The variance for partial match retrievals in k-dimensional bucket digital trees
|
|
- Merry Park
- 5 years ago
- Views:
Transcription
1 The variance for partial match retrievals in k-dimensional ucket digital trees Michael FUCHS Department of Applied Mathematics National Chiao Tung University January 12, 21 Astract The variance of partial match queries in k-dimensional tries was investigated in a couple of papers in the mid-nineties, the resulting analysis eing long and complicated. In this paper, we introduce a new and much easier approach. Moreover, our approach works for k-dimensional PATRICIA tries, k-dimensional digital search trees and ucket versions as well. 1 Introduction and Results Data structures for storing and retrieving multidimensional data are of vital importance in several areas of computer science such as design of data ase systems, graphics algorithms, etc. One possile class of such data structures was introduced in [6] and is ased on digital trees. The common feature of this class is that the data is composed of infinite -1 strings. We assume throughout this work that these strings are generated y a symmetric Bernoulli source, i.e., every it is generated independently and with the same proaility. We will study stochastic properties of the resulting random trees. We will first descrie the data structures in the aove mentioned class. Therefore, we start with k- dimensional tries. Assume that we have n records, denoted y R 1,..., R n, of k-dimensional data, i.e., every record consists of k infinite -1 strings, e.g., for the i-th record we have ( ) R i,1 = R [1] i,1, R[2] i,1, R[3] i,1,...,. ( ) R i,k = R [1] i,k, R[2] i,k, R[3] i,k,.... We shuffle the aove k sequences to otain a one-dimensional record R i ( ) R i = R [1] i,1,..., R[1] i,k, R[2] i,1,..., R[2] i,k, R[3] i,1,..., R[3] i,k,.... Then, we recursively construct the trie from the data R 1,..., R n as follows: if n = 1, we place the only record into the root which is considered an external node; if n 2, then the root ecomes an (empty) internal node and the records are either directed to the left or to right sutree according to whether their 1
2 1 1 D D 2 1 D 2 D 3 D D 4 D 4 1 D 4 D 1 D 3 D 1 D 3 Figure 1: A 2-dimensional trie, PATRICIA trie and digital search tree uild from the data data D 1 D 2 D 3 D 4 R i, R i, first it is or 1; finally, the sutrees are uild recursively y the same procedure, where the first it is removed; see Figure 1 for an example. Since the input data was random this yields a random tree which is is called k-dimensional random trie of size n. A close variant of k-dimensional tries are k-dimensional PATRICIA tries. Here, a trie is constructed from the shuffled data R 1,..., R n as aove and then multiple one-way ranching is suppressed; again see Figure 1 for an example. This yields a more alanced tree improving the overall performance of tries. The corresponding random tree is called k-dimensional random PATRICIA trie of size n. A final type of multidimensional digital trees is given y the k-dimensional digital search tree. Here, the tree is constructed from R 1,..., R n as follows: the first record is placed in the root; all other records are directed to the left or right sutree according to whether their first it is or 1; finally, the sutrees are constructed y the same principle again with the first it of the records removed; see Figure 1 for an example. So, in contrast to tries and PATRICIA tries, no distinction etween internal and external nodes is necessary for digital search trees. The resulting random tree will e called k-dimensional random digital search tree of size n. Note that all the trees introduced aove have the common feature that nodes only hold at most one record. If we allow nodes to hold up to 1 records, then the resulting trees are called k-dimensional ucket digital trees. In this paper, we will study the cost of partial match retrievals in k-dimensional ucket digital trees. Therefore, consider a partial match query which is a k-dimensional vector R = (R 1,..., R k ) with some of its coordinates a string of -1 its and others unspecified. For instance, for k = 2, we might have R 1 = (,,,,...), R 2 = (, 1, 1,,...), Then, a shuffled record R is produced as efore. For the aove example this yields R = (,,, 1,, 1,,,...). The partial match query asks now for the retrieval of all records in the tree with R eing used as search query. Here, or 1 in R means either going to the left or right sutree of the current node, whereas means 2
3 that we have to proceed with our search in oth sutrees. The cost of such a partial match query will e measured y the numer of nodes visited (where we only consider internal nodes for tries and PATRICIA tries); so for the query R aove, we have a cost of 2 for the trie and Patricia trie of Figure 1 and a cost of 3 for the digital search tree. Before going on, we will fix some notation which we are going to use throughout the work. First, it should e clear that under our random model, the cost of a partial match query only depends on the partial match pattern q which is a k-tuple of symols from S, }, where the i-th coordinate is S if R i is specified and otherwise, We will fix such a q throughout this work and denote the numer of entries in q y u, where we assume that < u < k. Furthermore, we will consider cyclic shifts of the entries of q y one position to the left which will e denoted y q ; more generally, q (l) will denote the cyclic shift of the entries of q y l position to the left. Also, we will associate to a partial match pattern q an infinite sequence (δ 1, δ 2, δ 3,...) with δ i = 1 if q i mod k = S and δ i = 2 otherwise. Finally, we denote the random variale descriing the cost of the partial match query y X q,n for all three types of ucket digital trees of size n and ucket size 1 (for the sake of simplicity, we suppress the index ). In this paper, we will e concerned with stochastic properties of X q,n. Therefore, let us recall what is known aout this random variale. First, the mean value of X q,n for k-dimensional tries was investigated in [1] where the authors proved that E(X q,n ) n u/k P 1 (log 2 n 1/k ) with P 1 (z) a one-periodic function whose Fourier expansion was given in [1] as