Randomized Smoothing Networks
|
|
- Beverly Wood
- 5 years ago
- Views:
Transcription
1 Randomized Smoothing Netorks Maurice Herlihy Computer Science Dept., Bron University, Providence, RI, USA Srikanta Tirthapura Dept. of Electrical and Computer Engg., Ioa State University, Ames, IA, USA A preliminary version of this article has appeared in the Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS) 2004 Corresponding Author addresses: mph@cs.bron.edu ( Maurice Herlihy ), snt@iastate.edu ( Srikanta Tirthapura ). Preprint submitted to Elsevier Science 23 March 2005
2 1 Introduction A k-smoothing netork is a distributed data structure that accepts tokens on input ires and routes them to output ires. It ensures that no matter ho imbalanced the traffic on the input ires, the numbers of tokens emitted on the output ires are approximately balanced, lying ithin k of one another, here k is a constant, independent of the number of active tokens. Smoothing netorks are ell suited for load balancing applications here tokens represent requests for service. Clients send tokens to arbitrary input ires; these tokens are routed to servers in such a ay that all servers receive approximately the same number of tokens. In a real distributed system, netork sitches may be rebooted or replaced dynamically, and it may not be feasible to determine the correct initial state for each sitch. Hence, an attractive approach to fault-recovery is simply to initialize the ne sitch to a random state, thus eliminating the need for a global coordination. In this paper, e analyze the smoothness properties of randomized balancing netorks, hose constituent balancers are initialized to random states. Randomized netorks are easy to maintain and can recover from faults ithout a global reconfiguration. We sho that randomized netorks produce outputs that are remarkably smooth. We consider the block smoothing netork initialized to a random state; e assume that an off-line adversary, one that does not kno the initial state, chooses an input sequence. We sho that the output of the netork is 2.36 log -smooth ith high probability. As a direct consequence, e sho that the output smoothness of a randomly initialized bitonic or a periodic netork is also O ( log ) ith high probability. In prior ork [7] e shoed that certain ell-knon 1-smoothing netorks, hen started in an arbitrary initial state (perhaps chosen by an adversary), produce outputs that are at orst (log )-smooth, here is the number of input and output ires. This bound is tight for each of the netorks that e considered there. Thus, our results sho that the outputs of randomized netorks are significantly smoother than the orst-case outputs of the same netorks initialized deterministically. Our results lead to extremely practical smoothing netorks. If an application requires approximate smoothing, then a block netork ith randomized balancers ill ork very ell. The block netork of idth has depth exactly log (there are no hidden constants), and the smoothness bound gros very sloly ith. For example, if the idth = 2 24, then the output smoothness is less than 12 ith overhelming probability. 2
3 Input Wires Output Wires Increasing Layers Fig. 1. A balancing netork of idth 4 and depth 3. Horizontal segments are ires and the vertical segments balancers. We conclude this article ith a brief discussion of informal but suggestive experimental results. By feeding random sequences to randomized smoothing netorks, e observed a degree of smoothness orse than constant, and consistent ith our bound. On random input sequences, e discovered that randomized netorks ere dramatically smoother than the same netorks initialized to the default initial state. 1.1 Model Balancers and Smoothing Netorks A balancer is an asynchronous sitch ith to input ires and to output ires, labeled top and bottom. A balancer accepts a stream of tokens on its input ires. A balancer has to states: it is oriented up or don. If the balancer is oriented up, then the next input token leaves on the top output ire and the balancer becomes oriented don. If the balancer is oriented don, then the next input token leaves on the bottom output ire and the balancer becomes oriented up. The above definition applies to balancers of idth to. All the balancers that e consider in this paper have a idth of to. A balancing netork is an acyclic netork of balancers here output ires of some balancers are linked to input ires of others. An example is shon in Figure 1. The netork s input ires are not linked to the output of any balancer, and similarly the netork s output ires are not linked to the input of any balancer. In this paper, e consider balancing netorks ith the same number of input and output ires, called the netork s idth. Tokens enter the netork on the input ires, typically several per ire, propagate asynchronously through the balancers, and leave on the output ires, typically several per ire. A balancing netork is quiescent if every token that has entered the netork has also left. Because balancing netorks are acyclic (as directed graphs), each balancer can be assigned a unique layer, hich is the length of the longest path from an input ire to that balancer. 3
