The variance for partial match retrievals in k-dimensional bucket digital trees

Size: px
Start display at page:

Download "The variance for partial match retrievals in k-dimensional bucket digital trees"

Transcription

1 The variance for partial match retrievals in k-dimensional ucket digital trees Michael FUCHS Department of Applied Mathematics National Chiao Tung University January 12, 21 Astract The variance of partial match queries in k-dimensional tries was investigated in a couple of papers in the mid-nineties, the resulting analysis eing long and complicated. In this paper, we introduce a new and much easier approach. Moreover, our approach works for k-dimensional PATRICIA tries, k-dimensional digital search trees and ucket versions as well. 1 Introduction and Results Data structures for storing and retrieving multidimensional data are of vital importance in several areas of computer science such as design of data ase systems, graphics algorithms, etc. One possile class of such data structures was introduced in [6] and is ased on digital trees. The common feature of this class is that the data is composed of infinite -1 strings. We assume throughout this work that these strings are generated y a symmetric Bernoulli source, i.e., every it is generated independently and with the same proaility. We will study stochastic properties of the resulting random trees. We will first descrie the data structures in the aove mentioned class. Therefore, we start with k- dimensional tries. Assume that we have n records, denoted y R 1,..., R n, of k-dimensional data, i.e., every record consists of k infinite -1 strings, e.g., for the i-th record we have ( ) R i,1 = R [1] i,1, R[2] i,1, R[3] i,1,...,. ( ) R i,k = R [1] i,k, R[2] i,k, R[3] i,k,.... We shuffle the aove k sequences to otain a one-dimensional record R i ( ) R i = R [1] i,1,..., R[1] i,k, R[2] i,1,..., R[2] i,k, R[3] i,1,..., R[3] i,k,.... Then, we recursively construct the trie from the data R 1,..., R n as follows: if n = 1, we place the only record into the root which is considered an external node; if n 2, then the root ecomes an (empty) internal node and the records are either directed to the left or to right sutree according to whether their 1

2 1 1 D D 2 1 D 2 D 3 D D 4 D 4 1 D 4 D 1 D 3 D 1 D 3 Figure 1: A 2-dimensional trie, PATRICIA trie and digital search tree uild from the data data D 1 D 2 D 3 D 4 R i, R i, first it is or 1; finally, the sutrees are uild recursively y the same procedure, where the first it is removed; see Figure 1 for an example. Since the input data was random this yields a random tree which is is called k-dimensional random trie of size n. A close variant of k-dimensional tries are k-dimensional PATRICIA tries. Here, a trie is constructed from the shuffled data R 1,..., R n as aove and then multiple one-way ranching is suppressed; again see Figure 1 for an example. This yields a more alanced tree improving the overall performance of tries. The corresponding random tree is called k-dimensional random PATRICIA trie of size n. A final type of multidimensional digital trees is given y the k-dimensional digital search tree. Here, the tree is constructed from R 1,..., R n as follows: the first record is placed in the root; all other records are directed to the left or right sutree according to whether their first it is or 1; finally, the sutrees are constructed y the same principle again with the first it of the records removed; see Figure 1 for an example. So, in contrast to tries and PATRICIA tries, no distinction etween internal and external nodes is necessary for digital search trees. The resulting random tree will e called k-dimensional random digital search tree of size n. Note that all the trees introduced aove have the common feature that nodes only hold at most one record. If we allow nodes to hold up to 1 records, then the resulting trees are called k-dimensional ucket digital trees. In this paper, we will study the cost of partial match retrievals in k-dimensional ucket digital trees. Therefore, consider a partial match query which is a k-dimensional vector R = (R 1,..., R k ) with some of its coordinates a string of -1 its and others unspecified. For instance, for k = 2, we might have R 1 = (,,,,...), R 2 = (, 1, 1,,...), Then, a shuffled record R is produced as efore. For the aove example this yields R = (,,, 1,, 1,,,...). The partial match query asks now for the retrieval of all records in the tree with R eing used as search query. Here, or 1 in R means either going to the left or right sutree of the current node, whereas means 2

3 that we have to proceed with our search in oth sutrees. The cost of such a partial match query will e measured y the numer of nodes visited (where we only consider internal nodes for tries and PATRICIA tries); so for the query R aove, we have a cost of 2 for the trie and Patricia trie of Figure 1 and a cost of 3 for the digital search tree. Before going on, we will fix some notation which we are going to use throughout the work. First, it should e clear that under our random model, the cost of a partial match query only depends on the partial match pattern q which is a k-tuple of symols from S, }, where the i-th coordinate is S if R i is specified and otherwise, We will fix such a q throughout this work and denote the numer of entries in q y u, where we assume that < u < k. Furthermore, we will consider cyclic shifts of the entries of q y one position to the left which will e denoted y q ; more generally, q (l) will denote the cyclic shift of the entries of q y l position to the left. Also, we will associate to a partial match pattern q an infinite sequence (δ 1, δ 2, δ 3,...) with δ i = 1 if q i mod k = S and δ i = 2 otherwise. Finally, we denote the random variale descriing the cost of the partial match query y X q,n for all three types of ucket digital trees of size n and ucket size 1 (for the sake of simplicity, we suppress the index ). In this paper, we will e concerned with stochastic properties of X q,n. Therefore, let us recall what is known aout this random variale. First, the mean value of X q,n for k-dimensional tries was investigated in [1] where the authors proved that E(X q,n ) n u/k P 1 (log 2 n 1/k ) with P 1 (z) a one-periodic function whose Fourier expansion was given in [1] as well. Similar results were susequently proved in [3] for k-dimensional ucket digital tries, k-dimensional PATRICIA tries, and k- dimensional digital search trees, too. As for the variance, it was conectured in [4] that for k-dimensional tries Var(X q,n ) n u/k P 2 (log 2 n 1/k ) (1) with P 2 (z) a one-periodic function. The authors proved this conecture for k = 2 in [4]. The general case was then settled in [7]. In this paper, we will give a new and more simpler approach to the proof of (1). Moreover, our approach works for k-dimensional ucket tries as well. In order to state our result, we need some notation. Set h q (z) = 2δ 1 e (z)e z Lq (z/2) + e (z)e z e (z) 2 e 2z, where e (z) = 1 + z + z 2 /2! + + z /! and L q (z) = exp z} n E(X q,n)z n /n!. Theorem 1. We have, with and Var(X q,n ) = n u/k P T 2 (log 2 n 1/k ) + O(n 2u/k 1 ) P T 2 (z) = where ω r = u/k + 2πir/(kL) and L = log 2. r= c T r e 2πirz c T r = 1 δ 1 δ l 2 ωrl z ωr 1 hq (l)(z)dz, kl Note that it is not immediately clear why the integral in the aove result should converge. This will, however, follow from the proof elow. With slightly more work, the Fourier coefficients can e further simplified. 3