well. Similar results were susequently proved in [3] for k-dimensional ucket digital tries, k-dimensional PATRICIA tries, and k- dimensional digital search trees, too. As for the variance, it was conectured in [4] that for k-dimensional tries Var(X q,n ) n u/k P 2 (log 2 n 1/k ) (1) with P 2 (z) a one-periodic function. The authors proved this conecture for k = 2 in [4]. The general case was then settled in [7]. In this paper, we will give a new and more simpler approach to the proof of (1). Moreover, our approach works for k-dimensional ucket tries as well. In order to state our result, we need some notation. Set h q (z) = 2δ 1 e (z)e z Lq (z/2) + e (z)e z e (z) 2 e 2z, where e (z) = 1 + z + z 2 /2! + + z /! and L q (z) = exp z} n E(X q,n)z n /n!. Theorem 1. We have, with and Var(X q,n ) = n u/k P T 2 (log 2 n 1/k ) + O(n 2u/k 1 ) P T 2 (z) = where ω r = u/k + 2πir/(kL) and L = log 2. r= c T r e 2πirz c T r = 1 δ 1 δ l 2 ωrl z ωr 1 hq (l)(z)dz, kl Note that it is not immediately clear why the integral in the aove result should converge. This will, however, follow from the proof elow. With slightly more work, the Fourier coefficients can e further simplified. 3
4 Corollary 1. We have, ( ( c T r = Γ( ω ( ωr ) r) + δ(2 ωr ) 2 ωr kl ( )( l + ωr + l + where l +1 δ(z) = δ 1 δ z, σ(z 1, z 2 ) = ( )( ) ωr ) , 2 = 1 )( ωr ) ) 2 1 l σ(2 ωr, 2 l )), (2) l 1 2 lk+u 1, 2 = δ 1 δ z 1 1 z 2 2. For instance, for k = 2, s = 1, and q = (, S), the value of c T ecomes (1 + 2) ( π ( ) ) 1/2 (l 1)(l + 1/2)2 l , 2 ln 2 8 l 1 2 l+1/2 l 2 where the last approximated was computed with Maple. This value coincides with the one given in [4]. Note that the expression given in the latter paper is slightly different; we leave it as an exercise to the reader to show that they are the same. Next, our approach can also e straightforwardly applied to k-dimensional ucket PATRICIA tries. Here, we have the same result as aove only h q (z) replaced y h q (z) =2δ 1 (e (z)e z δ 1 e (z/2)e z + (δ 1 1)e z/2 ) L q (z/2) + e (z)e z δ 1 e (z/2)e z + δ 1 e z/2 (e (z)e z δ 1 e (z/2)e z + δ 1 e z/2 ) 2. Also, a similar explicit expression for the Fourier coefficients as in Corollary 1 can e given. Since, the resulting formula is more messy we do not give details. Finally, k-dimensional ucket digital search trees are slightly more involved. Here, a new approach which was introduced in [2] can e used to otain an asymptotic expansion of the variance. In order to state our result, we again need some notation. Therefore, set and Theorem 2. We have, with and c D r = Q(s) = 1 h q (z) = 1 klγ(1 + ω r ) ( (1 s 2 ), Q l = ( ) 2 L () q (z)) l ( ) 1 2 =1 ( ) ) () ( Lq (z) 2. Var(X q,n ) = n u/k P D 2 (log 2 n 1/k ) + O(n 2u/k 1 ) P D 2 (z) = δ 1 δ l 2 ωrl r= c D r e 2πirz ( s ωr ) e zs hq (l)(z)dz + p(s) ds, (3) Q( 2s) 4
5 where p(s) = (1 + s) 1 + ( 1). s + 2 Also here, it is not clear why the aove doule integral should e convergent. This will, however, again follow from the proof elow. Moreover, the Fourier coefficients can e further simplified here, too. We will state the result for = 1. Therefore, set π(x ω 1)/(sin(πω)(x 1)) if x 1; ϕ(ω; x) = πω/ sin(πω), if x = 1. Then, we have the following corollary. Corollary 2. Assume that = 1. Then, c D 1 r = δ 1 δ l 2 ωrl klq(1)γ(1 + ω r ) where 1, 2, 3 δ q, = l ( 1) 1 δq (l), 2 δq (l), 3 2 ( 1 2 )+(1 ω r) 1 ( 1) l 2 (l+1 2 ) Q l Q1 Q 2 Q 3 ϕ(ω r ; ), l+ δ h. We conclude the introduction y giving a short sketch of the paper. In the next section, we will treat k-dimensional ucket tries. Then, in Section 3, we will riefly discuss k-dimensional ucket PATRICIA tries. Finally, in Section 5, we will prove the results for k-dimensional ucket digital search trees. 2 k-dimensional Bucket Tries h=1 Note that from the definition of k-dimensional ucket tries, we have X d X q q,n =,I n + Xq,n I n + 1, if q = (,...); X q,i n + 1, if q = (S,...), (n + 1), where I n = Binom(n, 1/2), (X n) is an independent copy of (X n ) with X n d = X n, and X q, = X q,1 = = X q, =. Poissonization. Let P q (z, y) denote the Poisson generating function of E(expX q,n y}), i.e., P q (z, y) = e z n Then, we otain from the aove distriutional recurrence E(e Xny ) zn n!. P q (z, y) = e y Pq (z/2, y) δ 1 + e (z)e z (1 e y ). Next, y taking first and second derivatives with respect to y and setting y =, we otain the following functional equation for the Poisson generating function of the mean (denoted y L q (z)) L q (z) = δ 1 Lq (z/2) + 1 e (z)e z 5
6 and for the Poisson generating function of the second moment (denoted y M q (z)) 2 M q (z) = M q (z/2) + 4 L q (z/2) + 2 L q (z/2) e (z)e z, if q = (,...); M q (z/2) + 2 L q (z/2) + 1 e (z)e z, if q = (S,...). In order to go from the Poisson generating function ack to the original quantity, we have introduced in [2] the notation of J S -admissiility. Recall that f(z) is called J S -admissile if the following two conditions hold (where here and throughout this work, ɛ will denote a small constant whose value might change from one appearance to the next). (I) There exists an α R such that f(z) = O ( z α ) uniformly for arg(z) ɛ. (O) We have, uniformly for ɛ arg(z) π. f(z) := e z f(z) = O ( e (1 ɛ) z ) The importance of this notation is that if f(z) is the Poisson generating function of, say f n, then J S - admissiility of f(z) implies that the following asymptotic relation etween f n and its Poisson generating function holds f n f () (n) τ (n)! with τ (n) = n![z n ](z n) e z (see [2] for a more thorough discussion of this). In our context, J S -admissile is easily checked via the following result. Proposition 1. Assume that we have f q (l)(z) = δ l+1 fq (l+1)(z/2) + g q (l)(z), ( l < k), where all involved functions are entire. Moreover, assume that g q (l)(z) is J S -admissile for l < k. Then, f q (l)(z) is J S -admissile for l < k. Proof. We only show how to prove (I). Therefore, we start y iterating the recurrence. This yields f q (z) = 2 u fq (z/2 k ) + δ 1 δ l g q (l)(z/2 l ). Now set Then, y the assumptions, we otain B q (r) := max f q (z). z =r, arg(z) ɛ B q (r) 2 u Bz (r/2 k ) + O (r α ). Next, we define K q (r) y K q (r) = 2 u Kq (r/2 k ) + O (r α ). 6
