Isoperimetric sequences for infinite complete binary trees and their relation to meta-fibonacci sequences and signed almost binary partitions

Size: px
Start display at page:

Download "Isoperimetric sequences for infinite complete binary trees and their relation to meta-fibonacci sequences and signed almost binary partitions"

Transcription

1 Isoperimetric sequences for infinite complete binary trees and their relation to meta-fibonacci sequences and signed almost binary partitions Frank Ruskey Sunil Chandran 2 Anita Das 2 Department of Computer Science, U. of Victoria, CANADA. 2 Department of Computer Science and Automation, Indian Institute of Science (IISc), Bangalore, INDIA. CANADAM, Montreal, May 2009

2 Complete BinaryTrees

3

4

5

6 Meta-Fibonacci Sequences: Tanny and Conolly The Tanny sequence: Let T (n) = maximum number of leaves possible at the lowest level in a binary tree with n nodes. For n =, 2, 3,...,,, 2, 2, 2, 3, 4, 4, 4, 4, 5, 6, 6, 7, 8, 8, 8, 8, 8, 9,... Recurrence relation (with T () = T (2) =, T (3) = 2): T (n) = T (n T (n )) + T (n 2 T (n 2)). The Conolly sequence: Integer k occurs a number of times equal to one plus its 2-adic evaluation (ruler function). For n =, 2, 3,...,, 2, 2 2, 3, 4, 4, 4 3, 5, 6, 6 2, 7, 8, 8, 8, 8 4, 9, 0, 0,, 2, 2, 2, 2 3 Satisfies the recurrence relation (with C() =, C(2) = 2): C(n) = C(n C(n )) + C(n C(n 2)).

7 Meta-Fibonacci Sequences: Tanny and Conolly The Tanny sequence: Let T (n) = maximum number of leaves possible at the lowest level in a binary tree with n nodes. For n =, 2, 3,...,,, 2, 2, 2, 3, 4, 4, 4, 4, 5, 6, 6, 7, 8, 8, 8, 8, 8, 9,... Recurrence relation (with T () = T (2) =, T (3) = 2): T (n) = T (n T (n )) + T (n 2 T (n 2)). The Conolly sequence: Integer k occurs a number of times equal to one plus its 2-adic evaluation (ruler function). For n =, 2, 3,...,, 2, 2 2, 3, 4, 4, 4 3, 5, 6, 6 2, 7, 8, 8, 8, 8 4, 9, 0, 0,, 2, 2, 2, 2 3 Satisfies the recurrence relation (with C() =, C(2) = 2): C(n) = C(n C(n )) + C(n C(n 2)).

8 Meta-Fibonacci Sequences: Tanny and Conolly The Tanny sequence: Let T (n) = maximum number of leaves possible at the lowest level in a binary tree with n nodes. For n =, 2, 3,...,,, 2, 2, 2, 3, 4, 4, 4, 4, 5, 6, 6, 7, 8, 8, 8, 8, 8, 9,... Recurrence relation (with T () = T (2) =, T (3) = 2): T (n) = T (n T (n )) + T (n 2 T (n 2)). The Conolly sequence: Integer k occurs a number of times equal to one plus its 2-adic evaluation (ruler function). For n =, 2, 3,...,, 2, 2 2, 3, 4, 4, 4 3, 5, 6, 6 2, 7, 8, 8, 8, 8 4, 9, 0, 0,, 2, 2, 2, 2 3 Satisfies the recurrence relation (with C() =, C(2) = 2): C(n) = C(n C(n )) + C(n C(n 2)).

9 Meta-Fibonacci Sequences: Tanny and Conolly The Tanny sequence: Let T (n) = maximum number of leaves possible at the lowest level in a binary tree with n nodes. For n =, 2, 3,...,,, 2, 2, 2, 3, 4, 4, 4, 4, 5, 6, 6, 7, 8, 8, 8, 8, 8, 9,... Recurrence relation (with T () = T (2) =, T (3) = 2): T (n) = T (n T (n )) + T (n 2 T (n 2)). The Conolly sequence: Integer k occurs a number of times equal to one plus its 2-adic evaluation (ruler function). For n =, 2, 3,...,, 2, 2 2, 3, 4, 4, 4 3, 5, 6, 6 2, 7, 8, 8, 8, 8 4, 9, 0, 0,, 2, 2, 2, 2 3 Satisfies the recurrence relation (with C() =, C(2) = 2): C(n) = C(n C(n )) + C(n C(n 2)).

10 Tanny numbers again A sequence of binary trees maximizing the number of leaves at the lowest level T (n) =,, 2, 2, 2, 3, 4, 4, 4, 4, 5, 6, 6, 7, 8,... Each tree is a subtree of the same infinite tree.

11 The Conolly numbers come from this tree Like before except nodes along leftmost path are unlabeled. To get C(n) ignore all nodes with labels bigger than n and count leaves at the bottom level. For example C(2) = 2. Proofs in paper with Brad Jackson, extensions in paper with former student Chris Degau.

12 The Conolly numbers come from this tree Like before except nodes along leftmost path are unlabeled. To get C(n) ignore all nodes with labels bigger than n and count leaves at the bottom level. For example C(2) = 2. Proofs in paper with Brad Jackson, extensions in paper with former student Chris Degau.

13 The Conolly numbers come from this tree Like before except nodes along leftmost path are unlabeled. To get C(n) ignore all nodes with labels bigger than n and count leaves at the bottom level. For example C(2) = 2. Proofs in paper with Brad Jackson, extensions in paper with former student Chris Degau.

14 The Conolly numbers come from this tree Like before except nodes along leftmost path are unlabeled. To get C(n) ignore all nodes with labels bigger than n and count leaves at the bottom level. For example C(2) = 2. Proofs in paper with Brad Jackson, extensions in paper with former student Chris Degau.

15 An isoperimetric problem on infinite binary trees An infinite binary tree T with all leaves at same level..

16 An isoperimetric problem on infinite binary trees A subset S of the tree, S = n = 24..

17 An isoperimetric problem on infinite binary trees The size of the cut (red edges): (S, S) = 20. The problem: Given S, how small can we make this cut?

18 An isoperimetric problem on infinite binary trees Label v where (v, par(v)) (S, S) with f (v) = ±(2 l ), l = level of v. 24 =

19 An isoperimetric problem on infinite binary trees Redistribute; sum at v is iff v S, otherwise = , the number of parts is 20.