4 Definition 1 A sequence of natural numbers X = x 0,..., x n 1 is k-smooth if x i x j k, for any 0 i, j < n. Definition 2 A balancing netork is a k-smoothing netork if, starting from its initial state, the overall distribution of output tokens across the output ires in any quiescent state is k-smooth. Note that if a netork is k-smooth, it is also l-smooth for any l > k. In this paper, e ill be concerned ith the block netork [6] (hich is isomorphic to the popular butterfly netork), the periodic netork [6,3] and the bitonic netork [4,3]. We no prove a simple but useful lemma. Lemma 3 If a sequence X = x 0,..., x n 1 is k-smooth, then the result of passing X through a balancing netork is k-smooth. PROOF. We sho that the result of passing any to elements of X through a balancer leads to a sequence that is k-smooth, and the lemma follos by induction. Let Z be the result of passing to elements of X through a balancer. The smallest element in Z is greater than or equal to the smallest element in X, and the largest element in Z is lesser than or equal to the largest element in X. Since X is k-smooth, Z is also k-smooth. Lemma 3 leads to the folloing corollary. Corollary 4 If a balancing netork N contains another netork M embedded inside it, and M is a k-smoothing netork, then N is also a k-smoothing netork Randomized Balancers and Netorks Definition 5 A randomized balancer is a balancer hich has been initialized to a random initial state, i.e. up or don ith equal probability. Definition 6 A randomized balancing netork is a balancing netork hose component balancers are independent randomized balancers. Let x denote the total number of input tokens to a randomized balancer b, and y 1, y 2 denote the number of tokens routed to the top and bottom output ires respectively. Let x b = D(x)r b, here: r b is a random variable specific to balancer b, hich can take values +1/2 or 1/2 ith equal probability. 4
5 D is the odd-characteristic function: D(x) = 1 if x is an odd number, and 0 otherise. By the definition of the randomized balancer: y 1 = x/2 + x b y 2 = x/2 x b (1) Note that if x is even, then the input tokens are divided equally among the output ires. The randomness comes into play only hen x is odd. In such a case, the excess token is routed to a randomly chosen output ire. 1.2 Our Results We ask the folloing question. What are the smoothness properties of randomized balancing netorks? We sho the folloing results in response. The output of a randomized block netork of idth is (2.36 log )- smooth ith probability at least 1 4/. We sho that the bitonic netork contains a block netork embedded inside it. The periodic netork consists of many pipelined block netorks, hence trivially contains a block netork embedded inside. Hence, the outputs of periodic and bitonic netorks of idth are also (2.36 log )-smooth ith probability at least 1 4/. 1.3 Related Work Aiello, Venkatesan and Yung [1] build smoothing netorks using a different kind of randomized balancer: odd-numbered input tokens to the balancer leave on a randomly chosen ire, hile even-numbered input tokens leave on the opposite ire from their immediate predecessors. It can be easily verified that our result for the smoothness of the block netork still holds if e replace our random balancers ith theirs. Using a combination of deterministic and randomized balancers, Aiello et al. [1] construct smoothing netorks hose outputs are 2-smooth ith high probability. In our model, hoever, an adversary could set the orientations of the deterministic balancers, and their analysis does not hold under these conditions. Klugerman and Plaxton [10] sho the existence of counting netorks (hich are 1-smoothing netorks ith other additional properties) of depth O(log ) 5