7 Then, B q (r) K q (r). Moreover, we immediately otain y iteration r α, if α > u/k; K q (r) = r u/k log r, if α = u/k; r u/k, if α < u/k. This proves our claim. Using this result it is easily proved that oth L q (z) and M q (z) are J S -admissile. Also, note that we have L q (z) = O ( z u/k), Mq (z) = O ( z 2u/k) (4) uniformly as z and arg(z) ɛ. Next, we define the poissonized variance as Then, y a straightforward computation Ṽ q (z) = M q (z) L q (z) 2. Ṽ q (z) = δ 1 Ṽ q (z/2) + h q (z), where h q (z) was defined in the introduction. The importance of the poissonized variance is apparent from the following result which is proved from the J S -admissiility of L q (z) and M q (z). Proposition 2. As n, Var(X q,n ) = Ṽq(n) + O ( n 2u/k 1). Proof. First note that from the proof of Proposition 1 and (4), we have Ṽ q (z) = O ( z u/k) uniformly for z and arg(z) ɛ. Next, consider Var(X q,n ) = E(Xq,n) 2 (E(X q,n )) 2 ( M q () (n) τ (n)! L () q (n) τ (n)! ) 2 Ṽq(n) n L q(n) 2 n 2 Ṽ q (n) + smaller order terms. Using the aove ounds and Ritt s theorem (see [5]) demonstrates the claim. Asymptotic Expansion of L q (z). We will first look at the mean value which is needed in the proof of Corollary 1. Therefore, y using iteration as in the proof of Proposition 1, we otain L q (z) = 2 u Lq (z/2 k ) + δ 1 δ l g q (l)(z/2 l ), where g q (l)(z) = 1 e (z)e z. Next, we use Mellin transform. Therefore, note that y (4) and the trivial ound L q (z) = O ( z +1) as z, the Mellin transform of L q (z) exists in the strip 1, u/k. Applying Mellin transform to the aove functional equation then yields M [ L q (z); ω] = Γ(w) ( ) w + δ 1 2 ωk+u 1 δ l 2 ωl, R(ω) 1, u/k. (5) 7
8 Moreover, y inverse Mellin transform and shifting the line of integration to the right, we have where P 1 (z) = r= L q (z) z u/k P 1 (log 2 z 1/k ), (z ), (6) c r e 2πirz, c r = Γ( ω r) kl ( ωr + ) k 1 δ 1 δ l 2 ωrl. Note that due to the fast decay of (5) along vertical lines, (6) more generally holds uniformly for z and arg(z) π/2 ɛ. Asymptotic Expansion of Ṽq(n). functional equation, we have Using iteration as aove and applying Mellin transform to the resulting M [Ṽq(z); ω] = ωk+u δ 1 δ l 2 ωl M [ h q (l)(z); ω], R(ω) 1, u/k. Now, from (4), we have that as z h q (l)(z) = O(z β ) (l) for any β > and l < k. Oviously, h q (z) = O(z +1 ) as z for l < k. Hence, the Mellin transform of h q (l)(z) exists in the strip 1,. Our claimed result follows from this y inverse Mellin transform and shifting the line of integration to the right. Simplification of the Fourier Coefficients. Therefore, we concentrate on The main task is the evaluation of z ωr 1 ( 2δ l+1 e (z)e z Lq (l+1)(z/2) + e (z)e z e (z) 2 e 2z ) dz. z ωr 1 e (z)e z Lq (l+1)(z/2)dz, the remaining parts eing easy. Note that due to (5), we have ( ) M [ L q (l+1)(z/2); σ] = 2σ Γ(σ) σ + δ 1 2 σk+u q (l+1)(2 σ ), where Now, y inverse Mellin transform z ωr 1 e (z)e z Lq (l+1)(z/2)dz = δ q (l+1)(z) = δ l+2 δ l++1 z. = ( ) ( ) ( 2 σ Γ(σ) σ σk+u ( )( σ + ωr σ + 8 ) δ q (l+1)(2 σ ) z ωr σ 1 e (z)e z dzdσ ) 2 σ Γ(σ)Γ( ω r σ) 1 2 σk+u δ q (l+1)(2 σ )dσ,
9 where the outer integral is along the line R(σ) =. Finally, y shifting the line of the integration to the left, we otain the asolute convergent series z ωr 1 e (z)e z Lq (l+1)(z/2)dz = Γ( ω r ) ( )( )( ) l + ωr + l + ωr 2 l δ q (l+1)(2 l ) l 1 2. lk+u l +1 Collecting everything and standard computation yields the claimed result. 3 k-dimensional Bucket PATRICIA Tries Here, from the definition of Patricia tries, we have X q,i n + Xq,n I n, if I n, n}, X q X q,n =,I n + Xq,n I n + 1, otherwise, X q,i n, if I n = n, X q,i n + 1, otherwise, if q = (,...); if q = (S,...), (n + 1), where notation and initial conditions are as in the previous section. From this we then otain for the Poisson generating function of the mean (with notation as efore) where L q (z) = δ 1 Lq (z/2) g q (z) g q (z) = e (z)e z + δ 1 e (z/2)e z δ 1 e z/2, and the Poisson generating function of the second moment 2 M q (z) = M q (z/2) + 2 L q (z/2) 2 + 4(1 e z/2 ) L q (z/2) g q (z), if q = (,...); M q (z/2) + 2(1 e z/2 ) L q (z/2) g q (z), if q = (S,...). Moreover, we have for the poissonized variance Ṽ q (z) = δ q Ṽ q (z/2) + h q (z), where h q (z) was defined in the introduction. The remaining analysis now proceeds from these functional equational equations as in the previous section. 4 k-dimensional Bucket Digital Search Trees Here, we will use a slightly different approach compared with the approach aove. This approach was introduced in [2]. Since the current situation is similar to the examples discussed in [2], we will only give a sketch and refer the interested reader to the latter paper for more details. Again, we start from a distriutional recurrence for X q,n which for the current situation reads as follows X d X q q,n+ =,I n + Xq,n I n + 1, if q = (,...); (n ), X q,i n + 1, if q = (S,...), where the notation is as efore and initial conditions are given y X q, = and X q,1 = = X q, 1 = 1. 9
10 Poissonization. We again define Then, P q (z, y) = e z n E(e Xq,ny ) zn n!. ( ) P q (z, y) = e y Pq (z/2, y) δ 1. Taking derivatives yields for the Poisson generating function of mean and second moment (denoted as efore) ( ) L () q (z) = δ 1 Lq (z/2) + 1 (7) and ( ) M q () 2 (z) = M q (z/2) + 4 L q (z/2) + 2 L q (z/2) 2 + 1, if q = (,...); M q (z/2) + 2 L q (z/2) + 1, if q = (S,...). The first step is again to show that L q (z) and M q (z) are J S -admissile. Therefore, we need the following result which is proved y a reduction to the trie case (see [2] for similar results). Proposition 3. Assume that we have ( ) f () (z) = δ q (l) l+1 fq (l+1)(z/2) + g q (l)(z), ( l < k), where all involved functions are entire and at z =. Moreover, assume that g q (l)(z) is J S -admissile for l < k. Then, f q (l)(z) is J S -admissile for l < k. This together with the closure properties from [2] then shows that L q (z) and M q (z) are J S -admissile. Next, we consider the poissonized variance Ṽq(z) = M q (z) L q (z) 2. An easy computation proves that ( ) Ṽ () (z) = δ 1 Ṽ q (z/2) + h q (z), where h q (z) was defined in the introduction. Then, from the J S -admissiility of L q (z) and M q (z), we otain as for tries the following result. Proposition 4. As n, Var(X q,n ) = Ṽq(n) + O ( n 2u/k 1). Asymptotic Expansion of L q (z). Again, we first consider the mean value. Therefore, note that in comparison to tries, it is not possile to iterate (7). Hence, we first apply Laplace transform and otain (s + 1) L [ L q (z); s] = 2δ 1 L [ L q (z); 2s] + (s + 1) 1 /s. (8) Next, we normalize with Q(s) from the introduction. Therefore, set L q (s) = L [ L q (z); s]/q( s) and Ḡ(s) = (s + 1) 1 /(Q( 2s) s). Then, L q (s) = 2δ 1 Lq (2s) + Ḡ(s). 1
