that for our computatons the LP solver whch s part of Mathematca was used for our computatons and accuracy to wthn 5 dgts s guaranteed. 5. Concludng emarks There are at least two drectons for future research: Frst one mght prove that the compettve rato of the 2-server 3-pont problem s analytcally at most e/(e 1) + ε. Secondly we wsh to extend our current approach (.e., approxmaton of nfnte pont locatons by fnte ones) to four (or more) ponts. We have a partal result for the 4-pont case where two of the four ponts are close (obvously t s smlar to the 3-pont case), but the generalzaton does not appear easy.

11 Algorthms 2008, 1 40 Procedure 1 Procedure SquareGeneraton 1: procedure SQUAEGENEATION( 0 ) 2: p (2, 3, 2, C 2 2/(2 2) = ) 3: Mark p. 4: P {p} 5: whle p = (a, b, d, r) such that r > 0 do 6: p the pont n P whose r s maxmum. 7: P P \{p} 8: Let p = (a, b, d, r) 9: d d/2 10: a 1 a, b 1 b 11: a 2 a d, b 2 b 12: a 3 a, b 3 b d 13: a 4 a d, b 4 b d See Fg : for 1 to 4 do 15: f (a, b ) Ω then 16: r CALCULATEC(a, b, d, r) 17: P P {(a, b, d, r )} 18: end f 19: end for 20: f p s marked then 21: p (a + 1, b + 1, 2, C a+1 a/(a 2)). 22: Mark p. Unmark p. 23: P P {p } 24: end f 25: end whle 26: end procedure 27: procedure CALCULATEC(a, b, d, r) 28: (a 0, b 0 ) FINDAPPOXPOINT(a, b) See Fg : r 0 GETC FOMLP(a 0, b 0 ) 30: e 0 max(a a 0, b b 0 ) 31: r 0 r 0 a 0 /(a 0 d e 0 ) 32: f r 0 < r 0 then 33: return r 0 34: else 35: r 0 GETC FOMLP(a, b) 36: r 0 r 0 a 0 /(a 0 d) 37: return r 0 38: end f 39: end procedure

12 Algorthms 2008, 1 41 Procedure 2 Procedure FndApproxPont 1: procedure FINDAPPOXPOINT(a, b) 2: e mn 3: for 31 to 17 do 4: x a, y y, e max(x/ a, y/ b) 5: f e < e mn then 6: e mn e, mn, x mn x, y mn y 7: end f 8: end for 9: return (x mn / mn, y mn / mn ) 10: end procedure eferences 1. Manasse, M.; McGeoch, L. A.; Sleator, D. Compettve algorthms for server problems. J. Algorthms 1990, 11, Koutsoupas, E.; Papadmtrou, C. On the k-server conjecture. J. ACM 1995, 42, Chrobak, M.; Karloff, H.; Payne, T. H.; Vshwanathan, S. New results on server problems. SIAM J. Dscrete Math. 1991, 4, Chrobak, M.; Larmore, L. L. An optmal onlne algorthm for k servers on trees. SIAM J. Comput. 1991, 20, Koutsoupas, E.; Papadmtrou, C. Beyond compettve analyss. In Proc. 35th FOCS, pages IEEE, Ben, W.; Chrobak, M.; Larmore, L. L. The 3-server problem n the plane. In Proc. 7th European Symp. on Algorthms (ESA), volume 1643 of Lecture Notes n Comput. Sc., pages Sprnger, Bartal, Y.; Bollobas, B.; Mendel, M. A amsey-type theorem for metrc spaces and ts applcatons for metrcal task systems and related problems. In Proc. 42nd FOCS, pages IEEE, Coppersmth, D.; Doyle, P. G.; aghavan, P.; Snr, M. andom walks on weghted graphs and applcatons to on-lne algorthms. J. ACM 1993, 40, Karln, A.; Manasse, M.; McGeoch, L.; Owck, S. Compettve randomzed algorthms for nonunform problems. Algorthmca 1994, 11, Chrobak, M.; Larmore, L. L.; Lund, C.; engold, N. A better lower bound on the compettve rato of the randomzed 2-server problem. Inform. Process. Lett. 1997, 63, Bartal, Y.; Chrobak, M.; Larmore, L. L. A randomzed algorthm for two servers on the lne. In Proc. 6th ESA, Lecture Notes n Comput. Sc., pages Sprnger, Ben, W.; Iwama, K.; Kawahara, J.; Larmore, L. L.; Oravec, J. A. A randomzed algorthm for two servers n cross polytope spaces. In Proc. 5th WAOA, volume 4927 of Lecture Notes n Computer Scence, pages Sprnger, Ben, W.; Larmore, L. L.; Noga, J. Equtable revsted. In Proc. 15th ESA, volume 4698 of Lecture Notes n Computer Scence, pages Sprnger, 2007.