4 Corollary 1. We have, ( ( c T r = Γ( ω ( ωr ) r) + δ(2 ωr ) 2 ωr kl ( )( l + ωr + l + where l +1 δ(z) = δ 1 δ z, σ(z 1, z 2 ) = ( )( ) ωr ) , 2 = 1 )( ωr ) ) 2 1 l σ(2 ωr, 2 l )), (2) l 1 2 lk+u 1, 2 = δ 1 δ z 1 1 z 2 2. For instance, for k = 2, s = 1, and q = (, S), the value of c T ecomes (1 + 2) ( π ( ) ) 1/2 (l 1)(l + 1/2)2 l , 2 ln 2 8 l 1 2 l+1/2 l 2 where the last approximated was computed with Maple. This value coincides with the one given in [4]. Note that the expression given in the latter paper is slightly different; we leave it as an exercise to the reader to show that they are the same. Next, our approach can also e straightforwardly applied to k-dimensional ucket PATRICIA tries. Here, we have the same result as aove only h q (z) replaced y h q (z) =2δ 1 (e (z)e z δ 1 e (z/2)e z + (δ 1 1)e z/2 ) L q (z/2) + e (z)e z δ 1 e (z/2)e z + δ 1 e z/2 (e (z)e z δ 1 e (z/2)e z + δ 1 e z/2 ) 2. Also, a similar explicit expression for the Fourier coefficients as in Corollary 1 can e given. Since, the resulting formula is more messy we do not give details. Finally, k-dimensional ucket digital search trees are slightly more involved. Here, a new approach which was introduced in [2] can e used to otain an asymptotic expansion of the variance. In order to state our result, we again need some notation. Therefore, set and Theorem 2. We have, with and c D r = Q(s) = 1 h q (z) = 1 klγ(1 + ω r ) ( (1 s 2 ), Q l = ( ) 2 L () q (z)) l ( ) 1 2 =1 ( ) ) () ( Lq (z) 2. Var(X q,n ) = n u/k P D 2 (log 2 n 1/k ) + O(n 2u/k 1 ) P D 2 (z) = δ 1 δ l 2 ωrl r= c D r e 2πirz ( s ωr ) e zs hq (l)(z)dz + p(s) ds, (3) Q( 2s) 4

5 where p(s) = (1 + s) 1 + ( 1). s + 2 Also here, it is not clear why the aove doule integral should e convergent. This will, however, again follow from the proof elow. Moreover, the Fourier coefficients can e further simplified here, too. We will state the result for = 1. Therefore, set π(x ω 1)/(sin(πω)(x 1)) if x 1; ϕ(ω; x) = πω/ sin(πω), if x = 1. Then, we have the following corollary. Corollary 2. Assume that = 1. Then, c D 1 r = δ 1 δ l 2 ωrl klq(1)γ(1 + ω r ) where 1, 2, 3 δ q, = l ( 1) 1 δq (l), 2 δq (l), 3 2 ( 1 2 )+(1 ω r) 1 ( 1) l 2 (l+1 2 ) Q l Q1 Q 2 Q 3 ϕ(ω r ; ), l+ δ h. We conclude the introduction y giving a short sketch of the paper. In the next section, we will treat k-dimensional ucket tries. Then, in Section 3, we will riefly discuss k-dimensional ucket PATRICIA tries. Finally, in Section 5, we will prove the results for k-dimensional ucket digital search trees. 2 k-dimensional Bucket Tries h=1 Note that from the definition of k-dimensional ucket tries, we have X d X q q,n =,I n + Xq,n I n + 1, if q = (,...); X q,i n + 1, if q = (S,...), (n + 1), where I n = Binom(n, 1/2), (X n) is an independent copy of (X n ) with X n d = X n, and X q, = X q,1 = = X q, =. Poissonization. Let P q (z, y) denote the Poisson generating function of E(expX q,n y}), i.e., P q (z, y) = e z n Then, we otain from the aove distriutional recurrence E(e Xny ) zn n!. P q (z, y) = e y Pq (z/2, y) δ 1 + e (z)e z (1 e y ). Next, y taking first and second derivatives with respect to y and setting y =, we otain the following functional equation for the Poisson generating function of the mean (denoted y L q (z)) L q (z) = δ 1 Lq (z/2) + 1 e (z)e z 5

6 and for the Poisson generating function of the second moment (denoted y M q (z)) 2 M q (z) = M q (z/2) + 4 L q (z/2) + 2 L q (z/2) e (z)e z, if q = (,...); M q (z/2) + 2 L q (z/2) + 1 e (z)e z, if q = (S,...). In order to go from the Poisson generating function ack to the original quantity, we have introduced in [2] the notation of J S -admissiility. Recall that f(z) is called J S -admissile if the following two conditions hold (where here and throughout this work, ɛ will denote a small constant whose value might change from one appearance to the next). (I) There exists an α R such that f(z) = O ( z α ) uniformly for arg(z) ɛ. (O) We have, uniformly for ɛ arg(z) π. f(z) := e z f(z) = O ( e (1 ɛ) z ) The importance of this notation is that if f(z) is the Poisson generating function of, say f n, then J S - admissiility of f(z) implies that the following asymptotic relation etween f n and its Poisson generating function holds f n f () (n) τ (n)! with τ (n) = n![z n ](z n) e z (see [2] for a more thorough discussion of this). In our context, J S -admissile is easily checked via the following result. Proposition 1. Assume that we have f q (l)(z) = δ l+1 fq (l+1)(z/2) + g q (l)(z), ( l < k), where all involved functions are entire. Moreover, assume that g q (l)(z) is J S -admissile for l < k. Then, f q (l)(z) is J S -admissile for l < k. Proof. We only show how to prove (I). Therefore, we start y iterating the recurrence. This yields f q (z) = 2 u fq (z/2 k ) + δ 1 δ l g q (l)(z/2 l ). Now set Then, y the assumptions, we otain B q (r) := max f q (z). z =r, arg(z) ɛ B q (r) 2 u Bz (r/2 k ) + O (r α ). Next, we define K q (r) y K q (r) = 2 u Kq (r/2 k ) + O (r α ). 6

7 Then, B q (r) K q (r). Moreover, we immediately otain y iteration r α, if α > u/k; K q (r) = r u/k log r, if α = u/k; r u/k, if α < u/k. This proves our claim. Using this result it is easily proved that oth L q (z) and M q (z) are J S -admissile. Also, note that we have L q (z) = O ( z u/k), Mq (z) = O ( z 2u/k) (4) uniformly as z and arg(z) ɛ. Next, we define the poissonized variance as Then, y a straightforward computation Ṽ q (z) = M q (z) L q (z) 2. Ṽ q (z) = δ 1 Ṽ q (z/2) + h q (z), where h q (z) was defined in the introduction. The importance of the poissonized variance is apparent from the following result which is proved from the J S -admissiility of L q (z) and M q (z). Proposition 2. As n, Var(X q,n ) = Ṽq(n) + O ( n 2u/k 1). Proof. First note that from the proof of Proposition 1 and (4), we have Ṽ q (z) = O ( z u/k) uniformly for z and arg(z) ɛ. Next, consider Var(X q,n ) = E(Xq,n) 2 (E(X q,n )) 2 ( M q () (n) τ (n)! L () q (n) τ (n)! ) 2 Ṽq(n) n L q(n) 2 n 2 Ṽ q (n) + smaller order terms. Using the aove ounds and Ritt s theorem (see [5]) demonstrates the claim. Asymptotic Expansion of L q (z). We will first look at the mean value which is needed in the proof of Corollary 1. Therefore, y using iteration as in the proof of Proposition 1, we otain L q (z) = 2 u Lq (z/2 k ) + δ 1 δ l g q (l)(z/2 l ), where g q (l)(z) = 1 e (z)e z. Next, we use Mellin transform. Therefore, note that y (4) and the trivial ound L q (z) = O ( z +1) as z, the Mellin transform of L q (z) exists in the strip 1, u/k. Applying Mellin transform to the aove functional equation then yields M [ L q (z); ω] = Γ(w) ( ) w + δ 1 2 ωk+u 1 δ l 2 ωl, R(ω) 1, u/k. (5) 7