11 Now, we can iterate and otain L q (s) = 2 k+u Lq (2 k s) + 2 l δ 1 δ l Ḡ(2 l s). The next step is again Mellin transform. Therefore, note that the Mellin transform of L q (s) exists in a non-trivial strip. Moreover, due to the growth properties of Q(s) from [2], the Mellin transform of Ḡ(s) exists in the strip 1,. Applying Mellin transform yields M [ L q (s); ω] = M [Ḡ(s); ω] 1 2 k ωk+u δ 1 δ l 2 l ωl, R(ω) 1 + u/k,. Next, y inverse Mellin transform and shifting the line of integration to the left, we otain L q (z) r= c r s 1 u/k 2πir/(kL), (s ). Since, Q( s) = 1 + O( s ) as s, the same asymptotic expansion holds for L [ L q (z); s] as well. Finally, y inverse Laplace transform (see [2] for technical details), we have L q (z) z u/k P 1 (log 2 z 1/k ), (z ), where P 1 is a computale, 1-periodic function. A more careful analysis shows that the aove asymptotic expansion holds uniformly for z and arg(z) π/2 ɛ. Asymptotic Expansion of Ṽq(z). Here, we proceed as aove and otain V q (s) = 2 k+u Vq (2 k s) + δ 1 δ l 2 l Hq (l)(2 l s), were V q (s) = L [Ṽq(z); s]/q( s) and H q (l)(s) = (L [ h q (l)(z); s] + p(s))/q( 2s) with Now, oserve that h q (z) = p(s) = (1 + s) 1 + ( 1). s + 2 O(z 2u/k 2 ), if z ; O(1), if z +, where the first ound follows from the previous paragraph and Ritt s theorem (see [5]) and the second ound is trivial. This together with the growth properties of Q(s) then in turn yields O(1/s), if s ; H q (s) = O(s β ), if s +, where β > is an aritrary constant. Consequently, the Mellin transform of H q exists in the strip 1,. The remaining proof of Theorem 2 proceeds then as in the previous paragraph. 11
12 Simplification of the Fourier Coefficients for = 1. First, y iteration of (8), L [ L q (z); s] = 1 s where δ q, = l=1 δ l. Next, y partial fraction expansion, where L [ L q (z); s] = 1 s δ q,l = Consequently, y inverse Laplace transform δ q, (s + 1) (2 s + 1), ( 1) l 2 ( l+1 2 ) δ q, = 1 δ q,l, (2 l s + 1)Q l Q l s (2 l s + 1)Q l l ( 1) 2 (+1 2 ) Q δ q,+l. L q (z) = l δ q,l Q l (1 e z/2l ). This implies L q(z) = l δ q,l 2 l Q l e z/2l, L q (z) 2 = l,h δ q,l δq,h z/2l z/2h e. 2 l+h Q l Q h Plugging this into (3) (note that for = 1, we have h q (z) = L q(z) 2 ) and using 1 Q( 2s) = 1 ( 1) 2 ( 2) Q(1) Q (s + 2 ) together with some standard computation proves the claim. References [1] P. Flaolet and C. Puech (1986). Partial match retrival of multidimensional data, J. ACM, 33, [2] H.-K. Hwang, M. Fuchs, V. Zacharovas (21). Asymptotic variance of random digital search trees, sumitted. [3] P. Kirschenhofer and H. Prodinger (1994). Multidimensional digital searching - alternative data structures, Random Struc. Algorithms, 5:1, [4] P. Kirschenhofer, H. Prodinger, W. Szpankowski (1993). Multidimensional digital searching and some new parameters in tries Int. J. Found. Comput. Scie., 4, [5] F. W. J. Olver (1974). Asymptotics and Special Functions, Academic Press, Computer Science and Applied Mathematics. [6] R. L. Rivest (1976). Partial-match retrieval algorithms, SIAM J. Comput., 5, [7] W. Schachinger (1995). The variance of a partial match retrieval in a multidimensional symmetric trie, Random Struc. Algorithms, 7:1,
Approximate Counting via the Poisson-Laplace-Mellin Method (joint with Chung-Kuei Lee and Helmut Prodinger)
Approximate Counting via the Poisson-Laplace-Mellin Method (joint with Chung-Kuei Lee and Helmut Prodinger) Michael Fuchs Department of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan
More informationAsymptotic and Exact Poissonized Variance in the Analysis of Random Digital Trees (joint with Hsien-Kuei Hwang and Vytas Zacharovas)
Asymptotic and Exact Poissonized Variance in the Analysis of Random Digital Trees (joint with Hsien-Kuei Hwang and Vytas Zacharovas) Michael Fuchs Institute of Applied Mathematics National Chiao Tung University
More informationAsymptotic variance of random symmetric digital search trees
Discrete Mathematics and Theoretical Computer Science DMTCS vol. :,, 3 66 Asymptotic variance of random symmetric digital search trees Hsien-Kuei Hwang, Michael Fuchs and Vytas Zacharovas Institute of
More informationThe Subtree Size Profile of Plane-oriented Recursive Trees
The Subtree Size Profile of Plane-oriented Recursive Trees Michael Fuchs Department of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan ANALCO11, January 22nd, 2011 Michael Fuchs (NCTU)
More informationDigital search trees JASS
Digital search trees Analysis of different digital trees with Rice s integrals. JASS Nicolai v. Hoyningen-Huene 28.3.2004 28.3.2004 JASS 04 - Digital search trees 1 content Tree Digital search tree: Definition
More informationUpper Bounds for Stern s Diatomic Sequence and Related Sequences
Upper Bounds for Stern s Diatomic Sequence and Related Sequences Colin Defant Department of Mathematics University of Florida, U.S.A. cdefant@ufl.edu Sumitted: Jun 18, 01; Accepted: Oct, 016; Pulished:
More informationDependence between Path Lengths and Size in Random Trees (joint with H.-H. Chern, H.-K. Hwang and R. Neininger)
Dependence between Path Lengths and Size in Random Trees (joint with H.-H. Chern, H.-K. Hwang and R. Neininger) Michael Fuchs Institute of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan
More informationROSENA R.X. DU AND HELMUT PRODINGER. Dedicated to Philippe Flajolet ( )
ON PROTECTED NODES IN DIGITAL SEARCH TREES ROSENA R.X. DU AND HELMUT PRODINGER Dedicated to Philippe Flajolet (98 2) Abstract. Recently, 2-protected nodes were studied in the context of ordered trees and
More information#A50 INTEGERS 14 (2014) ON RATS SEQUENCES IN GENERAL BASES
#A50 INTEGERS 14 (014) ON RATS SEQUENCES IN GENERAL BASES Johann Thiel Dept. of Mathematics, New York City College of Technology, Brooklyn, New York jthiel@citytech.cuny.edu Received: 6/11/13, Revised:
More informationHash Table Analysis. e(k) = bp(k). kp(k) = n b.