13 Algorthms 2008, Lund, C.; engold, N. Lnear programs for randomzed on-lne algorthms. In Proc. 5th SODA, pages ACM/SIAM, Karln, A..; Kenyon, C.; andall, D. Dynamc tcp acknowledgement and other stores about e/(e 1). In Proc. 33rd STOC, pages ACM, engold, N.; Westbrook, J.; Sleator, D. D. andomzed compettve algorthms for the lst update problem. Algorthmca 1994, 11, Fat, A.; Karp,.; Luby, M.; McGeoch, L. A.; Sleator, D.; Young, N. E. Compettve pagng algorthms. J. Algorthms 1991, 12, Appel, K.; Haken, W. Every planar map s four colorable. Illnos Journal of Mathematcs 1977, 21(5), Fege, U.; Goemans, M. X. Approxmatng the value of two prover proof systems, wth applcatons to max-2sat and max-dcut. In Proc. 3rd ISTCS, pages , Goemans, M. X.; Wllamson, D. P. Improved approxmaton algorthms for maxmum cut and satsfablty problems usng semdefnte programmng. J. ACM 1995, 42(6), Karloff, H.; Zwck, U. A 7/8-approxmaton algorthm for max 3sat. In Proc. 38th FOCS, pages IEEE, Trevsan, L.; Sorkn, G. B.; Sudan, M.; Wllamson, D. P. Gadgets, approxmaton, and lnear programmng. SIAM J. Comput. 2000, 29(6), Seden, S. S. On the onlne bn packng problem. J. ACM 2002, 49(5), Horyama, T.; Iwama, K.; Kawahara, J. Fnte-state onlne algorthms and ther automated compettve analyss. In Proc. 17th ISAAC, volume 4288 of Lecture Notes n Comput. Sc., pages Sprnger, Chrobak, M.; Larmore, L. L. The server problem and on-lne games. In McGeoch, L. A.; Sleator, D. D., edtors, On-lne Algorthms, volume 7 of DIMACS Seres n Dscrete Mathematcs and Theoretcal Computer Scence, pages AMS/ACM, c 2008 by the authors; lcensee Molecular Dversty Preservaton Internatonal, Basel, Swtzerland. Ths artcle s an open-access artcle dstrbuted under the terms and condtons of the Creatve Commons Attrbuton lcense (

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

Edge Isoperimetric Inequalities

Edge Isoperimetric Inequalities November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

COS 521: Advanced Algorithms Game Theory and Linear Programming

COS 521: Advanced Algorithms Game Theory and Linear Programming COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Learning Theory: Lecture Notes

Learning Theory: Lecture Notes Learnng Theory: Lecture Notes Lecturer: Kamalka Chaudhur Scrbe: Qush Wang October 27, 2012 1 The Agnostc PAC Model Recall that one of the constrants of the PAC model s that the data dstrbuton has to be

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017 U.C. Berkeley CS94: Beyond Worst-Case Analyss Handout 4s Luca Trevsan September 5, 07 Summary of Lecture 4 In whch we ntroduce semdefnte programmng and apply t to Max Cut. Semdefnte Programmng Recall that

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Complete subgraphs in multipartite graphs

Complete subgraphs in multipartite graphs Complete subgraphs n multpartte graphs FLORIAN PFENDER Unverstät Rostock, Insttut für Mathematk D-18057 Rostock, Germany Floran.Pfender@un-rostock.de Abstract Turán s Theorem states that every graph G

More information

Lecture 12: Discrete Laplacian

Lecture 12: Discrete Laplacian Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly

More information

Finding Dense Subgraphs in G(n, 1/2)

Finding Dense Subgraphs in G(n, 1/2) Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng

More information

Lecture 4: November 17, Part 1 Single Buffer Management

Lecture 4: November 17, Part 1 Single Buffer Management Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input

More information

CS : Algorithms and Uncertainty Lecture 17 Date: October 26, 2016

CS : Algorithms and Uncertainty Lecture 17 Date: October 26, 2016 CS 29-128: Algorthms and Uncertanty Lecture 17 Date: October 26, 2016 Instructor: Nkhl Bansal Scrbe: Mchael Denns 1 Introducton In ths lecture we wll be lookng nto the secretary problem, and an nterestng

More information

Perfect Competition and the Nash Bargaining Solution

Perfect Competition and the Nash Bargaining Solution Perfect Competton and the Nash Barganng Soluton Renhard John Department of Economcs Unversty of Bonn Adenauerallee 24-42 53113 Bonn, Germany emal: rohn@un-bonn.de May 2005 Abstract For a lnear exchange

More information

arxiv: v1 [math.co] 1 Mar 2014

arxiv: v1 [math.co] 1 Mar 2014 Unon-ntersectng set systems Gyula O.H. Katona and Dánel T. Nagy March 4, 014 arxv:1403.0088v1 [math.co] 1 Mar 014 Abstract Three ntersecton theorems are proved. Frst, we determne the sze of the largest

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016 U.C. Berkeley CS94: Spectral Methods and Expanders Handout 8 Luca Trevsan February 7, 06 Lecture 8: Spectral Algorthms Wrap-up In whch we talk about even more generalzatons of Cheeger s nequaltes, and

More information

Economics 101. Lecture 4 - Equilibrium and Efficiency

Economics 101. Lecture 4 - Equilibrium and Efficiency Economcs 0 Lecture 4 - Equlbrum and Effcency Intro As dscussed n the prevous lecture, we wll now move from an envronment where we looed at consumers mang decsons n solaton to analyzng economes full of

More information

Case A. P k = Ni ( 2L i k 1 ) + (# big cells) 10d 2 P k.

Case A. P k = Ni ( 2L i k 1 ) + (# big cells) 10d 2 P k. THE CELLULAR METHOD In ths lecture, we ntroduce the cellular method as an approach to ncdence geometry theorems lke the Szemeréd-Trotter theorem. The method was ntroduced n the paper Combnatoral complexty

More information

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41,

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41, The greatest common dvsor of two ntegers a and b (not both zero) s the largest nteger whch s a common factor of both a and b. We denote ths number by gcd(a, b), or smply (a, b) when there s no confuson

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

a b a In case b 0, a being divisible by b is the same as to say that

a b a In case b 0, a being divisible by b is the same as to say that Secton 6.2 Dvsblty among the ntegers An nteger a ε s dvsble by b ε f there s an nteger c ε such that a = bc. Note that s dvsble by any nteger b, snce = b. On the other hand, a s dvsble by only f a = :

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

Assortment Optimization under MNL

Assortment Optimization under MNL Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.

More information

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011 Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

Spectral Graph Theory and its Applications September 16, Lecture 5

Spectral Graph Theory and its Applications September 16, Lecture 5 Spectral Graph Theory and ts Applcatons September 16, 2004 Lecturer: Danel A. Spelman Lecture 5 5.1 Introducton In ths lecture, we wll prove the followng theorem: Theorem 5.1.1. Let G be a planar graph

More information

Lecture Randomized Load Balancing strategies and their analysis. Probability concepts include, counting, the union bound, and Chernoff bounds.

Lecture Randomized Load Balancing strategies and their analysis. Probability concepts include, counting, the union bound, and Chernoff bounds. U.C. Berkeley CS273: Parallel and Dstrbuted Theory Lecture 1 Professor Satsh Rao August 26, 2010 Lecturer: Satsh Rao Last revsed September 2, 2010 Lecture 1 1 Course Outlne We wll cover a samplng of the

More information

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 15 Scribe: Jieming Mao April 1, 2013

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 15 Scribe: Jieming Mao April 1, 2013 COS 511: heoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 15 Scrbe: Jemng Mao Aprl 1, 013 1 Bref revew 1.1 Learnng wth expert advce Last tme, we started to talk about learnng wth expert advce.