8 Moreover, y inverse Mellin transform and shifting the line of integration to the right, we have where P 1 (z) = r= L q (z) z u/k P 1 (log 2 z 1/k ), (z ), (6) c r e 2πirz, c r = Γ( ω r) kl ( ωr + ) k 1 δ 1 δ l 2 ωrl. Note that due to the fast decay of (5) along vertical lines, (6) more generally holds uniformly for z and arg(z) π/2 ɛ. Asymptotic Expansion of Ṽq(n). functional equation, we have Using iteration as aove and applying Mellin transform to the resulting M [Ṽq(z); ω] = ωk+u δ 1 δ l 2 ωl M [ h q (l)(z); ω], R(ω) 1, u/k. Now, from (4), we have that as z h q (l)(z) = O(z β ) (l) for any β > and l < k. Oviously, h q (z) = O(z +1 ) as z for l < k. Hence, the Mellin transform of h q (l)(z) exists in the strip 1,. Our claimed result follows from this y inverse Mellin transform and shifting the line of integration to the right. Simplification of the Fourier Coefficients. Therefore, we concentrate on The main task is the evaluation of z ωr 1 ( 2δ l+1 e (z)e z Lq (l+1)(z/2) + e (z)e z e (z) 2 e 2z ) dz. z ωr 1 e (z)e z Lq (l+1)(z/2)dz, the remaining parts eing easy. Note that due to (5), we have ( ) M [ L q (l+1)(z/2); σ] = 2σ Γ(σ) σ + δ 1 2 σk+u q (l+1)(2 σ ), where Now, y inverse Mellin transform z ωr 1 e (z)e z Lq (l+1)(z/2)dz = δ q (l+1)(z) = δ l+2 δ l++1 z. = ( ) ( ) ( 2 σ Γ(σ) σ σk+u ( )( σ + ωr σ + 8 ) δ q (l+1)(2 σ ) z ωr σ 1 e (z)e z dzdσ ) 2 σ Γ(σ)Γ( ω r σ) 1 2 σk+u δ q (l+1)(2 σ )dσ,

9 where the outer integral is along the line R(σ) =. Finally, y shifting the line of the integration to the left, we otain the asolute convergent series z ωr 1 e (z)e z Lq (l+1)(z/2)dz = Γ( ω r ) ( )( )( ) l + ωr + l + ωr 2 l δ q (l+1)(2 l ) l 1 2. lk+u l +1 Collecting everything and standard computation yields the claimed result. 3 k-dimensional Bucket PATRICIA Tries Here, from the definition of Patricia tries, we have X q,i n + Xq,n I n, if I n, n}, X q X q,n =,I n + Xq,n I n + 1, otherwise, X q,i n, if I n = n, X q,i n + 1, otherwise, if q = (,...); if q = (S,...), (n + 1), where notation and initial conditions are as in the previous section. From this we then otain for the Poisson generating function of the mean (with notation as efore) where L q (z) = δ 1 Lq (z/2) g q (z) g q (z) = e (z)e z + δ 1 e (z/2)e z δ 1 e z/2, and the Poisson generating function of the second moment 2 M q (z) = M q (z/2) + 2 L q (z/2) 2 + 4(1 e z/2 ) L q (z/2) g q (z), if q = (,...); M q (z/2) + 2(1 e z/2 ) L q (z/2) g q (z), if q = (S,...). Moreover, we have for the poissonized variance Ṽ q (z) = δ q Ṽ q (z/2) + h q (z), where h q (z) was defined in the introduction. The remaining analysis now proceeds from these functional equational equations as in the previous section. 4 k-dimensional Bucket Digital Search Trees Here, we will use a slightly different approach compared with the approach aove. This approach was introduced in [2]. Since the current situation is similar to the examples discussed in [2], we will only give a sketch and refer the interested reader to the latter paper for more details. Again, we start from a distriutional recurrence for X q,n which for the current situation reads as follows X d X q q,n+ =,I n + Xq,n I n + 1, if q = (,...); (n ), X q,i n + 1, if q = (S,...), where the notation is as efore and initial conditions are given y X q, = and X q,1 = = X q, 1 = 1. 9

10 Poissonization. We again define Then, P q (z, y) = e z n E(e Xq,ny ) zn n!. ( ) P q (z, y) = e y Pq (z/2, y) δ 1. Taking derivatives yields for the Poisson generating function of mean and second moment (denoted as efore) ( ) L () q (z) = δ 1 Lq (z/2) + 1 (7) and ( ) M q () 2 (z) = M q (z/2) + 4 L q (z/2) + 2 L q (z/2) 2 + 1, if q = (,...); M q (z/2) + 2 L q (z/2) + 1, if q = (S,...). The first step is again to show that L q (z) and M q (z) are J S -admissile. Therefore, we need the following result which is proved y a reduction to the trie case (see [2] for similar results). Proposition 3. Assume that we have ( ) f () (z) = δ q (l) l+1 fq (l+1)(z/2) + g q (l)(z), ( l < k), where all involved functions are entire and at z =. Moreover, assume that g q (l)(z) is J S -admissile for l < k. Then, f q (l)(z) is J S -admissile for l < k. This together with the closure properties from [2] then shows that L q (z) and M q (z) are J S -admissile. Next, we consider the poissonized variance Ṽq(z) = M q (z) L q (z) 2. An easy computation proves that ( ) Ṽ () (z) = δ 1 Ṽ q (z/2) + h q (z), where h q (z) was defined in the introduction. Then, from the J S -admissiility of L q (z) and M q (z), we otain as for tries the following result. Proposition 4. As n, Var(X q,n ) = Ṽq(n) + O ( n 2u/k 1). Asymptotic Expansion of L q (z). Again, we first consider the mean value. Therefore, note that in comparison to tries, it is not possile to iterate (7). Hence, we first apply Laplace transform and otain (s + 1) L [ L q (z); s] = 2δ 1 L [ L q (z); 2s] + (s + 1) 1 /s. (8) Next, we normalize with Q(s) from the introduction. Therefore, set L q (s) = L [ L q (z); s]/q( s) and Ḡ(s) = (s + 1) 1 /(Q( 2s) s). Then, L q (s) = 2δ 1 Lq (2s) + Ḡ(s). 1

11 Now, we can iterate and otain L q (s) = 2 k+u Lq (2 k s) + 2 l δ 1 δ l Ḡ(2 l s). The next step is again Mellin transform. Therefore, note that the Mellin transform of L q (s) exists in a non-trivial strip. Moreover, due to the growth properties of Q(s) from [2], the Mellin transform of Ḡ(s) exists in the strip 1,. Applying Mellin transform yields M [ L q (s); ω] = M [Ḡ(s); ω] 1 2 k ωk+u δ 1 δ l 2 l ωl, R(ω) 1 + u/k,. Next, y inverse Mellin transform and shifting the line of integration to the left, we otain L q (z) r= c r s 1 u/k 2πir/(kL), (s ). Since, Q( s) = 1 + O( s ) as s, the same asymptotic expansion holds for L [ L q (z); s] as well. Finally, y inverse Laplace transform (see [2] for technical details), we have L q (z) z u/k P 1 (log 2 z 1/k ), (z ), where P 1 is a computale, 1-periodic function. A more careful analysis shows that the aove asymptotic expansion holds uniformly for z and arg(z) π/2 ɛ. Asymptotic Expansion of Ṽq(z). Here, we proceed as aove and otain V q (s) = 2 k+u Vq (2 k s) + δ 1 δ l 2 l Hq (l)(2 l s), were V q (s) = L [Ṽq(z); s]/q( s) and H q (l)(s) = (L [ h q (l)(z); s] + p(s))/q( 2s) with Now, oserve that h q (z) = p(s) = (1 + s) 1 + ( 1). s + 2 O(z 2u/k 2 ), if z ; O(1), if z +, where the first ound follows from the previous paragraph and Ritt s theorem (see [5]) and the second ound is trivial. This together with the growth properties of Q(s) then in turn yields O(1/s), if s ; H q (s) = O(s β ), if s +, where β > is an aritrary constant. Consequently, the Mellin transform of H q exists in the strip 1,. The remaining proof of Theorem 2 proceeds then as in the previous paragraph. 11