20 An isoperimetric problem on infinite binary trees A better subset, the greedy one, with (S, S) = =

21 An isoperimetric problem on infinite binary trees The best subset, the connected one, with (S, S) = = 3 7.

22 Recap and Preview For every finite subset of T there is a partition of the number S in which every part is ±(2 k ) and (S, S) is equal to the number of parts in that partition. Yet to come: The partition of S of the above form with the least number of parts gives the answer to the isoperimetric problem.

23 Notation and results Problem: over all subsets S of size n of T, what is δ(n), the least number of edges in the cut (S, S)? Restrictions: S is connected (δ C (n)); S consists of complete binary trees (δ G (n)). E.g. δ(24) = δ C (24) = 2, and δ G (24) = 4. Notation ν(d) = 2 d ; ν(p) = p P (2p ). Results (C(n) = Conolly, T (n) = Tanny): δc (n) = n + 2 2T (n); δ G (n) = 2C(n) n. δ(n) = min k n {δ C (k) + δ G (n k)}. δ(n) = + min{δ(n ν(d)), δ(ν(d + ) n)}, where d = lg n.

24 Notation and results Problem: over all subsets S of size n of T, what is δ(n), the least number of edges in the cut (S, S)? Restrictions: S is connected (δ C (n)); S consists of complete binary trees (δ G (n)). E.g. δ(24) = δ C (24) = 2, and δ G (24) = 4. Notation ν(d) = 2 d ; ν(p) = p P (2p ). Results (C(n) = Conolly, T (n) = Tanny): δc (n) = n + 2 2T (n); δ G (n) = 2C(n) n. δ(n) = min k n {δ C (k) + δ G (n k)}. δ(n) = + min{δ(n ν(d)), δ(ν(d + ) n)}, where d = lg n.

25 Notation and results Problem: over all subsets S of size n of T, what is δ(n), the least number of edges in the cut (S, S)? Restrictions: S is connected (δ C (n)); S consists of complete binary trees (δ G (n)). E.g. δ(24) = δ C (24) = 2, and δ G (24) = 4. Notation ν(d) = 2 d ; ν(p) = p P (2p ). Results (C(n) = Conolly, T (n) = Tanny): δc (n) = n + 2 2T (n); δ G (n) = 2C(n) n. δ(n) = min k n {δ C (k) + δ G (n k)}. δ(n) = + min{δ(n ν(d)), δ(ν(d + ) n)}, where d = lg n.

26 Notation and results Problem: over all subsets S of size n of T, what is δ(n), the least number of edges in the cut (S, S)? Restrictions: S is connected (δ C (n)); S consists of complete binary trees (δ G (n)). E.g. δ(24) = δ C (24) = 2, and δ G (24) = 4. Notation ν(d) = 2 d ; ν(p) = p P (2p ). Results (C(n) = Conolly, T (n) = Tanny): δc (n) = n + 2 2T (n); δ G (n) = 2C(n) n. δ(n) = min k n {δ C (k) + δ G (n k)}. δ(n) = + min{δ(n ν(d)), δ(ν(d + ) n)}, where d = lg n.

27 Notation and results Problem: over all subsets S of size n of T, what is δ(n), the least number of edges in the cut (S, S)? Restrictions: S is connected (δ C (n)); S consists of complete binary trees (δ G (n)). E.g. δ(24) = δ C (24) = 2, and δ G (24) = 4. Notation ν(d) = 2 d ; ν(p) = p P (2p ). Results (C(n) = Conolly, T (n) = Tanny): δc (n) = n + 2 2T (n); δ G (n) = 2C(n) n. δ(n) = min k n {δ C (k) + δ G (n k)}. δ(n) = + min{δ(n ν(d)), δ(ν(d + ) n)}, where d = lg n.

28 Notation and results Problem: over all subsets S of size n of T, what is δ(n), the least number of edges in the cut (S, S)? Restrictions: S is connected (δ C (n)); S consists of complete binary trees (δ G (n)). E.g. δ(24) = δ C (24) = 2, and δ G (24) = 4. Notation ν(d) = 2 d ; ν(p) = p P (2p ). Results (C(n) = Conolly, T (n) = Tanny): δc (n) = n + 2 2T (n); δ G (n) = 2C(n) n. δ(n) = min k n {δ C (k) + δ G (n k)}. δ(n) = + min{δ(n ν(d)), δ(ν(d + ) n)}, where d = lg n.

29 One proof: Lemma: δ C (n) = n + 2 2T (n). Proof: Let S = n be such that (S, S) = δ C (n). On the one hand, counting edges, v S deg(v) = 2(n ) + (S, S) = 2(n ) + δ C (n). On the other, v S deg(v) = 3n 3 + n = 3n 2n. Thus δ C (n) = n + 2 2n = n + 2 2T (n), because T (n) maximizes n.

30 Binary partitions Binary partitions (all parts of the form 2 j ) Example: 2 = = Almost binary partitions (all parts of the form ν j = 2 j ). Example 2 = We can allow the partitions to be signed. We often want to find minimal partitions; those with the least number of parts. The greedy algorithm finds (the unique) minimal partitions for binary and almost binary partitions. Like coin-changing. The signed cases are more interesting...

31 Minimal signed almost binary partitions A Signed Almost Binary Partition (SABP) of n is a pair (P, N) where n = (2 i ) i P j N(2 j ) = ν(p) ν(n). The minimum size of a SABP of n is denoted τ(n) = P + N. It is an ABP (or GABP) if N =. The minimum size of a ABP is τ G (n). (G is for greedy ). It is a CABP if P =. The minimum size of a CABP is τ C (n). (C is for connected ). 2 = 5-3 is a msabp and a mcabp. 2 = is a mgapb. Theorem: δ(n) = τ(n), δ G (n) = τ G (n), and δ C (n) = τ C (n).