6 Analysis of idth netork Depth Balancers Global Initialization Smoothness Klugerman and Plaxton [10,9] O(log ) Det. Required 1 Aiello et al. [1] O(log ) Det. and Rand. Required 2 (.h.p.) Herlihy et al. [7] log Det. Not required log This paper log Rand. Not required 2.36 log (.h.p.) Fig. 2. Comparison of various analyses of smoothing netorks. Note:.h.p. = ith high probability, det. = deterministic and rand. = randomized. hich use deterministic balancers. They also give an explicit construction of a counting netork of depth O(c log log ) (here c is a constant) using deterministic balancers. Klugerman [9] extends this to give a polynomial time construction of an O(log ) depth counting netork of idth. The above netorks use the AKS netork [2] as a subnetork, and are hence not practical since the constants in O(log ) are huge. For a survey of ork on lo-depth counting netorks and related topics, e refer the reader to Busch and Herlihy [5]. In earlier ork [7], e shoed that the orst case output smoothness of the block, periodic and bitonic netorks of idth is exactly log hen the sitches are initialized adversarially. Our results in this paper sho that randomization helps significantly to reduce the output smoothness of the block netork. A comparison of various analyses of smoothing netorks appears in Figure 2. Roadmap: The rest of the paper is organized as follos. Section 2 contains the analysis of the block netork. Section 3 contains the analysis of the bitonic netork. Section 4 contains the experimental results, and e conclude by listing some open problems in Section 5. 2 The Periodic and Block Netorks The periodic smoothing netork [3] is isomorphic to the periodic sorting netork of Dod et al. [6]. At its heart is a component Block[] netork, defined inductively as follos. 6
7 Fig. 3. A Block[8] Netork consists of to Block[4] netorks: one ith balancers denoted by solid lines, and the other ith balancers denoted by dashed lines. The outputs of the Block[4] netorks are fed into an EvenOdd[8] netork, shon inside the box. The Block Netork: The Block[2] netork is a single balancer. The Block[2] netork is constructed from to Block[] netorks as follos. Given an input sequence X of length 2, represent each index (subscript) as a binary string. The A-cochain of X, denoted X A, is the subsequence hose indexes have lo-order bits 00 or 11. For example, the A-cochain of the sequence x 0,..., x 7 is x 0, x 3, x 4, x 7. The B-cochain x B is the subsequence hose lo-order bits are 01 and 10. The input sequence X is fed into to parallel Block[] netorks, hich e ill call the A-block and the B-block. Sequence X A goes to the A-block, and X B to the B-block. Suppose the output sequence of the A-block is Y A = y0 A, ya 1,..., ya 1 and the output sequence of the B-block is Y B = y0 B, yb 1,..., yb 1. These are fed into an EvenOdd[2] netork, hich simply balances each element of Y A ith the corresponding element of Y B. More formally, Even- Odd[2] consists of balancers numbered 0 to 1, and the ith balancer balances yi A ith yi B. Figure 3 shos a Block[8] netork. The Block[] netork consists of log layers of balancers, numbered from 1 (input layer) to log (output layer). The output ires of a balancer in layer l belong to layer l. The input ires to the netork belong to layer 0. Each layer consists of /2 balancers, so that the netork has a total of ( log )/2 balancers. The Periodic Netork: The Periodic[] netork is the cascade of (log ) Block[] netorks. Since the Periodic[] netork trivially contains a Block[] embedded inside it, because of Corollary 4, our upper bounds for the block netork directly carry over to the periodic netork. 7
8 2.1 Smoothness of the Randomized Block[] Netork Consider an execution of the randomized smoothing netork, taking it from a random initial state to a quiescent state, here a total of M tokens have entered and left the netork. We consider Block[] as a tree. Each node in this tree is a set of one or more balancers, as described belo. The root of the tree is the set of all the /2 balancers at the input layer of the netork (layer 1). This node is labeled v 1,1, since it is the first node in layer 1. For each i = 2... log, the ith layer is divided into 2 i 1 nodes, numbered from v i,1 till v i,2 i 1, ith each node consisting of /2 i balancers. Given the nodes in the (i 1)th layer, the nodes in the ith layer are defined as follos. The node v i,2k 1 consists of all the balancers that the top output ires of the balancers in node v i 1,k point to. Similarly, the node v i,2k consists of all the balancers that the bottom output ires of the balancers in node v i 1,k point to. In the tree, there is an edge from node v i 1,k to nodes v i,2k 1 and v i,2k. The leaves of the tree are the