12 Simplification of the Fourier Coefficients for = 1. First, y iteration of (8), L [ L q (z); s] = 1 s where δ q, = l=1 δ l. Next, y partial fraction expansion, where L [ L q (z); s] = 1 s δ q,l = Consequently, y inverse Laplace transform δ q, (s + 1) (2 s + 1), ( 1) l 2 ( l+1 2 ) δ q, = 1 δ q,l, (2 l s + 1)Q l Q l s (2 l s + 1)Q l l ( 1) 2 (+1 2 ) Q δ q,+l. L q (z) = l δ q,l Q l (1 e z/2l ). This implies L q(z) = l δ q,l 2 l Q l e z/2l, L q (z) 2 = l,h δ q,l δq,h z/2l z/2h e. 2 l+h Q l Q h Plugging this into (3) (note that for = 1, we have h q (z) = L q(z) 2 ) and using 1 Q( 2s) = 1 ( 1) 2 ( 2) Q(1) Q (s + 2 ) together with some standard computation proves the claim. References [1] P. Flaolet and C. Puech (1986). Partial match retrival of multidimensional data, J. ACM, 33, [2] H.-K. Hwang, M. Fuchs, V. Zacharovas (21). Asymptotic variance of random digital search trees, sumitted. [3] P. Kirschenhofer and H. Prodinger (1994). Multidimensional digital searching - alternative data structures, Random Struc. Algorithms, 5:1, [4] P. Kirschenhofer, H. Prodinger, W. Szpankowski (1993). Multidimensional digital searching and some new parameters in tries Int. J. Found. Comput. Scie., 4, [5] F. W. J. Olver (1974). Asymptotics and Special Functions, Academic Press, Computer Science and Applied Mathematics. [6] R. L. Rivest (1976). Partial-match retrieval algorithms, SIAM J. Comput., 5, [7] W. Schachinger (1995). The variance of a partial match retrieval in a multidimensional symmetric trie, Random Struc. Algorithms, 7:1,

Approximate Counting via the Poisson-Laplace-Mellin Method (joint with Chung-Kuei Lee and Helmut Prodinger)

Approximate Counting via the Poisson-Laplace-Mellin Method (joint with Chung-Kuei Lee and Helmut Prodinger) Approximate Counting via the Poisson-Laplace-Mellin Method (joint with Chung-Kuei Lee and Helmut Prodinger) Michael Fuchs Department of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan

More information

Asymptotic and Exact Poissonized Variance in the Analysis of Random Digital Trees (joint with Hsien-Kuei Hwang and Vytas Zacharovas)

Asymptotic and Exact Poissonized Variance in the Analysis of Random Digital Trees (joint with Hsien-Kuei Hwang and Vytas Zacharovas) Asymptotic and Exact Poissonized Variance in the Analysis of Random Digital Trees (joint with Hsien-Kuei Hwang and Vytas Zacharovas) Michael Fuchs Institute of Applied Mathematics National Chiao Tung University

More information

Asymptotic variance of random symmetric digital search trees

Asymptotic variance of random symmetric digital search trees Discrete Mathematics and Theoretical Computer Science DMTCS vol. :,, 3 66 Asymptotic variance of random symmetric digital search trees Hsien-Kuei Hwang, Michael Fuchs and Vytas Zacharovas Institute of

More information

The Subtree Size Profile of Plane-oriented Recursive Trees

The Subtree Size Profile of Plane-oriented Recursive Trees The Subtree Size Profile of Plane-oriented Recursive Trees Michael Fuchs Department of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan ANALCO11, January 22nd, 2011 Michael Fuchs (NCTU)

More information

Digital search trees JASS

Digital search trees JASS Digital search trees Analysis of different digital trees with Rice s integrals. JASS Nicolai v. Hoyningen-Huene 28.3.2004 28.3.2004 JASS 04 - Digital search trees 1 content Tree Digital search tree: Definition

More information

Upper Bounds for Stern s Diatomic Sequence and Related Sequences

Upper Bounds for Stern s Diatomic Sequence and Related Sequences Upper Bounds for Stern s Diatomic Sequence and Related Sequences Colin Defant Department of Mathematics University of Florida, U.S.A. cdefant@ufl.edu Sumitted: Jun 18, 01; Accepted: Oct, 016; Pulished:

More information

Dependence between Path Lengths and Size in Random Trees (joint with H.-H. Chern, H.-K. Hwang and R. Neininger)

Dependence between Path Lengths and Size in Random Trees (joint with H.-H. Chern, H.-K. Hwang and R. Neininger) Dependence between Path Lengths and Size in Random Trees (joint with H.-H. Chern, H.-K. Hwang and R. Neininger) Michael Fuchs Institute of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan

More information

ROSENA R.X. DU AND HELMUT PRODINGER. Dedicated to Philippe Flajolet ( )

ROSENA R.X. DU AND HELMUT PRODINGER. Dedicated to Philippe Flajolet ( ) ON PROTECTED NODES IN DIGITAL SEARCH TREES ROSENA R.X. DU AND HELMUT PRODINGER Dedicated to Philippe Flajolet (98 2) Abstract. Recently, 2-protected nodes were studied in the context of ordered trees and

More information

#A50 INTEGERS 14 (2014) ON RATS SEQUENCES IN GENERAL BASES

#A50 INTEGERS 14 (2014) ON RATS SEQUENCES IN GENERAL BASES #A50 INTEGERS 14 (014) ON RATS SEQUENCES IN GENERAL BASES Johann Thiel Dept. of Mathematics, New York City College of Technology, Brooklyn, New York jthiel@citytech.cuny.edu Received: 6/11/13, Revised:

More information

Hash Table Analysis. e(k) = bp(k). kp(k) = n b.

Hash Table Analysis. e(k) = bp(k). kp(k) = n b. Septemer 1, 2016 Hash Tale Analysis Assume that we have a hash tale structured as a vector of lists, resolving collisions y sequential search of uckets, as in the generic hash tale template HashTale

More information

Polynomials Characterizing Hyper b-ary Representations

Polynomials Characterizing Hyper b-ary Representations 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 21 (2018), Article 18.4.3 Polynomials Characterizing Hyper -ary Representations Karl Dilcher 1 Department of Mathematics and Statistics Dalhousie University

More information

Pseudo-automata for generalized regular expressions

Pseudo-automata for generalized regular expressions Pseudo-automata for generalized regular expressions B. F. Melnikov A. A. Melnikova Astract In this paper we introduce a new formalism which is intended for representing a special extensions of finite automata.

More information

Luis Manuel Santana Gallego 100 Investigation and simulation of the clock skew in modern integrated circuits. Clock Skew Model

Luis Manuel Santana Gallego 100 Investigation and simulation of the clock skew in modern integrated circuits. Clock Skew Model Luis Manuel Santana Gallego 100 Appendix 3 Clock Skew Model Xiaohong Jiang and Susumu Horiguchi [JIA-01] 1. Introduction The evolution of VLSI chips toward larger die sizes and faster clock speeds makes

More information

Depth versus Breadth in Convolutional Polar Codes

Depth versus Breadth in Convolutional Polar Codes Depth versus Breadth in Convolutional Polar Codes Maxime Tremlay, Benjamin Bourassa and David Poulin,2 Département de physique & Institut quantique, Université de Sherrooke, Sherrooke, Quéec, Canada JK

More information

Genetic Algorithms applied to Problems of Forbidden Configurations

Genetic Algorithms applied to Problems of Forbidden Configurations Genetic Algorithms applied to Prolems of Foridden Configurations R.P. Anstee Miguel Raggi Department of Mathematics University of British Columia Vancouver, B.C. Canada V6T Z2 anstee@math.uc.ca mraggi@gmail.com

More information

Solving Systems of Linear Equations Symbolically

Solving Systems of Linear Equations Symbolically " Solving Systems of Linear Equations Symolically Every day of the year, thousands of airline flights crisscross the United States to connect large and small cities. Each flight follows a plan filed with

More information

Motivation: Can the equations of physics be derived from information-theoretic principles?