32 A normal form for a SABP (P, N) Three conditions (A) P N =. (B) P = Greedy(ν(P)) and N = Greedy(ν(N)). (C) max(p) { lg n, + lg n }. Lemma: For every n there is a minimal SABP (or mgabp or mcabp) that is in normal form. Examples: Third condition is not vacuous: 5 = = τ=3 = τ G =5 = } 63 5 {{ 3 }. τ C =5

33 A duality and symmetry δ(n) = Theorem Let d = lg n. δ G (n) = δ C (3 2 d n 2) and δ(n) = δ(3 2 d n 2) Example: Note the binary representations: (n) 2 α0 (3 2 d n 2) 2 α0

34 A duality and symmetry δ(n) = Theorem Let d = lg n. δ G (n) = δ C (3 2 d n 2) and δ(n) = δ(3 2 d n 2) Example: Note the binary representations: (n) 2 α0 (3 2 d n 2) 2 α0

35 How fast does δ(n) grow? Curves are lg n and (lg n)/2; diamonds are δ(n). New curves are δ G (n) and δ C (n).

36 When is δ(n) = δ G (n)? n = = (2 0 ) + (2 7 ) + (2 4 ) + (2 ) Theorem If the minimum gap is at least 3, then δ(n) = δ G (n). As a consequence, δ(n) (lg n)/3. Can 3 be replaced by 2 above? NO! The smallest known counter-example is n = 46, 92, 496, 8, 49, where 2 = δ(n) = 2 + δ G (n). Why? Here n = j S ν(j), where S = {, 3,..., 45} j S 2j j B 2j j A 2j s + b a 000

37 Growth Rate of α(m) = min{n : δ(n) = m} m α(m) α(m) (4 m )/(4 )

38 Open Problems Extend to k-ary trees. Is there a faster way to compute δ(n) and the actual msabp? I.e., something similar to Prodinger s algorithm for signed binary partitions. We conjecture that the general problem has a nested solution. This means that there is a sequence S, S 2,... of subsets of nodes in T with the following three properties. S n = n, S n S n+, and (S n, S n ) = δ(n).

39 The end Thanks for coming! Any questions?

40 Another oddity... Notation: # (s) is the number of s in the string s. Lemma δ G (n) = min k {# ((n + k) 2 ) k}. For example, G(2) = G((00) 2 ) = 4 because, taking successively k =, 2, 3, 4, we have # (0) = 3 >, # (0) = 3 > 2, # () = 4 > 3, but # (0000) = 4.

Isoperimetric Sequences for Infinite Complete Binary Trees, Meta-Fibonacci Sequences and Signed Almost Binary Partitions

Isoperimetric Sequences for Infinite Complete Binary Trees, Meta-Fibonacci Sequences and Signed Almost Binary Partitions arxiv:1210.0405v1 [math.co] 1 Oct 2012 Isoperimetric Sequences for Infinite Complete Binary Trees, Meta-Fibonacci Sequences and Signed Almost Binary Partitions L. Sunil Chandran Anita Das Frank Ruskey

More information

arxiv: v1 [math.co] 22 Jan 2013

arxiv: v1 [math.co] 22 Jan 2013 NESTED RECURSIONS, SIMULTANEOUS PARAMETERS AND TREE SUPERPOSITIONS ABRAHAM ISGUR, VITALY KUZNETSOV, MUSTAZEE RAHMAN, AND STEPHEN TANNY arxiv:1301.5055v1 [math.co] 22 Jan 2013 Abstract. We apply a tree-based

More information

ALGORITHMS AND COMBINATORICS OF MAXIMAL COMPACT CODES by. CHRISTOPHER JORDAN DEUGAU B.Sc., Malaspina University-College, 2004

ALGORITHMS AND COMBINATORICS OF MAXIMAL COMPACT CODES by. CHRISTOPHER JORDAN DEUGAU B.Sc., Malaspina University-College, 2004 ALGORITHMS AND COMBINATORICS OF MAXIMAL COMPACT CODES by CHRISTOPHER JORDAN DEUGAU B.Sc., Malaspina University-College, 2004 A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree

More information

Solving Nested Recursions With Trees. Abraham Isgur

Solving Nested Recursions With Trees. Abraham Isgur Solving Nested Recursions With Trees by Abraham Isgur A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department of Mathematics University of Toronto

More information

Trees and Meta-Fibonacci Sequences

Trees and Meta-Fibonacci Sequences Trees and Meta-Fibonacci Sequences Abraham Isgur, David Reiss, and Stephen Tanny Department of Mathematics University of Toronto, Ontario, Canada abraham.isgur@utoronto.ca, david.reiss@utoronto.ca, tanny@math.toronto.edu

More information

Sequences that satisfy a(n a(n)) = 0

Sequences that satisfy a(n a(n)) = 0 Sequences that satisfy a(n a(n)) = 0 Nate Kube Frank Ruskey October 13, 2005 Abstract We explore the properties of some sequences for which a(n a(n)) = 0. Under the natural restriction that a(n) < n the

More information

(tree searching technique) (Boolean formulas) satisfying assignment: (X 1, X 2 )

(tree searching technique) (Boolean formulas) satisfying assignment: (X 1, X 2 ) Algorithms Chapter 5: The Tree Searching Strategy - Examples 1 / 11 Chapter 5: The Tree Searching Strategy 1. Ex 5.1Determine the satisfiability of the following Boolean formulas by depth-first search

More information

Data selection. Lower complexity bound for sorting

Data selection. Lower complexity bound for sorting Data selection. Lower complexity bound for sorting Lecturer: Georgy Gimel farb COMPSCI 220 Algorithms and Data Structures 1 / 12 1 Data selection: Quickselect 2 Lower complexity bound for sorting 3 The

More information

SIGNAL COMPRESSION Lecture 7. Variable to Fix Encoding

SIGNAL COMPRESSION Lecture 7. Variable to Fix Encoding SIGNAL COMPRESSION Lecture 7 Variable to Fix Encoding 1. Tunstall codes 2. Petry codes 3. Generalized Tunstall codes for Markov sources (a presentation of the paper by I. Tabus, G. Korodi, J. Rissanen.