balancers at the output layer. Let m i,j denote the total number of tokens entering node v i,j. Since the tokens on the top output ires of the balancers in v i,j enter v i+1,2j 1, the number of tokens entering node v i+1,2j 1 is (using Equation 1): m i+1,2j 1 = m i,j 2 + b v i,j x b (2) We ill no express the number of tokens that are output at the top output ire of v log,1 as a function of the number of input tokens and the random variables corresponding to the different balancers. The tokens that exit from the topmost output ire must follo the path v 1,1 v 2,1 v 3,1... v log,1 and further exit on the top output ire of balancer v log,1. The number of tokens entering v 1,1 is M. Let X 1 denote the number of tokens exiting the top output ire of v log,1, hich is a single output balancer. Applying Equation 2 repeatedly, and finally Equation 1, e get: 8
9 m 2,1 = M 2 + b v 1,1 x b m 3,1 = m 2,1 2 + b v 2,1 x b X 1 = m log,1 2 + b v log,1 x b Combining the above, e get: X 1 = M + b v 1,1 x b b v + 2,1 x b b v log 1,1 x b + x b /2 /4 2 b v log,1 Reriting the above: X 1 = M/ + V here V = log i=1 2i x b b v i,1 (3) We ill no analyze V. The main problem is that V is not the sum of independent random variables. Clearly the various random variables x b (for different balancers b) are heavily dependent on each other, since the event that the number of tokens entering balancer b is even (resp., odd) depends upon the corresponding events for balancers at earlier layers. Recall that x b = D(n b )r b. We consider an alternate random variable W, defined as follos. W = log i=1 2i r b b v i,1 (4) Since the random variables r b for different balancers b are independent, W is easier to handle than V. We rerite Equations 3 and 4 as follos: V = {(b S) (D(n b )=1)} c b r b (5) W = {b S} c b r b (6) S is a set of balancers, c b denotes a constant specific to balancer b, and r b is the random variable corresponding to balancer b. The set S and the c b s can 9
10 be derived from Equations 3 and 4, but their exact nature is not important here. We no prove a key lemma, shoing that in order to bound the probability that V deviates significantly from its expected value, it is enough to bound the probability that W deviates from its expected value. Lemma 7 For any δ > 0, Pr { V > δ} 2Pr { W > δ}. PROOF. Consider the conditional probability α = Pr {W > δ V > δ} From Equations 5 and 6, Pr {W δ V > δ} Pr {(b S) (D(n b ) 1)} c b r b < 0 1/2 The right hand side inequality ( 1/2) is true because: for each balancer b, the random variable r b is distributed symmetrically around zero, and is chosen independent of n b. Thus, e have α 1/2. Pr {W > δ} Pr {(W > δ) (V > δ)} Pr {W > δ V > δ} Pr {V > δ} Pr {V > δ}/2 Similarly, e can sho the other direction, that Pr {V < δ} 2Pr {W < δ}, and the claim follos. We ill use the folloing lemma in further proofs. Lemma 8 [Hoeffding s bound [8]] Suppose S n = Y 0 + Y Y n 1 here the Y j s are independent random variables, and for each j = 0... n 1, Y j [a j, b j ]. Then, for any ɛ > 0, Pr {S n E[S n ] > nɛ} exp 2n 2 ɛ 2 j=0 (b j a j ) 2 n 1 10
11 Lemma 9 { } Pr V > log < 4 2 PROOF. We ill first bound the probability that W is large, and then use Lemma 7 to bound the probability that V is large. Since W is the sum of independent random variables, e use Hoeffding s inequality (stated in Lemma 8) to bound the probability that W is large. For i = 1... log, the number of balancers in node v i,1 is /2 i. Thus, W is the sum of (/2 + / ) = 1 independent random variables. The expectation of W : E[W ] = 0, since E[r b ] = 0 for every balancer b. Next, the ranges of various random variables. For i = 1... log, 2 i r b [ 2 i 1 ], +2i 1 In Lemma 8, the term (b j a j ) 2 is: 2 ( 2 )2 + 4 ( 4 ) = 2 2 Setting ɛ = 2 ln 1 in Lemma 8, e get Pr { W > 2 ln } exp { 2 ln } = 1 2 (7) Since W is the eighted sum of r b s, each of hich is symmetrically distributed around zero, W is also symmetrically distributed around zero. Hence Pr { W < 2 ln } = Pr { W > 2 ln } 1 2 (8) Equations 7 and 8 combined ith Lemma 7 yield the claim. Note that e have stated our lemma using logarithms to base 2. Theorem 10 The output sequence of Block[] ith randomized balancers is 2.36 log -smooth ith probability at least 1 4/. PROOF. Let X 1, X 2,..., X denote the output sequence of Block[] ith randomized balancers, here X 1 corresponds to the topmost output ire. 11