Motivation: Can the equations of physics be derived from information-theoretic principles? 10. Physics from Fisher Information. Motivation: Can the equations of physics e derived from information-theoretic principles? I. Fisher Information. Task: To otain a measure of the accuracy of estimated

More information

The Moments of the Profile in Random Binary Digital Trees

The Moments of the Profile in Random Binary Digital Trees Journal of mathematics and computer science 6(2013)176-190 The Moments of the Profile in Random Binary Digital Trees Ramin Kazemi and Saeid Delavar Department of Statistics, Imam Khomeini International

More information

Chaos and Dynamical Systems

Chaos and Dynamical Systems Chaos and Dynamical Systems y Megan Richards Astract: In this paper, we will discuss the notion of chaos. We will start y introducing certain mathematical concepts needed in the understanding of chaos,

More information

A Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence

A Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence A Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence Dedicated to Philippe Flajolet 1948-2011 July 4, 2013 Philippe Jacquet Charles Knessl 1 Wojciech Szpankowski 2 Bell Labs Dept. Math.

More information

Representation theory of SU(2), density operators, purification Michael Walter, University of Amsterdam

Representation theory of SU(2), density operators, purification Michael Walter, University of Amsterdam Symmetry and Quantum Information Feruary 6, 018 Representation theory of S(), density operators, purification Lecture 7 Michael Walter, niversity of Amsterdam Last week, we learned the asic concepts of

More information

Partial Match Queries in Relaxed Multidimensional Search Trees 1

Partial Match Queries in Relaxed Multidimensional Search Trees 1 Algorithmica 2001 29: 181 204 DOI: 10.1007/s004530010065 Algorithmica 2001 Springer-Verlag New York Inc. Partial Match Queries in Relaxed Multidimensional Search Trees 1 C. Martínez, 2 A. Panholzer, 3

More information

Generalized Seasonal Tapered Block Bootstrap

Generalized Seasonal Tapered Block Bootstrap Generalized Seasonal Tapered Block Bootstrap Anna E. Dudek 1, Efstathios Paparoditis 2, Dimitris N. Politis 3 Astract In this paper a new lock ootstrap method for periodic times series called Generalized

More information

Modifying Shor s algorithm to compute short discrete logarithms

Modifying Shor s algorithm to compute short discrete logarithms Modifying Shor s algorithm to compute short discrete logarithms Martin Ekerå Decemer 7, 06 Astract We revisit Shor s algorithm for computing discrete logarithms in F p on a quantum computer and modify

More information

TIGHT BOUNDS FOR THE FIRST ORDER MARCUM Q-FUNCTION

TIGHT BOUNDS FOR THE FIRST ORDER MARCUM Q-FUNCTION TIGHT BOUNDS FOR THE FIRST ORDER MARCUM Q-FUNCTION Jiangping Wang and Dapeng Wu Department of Electrical and Computer Engineering University of Florida, Gainesville, FL 3611 Correspondence author: Prof.

More information

Asymptotic results for silent elimination

Asymptotic results for silent elimination Discrete Mathematics and Theoretical Computer Science DMTCS vol. subm., by the authors, 1 1 Asymptotic results for silent elimination Guy Louchard 1 and Helmut Prodinger 2 1 Université Libre de Bruxelles,

More information

THE BALANCED DECOMPOSITION NUMBER AND VERTEX CONNECTIVITY

THE BALANCED DECOMPOSITION NUMBER AND VERTEX CONNECTIVITY THE BALANCED DECOMPOSITION NUMBER AND VERTEX CONNECTIVITY SHINYA FUJITA AND HENRY LIU Astract The alanced decomposition numer f(g) of a graph G was introduced y Fujita and Nakamigawa [Discr Appl Math,

More information

Forty years of tree enumeration

Forty years of tree enumeration October 24, 206 Canada John Moon (Alberta) Counting labelled trees Canadian mathematical monographs What is our subject? Asymptotic enumeration or Probabilistic combinatorics? What is our subject? Asymptotic

More information

1 Caveats of Parallel Algorithms

1 Caveats of Parallel Algorithms CME 323: Distriuted Algorithms and Optimization, Spring 2015 http://stanford.edu/ reza/dao. Instructor: Reza Zadeh, Matroid and Stanford. Lecture 1, 9/26/2015. Scried y Suhas Suresha, Pin Pin, Andreas

More information

The WHILE Hierarchy of Program Schemes is Infinite

The WHILE Hierarchy of Program Schemes is Infinite The WHILE Hierarchy of Program Schemes is Infinite Can Adam Alayrak and Thomas Noll RWTH Aachen Ahornstr. 55, 52056 Aachen, Germany alayrak@informatik.rwth-aachen.de and noll@informatik.rwth-aachen.de

More information

Branching Bisimilarity with Explicit Divergence

Branching Bisimilarity with Explicit Divergence Branching Bisimilarity with Explicit Divergence Ro van Glaeek National ICT Australia, Sydney, Australia School of Computer Science and Engineering, University of New South Wales, Sydney, Australia Bas

More information

Lecture 12: Grover s Algorithm

Lecture 12: Grover s Algorithm CPSC 519/619: Quantum Computation John Watrous, University of Calgary Lecture 12: Grover s Algorithm March 7, 2006 We have completed our study of Shor s factoring algorithm. The asic technique ehind Shor

More information

Bounded Queries, Approximations and the Boolean Hierarchy

Bounded Queries, Approximations and the Boolean Hierarchy Bounded Queries, Approximations and the Boolean Hierarchy Richard Chang Department of Computer Science and Electrical Engineering University of Maryland Baltimore County March 23, 1999 Astract This paper

More information

Divide-and-Conquer. Reading: CLRS Sections 2.3, 4.1, 4.2, 4.3, 28.2, CSE 6331 Algorithms Steve Lai

Divide-and-Conquer. Reading: CLRS Sections 2.3, 4.1, 4.2, 4.3, 28.2, CSE 6331 Algorithms Steve Lai Divide-and-Conquer Reading: CLRS Sections 2.3, 4.1, 4.2, 4.3, 28.2, 33.4. CSE 6331 Algorithms Steve Lai Divide and Conquer Given an instance x of a prolem, the method works as follows: divide-and-conquer

More information

Lecture 6 January 15, 2014

Lecture 6 January 15, 2014 Advanced Graph Algorithms Jan-Apr 2014 Lecture 6 January 15, 2014 Lecturer: Saket Sourah Scrie: Prafullkumar P Tale 1 Overview In the last lecture we defined simple tree decomposition and stated that for

More information

Bringing Order to Special Cases of Klee s Measure Problem

Bringing Order to Special Cases of Klee s Measure Problem Bringing Order to Special Cases of Klee s Measure Prolem Karl Bringmann Max Planck Institute for Informatics Astract. Klee s Measure Prolem (KMP) asks for the volume of the union of n axis-aligned oxes

More information

P = ρ{ g a } + µ 2 V II. FLUID STATICS

P = ρ{ g a } + µ 2 V II. FLUID STATICS II. FLUID STATICS From a force analysis on a triangular fluid element at rest, the following three concepts are easily developed: For a continuous, hydrostatic, shear free fluid: 1. Pressure is constant

More information

MATHEMATICAL ENGINEERING TECHNICAL REPORTS. Polynomial Time Perfect Sampler for Discretized Dirichlet Distribution