More information

Today s Outline. CS 362, Lecture 4. Annihilator Method. Lookup Table. Annihilators for recurrences with non-homogeneous terms Transformations

Today s Outline. CS 362, Lecture 4. Annihilator Method. Lookup Table. Annihilators for recurrences with non-homogeneous terms Transformations Today s Outline CS 362, Lecture 4 Jared Saia University of New Mexico Annihilators for recurrences with non-homogeneous terms Transformations 1 Annihilator Method Lookup Table Write down the annihilator

More information

13 Dynamic Programming (3) Optimal Binary Search Trees Subset Sums & Knapsacks

13 Dynamic Programming (3) Optimal Binary Search Trees Subset Sums & Knapsacks 13 Dynamic Programming (3) Optimal Binary Search Trees Subset Sums & Knapsacks Average-case analysis Average-case analysis of algorithms and data structures: Input is generated according to a known probability

More information

On the Average Path Length of Complete m-ary Trees

On the Average Path Length of Complete m-ary Trees 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 17 2014, Article 14.6.3 On the Average Path Length of Complete m-ary Trees M. A. Nyblom School of Mathematics and Geospatial Science RMIT University

More information

Hon.Algorithms (CSCI-GA 3520), Professor Yap Fall 2012 MIDTERM EXAM. Oct 11, 2012 SOLUTION

Hon.Algorithms (CSCI-GA 3520), Professor Yap Fall 2012 MIDTERM EXAM. Oct 11, 2012 SOLUTION Hon.Algorithms (CSCI-GA 352), Professor Yap Fall 22 MIDTERM EXAM Oct, 22 SOLUTIONS Problem. ( Points) Consider the recurrence T(n) = 4T(n/2)+ n2 lgn. Reduce this to standard form and solve it to Θ-order.

More information

Fixed-Density Necklaces and Lyndon Words in Cool-lex Order

Fixed-Density Necklaces and Lyndon Words in Cool-lex Order Fixed-Density Necklaces and Lyndon Words in Cool-lex Order J. Sawada A. Williams July 6, 2009 Abstract This paper creates a simple Gray code for fixed-density binary necklaces and Lyndon words. The Gray

More information

On the minimum neighborhood of independent sets in the n-cube

On the minimum neighborhood of independent sets in the n-cube Matemática Contemporânea, Vol. 44, 1 10 c 2015, Sociedade Brasileira de Matemática On the minimum neighborhood of independent sets in the n-cube Moysés da S. Sampaio Júnior Fabiano de S. Oliveira Luérbio

More information

Silver trees and Cohen reals

Silver trees and Cohen reals Silver trees and Cohen reals Otmar Spinas Abstract We prove that the meager ideal M is Tukey reducible to the Mycielski ideal J(Si) which is the ideal associated with Silver forcing Si. This implies add

More information

A fast algorithm to generate necklaces with xed content

A fast algorithm to generate necklaces with xed content Theoretical Computer Science 301 (003) 477 489 www.elsevier.com/locate/tcs Note A fast algorithm to generate necklaces with xed content Joe Sawada 1 Department of Computer Science, University of Toronto,

More information

CSCE 222 Discrete Structures for Computing. Dr. Hyunyoung Lee

CSCE 222 Discrete Structures for Computing. Dr. Hyunyoung Lee CSCE 222 Discrete Structures for Computing Sequences and Summations Dr. Hyunyoung Lee Based on slides by Andreas Klappenecker 1 Sequences 2 Sequences A sequence is a function from a subset of the set of

More information

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard

More information

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181. Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität

More information

Propositional and Predicate Logic - IV

Propositional and Predicate Logic - IV Propositional and Predicate Logic - IV Petr Gregor KTIML MFF UK ZS 2015/2016 Petr Gregor (KTIML MFF UK) Propositional and Predicate Logic - IV ZS 2015/2016 1 / 19 Tableau method (from the previous lecture)

More information

Analysis of Approximate Quickselect and Related Problems

Analysis of Approximate Quickselect and Related Problems Analysis of Approximate Quickselect and Related Problems Conrado Martínez Univ. Politècnica Catalunya Joint work with A. Panholzer and H. Prodinger LIP6, Paris, April 2009 Introduction Quickselect finds

More information

1 Basic Definitions. 2 Proof By Contradiction. 3 Exchange Argument

1 Basic Definitions. 2 Proof By Contradiction. 3 Exchange Argument 1 Basic Definitions A Problem is a relation from input to acceptable output. For example, INPUT: A list of integers x 1,..., x n OUTPUT: One of the three smallest numbers in the list An algorithm A solves

More information

The Fibonacci Quilt Sequence

The Fibonacci Quilt Sequence The Sequence Minerva Catral, Pari Ford*, Pamela Harris, Steven J. Miller, Dawn Nelson AMS Section Meeting Georgetown University March 7, 2015 1 1 2 1 2 3 1 2 3 4 1 2 3 4 5 Fibonacci sequence Theorem (

More information

Fundamental Algorithms

Fundamental Algorithms Fundamental Algorithms Chapter 5: Searching Michael Bader Winter 2014/15 Chapter 5: Searching, Winter 2014/15 1 Searching Definition (Search Problem) Input: a sequence or set A of n elements (objects)

More information

Linear Recurrent Subsequences of Meta-Fibonacci Sequences

Linear Recurrent Subsequences of Meta-Fibonacci Sequences Linear Recurrent Subsequences of Meta-Fibonacci Sequences Nathan Fox arxiv:1508.01840v1 [math.nt] 7 Aug 2015 Abstract In a recent paper, Frank Ruskey asked whether every linear recurrent sequence can occur

More information

Greedy Algorithms My T. UF

Greedy Algorithms My T. UF Introduction to Algorithms Greedy Algorithms @ UF Overview A greedy algorithm always makes the choice that looks best at the moment Make a locally optimal choice in hope of getting a globally optimal solution

More information

Chapter 9: Relations Relations

Chapter 9: Relations Relations Chapter 9: Relations 9.1 - Relations Definition 1 (Relation). Let A and B be sets. A binary relation from A to B is a subset R A B, i.e., R is a set of ordered pairs where the first element from each pair

More information

Signed Measures and Complex Measures

Signed Measures and Complex Measures Chapter 8 Signed Measures Complex Measures As opposed to the measures we have considered so far, a signed measure is allowed to take on both positive negative values. To be precise, if M is a σ-algebra

More information

MA/CSSE 474 Theory of Computation

MA/CSSE 474 Theory of Computation MA/CSSE 474 Theory of Computation Bottom-up parsing Pumping Theorem for CFLs Recap: Going One Way Lemma: Each context-free language is accepted by some PDA. Proof (by construction): The idea: Let the stack