Septemer 1, 2016 Hash Tale Analysis Assume that we have a hash tale structured as a vector of lists, resolving collisions y sequential search of uckets, as in the generic hash tale template HashTale
More informationPolynomials Characterizing Hyper b-ary Representations
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 21 (2018), Article 18.4.3 Polynomials Characterizing Hyper -ary Representations Karl Dilcher 1 Department of Mathematics and Statistics Dalhousie University
More informationPseudo-automata for generalized regular expressions
Pseudo-automata for generalized regular expressions B. F. Melnikov A. A. Melnikova Astract In this paper we introduce a new formalism which is intended for representing a special extensions of finite automata.
More informationLuis Manuel Santana Gallego 100 Investigation and simulation of the clock skew in modern integrated circuits. Clock Skew Model
Luis Manuel Santana Gallego 100 Appendix 3 Clock Skew Model Xiaohong Jiang and Susumu Horiguchi [JIA-01] 1. Introduction The evolution of VLSI chips toward larger die sizes and faster clock speeds makes
More informationDepth versus Breadth in Convolutional Polar Codes
Depth versus Breadth in Convolutional Polar Codes Maxime Tremlay, Benjamin Bourassa and David Poulin,2 Département de physique & Institut quantique, Université de Sherrooke, Sherrooke, Quéec, Canada JK
More informationGenetic Algorithms applied to Problems of Forbidden Configurations
Genetic Algorithms applied to Prolems of Foridden Configurations R.P. Anstee Miguel Raggi Department of Mathematics University of British Columia Vancouver, B.C. Canada V6T Z2 anstee@math.uc.ca mraggi@gmail.com
More informationSolving Systems of Linear Equations Symbolically
" Solving Systems of Linear Equations Symolically Every day of the year, thousands of airline flights crisscross the United States to connect large and small cities. Each flight follows a plan filed with
More informationMotivation: Can the equations of physics be derived from information-theoretic principles?
10. Physics from Fisher Information. Motivation: Can the equations of physics e derived from information-theoretic principles? I. Fisher Information. Task: To otain a measure of the accuracy of estimated
More informationThe Moments of the Profile in Random Binary Digital Trees
Journal of mathematics and computer science 6(2013)176-190 The Moments of the Profile in Random Binary Digital Trees Ramin Kazemi and Saeid Delavar Department of Statistics, Imam Khomeini International
More informationChaos and Dynamical Systems
Chaos and Dynamical Systems y Megan Richards Astract: In this paper, we will discuss the notion of chaos. We will start y introducing certain mathematical concepts needed in the understanding of chaos,
More informationA Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence
A Note on a Problem Posed by D. E. Knuth on a Satisfiability Recurrence Dedicated to Philippe Flajolet 1948-2011 July 4, 2013 Philippe Jacquet Charles Knessl 1 Wojciech Szpankowski 2 Bell Labs Dept. Math.
More informationRepresentation theory of SU(2), density operators, purification Michael Walter, University of Amsterdam
Symmetry and Quantum Information Feruary 6, 018 Representation theory of S(), density operators, purification Lecture 7 Michael Walter, niversity of Amsterdam Last week, we learned the asic concepts of
More informationPartial Match Queries in Relaxed Multidimensional Search Trees 1
Algorithmica 2001 29: 181 204 DOI: 10.1007/s004530010065 Algorithmica 2001 Springer-Verlag New York Inc. Partial Match Queries in Relaxed Multidimensional Search Trees 1 C. Martínez, 2 A. Panholzer, 3
More informationGeneralized Seasonal Tapered Block Bootstrap
Generalized Seasonal Tapered Block Bootstrap Anna E. Dudek 1, Efstathios Paparoditis 2, Dimitris N. Politis 3 Astract In this paper a new lock ootstrap method for periodic times series called Generalized
More informationModifying Shor s algorithm to compute short discrete logarithms
Modifying Shor s algorithm to compute short discrete logarithms Martin Ekerå Decemer 7, 06 Astract We revisit Shor s algorithm for computing discrete logarithms in F p on a quantum computer and modify
More informationTIGHT BOUNDS FOR THE FIRST ORDER MARCUM Q-FUNCTION
TIGHT BOUNDS FOR THE FIRST ORDER MARCUM Q-FUNCTION Jiangping Wang and Dapeng Wu Department of Electrical and Computer Engineering University of Florida, Gainesville, FL 3611 Correspondence author: Prof.
More informationAsymptotic results for silent elimination
Discrete Mathematics and Theoretical Computer Science DMTCS vol. subm., by the authors, 1 1 Asymptotic results for silent elimination Guy Louchard 1 and Helmut Prodinger 2 1 Université Libre de Bruxelles,
More informationTHE BALANCED DECOMPOSITION NUMBER AND VERTEX CONNECTIVITY
THE BALANCED DECOMPOSITION NUMBER AND VERTEX CONNECTIVITY SHINYA FUJITA AND HENRY LIU Astract The alanced decomposition numer f(g) of a graph G was introduced y Fujita and Nakamigawa [Discr Appl Math,
More informationForty years of tree enumeration
October 24, 206 Canada John Moon (Alberta) Counting labelled trees Canadian mathematical monographs What is our subject? Asymptotic enumeration or Probabilistic combinatorics? What is our subject? Asymptotic
More information1 Caveats of Parallel Algorithms
CME 323: Distriuted Algorithms and Optimization, Spring 2015 http://stanford.edu/ reza/dao. Instructor: Reza Zadeh, Matroid and Stanford. Lecture 1, 9/26/2015. Scried y Suhas Suresha, Pin Pin, Andreas
More informationThe WHILE Hierarchy of Program Schemes is Infinite
The WHILE Hierarchy of Program Schemes is Infinite Can Adam Alayrak and Thomas Noll RWTH Aachen Ahornstr. 55, 52056 Aachen, Germany alayrak@informatik.rwth-aachen.de and noll@informatik.rwth-aachen.de
More informationBranching Bisimilarity with Explicit Divergence
Branching Bisimilarity with Explicit Divergence Ro van Glaeek National ICT Australia, Sydney, Australia School of Computer Science and Engineering, University of New South Wales, Sydney, Australia Bas
More informationLecture 12: Grover s Algorithm
CPSC 519/619: Quantum Computation John Watrous, University of Calgary Lecture 12: Grover s Algorithm March 7, 2006 We have completed our study of Shor s factoring algorithm. The asic technique ehind Shor
More informationBounded Queries, Approximations and the Boolean Hierarchy
Bounded Queries, Approximations and the Boolean Hierarchy Richard Chang Department of Computer Science and Electrical Engineering University of Maryland Baltimore County March 23, 1999 Astract This paper
More informationDivide-and-Conquer. Reading: CLRS Sections 2.3, 4.1, 4.2, 4.3, 28.2, CSE 6331 Algorithms Steve Lai