MATHEMATICAL ENGINEERING TECHNICAL REPORTS. Polynomial Time Perfect Sampler for Discretized Dirichlet Distribution MATHEMATICAL ENGINEERING TECHNICAL REPORTS Polynomial Time Perfect Sampler for Discretized Dirichlet Distriution Tomomi MATSUI and Shuji KIJIMA METR 003 7 April 003 DEPARTMENT OF MATHEMATICAL INFORMATICS

More information

Generalized Sampling and Variance in Counterfactual Regret Minimization

Generalized Sampling and Variance in Counterfactual Regret Minimization Generalized Sampling and Variance in Counterfactual Regret Minimization Richard Gison and Marc Lanctot and Neil Burch and Duane Szafron and Michael Bowling Department of Computing Science, University of

More information

On Universality of Blow-up Profile for L 2 critical nonlinear Schrödinger Equation

On Universality of Blow-up Profile for L 2 critical nonlinear Schrödinger Equation On Universality of Blow-up Profile for L critical nonlinear Schrödinger Equation Frank Merle,, Pierre Raphael Université de Cergy Pontoise Institut Universitaire de France Astract We consider finite time

More information

Compactness vs Collusion Resistance in Functional Encryption

Compactness vs Collusion Resistance in Functional Encryption Compactness vs Collusion Resistance in Functional Encryption Baiyu Li Daniele Micciancio April 10, 2017 Astract We present two general constructions that can e used to comine any two functional encryption

More information

Structuring Unreliable Radio Networks

Structuring Unreliable Radio Networks Structuring Unreliale Radio Networks Keren Censor-Hillel Seth Gilert Faian Kuhn Nancy Lynch Calvin Newport March 29, 2011 Astract In this paper we study the prolem of uilding a connected dominating set

More information

1 Hoeffding s Inequality

1 Hoeffding s Inequality Proailistic Method: Hoeffding s Inequality and Differential Privacy Lecturer: Huert Chan Date: 27 May 22 Hoeffding s Inequality. Approximate Counting y Random Sampling Suppose there is a ag containing

More information

SVETLANA KATOK AND ILIE UGARCOVICI (Communicated by Jens Marklof)

SVETLANA KATOK AND ILIE UGARCOVICI (Communicated by Jens Marklof) JOURNAL OF MODERN DYNAMICS VOLUME 4, NO. 4, 010, 637 691 doi: 10.3934/jmd.010.4.637 STRUCTURE OF ATTRACTORS FOR (a, )-CONTINUED FRACTION TRANSFORMATIONS SVETLANA KATOK AND ILIE UGARCOVICI (Communicated

More information

EVALUATIONS OF EXPECTED GENERALIZED ORDER STATISTICS IN VARIOUS SCALE UNITS

EVALUATIONS OF EXPECTED GENERALIZED ORDER STATISTICS IN VARIOUS SCALE UNITS APPLICATIONES MATHEMATICAE 9,3 (), pp. 85 95 Erhard Cramer (Oldenurg) Udo Kamps (Oldenurg) Tomasz Rychlik (Toruń) EVALUATIONS OF EXPECTED GENERALIZED ORDER STATISTICS IN VARIOUS SCALE UNITS Astract. We

More information

Fast inverse for big numbers: Picarte s iteration

Fast inverse for big numbers: Picarte s iteration Fast inverse for ig numers: Picarte s iteration Claudio Gutierrez and Mauricio Monsalve Computer Science Department, Universidad de Chile cgutierr,mnmonsal@dcc.uchile.cl Astract. This paper presents an

More information

Function Secret Sharing: Improvements and Extensions

Function Secret Sharing: Improvements and Extensions Function Secret Sharing: Improvements and Extensions Elette Boyle Niv Giloa Yuval Ishai July 24, 2018 Astract Function Secret Sharing (FSS), introduced y Boyle et al. (Eurocrypt 2015), provides a way for

More information

SUFFIX TREE. SYNONYMS Compact suffix trie

SUFFIX TREE. SYNONYMS Compact suffix trie SUFFIX TREE Maxime Crochemore King s College London and Université Paris-Est, http://www.dcs.kcl.ac.uk/staff/mac/ Thierry Lecroq Université de Rouen, http://monge.univ-mlv.fr/~lecroq SYNONYMS Compact suffix

More information

arxiv: v1 [math.nt] 27 May 2018

arxiv: v1 [math.nt] 27 May 2018 SETTLIG SOME SUM SUPPOSITIOS TAAY WAKHARE AD CHRISTOPHE VIGAT arxiv:180510569v1 matht] 7 May 018 Astract We solve multiple conjectures y Byszewsi and Ulas aout the sum of ase digits function In order to

More information

Applications of Tree Automata Theory Lecture V: Theory of Tree Transducers

Applications of Tree Automata Theory Lecture V: Theory of Tree Transducers Applications of Tree Automata Theory Lecture V: Theory of Tree Transducers Andreas Maletti Institute of Computer Science Universität Leipzig, Germany on leave from: Institute for Natural Language Processing

More information

Minimizing a convex separable exponential function subject to linear equality constraint and bounded variables

Minimizing a convex separable exponential function subject to linear equality constraint and bounded variables Minimizing a convex separale exponential function suect to linear equality constraint and ounded variales Stefan M. Stefanov Department of Mathematics Neofit Rilski South-Western University 2700 Blagoevgrad

More information

A converse Gaussian Poincare-type inequality for convex functions

A converse Gaussian Poincare-type inequality for convex functions Statistics & Proaility Letters 44 999 28 290 www.elsevier.nl/locate/stapro A converse Gaussian Poincare-type inequality for convex functions S.G. Bokov a;, C. Houdre ; ;2 a Department of Mathematics, Syktyvkar

More information

arxiv: v1 [cs.fl] 24 Nov 2017

arxiv: v1 [cs.fl] 24 Nov 2017 (Biased) Majority Rule Cellular Automata Bernd Gärtner and Ahad N. Zehmakan Department of Computer Science, ETH Zurich arxiv:1711.1090v1 [cs.fl] 4 Nov 017 Astract Consider a graph G = (V, E) and a random

More information

Research Article Coexistence of the Bandcount-Adding and Bandcount-Increment Scenarios

Research Article Coexistence of the Bandcount-Adding and Bandcount-Increment Scenarios Discrete Dynamics in Nature and Society Volume 211, Article ID 681565, 3 pages doi:1.1155/211/681565 Research Article Coexistence of the Bandcount-Adding and Bandcount-Increment Scenarios Viktor Avrutin,

More information

Content Delivery in Erasure Broadcast. Channels with Cache and Feedback

Content Delivery in Erasure Broadcast. Channels with Cache and Feedback Content Delivery in Erasure Broadcast Channels with Cache and Feedack Asma Ghorel, Mari Koayashi, and Sheng Yang LSS, CentraleSupélec Gif-sur-Yvette, France arxiv:602.04630v [cs.t] 5 Fe 206 {asma.ghorel,

More information

Smooth Projective Hashing and Two-Message Oblivious Transfer

Smooth Projective Hashing and Two-Message Oblivious Transfer Smooth Projective Hashing and Two-Message Olivious Transfer Shai Halevi IBM Research Yael Tauman Kalai Microsoft Research Octoer 31, 2010 Astract We present a general framework for constructing two-message

More information

ERASMUS UNIVERSITY ROTTERDAM Information concerning the Entrance examination Mathematics level 2 for International Business Administration (IBA)

ERASMUS UNIVERSITY ROTTERDAM Information concerning the Entrance examination Mathematics level 2 for International Business Administration (IBA) ERASMUS UNIVERSITY ROTTERDAM Information concerning the Entrance examination Mathematics level 2 for International Business Administration (IBA) General information Availale time: 2.5 hours (150 minutes).