More information

COS597D: Information Theory in Computer Science October 19, Lecture 10

COS597D: Information Theory in Computer Science October 19, Lecture 10 COS597D: Information Theory in Computer Science October 9, 20 Lecture 0 Lecturer: Mark Braverman Scribe: Andrej Risteski Kolmogorov Complexity In the previous lectures, we became acquainted with the concept

More information

Integer factorization, part 1: the Q sieve. part 2: detecting smoothness. D. J. Bernstein

Integer factorization, part 1: the Q sieve. part 2: detecting smoothness. D. J. Bernstein Integer factorization, part 1: the Q sieve Integer factorization, part 2: detecting smoothness D. J. Bernstein The Q sieve factors by combining enough -smooth congruences ( + ). Enough log. Plausible conjecture:

More information

CSE 20. Lecture 4: Introduction to Boolean algebra. CSE 20: Lecture4

CSE 20. Lecture 4: Introduction to Boolean algebra. CSE 20: Lecture4 CSE 20 Lecture 4: Introduction to Boolean algebra Reminder First quiz will be on Friday (17th January) in class. It is a paper quiz. Syllabus is all that has been done till Wednesday. If you want you may

More information

Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018

Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018 CS17 Integrated Introduction to Computer Science Klein Contents Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018 1 Tree definitions 1 2 Analysis of mergesort using a binary tree 1 3 Analysis of

More information

10.4 The Kruskal Katona theorem

10.4 The Kruskal Katona theorem 104 The Krusal Katona theorem 141 Example 1013 (Maximum weight traveling salesman problem We are given a complete directed graph with non-negative weights on edges, and we must find a maximum weight Hamiltonian

More information

HMMT February 2018 February 10, 2018

HMMT February 2018 February 10, 2018 HMMT February 018 February 10, 018 Algebra and Number Theory 1. For some real number c, the graphs of the equation y = x 0 + x + 18 and the line y = x + c intersect at exactly one point. What is c? 18

More information

Numeration Systems. S. E. Payne General Numeration Systems 2. 3 Combinatorial Numeration Numeration with forbidden substrings 14

Numeration Systems. S. E. Payne General Numeration Systems 2. 3 Combinatorial Numeration Numeration with forbidden substrings 14 Numeration Systems S. E. Payne 2010 Contents 1 General Numeration Systems 2 2 Greedy Representations 3 3 Combinatorial Numeration 13 4 Numeration with forbidden substrings 14 5 The dominant root of the

More information

Non-context-Free Languages. CS215, Lecture 5 c

Non-context-Free Languages. CS215, Lecture 5 c Non-context-Free Languages CS215, Lecture 5 c 2007 1 The Pumping Lemma Theorem. (Pumping Lemma) Let be context-free. There exists a positive integer divided into five pieces, Proof for for each, and..

More information

cse303 ELEMENTS OF THE THEORY OF COMPUTATION Professor Anita Wasilewska

cse303 ELEMENTS OF THE THEORY OF COMPUTATION Professor Anita Wasilewska cse303 ELEMENTS OF THE THEORY OF COMPUTATION Professor Anita Wasilewska LECTURE 3 CHAPTER 1 SETS, RELATIONS, and LANGUAGES 6. Closures and Algorithms 7. Alphabets and Languages 8. Finite Representation

More information

Fall 2017 November 10, Written Homework 5

Fall 2017 November 10, Written Homework 5 CS1800 Discrete Structures Profs. Aslam, Gold, & Pavlu Fall 2017 November 10, 2017 Assigned: Mon Nov 13 2017 Due: Wed Nov 29 2017 Instructions: Written Homework 5 The assignment has to be uploaded to blackboard

More information

Parity Dominating Sets in Grid Graphs

Parity Dominating Sets in Grid Graphs Parity Dominating Sets in Grid Graphs John L. Goldwasser and William F. Klostermeyer Dept. of Mathematics West Virginia University Morgantown, WV 26506 Dept. of Computer and Information Sciences University

More information

ODD PARTITIONS IN YOUNG S LATTICE

ODD PARTITIONS IN YOUNG S LATTICE Séminaire Lotharingien de Combinatoire 75 (2016), Article B75g ODD PARTITIONS IN YOUNG S LATTICE ARVIND AYYER, AMRITANSHU PRASAD, AND STEVEN SPALLONE Abstract. We show that the subgraph induced in Young

More information

Compositions, Bijections, and Enumerations

Compositions, Bijections, and Enumerations Georgia Southern University Digital Commons@Georgia Southern Electronic Theses & Dissertations COGS- Jack N. Averitt College of Graduate Studies Fall 2012 Compositions, Bijections, and Enumerations Charles

More information

PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai

PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions My T. Thai 1 1 Hardness of Approximation Consider a maximization problem Π such as MAX-E3SAT. To show that it is NP-hard to approximation

More information

1 The Knapsack Problem

1 The Knapsack Problem Comp 260: Advanced Algorithms Prof. Lenore Cowen Tufts University, Spring 2018 Scribe: Tom Magerlein 1 Lecture 4: The Knapsack Problem 1 The Knapsack Problem Suppose we are trying to burgle someone s house.

More information

CSCE 750 Final Exam Answer Key Wednesday December 7, 2005

CSCE 750 Final Exam Answer Key Wednesday December 7, 2005 CSCE 750 Final Exam Answer Key Wednesday December 7, 2005 Do all problems. Put your answers on blank paper or in a test booklet. There are 00 points total in the exam. You have 80 minutes. Please note

More information

MATH 324 Summer 2011 Elementary Number Theory. Notes on Mathematical Induction. Recall the following axiom for the set of integers.