Divide-and-Conquer Reading: CLRS Sections 2.3, 4.1, 4.2, 4.3, 28.2, 33.4. CSE 6331 Algorithms Steve Lai Divide and Conquer Given an instance x of a prolem, the method works as follows: divide-and-conquer
More informationLecture 6 January 15, 2014
Advanced Graph Algorithms Jan-Apr 2014 Lecture 6 January 15, 2014 Lecturer: Saket Sourah Scrie: Prafullkumar P Tale 1 Overview In the last lecture we defined simple tree decomposition and stated that for
More informationBringing Order to Special Cases of Klee s Measure Problem
Bringing Order to Special Cases of Klee s Measure Prolem Karl Bringmann Max Planck Institute for Informatics Astract. Klee s Measure Prolem (KMP) asks for the volume of the union of n axis-aligned oxes
More informationP = ρ{ g a } + µ 2 V II. FLUID STATICS
II. FLUID STATICS From a force analysis on a triangular fluid element at rest, the following three concepts are easily developed: For a continuous, hydrostatic, shear free fluid: 1. Pressure is constant
More informationMATHEMATICAL ENGINEERING TECHNICAL REPORTS. Polynomial Time Perfect Sampler for Discretized Dirichlet Distribution
MATHEMATICAL ENGINEERING TECHNICAL REPORTS Polynomial Time Perfect Sampler for Discretized Dirichlet Distriution Tomomi MATSUI and Shuji KIJIMA METR 003 7 April 003 DEPARTMENT OF MATHEMATICAL INFORMATICS
More informationGeneralized Sampling and Variance in Counterfactual Regret Minimization
Generalized Sampling and Variance in Counterfactual Regret Minimization Richard Gison and Marc Lanctot and Neil Burch and Duane Szafron and Michael Bowling Department of Computing Science, University of
More informationOn Universality of Blow-up Profile for L 2 critical nonlinear Schrödinger Equation
On Universality of Blow-up Profile for L critical nonlinear Schrödinger Equation Frank Merle,, Pierre Raphael Université de Cergy Pontoise Institut Universitaire de France Astract We consider finite time
More informationCompactness vs Collusion Resistance in Functional Encryption
Compactness vs Collusion Resistance in Functional Encryption Baiyu Li Daniele Micciancio April 10, 2017 Astract We present two general constructions that can e used to comine any two functional encryption
More informationStructuring Unreliable Radio Networks
Structuring Unreliale Radio Networks Keren Censor-Hillel Seth Gilert Faian Kuhn Nancy Lynch Calvin Newport March 29, 2011 Astract In this paper we study the prolem of uilding a connected dominating set
More information1 Hoeffding s Inequality
Proailistic Method: Hoeffding s Inequality and Differential Privacy Lecturer: Huert Chan Date: 27 May 22 Hoeffding s Inequality. Approximate Counting y Random Sampling Suppose there is a ag containing
More informationSVETLANA KATOK AND ILIE UGARCOVICI (Communicated by Jens Marklof)
JOURNAL OF MODERN DYNAMICS VOLUME 4, NO. 4, 010, 637 691 doi: 10.3934/jmd.010.4.637 STRUCTURE OF ATTRACTORS FOR (a, )-CONTINUED FRACTION TRANSFORMATIONS SVETLANA KATOK AND ILIE UGARCOVICI (Communicated
More informationEVALUATIONS OF EXPECTED GENERALIZED ORDER STATISTICS IN VARIOUS SCALE UNITS
APPLICATIONES MATHEMATICAE 9,3 (), pp. 85 95 Erhard Cramer (Oldenurg) Udo Kamps (Oldenurg) Tomasz Rychlik (Toruń) EVALUATIONS OF EXPECTED GENERALIZED ORDER STATISTICS IN VARIOUS SCALE UNITS Astract. We
More informationFast inverse for big numbers: Picarte s iteration
Fast inverse for ig numers: Picarte s iteration Claudio Gutierrez and Mauricio Monsalve Computer Science Department, Universidad de Chile cgutierr,mnmonsal@dcc.uchile.cl Astract. This paper presents an
More informationFunction Secret Sharing: Improvements and Extensions
Function Secret Sharing: Improvements and Extensions Elette Boyle Niv Giloa Yuval Ishai July 24, 2018 Astract Function Secret Sharing (FSS), introduced y Boyle et al. (Eurocrypt 2015), provides a way for
More informationSUFFIX TREE. SYNONYMS Compact suffix trie
SUFFIX TREE Maxime Crochemore King s College London and Université Paris-Est, http://www.dcs.kcl.ac.uk/staff/mac/ Thierry Lecroq Université de Rouen, http://monge.univ-mlv.fr/~lecroq SYNONYMS Compact suffix
More informationarxiv: v1 [math.nt] 27 May 2018
SETTLIG SOME SUM SUPPOSITIOS TAAY WAKHARE AD CHRISTOPHE VIGAT arxiv:180510569v1 matht] 7 May 018 Astract We solve multiple conjectures y Byszewsi and Ulas aout the sum of ase digits function In order to
More informationApplications of Tree Automata Theory Lecture V: Theory of Tree Transducers
Applications of Tree Automata Theory Lecture V: Theory of Tree Transducers Andreas Maletti Institute of Computer Science Universität Leipzig, Germany on leave from: Institute for Natural Language Processing
More informationMinimizing a convex separable exponential function subject to linear equality constraint and bounded variables
Minimizing a convex separale exponential function suect to linear equality constraint and ounded variales Stefan M. Stefanov Department of Mathematics Neofit Rilski South-Western University 2700 Blagoevgrad
More informationA converse Gaussian Poincare-type inequality for convex functions
Statistics & Proaility Letters 44 999 28 290 www.elsevier.nl/locate/stapro A converse Gaussian Poincare-type inequality for convex functions S.G. Bokov a;, C. Houdre ; ;2 a Department of Mathematics, Syktyvkar
More informationarxiv: v1 [cs.fl] 24 Nov 2017
(Biased) Majority Rule Cellular Automata Bernd Gärtner and Ahad N. Zehmakan Department of Computer Science, ETH Zurich arxiv:1711.1090v1 [cs.fl] 4 Nov 017 Astract Consider a graph G = (V, E) and a random
More informationResearch Article Coexistence of the Bandcount-Adding and Bandcount-Increment Scenarios
Discrete Dynamics in Nature and Society Volume 211, Article ID 681565, 3 pages doi:1.1155/211/681565 Research Article Coexistence of the Bandcount-Adding and Bandcount-Increment Scenarios Viktor Avrutin,
More informationContent Delivery in Erasure Broadcast. Channels with Cache and Feedback
Content Delivery in Erasure Broadcast Channels with Cache and Feedack Asma Ghorel, Mari Koayashi, and Sheng Yang LSS, CentraleSupélec Gif-sur-Yvette, France arxiv:602.04630v [cs.t] 5 Fe 206 {asma.ghorel,
More informationSmooth Projective Hashing and Two-Message Oblivious Transfer
Smooth Projective Hashing and Two-Message Olivious Transfer Shai Halevi IBM Research Yael Tauman Kalai Microsoft Research Octoer 31, 2010 Astract We present a general framework for constructing two-message
More informationERASMUS UNIVERSITY ROTTERDAM Information concerning the Entrance examination Mathematics level 2 for International Business Administration (IBA)
ERASMUS UNIVERSITY ROTTERDAM Information concerning the Entrance examination Mathematics level 2 for International Business Administration (IBA) General information Availale time: 2.5 hours (150 minutes).