12 From Lemma 9, e have { } Pr X 1 M/ > log 4/ 2 The random variables X 1... X all have the same distribution, due to symmetry, and a similar equation holds for all of them. Using the union bound on probabilities, the probability that for some i the value X i M/ exceeds log is not greater than 4/. Thus, ith probability at least 1 4/, all outputs X i are ithin log of M/, and hence ithin 2.36 log of each other, as needed. 3 The Bitonic Netork MERGER[4] BITONIC[4] MERGER[4] BITONIC[4] MERGER[8] Fig. 4. Recursive Structure of a Bitonic[8] Counting Netork. The Bitonic[] smoothing netork [3] is isomorphic to the bitonic sorting netork of Batcher [4]. This netork has a simple inductive structure, shon in Figure 4. The Bitonic[2] netork is a single balancer. The Bitonic[2] netork is constructed by feeding the 2 input ires into to parallel Bitonic[] netorks, and feeding their outputs into a Merger[2] netork. The Merger[2] netork takes to input -sequences X and Y and produces an output 2-sequence Z. The Merger[] netork is also defined inductively. The Merger[2] netork is a single balancer. We construct the Merger[2] netork from to Merger[] netorks and a EvenOdd[2] netork hich as described in Section 2. Let X E denote the even subsequence x 0, x 2,..., x 2 of X, and X O denote the odd subsequence x 1, x 3,..., x 1. Similarly define Y E and Y O. The input to the first Merger[] netork is the -sequence formed by the concatenation of X E and Y O, denoted by X E Y O. Call that netork s output 12
13 sequence U. Symmetrically, the input to the second Merger[] netork is the -sequence X O Y E. Call that output sequence V. The final layer of the netork, EvenOdd[], simply joins the each output ire of the first Merger[] netork ith the corresponding output ire of the second Merger[] netork. To netorks N and M are isomorphic if the underlying directed graphs are isomorphic. Lemma 11 The Merger[] netork is isomorphic to the Block[] netork. PROOF. We argue by induction on. When is 2, both netorks consist of a single balancer. Assume that Merger[] is isomorphic to Block[], and consider the Merger[2] and Block[2] netorks. In the Block[2] netork, the final layer connects the i-th ire of one component Block[] netork ith the i-th ire of the other. Likeise, in the Merger[2] netork, the final layer connects the i-th ire of one component Merger[] netork ith the i-th ire of the other, preserving the isomorphism. Lemma 11, Theorem 10 and Corollary 4 together lead to the folloing corollary. Corollary 12 The Merger[] netork, and hence, the Bitonic[] netork are 2.36 log -smooth ith probability at least 1 4/. 4 Experiments To develop an intuition about hether our bound can be improved, e conducted a number of simple experiments testing the behavior of randomized block netorks of different sizes. These results do not prove anything, but they are suggestive. The results are shon in Figure 5. In our experiments, the number of tokens input into each ire is randomly chosen beteen 1 and , and the output smoothness is averaged over 10 runs. We simulated netorks of idth up to The results sho that hen log changes from 1 to 24, the (average) output smoothness increases very gradually, from 0.7 to 3.2. We do not expect to be able to simulate much larger netorks. 13
14 To compare ith the randomized netork, e simulated a block netork initialized in the standard state; all balancers ere initialized to up. Using the same setup as for the random netork, (the number of tokens into each ire is a random number beteen 1 and , average taken over 10 runs), the results obtained are shon belo. It can be seen that the output smoothness is very nearly equal to log 2. While e kno that the orst case smoothness of a block netork initialized by an adversary is log, these experiments suggest that the smoothness of the netork over random inputs hen initialized very regularly (not by an adversary) is no better than log /2. In other ords, these experiments suggest that the average smoothness of the block netork initialized to the standard state is O(log ), hile e have shon that the smoothness of a block netork initialized randomly is O( log ). We conclude that for applications needing approximate load balancing, a randomized block netork orks much better than a deterministic one. 14 randomized block netork deterministic block netork 12 average smoothness of output log(), =idth of netork Fig. 5. The observed smoothness of a Block[] netork ith randomized and deterministic balancers 5 Open Problems We conclude by listing some interesting open problems. 14