More information

A 2D Bounded Linear Program (H,c) 2D Linear Programming

A 2D Bounded Linear Program (H,c) 2D Linear Programming A 2D Bounded Lnear Program (H,c) h 3 v h 8 h 5 c h 4 h h 6 h 7 h 2 2D Lnear Programmng C s a polygonal regon, the ntersecton of n halfplanes. (H, c) s nfeasble, as C s empty. Feasble regon C s unbounded

More information

Finding Primitive Roots Pseudo-Deterministically

Finding Primitive Roots Pseudo-Deterministically Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms

More information

1 The Mistake Bound Model

1 The Mistake Bound Model 5-850: Advanced Algorthms CMU, Sprng 07 Lecture #: Onlne Learnng and Multplcatve Weghts February 7, 07 Lecturer: Anupam Gupta Scrbe: Bryan Lee,Albert Gu, Eugene Cho he Mstake Bound Model Suppose there

More information

Affine transformations and convexity

Affine transformations and convexity Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/

More information

Additional Codes using Finite Difference Method. 1 HJB Equation for Consumption-Saving Problem Without Uncertainty

Additional Codes using Finite Difference Method. 1 HJB Equation for Consumption-Saving Problem Without Uncertainty Addtonal Codes usng Fnte Dfference Method Benamn Moll 1 HJB Equaton for Consumpton-Savng Problem Wthout Uncertanty Before consderng the case wth stochastc ncome n http://www.prnceton.edu/~moll/ HACTproect/HACT_Numercal_Appendx.pdf,

More information

Graph Reconstruction by Permutations

Graph Reconstruction by Permutations Graph Reconstructon by Permutatons Perre Ille and Wllam Kocay* Insttut de Mathémathques de Lumny CNRS UMR 6206 163 avenue de Lumny, Case 907 13288 Marselle Cedex 9, France e-mal: lle@ml.unv-mrs.fr Computer

More information

Every planar graph is 4-colourable a proof without computer

Every planar graph is 4-colourable a proof without computer Peter Dörre Department of Informatcs and Natural Scences Fachhochschule Südwestfalen (Unversty of Appled Scences) Frauenstuhlweg 31, D-58644 Iserlohn, Germany Emal: doerre(at)fh-swf.de Mathematcs Subject

More information

Grover s Algorithm + Quantum Zeno Effect + Vaidman

Grover s Algorithm + Quantum Zeno Effect + Vaidman Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the

More information

Lecture 20: Lift and Project, SDP Duality. Today we will study the Lift and Project method. Then we will prove the SDP duality theorem.

Lecture 20: Lift and Project, SDP Duality. Today we will study the Lift and Project method. Then we will prove the SDP duality theorem. prnceton u. sp 02 cos 598B: algorthms and complexty Lecture 20: Lft and Project, SDP Dualty Lecturer: Sanjeev Arora Scrbe:Yury Makarychev Today we wll study the Lft and Project method. Then we wll prove

More information

VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES

VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES BÂRZĂ, Slvu Faculty of Mathematcs-Informatcs Spru Haret Unversty barza_slvu@yahoo.com Abstract Ths paper wants to contnue

More information

Lecture Space-Bounded Derandomization

Lecture Space-Bounded Derandomization Notes on Complexty Theory Last updated: October, 2008 Jonathan Katz Lecture Space-Bounded Derandomzaton 1 Space-Bounded Derandomzaton We now dscuss derandomzaton of space-bounded algorthms. Here non-trval

More information

MMA and GCMMA two methods for nonlinear optimization

MMA and GCMMA two methods for nonlinear optimization MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

A Note on Bound for Jensen-Shannon Divergence by Jeffreys

A Note on Bound for Jensen-Shannon Divergence by Jeffreys OPEN ACCESS Conference Proceedngs Paper Entropy www.scforum.net/conference/ecea- A Note on Bound for Jensen-Shannon Dvergence by Jeffreys Takuya Yamano, * Department of Mathematcs and Physcs, Faculty of

More information

An Interactive Optimisation Tool for Allocation Problems

An Interactive Optimisation Tool for Allocation Problems An Interactve Optmsaton ool for Allocaton Problems Fredr Bonäs, Joam Westerlund and apo Westerlund Process Desgn Laboratory, Faculty of echnology, Åbo Aadem Unversty, uru 20500, Fnland hs paper presents

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2].