More informationWeak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis
Weak eys of the Full MISTY1 Block Cipher for Related-ey Cryptanalysis Jiqiang Lu 1, Wun-She Yap 1,2, and Yongzhuang Wei 3,4 1 Institute for Infocomm Research, Agency for Science, Technology and Research
More informationExpansion formula using properties of dot product (analogous to FOIL in algebra): u v 2 u v u v u u 2u v v v u 2 2u v v 2
Least squares: Mathematical theory Below we provide the "vector space" formulation, and solution, of the least squares prolem. While not strictly necessary until we ring in the machinery of matrix algera,
More informationLong non-crossing configurations in the plane
Long non-crossing configurations in the plane Adrian Dumitrescu Csaa D. Tóth July 4, 00 Astract We revisit some maximization prolems for geometric networks design under the non-crossing constraint, first
More informationOn the number of subtrees on the fringe of random trees (partly joint with Huilan Chang)
On the number of subtrees on the fringe of random trees (partly joint with Huilan Chang) Michael Fuchs Institute of Applied Mathematics National Chiao Tung University Hsinchu, Taiwan April 16th, 2008 Michael
More informationDigital Trees and Memoryless Sources: from Arithmetics to Analysis
Digital Trees and Memoryless Sources: from Arithmetics to Analysis Philippe Flajolet, Mathieu Roux, Brigitte Vallée AofA 2010, Wien 1 What is a digital tree, aka TRIE? = a data structure for dynamic dictionaries
More informationCritical value of the total debt in view of the debts. durations
Critical value of the total det in view of the dets durations I.A. Molotov, N.A. Ryaova N.V.Pushov Institute of Terrestrial Magnetism, the Ionosphere and Radio Wave Propagation, Russian Academy of Sciences,
More informationCharacterization of the Burst Aggregation Process in Optical Burst Switching.
See discussions, stats, and author profiles for this pulication at: http://www.researchgate.net/pulication/221198381 Characterization of the Burst Aggregation Process in Optical Burst Switching. CONFERENCE
More information14 Branching processes
4 BRANCHING PROCESSES 6 4 Branching processes In this chapter we will consider a rom model for population growth in the absence of spatial or any other resource constraints. So, consider a population of
More informationStar discrepancy of generalized two-dimensional Hammersley point sets
Star discrepancy of generalized two-dimensional Hammersley point sets Henri Faure Astract We generalize to aritrary ases recent results on the star discrepancy of digitally shifted two-dimensional Hammersley
More informationPHY451, Spring /5
PHY451, Spring 2011 Notes on Optical Pumping Procedure & Theory Procedure 1. Turn on the electronics and wait for the cell to warm up: ~ ½ hour. The oven should already e set to 50 C don t change this
More informationEXPECTED WORST-CASE PARTIAL MATCH IN RANDOM QUADTRIES
EXPECTED WORST-CASE PARTIAL MATCH IN RANDOM QUADTRIES Luc Devroye School of Computer Science McGill University Montreal, Canada H3A 2K6 luc@csmcgillca Carlos Zamora-Cura Instituto de Matemáticas Universidad
More informationReversibility of Turing Machine Computations
Reversiility of Turing Machine Coputations Zvi M. Kede NYU CS Technical Report TR-2013-956 May 13, 2013 Astract Since Bennett s 1973 seinal paper, there has een a growing interest in general-purpose, reversile
More informationHecke s Converse Theorem
Hecke s Converse Theorem Christoph Rösch January 7, 2007 Introduction In Andrea s Talk we saw how to get a Dirichlet series from a modular form. Moreover we saw that this Dirichlet series can be analytically
More informationThe Capacity Region of 2-Receiver Multiple-Input Broadcast Packet Erasure Channels with Channel Output Feedback
IEEE TRANSACTIONS ON INFORMATION THEORY, ONLINE PREPRINT 2014 1 The Capacity Region of 2-Receiver Multiple-Input Broadcast Packet Erasure Channels with Channel Output Feedack Chih-Chun Wang, Memer, IEEE,
More informationAnalytic Depoissonization and Its Applications
Analytic Depoissonization and Its Applications W. Szpankowski Department of Computer Science Purdue University W. Lafayette, IN 47907 April 29, 2008 AofA and IT logos This research is supported by NSF
More informationCS 4120 Lecture 3 Automating lexical analysis 29 August 2011 Lecturer: Andrew Myers. 1 DFAs
CS 42 Lecture 3 Automating lexical analysis 29 August 2 Lecturer: Andrew Myers A lexer generator converts a lexical specification consisting of a list of regular expressions and corresponding actions into
More informationFREDHOLM REALIZATIONS OF ELLIPTIC SYMBOLS ON MANIFOLDS WITH BOUNDARY
FREDHOLM REALIZATIONS OF ELLIPTIC SYMBOLS ON MANIFOLDS WITH BOUNDARY PIERRE ALBIN AND RICHARD MELROSE Astract. We show that the existence of a Fredholm element of the zero calculus of pseudodifferential
More informationAUTOMORPHISMS OF THE AFFINE LINE OVER NON-REDUCED RINGS
AUTOMORPHISMS OF THE AFFINE LINE OVER NON-REDUCED RINGS TAYLOR ANDREW DUPUY Astract. The affine space A 1 B only has automorphisms of the form at + when B is a domain. In this paper we study univariate
More informationHIGH-DIMENSIONAL GRAPHS AND VARIABLE SELECTION WITH THE LASSO
The Annals of Statistics 2006, Vol. 34, No. 3, 1436 1462 DOI: 10.1214/009053606000000281 Institute of Mathematical Statistics, 2006 HIGH-DIMENSIONAL GRAPHS AND VARIABLE SELECTION WITH THE LASSO BY NICOLAI
More informationEfficient Compression of Monotone and m-modal Distributions
Efficient Compression of Monotone and m-modal Distriutions Jayadev Acharya, Ashkan Jafarpour, Alon Orlitsky, and Ananda Theertha Suresh ECE Department, UCSD {jacharya, ashkan, alon, asuresh}@ucsd.edu Astract
More informationOn rational approximation of algebraic functions. Julius Borcea. Rikard Bøgvad & Boris Shapiro
On rational approximation of algebraic functions http://arxiv.org/abs/math.ca/0409353 Julius Borcea joint work with Rikard Bøgvad & Boris Shapiro 1. Padé approximation: short overview 2. A scheme of rational
More informationDistributed control of "ball on beam" system