More information

Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis

Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis Weak eys of the Full MISTY1 Block Cipher for Related-ey Cryptanalysis Jiqiang Lu 1, Wun-She Yap 1,2, and Yongzhuang Wei 3,4 1 Institute for Infocomm Research, Agency for Science, Technology and Research

More information

Expansion formula using properties of dot product (analogous to FOIL in algebra): u v 2 u v u v u u 2u v v v u 2 2u v v 2

Expansion formula using properties of dot product (analogous to FOIL in algebra): u v 2 u v u v u u 2u v v v u 2 2u v v 2 Least squares: Mathematical theory Below we provide the "vector space" formulation, and solution, of the least squares prolem. While not strictly necessary until we ring in the machinery of matrix algera,

More information

Long non-crossing configurations in the plane

Long non-crossing configurations in the plane Long non-crossing configurations in the plane Adrian Dumitrescu Csaa D. Tóth July 4, 00 Astract We revisit some maximization prolems for geometric networks design under the non-crossing constraint, first

More information

On the number of subtrees on the fringe of random trees (partly joint with Huilan Chang)

On the number of subtrees on the fringe of random trees (partly joint with Huilan Chang) On the number of subtrees on the fringe of random trees (partly joint with Huilan Chang) Michael Fuchs Institute of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan April 16th, 2008 Michael

More information

Digital Trees and Memoryless Sources: from Arithmetics to Analysis

Digital Trees and Memoryless Sources: from Arithmetics to Analysis Digital Trees and Memoryless Sources: from Arithmetics to Analysis Philippe Flajolet, Mathieu Roux, Brigitte Vallée AofA 2010, Wien 1 What is a digital tree, aka TRIE? = a data structure for dynamic dictionaries

More information

Critical value of the total debt in view of the debts. durations

Critical value of the total debt in view of the debts. durations Critical value of the total det in view of the dets durations I.A. Molotov, N.A. Ryaova N.V.Pushov Institute of Terrestrial Magnetism, the Ionosphere and Radio Wave Propagation, Russian Academy of Sciences,

More information

Characterization of the Burst Aggregation Process in Optical Burst Switching.

Characterization of the Burst Aggregation Process in Optical Burst Switching. See discussions, stats, and author profiles for this pulication at: http://www.researchgate.net/pulication/221198381 Characterization of the Burst Aggregation Process in Optical Burst Switching. CONFERENCE

More information

14 Branching processes

14 Branching processes 4 BRANCHING PROCESSES 6 4 Branching processes In this chapter we will consider a rom model for population growth in the absence of spatial or any other resource constraints. So, consider a population of

More information

Star discrepancy of generalized two-dimensional Hammersley point sets

Star discrepancy of generalized two-dimensional Hammersley point sets Star discrepancy of generalized two-dimensional Hammersley point sets Henri Faure Astract We generalize to aritrary ases recent results on the star discrepancy of digitally shifted two-dimensional Hammersley

More information

PHY451, Spring /5

PHY451, Spring /5 PHY451, Spring 2011 Notes on Optical Pumping Procedure & Theory Procedure 1. Turn on the electronics and wait for the cell to warm up: ~ ½ hour. The oven should already e set to 50 C don t change this

More information

EXPECTED WORST-CASE PARTIAL MATCH IN RANDOM QUADTRIES

EXPECTED WORST-CASE PARTIAL MATCH IN RANDOM QUADTRIES EXPECTED WORST-CASE PARTIAL MATCH IN RANDOM QUADTRIES Luc Devroye School of Computer Science McGill University Montreal, Canada H3A 2K6 luc@csmcgillca Carlos Zamora-Cura Instituto de Matemáticas Universidad

More information

Reversibility of Turing Machine Computations

Reversibility of Turing Machine Computations Reversiility of Turing Machine Coputations Zvi M. Kede NYU CS Technical Report TR-2013-956 May 13, 2013 Astract Since Bennett s 1973 seinal paper, there has een a growing interest in general-purpose, reversile

More information

Hecke s Converse Theorem

Hecke s Converse Theorem Hecke s Converse Theorem Christoph Rösch January 7, 2007 Introduction In Andrea s Talk we saw how to get a Dirichlet series from a modular form. Moreover we saw that this Dirichlet series can be analytically

More information

The Capacity Region of 2-Receiver Multiple-Input Broadcast Packet Erasure Channels with Channel Output Feedback

The Capacity Region of 2-Receiver Multiple-Input Broadcast Packet Erasure Channels with Channel Output Feedback IEEE TRANSACTIONS ON INFORMATION THEORY, ONLINE PREPRINT 2014 1 The Capacity Region of 2-Receiver Multiple-Input Broadcast Packet Erasure Channels with Channel Output Feedack Chih-Chun Wang, Memer, IEEE,

More information

Analytic Depoissonization and Its Applications

Analytic Depoissonization and Its Applications Analytic Depoissonization and Its Applications W. Szpankowski Department of Computer Science Purdue University W. Lafayette, IN 47907 April 29, 2008 AofA and IT logos This research is supported by NSF

More information

CS 4120 Lecture 3 Automating lexical analysis 29 August 2011 Lecturer: Andrew Myers. 1 DFAs

CS 4120 Lecture 3 Automating lexical analysis 29 August 2011 Lecturer: Andrew Myers. 1 DFAs CS 42 Lecture 3 Automating lexical analysis 29 August 2 Lecturer: Andrew Myers A lexer generator converts a lexical specification consisting of a list of regular expressions and corresponding actions into

More information

FREDHOLM REALIZATIONS OF ELLIPTIC SYMBOLS ON MANIFOLDS WITH BOUNDARY

FREDHOLM REALIZATIONS OF ELLIPTIC SYMBOLS ON MANIFOLDS WITH BOUNDARY FREDHOLM REALIZATIONS OF ELLIPTIC SYMBOLS ON MANIFOLDS WITH BOUNDARY PIERRE ALBIN AND RICHARD MELROSE Astract. We show that the existence of a Fredholm element of the zero calculus of pseudodifferential

More information

AUTOMORPHISMS OF THE AFFINE LINE OVER NON-REDUCED RINGS

AUTOMORPHISMS OF THE AFFINE LINE OVER NON-REDUCED RINGS AUTOMORPHISMS OF THE AFFINE LINE OVER NON-REDUCED RINGS TAYLOR ANDREW DUPUY Astract. The affine space A 1 B only has automorphisms of the form at + when B is a domain. In this paper we study univariate

More information

HIGH-DIMENSIONAL GRAPHS AND VARIABLE SELECTION WITH THE LASSO

HIGH-DIMENSIONAL GRAPHS AND VARIABLE SELECTION WITH THE LASSO The Annals of Statistics 2006, Vol. 34, No. 3, 1436 1462 DOI: 10.1214/009053606000000281 Institute of Mathematical Statistics, 2006 HIGH-DIMENSIONAL GRAPHS AND VARIABLE SELECTION WITH THE LASSO BY NICOLAI

More information

Efficient Compression of Monotone and m-modal Distributions

Efficient Compression of Monotone and m-modal Distributions Efficient Compression of Monotone and m-modal Distriutions Jayadev Acharya, Ashkan Jafarpour, Alon Orlitsky, and Ananda Theertha Suresh ECE Department, UCSD {jacharya, ashkan, alon, asuresh}@ucsd.edu Astract

More information

On rational approximation of algebraic functions. Julius Borcea. Rikard Bøgvad & Boris Shapiro

On rational approximation of algebraic functions. Julius Borcea. Rikard Bøgvad & Boris Shapiro On rational approximation of algebraic functions http://arxiv.org/abs/math.ca/0409353 Julius Borcea joint work with Rikard Bøgvad & Boris Shapiro 1. Padé approximation: short overview 2. A scheme of rational

More information

Distributed control of "ball on beam" system

Distributed control of ball on beam system XI International PhD Workshop OWD 29, 17 2 Octoer 29 Distriuted control of "all on eam" system Michał Ganois, University of Science and Technology AGH Astract This paper presents possiilities of control