MATH 324 Summer 2011 Elementary Number Theory. Notes on Mathematical Induction. Recall the following axiom for the set of integers. MATH 4 Summer 011 Elementary Number Theory Notes on Mathematical Induction Principle of Mathematical Induction Recall the following axiom for the set of integers. Well-Ordering Axiom for the Integers If

More information

Problem. Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26

Problem. Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26 Binary Search Introduction Problem Problem Given a dictionary and a word. Which page (if any) contains the given word? 3 / 26 Strategy 1: Random Search Randomly select a page until the page containing

More information

Article begins on next page

Article begins on next page Linear Recurrent Subsequences of Generalized Meta-Fibonacci Sequences Rutgers University has made this article freely available. Please share how this access benefits you. Your story matters. [https://rucore.libraries.rutgers.edu/rutgers-lib/49496/story/]

More information

4.8 Huffman Codes. These lecture slides are supplied by Mathijs de Weerd

4.8 Huffman Codes. These lecture slides are supplied by Mathijs de Weerd 4.8 Huffman Codes These lecture slides are supplied by Mathijs de Weerd Data Compression Q. Given a text that uses 32 symbols (26 different letters, space, and some punctuation characters), how can we

More information

Identifying an m-ary Partition Identity through an m-ary Tree

Identifying an m-ary Partition Identity through an m-ary Tree Bridgewater State University Virtual Commons - Bridgewater State University Mathematics Faculty Publications Mathematics Department 06 Identifying an m-ary Partition Identity through an m-ary Tree Timothy

More information

Notes on induction proofs and recursive definitions

Notes on induction proofs and recursive definitions Notes on induction proofs and recursive definitions James Aspnes December 13, 2010 1 Simple induction Most of the proof techniques we ve talked about so far are only really useful for proving a property

More information

Binomial coefficients and k-regular sequences

Binomial coefficients and k-regular sequences Binomial coefficients and k-regular sequences Eric Rowland Hofstra University New York Combinatorics Seminar CUNY Graduate Center, 2017 12 22 Eric Rowland Binomial coefficients and k-regular sequences

More information

Rearrangements of convergence sums at infinity

Rearrangements of convergence sums at infinity Rearrangements of convergence sums at infinity Chelton D. Evans and William K. Pattinson Abstract Convergence sums theory is concerned with monotonic series testing. On face value, this may seem a limitation

More information

Algorithms, Design and Analysis. Order of growth. Table 2.1. Big-oh. Asymptotic growth rate. Types of formulas for basic operation count

Algorithms, Design and Analysis. Order of growth. Table 2.1. Big-oh. Asymptotic growth rate. Types of formulas for basic operation count Types of formulas for basic operation count Exact formula e.g., C(n) = n(n-1)/2 Algorithms, Design and Analysis Big-Oh analysis, Brute Force, Divide and conquer intro Formula indicating order of growth

More information

CMPSCI611: The Matroid Theorem Lecture 5

CMPSCI611: The Matroid Theorem Lecture 5 CMPSCI611: The Matroid Theorem Lecture 5 We first review our definitions: A subset system is a set E together with a set of subsets of E, called I, such that I is closed under inclusion. This means that

More information

1. [10 marks] Consider the following two algorithms that find the two largest elements in an array A[1..n], where n >= 2.

1. [10 marks] Consider the following two algorithms that find the two largest elements in an array A[1..n], where n >= 2. CSC 6 H5S Homework Assignment # 1 Spring 010 Worth: 11% Due: Monday February 1 (at class) For each question, please write up detailed answers carefully. Make sure that you use notation and terminology

More information

0 1 d 010. h 0111 i g 01100

0 1 d 010. h 0111 i g 01100 CMSC 5:Fall 07 Dave Mount Solutions to Homework : Greedy Algorithms Solution : The code tree is shown in Fig.. a 0000 c 0000 b 00 f 000 d 00 g 000 h 0 i 00 e Prob / / /8 /6 / Depth 5 Figure : Solution

More information

Recursion and Induction

Recursion and Induction Recursion and Induction Themes Recursion Recurrence Definitions Recursive Relations Induction (prove properties of recursive programs and objects defined recursively) Examples Tower of Hanoi Gray Codes

More information

Binomial Coefficient Identities/Complements

Binomial Coefficient Identities/Complements Binomial Coefficient Identities/Complements CSE21 Fall 2017, Day 4 Oct 6, 2017 https://sites.google.com/a/eng.ucsd.edu/cse21-fall-2017-miles-jones/ permutation P(n,r) = n(n-1) (n-2) (n-r+1) = Terminology

More information

Generating Functions

Generating Functions Semester 1, 2004 Generating functions Another means of organising enumeration. Two examples we have seen already. Example 1. Binomial coefficients. Let X = {1, 2,..., n} c k = # k-element subsets of X

More information

FRINGE TREES, CRUMP MODE JAGERS BRANCHING PROCESSES AND m-ary SEARCH TREES

FRINGE TREES, CRUMP MODE JAGERS BRANCHING PROCESSES AND m-ary SEARCH TREES FRINGE TREES, CRUMP MODE JAGERS BRANCHING PROCESSES AND m-ary SEARCH TREES CECILIA HOLMGREN AND SVANTE JANSON Abstract. This survey studies asymptotics of random fringe trees and extended fringe trees

More information

ECS 20: Discrete Mathematics for Computer Science UC Davis Phillip Rogaway June 12, Final Exam

ECS 20: Discrete Mathematics for Computer Science UC Davis Phillip Rogaway June 12, Final Exam ECS 20: Discrete Mathematics for Computer Science Handout F UC Davis Phillip Rogaway June 12, 2000 Final Exam Instructions: Read the questions carefully; maybe I m not asking what you assume me to be asking!

More information

Abstract. JIANG, ZONGLIANG. Symmetric chain decompositions and independent families of. curves. (Under the direction of Dr. Carla D. Savage.

Abstract. JIANG, ZONGLIANG. Symmetric chain decompositions and independent families of. curves. (Under the direction of Dr. Carla D. Savage. Abstract JIANG, ZONGLIANG. Symmetric chain decompositions and independent families of curves. (Under the direction of Dr. Carla D. Savage.) This thesis shows that symmetric independent families of n curves

More information

4 Linear Recurrence Relations & the Fibonacci Sequence

4 Linear Recurrence Relations & the Fibonacci Sequence 4 Linear Recurrence Relations & the Fibonacci Sequence Recall the classic example of the Fibonacci sequence (F n ) n=1 the relations: F n+ = F n+1 + F n F 1 = F = 1 = (1, 1,, 3, 5, 8, 13, 1,...), defined

More information

Fast Sorting and Selection. A Lower Bound for Worst Case

Fast Sorting and Selection. A Lower Bound for Worst Case Presentation for use with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 0 Fast Sorting and Selection USGS NEIC. Public domain government image. A Lower Bound

More information

and e 2 ~ e 2 iff e 1

and e 2 ~ e 2 iff e 1 Section 4. Equivalence Relations A binary relation is an equivalence relation if it has the three properties reflexive, symmetric, and transitive (RST). Examples. a. Equality on any set. b. x ~ y iff x