XI International PhD Workshop OWD 29, 17 2 Octoer 29 Distriuted control of "all on eam" system Michał Ganois, University of Science and Technology AGH Astract This paper presents possiilities of control
More informationSCATTERING CONFIGURATION SPACES
SCATTERING CONFIGURATION SPACES RICHARD MELROSE AND MICHAEL SINGER 1.0B; Revised: 14-8-2008; Run: March 17, 2009 Astract. For a compact manifold with oundary X we introduce the n-fold scattering stretched
More informationEach element of this set is assigned a probability. There are three basic rules for probabilities:
XIV. BASICS OF ROBABILITY Somewhere out there is a set of all possile event (or all possile sequences of events which I call Ω. This is called a sample space. Out of this we consider susets of events which
More informationKinetic boundary conditions in the lattice Boltzmann method
Kinetic oundary conditions in the lattice Boltzmann method Santosh Ansumali and Iliya V. Karlin ETH-Zürich, Department of Materials, Institute of Polymers, ETH-Zentrum, Sonneggstrasse 3, ML J 19, CH-8092
More informationThe Subtree Size Profile of Bucket Recursive Trees
Iranian Journal of Mathematical Sciences and Informatics Vol., No. (206, pp - DOI: 0.7508/ijmsi.206.0.00 The Subtree Size Profile of Bucket Recursive Trees Ramin Kazemi Department of Statistics, Imam Khomeini
More informationHomework #5 Solutions
Homework #5 Solutions p 83, #16. In order to find a chain a 1 a 2 a n of subgroups of Z 240 with n as large as possible, we start at the top with a n = 1 so that a n = Z 240. In general, given a i we will
More informationTopological structures and phases. in U(1) gauge theory. Abstract. We show that topological properties of minimal Dirac sheets as well as of
BUHEP-94-35 Decemer 1994 Topological structures and phases in U(1) gauge theory Werner Kerler a, Claudio Rei and Andreas Weer a a Fachereich Physik, Universitat Marurg, D-35032 Marurg, Germany Department
More informationMATH 185: COMPLEX ANALYSIS FALL 2009/10 PROBLEM SET 9 SOLUTIONS. and g b (z) = eπz/2 1
MATH 85: COMPLEX ANALYSIS FALL 2009/0 PROBLEM SET 9 SOLUTIONS. Consider the functions defined y g a (z) = eiπz/2 e iπz/2 + Show that g a maps the set to D(0, ) while g maps the set and g (z) = eπz/2 e
More informationROBUST FREQUENCY DOMAIN ARMA MODELLING. Jonas Gillberg Fredrik Gustafsson Rik Pintelon
ROBUST FREQUENCY DOMAIN ARMA MODELLING Jonas Gillerg Fredrik Gustafsson Rik Pintelon Department of Electrical Engineering, Linköping University SE-581 83 Linköping, Sweden Email: gillerg@isy.liu.se, fredrik@isy.liu.se
More informationPHYS 705: Classical Mechanics. Introduction and Derivative of Moment of Inertia Tensor
1 PHYS 705: Classical Mechanics Introduction and Derivative of Moment of Inertia Tensor L and N depends on the Choice of Origin Consider a particle moving in a circle with constant v. If we pick the origin
More informationITERATED COLEMAN INTEGRATION FOR HYPERELLIPTIC CURVES
ITERATED COLEMAN INTEGRATION FOR HYERELLITIC CURVE JENNIFER BALAKRIHNAN Astract The Coleman integral is a p-adic line integral Doule Coleman integrals on elliptic curves appear in Kim s nonaelian Chaauty
More informationNon-Linear Regression Samuel L. Baker
NON-LINEAR REGRESSION 1 Non-Linear Regression 2006-2008 Samuel L. Baker The linear least squares method that you have een using fits a straight line or a flat plane to a unch of data points. Sometimes
More informationMath 216 Second Midterm 28 March, 2013
Math 26 Second Midterm 28 March, 23 This sample exam is provided to serve as one component of your studying for this exam in this course. Please note that it is not guaranteed to cover the material that
More informationAutomata, Logic and Games: Theory and Application
Automata, Logic and Games: Theory and Application 2 Parity Games, Tree Automata, and S2S Luke Ong University of Oxford TACL Summer School University of Salerno, 14-19 June 2015 Luke Ong S2S 14-19 June
More informationA matroid associated with a phylogenetic tree
Discrete Mathematics and Theoretical Computer Science DMTCS vol. 16:, 014, 41 56 A matroid associated with a phylogenetic tree Andreas W.M. Dress 1 Katharina T. Huer Mike Steel 3 1 CAS-MPG Partner Institute
More informationDemographic noise slows down cycles of dominance in ecological models
J. Math. Biol manuscript No. (will e inserted y the editor) Demographic noise slows down cycles of dominance in ecological models Qian Yang Tim Rogers Jonathan H.P. Dawes Received: date / Accepted: date
More informationGeneralized Reed-Solomon Codes
Chapter 5 Generalized Reed-Solomon Codes In 1960, I.S. Reed and G. Solomon introduced a family of error-correcting codes that are douly lessed. The codes and their generalizations are useful in practice,
More informationEstimating a Finite Population Mean under Random Non-Response in Two Stage Cluster Sampling with Replacement
Open Journal of Statistics, 07, 7, 834-848 http://www.scirp.org/journal/ojs ISS Online: 6-798 ISS Print: 6-78X Estimating a Finite Population ean under Random on-response in Two Stage Cluster Sampling
More informationSection 7.4: Inverse Laplace Transform
Section 74: Inverse Laplace Transform A natural question to ask about any function is whether it has an inverse function We now ask this question about the Laplace transform: given a function F (s), will
More informationPolynomial Degree and Finite Differences
CONDENSED LESSON 7.1 Polynomial Degree and Finite Differences In this lesson, you Learn the terminology associated with polynomials Use the finite differences method to determine the degree of a polynomial
More information11. Recursion Method: Concepts
University of Rhode Island DigitalCommons@URI Nonequilibrium Statistical Physics Physics Course Materials 16 11. Recursion Method: Concepts Gerhard Müller University of Rhode Island, gmuller@uri.edu Creative
More informationThe space requirement of m-ary search trees: distributional asymptotics for m 27
1 The space requirement of m-ary search trees: distributional asymptotics for m 7 James Allen Fill 1 and Nevin Kapur 1 Applied Mathematics and Statistics, The Johns Hopkins University, 3400 N. Charles
More information