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2]. Bulletn of Mathematcal Scences and Applcatons Submtted: 016-04-07 ISSN: 78-9634, Vol. 18, pp 1-10 Revsed: 016-09-08 do:10.1805/www.scpress.com/bmsa.18.1 Accepted: 016-10-13 017 ScPress Ltd., Swtzerland

More information

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U)

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U) Econ 413 Exam 13 H ANSWERS Settet er nndelt 9 deloppgaver, A,B,C, som alle anbefales å telle lkt for å gøre det ltt lettere å stå. Svar er gtt . Unfortunately, there s a prntng error n the hnt of

More information

Report on Image warping

Report on Image warping Report on Image warpng Xuan Ne, Dec. 20, 2004 Ths document summarzed the algorthms of our mage warpng soluton for further study, and there s a detaled descrpton about the mplementaton of these algorthms.

More information

CHAPTER 17 Amortized Analysis

CHAPTER 17 Amortized Analysis CHAPTER 7 Amortzed Analyss In an amortzed analyss, the tme requred to perform a sequence of data structure operatons s averaged over all the operatons performed. It can be used to show that the average

More information

A new construction of 3-separable matrices via an improved decoding of Macula s construction

A new construction of 3-separable matrices via an improved decoding of Macula s construction Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula

More information

MATH 241B FUNCTIONAL ANALYSIS - NOTES EXAMPLES OF C ALGEBRAS

MATH 241B FUNCTIONAL ANALYSIS - NOTES EXAMPLES OF C ALGEBRAS MATH 241B FUNCTIONAL ANALYSIS - NOTES EXAMPLES OF C ALGEBRAS These are nformal notes whch cover some of the materal whch s not n the course book. The man purpose s to gve a number of nontrval examples

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

Appendix B. The Finite Difference Scheme

Appendix B. The Finite Difference Scheme 140 APPENDIXES Appendx B. The Fnte Dfference Scheme In ths appendx we present numercal technques whch are used to approxmate solutons of system 3.1 3.3. A comprehensve treatment of theoretcal and mplementaton

More information

Canonical transformations

Canonical transformations Canoncal transformatons November 23, 2014 Recall that we have defned a symplectc transformaton to be any lnear transformaton M A B leavng the symplectc form nvarant, Ω AB M A CM B DΩ CD Coordnate transformatons,

More information

Lecture 4. Instructor: Haipeng Luo

Lecture 4. Instructor: Haipeng Luo Lecture 4 Instructor: Hapeng Luo In the followng lectures, we focus on the expert problem and study more adaptve algorthms. Although Hedge s proven to be worst-case optmal, one may wonder how well t would

More information

Generalized Linear Methods

Generalized Linear Methods Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set

More information

Inductance Calculation for Conductors of Arbitrary Shape

Inductance Calculation for Conductors of Arbitrary Shape CRYO/02/028 Aprl 5, 2002 Inductance Calculaton for Conductors of Arbtrary Shape L. Bottura Dstrbuton: Internal Summary In ths note we descrbe a method for the numercal calculaton of nductances among conductors

More information

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,

More information

Turing Machines (intro)

Turing Machines (intro) CHAPTER 3 The Church-Turng Thess Contents Turng Machnes defntons, examples, Turng-recognzable and Turng-decdable languages Varants of Turng Machne Multtape Turng machnes, non-determnstc Turng Machnes,

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

Yong Joon Ryang. 1. Introduction Consider the multicommodity transportation problem with convex quadratic cost function. 1 2 (x x0 ) T Q(x x 0 )

Yong Joon Ryang. 1. Introduction Consider the multicommodity transportation problem with convex quadratic cost function. 1 2 (x x0 ) T Q(x x 0 ) Kangweon-Kyungk Math. Jour. 4 1996), No. 1, pp. 7 16 AN ITERATIVE ROW-ACTION METHOD FOR MULTICOMMODITY TRANSPORTATION PROBLEMS Yong Joon Ryang Abstract. The optmzaton problems wth quadratc constrants often

More information

Numerical Heat and Mass Transfer

Numerical Heat and Mass Transfer Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and