More information

ICS141: Discrete Mathematics for Computer Science I

ICS141: Discrete Mathematics for Computer Science I ICS141: Discrete Mathematics for Computer Science I Dept. Information & Computer Sci., Jan Stelovsky based on slides by Dr. Baek and Dr. Still Originals by Dr. M. P. Frank and Dr. J.L. Gross Provided by

More information

Named numbres. Ngày 25 tháng 11 năm () Named numbres Ngày 25 tháng 11 năm / 7

Named numbres. Ngày 25 tháng 11 năm () Named numbres Ngày 25 tháng 11 năm / 7 Named numbres Ngày 25 tháng 11 năm 2011 () Named numbres Ngày 25 tháng 11 năm 2011 1 / 7 Fibonacci, Catalan, Stirling, Euler, Bernoulli Many sequences are famous. 1 1, 2, 3, 4,... the integers. () Named

More information

Lecture 1 : Data Compression and Entropy

Lecture 1 : Data Compression and Entropy CPS290: Algorithmic Foundations of Data Science January 8, 207 Lecture : Data Compression and Entropy Lecturer: Kamesh Munagala Scribe: Kamesh Munagala In this lecture, we will study a simple model for

More information

CS5371 Theory of Computation. Lecture 9: Automata Theory VII (Pumping Lemma, Non-CFL)

CS5371 Theory of Computation. Lecture 9: Automata Theory VII (Pumping Lemma, Non-CFL) CS5371 Theory of Computation Lecture 9: Automata Theory VII (Pumping Lemma, Non-CFL) Objectives Introduce Pumping Lemma for CFL Apply Pumping Lemma to show that some languages are non-cfl Pumping Lemma

More information

c 2002 Society for Industrial and Applied Mathematics

c 2002 Society for Industrial and Applied Mathematics SIAM J. DISCRETE MATH. Vol. 15, No. 4, pp. 546 561 c 2002 Society for Industrial and Applied Mathematics A FAST ALGORITHM FOR GENERATING NONISOMORPHIC CHORD DIAGRAMS JOE SAWADA Abstract. Using a new string

More information

Handout 5. α a1 a n. }, where. xi if a i = 1 1 if a i = 0.

Handout 5. α a1 a n. }, where. xi if a i = 1 1 if a i = 0. Notes on Complexity Theory Last updated: October, 2005 Jonathan Katz Handout 5 1 An Improved Upper-Bound on Circuit Size Here we show the result promised in the previous lecture regarding an upper-bound

More information

EXERCISES SHORTEST PATHS: APPLICATIONS, OPTIMIZATION, VARIATIONS, AND SOLVING THE CONSTRAINED SHORTEST PATH PROBLEM. 1 Applications and Modelling

EXERCISES SHORTEST PATHS: APPLICATIONS, OPTIMIZATION, VARIATIONS, AND SOLVING THE CONSTRAINED SHORTEST PATH PROBLEM. 1 Applications and Modelling SHORTEST PATHS: APPLICATIONS, OPTIMIZATION, VARIATIONS, AND SOLVING THE CONSTRAINED SHORTEST PATH PROBLEM EXERCISES Prepared by Natashia Boland 1 and Irina Dumitrescu 2 1 Applications and Modelling 1.1

More information

CS60007 Algorithm Design and Analysis 2018 Assignment 1

CS60007 Algorithm Design and Analysis 2018 Assignment 1 CS60007 Algorithm Design and Analysis 2018 Assignment 1 Palash Dey and Swagato Sanyal Indian Institute of Technology, Kharagpur Please submit the solutions of the problems 6, 11, 12 and 13 (written in

More information

Partitions and Covers

Partitions and Covers University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Dong Wang Date: January 2, 2012 LECTURE 4 Partitions and Covers In previous lectures, we saw

More information

CATALAN NUMBERS AND EXCEPTIONAL SEQUENCES

CATALAN NUMBERS AND EXCEPTIONAL SEQUENCES CATALAN NUMBERS AND EXCEPTIONAL SEQUENCES KIYOSHI IGUSA Contents. Woo s diagrams 2 2. Catalan numbers 3 3. Representations of quivers 4 4. Statement of theorem 8 5. Extension to Artin groups 9 6. Comments

More information

University of Toronto Department of Electrical and Computer Engineering. Final Examination. ECE 345 Algorithms and Data Structures Fall 2016

University of Toronto Department of Electrical and Computer Engineering. Final Examination. ECE 345 Algorithms and Data Structures Fall 2016 University of Toronto Department of Electrical and Computer Engineering Final Examination ECE 345 Algorithms and Data Structures Fall 2016 Print your first name, last name, UTORid, and student number neatly

More information

The Poupard statistics on tangent and secant trees

The Poupard statistics on tangent and secant trees The Poupard statistics on tangent and secant trees Guoniu Han IRMA, Strasbourg (Based on some recent papers with Dominique Foata) 1 Taylor expansion of tan u: Tangent numbers tanu = n 0 u ()! T = u 1!

More information

Connected Component Tree

Connected Component Tree onnected omponent Tree Jean ousty OUR-DAY OURSE on Mathematical Morphology in image analysis Bangalore 19- October 010 Motivation onnectivity plays important role for image processing Morphological connected

More information

What is a semigroup? What is a group? What is the difference between a semigroup and a group?

What is a semigroup? What is a group? What is the difference between a semigroup and a group? The second exam will be on Thursday, July 5, 2012. The syllabus will be Sections IV.5 (RSA Encryption), III.1, III.2, III.3, III.4 and III.8, III.9, plus the handout on Burnside coloring arguments. Of

More information

SMT 2013 Power Round Solutions February 2, 2013

SMT 2013 Power Round Solutions February 2, 2013 Introduction This Power Round is an exploration of numerical semigroups, mathematical structures which appear very naturally out of answers to simple questions. For example, suppose McDonald s sells Chicken

More information

Symmetric Rendezvous in Graphs: Deterministic Approaches

Symmetric Rendezvous in Graphs: Deterministic Approaches Symmetric Rendezvous in Graphs: Deterministic Approaches Shantanu Das Technion, Haifa, Israel http://www.bitvalve.org/~sdas/pres/rendezvous_lorentz.pdf Coauthors: Jérémie Chalopin, Adrian Kosowski, Peter