More information

SCATTERING CONFIGURATION SPACES

SCATTERING CONFIGURATION SPACES SCATTERING CONFIGURATION SPACES RICHARD MELROSE AND MICHAEL SINGER 1.0B; Revised: 14-8-2008; Run: March 17, 2009 Astract. For a compact manifold with oundary X we introduce the n-fold scattering stretched

More information

Each element of this set is assigned a probability. There are three basic rules for probabilities:

Each element of this set is assigned a probability. There are three basic rules for probabilities: XIV. BASICS OF ROBABILITY Somewhere out there is a set of all possile event (or all possile sequences of events which I call Ω. This is called a sample space. Out of this we consider susets of events which

More information

Kinetic boundary conditions in the lattice Boltzmann method

Kinetic boundary conditions in the lattice Boltzmann method Kinetic oundary conditions in the lattice Boltzmann method Santosh Ansumali and Iliya V. Karlin ETH-Zürich, Department of Materials, Institute of Polymers, ETH-Zentrum, Sonneggstrasse 3, ML J 19, CH-8092

More information

The Subtree Size Profile of Bucket Recursive Trees

The Subtree Size Profile of Bucket Recursive Trees Iranian Journal of Mathematical Sciences and Informatics Vol., No. (206, pp - DOI: 0.7508/ijmsi.206.0.00 The Subtree Size Profile of Bucket Recursive Trees Ramin Kazemi Department of Statistics, Imam Khomeini

More information

Homework #5 Solutions

Homework #5 Solutions Homework #5 Solutions p 83, #16. In order to find a chain a 1 a 2 a n of subgroups of Z 240 with n as large as possible, we start at the top with a n = 1 so that a n = Z 240. In general, given a i we will

More information

Topological structures and phases. in U(1) gauge theory. Abstract. We show that topological properties of minimal Dirac sheets as well as of

Topological structures and phases. in U(1) gauge theory. Abstract. We show that topological properties of minimal Dirac sheets as well as of BUHEP-94-35 Decemer 1994 Topological structures and phases in U(1) gauge theory Werner Kerler a, Claudio Rei and Andreas Weer a a Fachereich Physik, Universitat Marurg, D-35032 Marurg, Germany Department

More information

MATH 185: COMPLEX ANALYSIS FALL 2009/10 PROBLEM SET 9 SOLUTIONS. and g b (z) = eπz/2 1

MATH 185: COMPLEX ANALYSIS FALL 2009/10 PROBLEM SET 9 SOLUTIONS. and g b (z) = eπz/2 1 MATH 85: COMPLEX ANALYSIS FALL 2009/0 PROBLEM SET 9 SOLUTIONS. Consider the functions defined y g a (z) = eiπz/2 e iπz/2 + Show that g a maps the set to D(0, ) while g maps the set and g (z) = eπz/2 e

More information

ROBUST FREQUENCY DOMAIN ARMA MODELLING. Jonas Gillberg Fredrik Gustafsson Rik Pintelon

ROBUST FREQUENCY DOMAIN ARMA MODELLING. Jonas Gillberg Fredrik Gustafsson Rik Pintelon ROBUST FREQUENCY DOMAIN ARMA MODELLING Jonas Gillerg Fredrik Gustafsson Rik Pintelon Department of Electrical Engineering, Linköping University SE-581 83 Linköping, Sweden Email: gillerg@isy.liu.se, fredrik@isy.liu.se

More information

PHYS 705: Classical Mechanics. Introduction and Derivative of Moment of Inertia Tensor

PHYS 705: Classical Mechanics. Introduction and Derivative of Moment of Inertia Tensor 1 PHYS 705: Classical Mechanics Introduction and Derivative of Moment of Inertia Tensor L and N depends on the Choice of Origin Consider a particle moving in a circle with constant v. If we pick the origin

More information

ITERATED COLEMAN INTEGRATION FOR HYPERELLIPTIC CURVES

ITERATED COLEMAN INTEGRATION FOR HYPERELLIPTIC CURVES ITERATED COLEMAN INTEGRATION FOR HYERELLITIC CURVE JENNIFER BALAKRIHNAN Astract The Coleman integral is a p-adic line integral Doule Coleman integrals on elliptic curves appear in Kim s nonaelian Chaauty

More information

Non-Linear Regression Samuel L. Baker

Non-Linear Regression Samuel L. Baker NON-LINEAR REGRESSION 1 Non-Linear Regression 2006-2008 Samuel L. Baker The linear least squares method that you have een using fits a straight line or a flat plane to a unch of data points. Sometimes

More information

Math 216 Second Midterm 28 March, 2013

Math 216 Second Midterm 28 March, 2013 Math 26 Second Midterm 28 March, 23 This sample exam is provided to serve as one component of your studying for this exam in this course. Please note that it is not guaranteed to cover the material that

More information

Automata, Logic and Games: Theory and Application

Automata, Logic and Games: Theory and Application Automata, Logic and Games: Theory and Application 2 Parity Games, Tree Automata, and S2S Luke Ong University of Oxford TACL Summer School University of Salerno, 14-19 June 2015 Luke Ong S2S 14-19 June

More information

A matroid associated with a phylogenetic tree

A matroid associated with a phylogenetic tree Discrete Mathematics and Theoretical Computer Science DMTCS vol. 16:, 014, 41 56 A matroid associated with a phylogenetic tree Andreas W.M. Dress 1 Katharina T. Huer Mike Steel 3 1 CAS-MPG Partner Institute

More information

Demographic noise slows down cycles of dominance in ecological models

Demographic noise slows down cycles of dominance in ecological models J. Math. Biol manuscript No. (will e inserted y the editor) Demographic noise slows down cycles of dominance in ecological models Qian Yang Tim Rogers Jonathan H.P. Dawes Received: date / Accepted: date

More information

Generalized Reed-Solomon Codes

Generalized Reed-Solomon Codes Chapter 5 Generalized Reed-Solomon Codes In 1960, I.S. Reed and G. Solomon introduced a family of error-correcting codes that are douly lessed. The codes and their generalizations are useful in practice,

More information

Estimating a Finite Population Mean under Random Non-Response in Two Stage Cluster Sampling with Replacement

Estimating a Finite Population Mean under Random Non-Response in Two Stage Cluster Sampling with Replacement Open Journal of Statistics, 07, 7, 834-848 http://www.scirp.org/journal/ojs ISS Online: 6-798 ISS Print: 6-78X Estimating a Finite Population ean under Random on-response in Two Stage Cluster Sampling

More information

Section 7.4: Inverse Laplace Transform

Section 7.4: Inverse Laplace Transform Section 74: Inverse Laplace Transform A natural question to ask about any function is whether it has an inverse function We now ask this question about the Laplace transform: given a function F (s), will

More information

Polynomial Degree and Finite Differences

Polynomial Degree and Finite Differences CONDENSED LESSON 7.1 Polynomial Degree and Finite Differences In this lesson, you Learn the terminology associated with polynomials Use the finite differences method to determine the degree of a polynomial

More information

11. Recursion Method: Concepts

11. Recursion Method: Concepts University of Rhode Island DigitalCommons@URI Nonequilibrium Statistical Physics Physics Course Materials 16 11. Recursion Method: Concepts Gerhard Müller University of Rhode Island, gmuller@uri.edu Creative

More information

The space requirement of m-ary search trees: distributional asymptotics for m 27

The space requirement of m-ary search trees: distributional asymptotics for m 27 1 The space requirement of m-ary search trees: distributional asymptotics for m 7 James Allen Fill 1 and Nevin Kapur 1 Applied Mathematics and Statistics, The Johns Hopkins University, 3400 N. Charles

More information