More information

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family IOSR Journal of Mathematcs IOSR-JM) ISSN: 2278-5728. Volume 3, Issue 3 Sep-Oct. 202), PP 44-48 www.osrjournals.org Usng T.O.M to Estmate Parameter of dstrbutons that have not Sngle Exponental Famly Jubran

More information

Transfer Functions. Convenient representation of a linear, dynamic model. A transfer function (TF) relates one input and one output: ( ) system

Transfer Functions. Convenient representation of a linear, dynamic model. A transfer function (TF) relates one input and one output: ( ) system Transfer Functons Convenent representaton of a lnear, dynamc model. A transfer functon (TF) relates one nput and one output: x t X s y t system Y s The followng termnology s used: x y nput output forcng

More information

TAIL BOUNDS FOR SUMS OF GEOMETRIC AND EXPONENTIAL VARIABLES

TAIL BOUNDS FOR SUMS OF GEOMETRIC AND EXPONENTIAL VARIABLES TAIL BOUNDS FOR SUMS OF GEOMETRIC AND EXPONENTIAL VARIABLES SVANTE JANSON Abstract. We gve explct bounds for the tal probabltes for sums of ndependent geometrc or exponental varables, possbly wth dfferent

More information

HMMT February 2016 February 20, 2016

HMMT February 2016 February 20, 2016 HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,

More information

Randić Energy and Randić Estrada Index of a Graph

Randić Energy and Randić Estrada Index of a Graph EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS Vol. 5, No., 202, 88-96 ISSN 307-5543 www.ejpam.com SPECIAL ISSUE FOR THE INTERNATIONAL CONFERENCE ON APPLIED ANALYSIS AND ALGEBRA 29 JUNE -02JULY 20, ISTANBUL

More information

The path of ants Dragos Crisan, Andrei Petridean, 11 th grade. Colegiul National "Emil Racovita", Cluj-Napoca

The path of ants Dragos Crisan, Andrei Petridean, 11 th grade. Colegiul National Emil Racovita, Cluj-Napoca Ths artcle s wrtten by students. It may nclude omssons and mperfectons, whch were dentfed and reported as mnutely as possble by our revewers n the edtoral notes. The path of ants 07-08 Students names and

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

Prof. Dr. I. Nasser Phys 630, T Aug-15 One_dimensional_Ising_Model

Prof. Dr. I. Nasser Phys 630, T Aug-15 One_dimensional_Ising_Model EXACT OE-DIMESIOAL ISIG MODEL The one-dmensonal Isng model conssts of a chan of spns, each spn nteractng only wth ts two nearest neghbors. The smple Isng problem n one dmenson can be solved drectly n several

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

Amusing Properties of Odd Numbers Derived From Valuated Binary Tree

Amusing Properties of Odd Numbers Derived From Valuated Binary Tree IOSR Journal of Mathematcs (IOSR-JM) e-iss: 78-578, p-iss: 19-765X. Volume 1, Issue 6 Ver. V (ov. - Dec.016), PP 5-57 www.osrjournals.org Amusng Propertes of Odd umbers Derved From Valuated Bnary Tree

More information

20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness.

20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness. 20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The frst dea s connectedness. Essentally, we want to say that a space cannot be decomposed

More information

2 More examples with details

2 More examples with details Physcs 129b Lecture 3 Caltech, 01/15/19 2 More examples wth detals 2.3 The permutaton group n = 4 S 4 contans 4! = 24 elements. One s the dentty e. Sx of them are exchange of two objects (, j) ( to j and

More information

Week3, Chapter 4. Position and Displacement. Motion in Two Dimensions. Instantaneous Velocity. Average Velocity

Week3, Chapter 4. Position and Displacement. Motion in Two Dimensions. Instantaneous Velocity. Average Velocity Week3, Chapter 4 Moton n Two Dmensons Lecture Quz A partcle confned to moton along the x axs moves wth constant acceleraton from x =.0 m to x = 8.0 m durng a 1-s tme nterval. The velocty of the partcle

More information

Genericity of Critical Types

Genericity of Critical Types Genercty of Crtcal Types Y-Chun Chen Alfredo D Tllo Eduardo Fangold Syang Xong September 2008 Abstract Ely and Pesk 2008 offers an nsghtful characterzaton of crtcal types: a type s crtcal f and only f