More information

arxiv: v1 [math.co] 3 Nov 2014

arxiv: v1 [math.co] 3 Nov 2014 SPARSE MATRICES DESCRIBING ITERATIONS OF INTEGER-VALUED FUNCTIONS BERND C. KELLNER arxiv:1411.0590v1 [math.co] 3 Nov 014 Abstract. We consider iterations of integer-valued functions φ, which have no fixed

More information

Equality of P-partition Generating Functions

Equality of P-partition Generating Functions Bucknell University Bucknell Digital Commons Honors Theses Student Theses 2011 Equality of P-partition Generating Functions Ryan Ward Bucknell University Follow this and additional works at: https://digitalcommons.bucknell.edu/honors_theses

More information

Writing Assignment 2 Student Sample Questions

Writing Assignment 2 Student Sample Questions Writing Assignment 2 Student Sample Questions 1. Let P and Q be statements. Then the statement (P = Q) ( P Q) is a tautology. 2. The statement If the sun rises from the west, then I ll get out of the bed.

More information

CS 6110 S16 Lecture 33 Testing Equirecursive Equality 27 April 2016

CS 6110 S16 Lecture 33 Testing Equirecursive Equality 27 April 2016 CS 6110 S16 Lecture 33 Testing Equirecursive Equality 27 April 2016 1 Equirecursive Equality In the equirecursive view of recursive types, types are regular labeled trees, possibly infinite. However, we

More information

GENERALIZED STIRLING PERMUTATIONS, FAMILIES OF INCREASING TREES AND URN MODELS

GENERALIZED STIRLING PERMUTATIONS, FAMILIES OF INCREASING TREES AND URN MODELS GENERALIZED STIRLING PERMUTATIONS, FAMILIES OF INCREASING TREES AND URN MODELS SVANTE JANSON, MARKUS KUBA, AND ALOIS PANHOLZER ABSTRACT. Bona [6] studied the distribution of ascents, plateaux and descents

More information

EECS 229A Spring 2007 * * (a) By stationarity and the chain rule for entropy, we have

EECS 229A Spring 2007 * * (a) By stationarity and the chain rule for entropy, we have EECS 229A Spring 2007 * * Solutions to Homework 3 1. Problem 4.11 on pg. 93 of the text. Stationary processes (a) By stationarity and the chain rule for entropy, we have H(X 0 ) + H(X n X 0 ) = H(X 0,

More information

Theory of Computation

Theory of Computation Theory of Computation (Feodor F. Dragan) Department of Computer Science Kent State University Spring, 2018 Theory of Computation, Feodor F. Dragan, Kent State University 1 Before we go into details, what

More information

CS6375: Machine Learning Gautam Kunapuli. Decision Trees

CS6375: Machine Learning Gautam Kunapuli. Decision Trees Gautam Kunapuli Example: Restaurant Recommendation Example: Develop a model to recommend restaurants to users depending on their past dining experiences. Here, the features are cost (x ) and the user s

More information

Tewodros Amdeberhan, Dante Manna and Victor H. Moll Department of Mathematics, Tulane University New Orleans, LA 70118

Tewodros Amdeberhan, Dante Manna and Victor H. Moll Department of Mathematics, Tulane University New Orleans, LA 70118 The -adic valuation of Stirling numbers Tewodros Amdeberhan, Dante Manna and Victor H. Moll Department of Mathematics, Tulane University New Orleans, LA 7011 Abstract We analyze properties of the -adic

More information

2-ADIC PARTIAL STIRLING FUNCTIONS AND THEIR ZEROS. 1. Introduction

2-ADIC PARTIAL STIRLING FUNCTIONS AND THEIR ZEROS. 1. Introduction 2-ADIC PARTIAL STIRLING FUNCTIONS AND THEIR ZEROS DONALD M. DAVIS Abstract. Let P n (x = 1 ( n n! 2i+1 (2i + 1 x. This extends to a continuous function on the 2-adic integers, the nth 2-adic partial Stirling

More information

CSE 202 Homework 4 Matthias Springer, A

CSE 202 Homework 4 Matthias Springer, A CSE 202 Homework 4 Matthias Springer, A99500782 1 Problem 2 Basic Idea PERFECT ASSEMBLY N P: a permutation P of s i S is a certificate that can be checked in polynomial time by ensuring that P = S, and

More information

Key words and phrases. Hausdorff measure, self-similar set, Sierpinski triangle The research of Móra was supported by OTKA Foundation #TS49835

Key words and phrases. Hausdorff measure, self-similar set, Sierpinski triangle The research of Móra was supported by OTKA Foundation #TS49835 Key words and phrases. Hausdorff measure, self-similar set, Sierpinski triangle The research of Móra was supported by OTKA Foundation #TS49835 Department of Stochastics, Institute of Mathematics, Budapest

More information

CSE101: Design and Analysis of Algorithms. Ragesh Jaiswal, CSE, UCSD

CSE101: Design and Analysis of Algorithms. Ragesh Jaiswal, CSE, UCSD Greedy s Greedy s Shortest path Claim 2: Let S be a subset of vertices containing s such that we know the shortest path length l(s, u) from s to any vertex in u S. Let e = (u, v) be an edge such that 1

More information

Recurrence Relations

Recurrence Relations Recurrence Relations Winter 2017 Recurrence Relations Recurrence Relations A recurrence relation for the sequence {a n } is an equation that expresses a n in terms of one or more of the previous terms

More information

1 Basic Combinatorics

1 Basic Combinatorics 1 Basic Combinatorics 1.1 Sets and sequences Sets. A set is an unordered collection of distinct objects. The objects are called elements of the set. We use braces to denote a set, for example, the set

More information

Properties of the Integers

Properties of the Integers Properties of the Integers The set of all integers is the set and the subset of Z given by Z = {, 5, 4, 3, 2, 1, 0, 1, 2, 3, 4, 5, }, N = {0, 1, 2, 3, 4, }, is the set of nonnegative integers (also called

More information

The Complexity of Mining Maximal Frequent Subgraphs

The Complexity of Mining Maximal Frequent Subgraphs The Complexity of Mining Maximal Frequent Subgraphs Benny Kimelfeld IBM Research Almaden kimelfeld@us.ibm.com Phokion G. Kolaitis UC Santa Cruz & IBM Research Almaden kolaitis@cs.ucsc.edu ABSTRACT A frequent

More information