More information

Singular Value Decomposition: Theory and Applications

Singular Value Decomposition: Theory and Applications Sngular Value Decomposton: Theory and Applcatons Danel Khashab Sprng 2015 Last Update: March 2, 2015 1 Introducton A = UDV where columns of U and V are orthonormal and matrx D s dagonal wth postve real

More information

CHAPTER 14 GENERAL PERTURBATION THEORY

CHAPTER 14 GENERAL PERTURBATION THEORY CHAPTER 4 GENERAL PERTURBATION THEORY 4 Introducton A partcle n orbt around a pont mass or a sphercally symmetrc mass dstrbuton s movng n a gravtatonal potental of the form GM / r In ths potental t moves

More information

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,

More information

12. The Hamilton-Jacobi Equation Michael Fowler

12. The Hamilton-Jacobi Equation Michael Fowler 1. The Hamlton-Jacob Equaton Mchael Fowler Back to Confguraton Space We ve establshed that the acton, regarded as a functon of ts coordnate endponts and tme, satsfes ( ) ( ) S q, t / t+ H qpt,, = 0, and

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

The Second Anti-Mathima on Game Theory

The Second Anti-Mathima on Game Theory The Second Ant-Mathma on Game Theory Ath. Kehagas December 1 2006 1 Introducton In ths note we wll examne the noton of game equlbrum for three types of games 1. 2-player 2-acton zero-sum games 2. 2-player

More information

Linear Approximation with Regularization and Moving Least Squares

Linear Approximation with Regularization and Moving Least Squares Lnear Approxmaton wth Regularzaton and Movng Least Squares Igor Grešovn May 007 Revson 4.6 (Revson : March 004). 5 4 3 0.5 3 3.5 4 Contents: Lnear Fttng...4. Weghted Least Squares n Functon Approxmaton...

More information

Chapter 11: Simple Linear Regression and Correlation

Chapter 11: Simple Linear Regression and Correlation Chapter 11: Smple Lnear Regresson and Correlaton 11-1 Emprcal Models 11-2 Smple Lnear Regresson 11-3 Propertes of the Least Squares Estmators 11-4 Hypothess Test n Smple Lnear Regresson 11-4.1 Use of t-tests

More information

First day August 1, Problems and Solutions

First day August 1, Problems and Solutions FOURTH INTERNATIONAL COMPETITION FOR UNIVERSITY STUDENTS IN MATHEMATICS July 30 August 4, 997, Plovdv, BULGARIA Frst day August, 997 Problems and Solutons Problem. Let {ε n } n= be a sequence of postve

More information

The optimal delay of the second test is therefore approximately 210 hours earlier than =2.

The optimal delay of the second test is therefore approximately 210 hours earlier than =2. THE IEC 61508 FORMULAS 223 The optmal delay of the second test s therefore approxmately 210 hours earler than =2. 8.4 The IEC 61508 Formulas IEC 61508-6 provdes approxmaton formulas for the PF for smple

More information

arxiv: v1 [math.ho] 18 May 2008

arxiv: v1 [math.ho] 18 May 2008 Recurrence Formulas for Fbonacc Sums Adlson J. V. Brandão, João L. Martns 2 arxv:0805.2707v [math.ho] 8 May 2008 Abstract. In ths artcle we present a new recurrence formula for a fnte sum nvolvng the Fbonacc

More information

Dynamic Programming. Preview. Dynamic Programming. Dynamic Programming. Dynamic Programming (Example: Fibonacci Sequence)

Dynamic Programming. Preview. Dynamic Programming. Dynamic Programming. Dynamic Programming (Example: Fibonacci Sequence) /24/27 Prevew Fbonacc Sequence Longest Common Subsequence Dynamc programmng s a method for solvng complex problems by breakng them down nto smpler sub-problems. It s applcable to problems exhbtng the propertes

More information

Lecture 2: Gram-Schmidt Vectors and the LLL Algorithm

Lecture 2: Gram-Schmidt Vectors and the LLL Algorithm NYU, Fall 2016 Lattces Mn Course Lecture 2: Gram-Schmdt Vectors and the LLL Algorthm Lecturer: Noah Stephens-Davdowtz 2.1 The Shortest Vector Problem In our last lecture, we consdered short solutons to

More information