15 (1) Our bounds for the smoothness of the block netork does not make use of structure that may be present in the input sequence. Can e obtain better bounds if the input is already fairly smooth? (2) Can e get better bounds on the output smoothness of the randomized periodic or bitonic netorks? (3) Ho tight is the O( log ) upper bound for the block netork? Can e get a matching loer bound? References [1] W. Aiello, R. Venkatesan, and M. Yung. Coins, eights and contention in balancing netorks. In Proceedings of the annual ACM symposium on Principles of Distributed Computing, pages , August [2] M. Ajtai, J. Komlós, and E. Szemerédi. Sorting in c log n parallel steps. Combinatorica, 3:1 19, [3] J. Aspnes, M. Herlihy, and N. Shavit. Counting netorks. Journal of the ACM, 41(5): , [4] K.E. Batcher. Sorting netorks and their applications. In Proceedings of the AFIPS Spring Joint Computer Conference, volume 32, pages , [5] C. Busch and M. Herlihy. A survey on counting netorks. In Proceedings of Workshop on Distributed Data and Structures (WDAS), March [6] M. Dod, Y. Perl, L. Rudolph, and M. Saks. The periodic balanced sorting netork. Journal of the ACM, 36(4): , October [7] M. Herlihy and S. Tirthapura. Self stabilizing smoothing and counting. In Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS), pages 4 11, [8] W. Hoeffding. Probability inequalities for sums of bounded random variables. American Statistical Association Journal, 58:13 30, [9] M. Klugerman. Small-depth Counting Netorks and Related Topics. PhD thesis, Massachusetts Institute of Technology, Department of Mathematics, Sept [10] M. Klugerman and C.G. Plaxton. Small-depth counting netorks. In Proceedings of the 24th Annual ACM Symposium on Theory of Computing, pages ,
A Randomized, O(log w)-depth 2-Smoothing Network
A Randomized, O(log )-Depth -Smoothing Netork Marios Mavronicolas Department of Computer Science University of Cyprus CY-678 Nicosia, Cyprus mavronic@csucyaccy Thomas Sauerald International Computer Science
More informationLecture 3 Frequency Moments, Heavy Hitters
COMS E6998-9: Algorithmic Techniques for Massive Data Sep 15, 2015 Lecture 3 Frequency Moments, Heavy Hitters Instructor: Alex Andoni Scribes: Daniel Alabi, Wangda Zhang 1 Introduction This lecture is
More informationSocial Network Games
CWI and University of Amsterdam Based on joint orks ith Evangelos Markakis and Sunil Simon The model Social netork ([Apt, Markakis 2011]) Weighted directed graph: G = (V,,), here V: a finite set of agents,
More informationSome Classes of Invertible Matrices in GF(2)
Some Classes of Invertible Matrices in GF() James S. Plank Adam L. Buchsbaum Technical Report UT-CS-07-599 Department of Electrical Engineering and Computer Science University of Tennessee August 16, 007
More informationA Generalization of a result of Catlin: 2-factors in line graphs
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 72(2) (2018), Pages 164 184 A Generalization of a result of Catlin: 2-factors in line graphs Ronald J. Gould Emory University Atlanta, Georgia U.S.A. rg@mathcs.emory.edu
More informationCOS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 12 Scribe: Indraneel Mukherjee March 12, 2008
COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture # 12 Scribe: Indraneel Mukherjee March 12, 2008 In the previous lecture, e ere introduced to the SVM algorithm and its basic motivation
More informationHow Long Does it Take to Catch a Wild Kangaroo?
Ho Long Does it Take to Catch a Wild Kangaroo? Ravi Montenegro Prasad Tetali ABSTRACT The discrete logarithm problem asks to solve for the exponent x, given the generator g of a cyclic group G and an element
More informationArtificial Neural Networks. Part 2
Artificial Neural Netorks Part Artificial Neuron Model Folloing simplified model of real neurons is also knon as a Threshold Logic Unit x McCullouch-Pitts neuron (943) x x n n Body of neuron f out Biological
More informationN-bit Parity Neural Networks with minimum number of threshold neurons
Open Eng. 2016; 6:309 313 Research Article Open Access Marat Z. Arslanov*, Zhazira E. Amirgalieva, and Chingiz A. Kenshimov N-bit Parity Neural Netorks ith minimum number of threshold neurons DOI 10.1515/eng-2016-0037
More informationCh. 2 Math Preliminaries for Lossless Compression. Section 2.4 Coding
Ch. 2 Math Preliminaries for Lossless Compression Section 2.4 Coding Some General Considerations Definition: An Instantaneous Code maps each symbol into a codeord Notation: a i φ (a i ) Ex. : a 0 For Ex.
More information3 - Vector Spaces Definition vector space linear space u, v,
3 - Vector Spaces Vectors in R and R 3 are essentially matrices. They can be vieed either as column vectors (matrices of size and 3, respectively) or ro vectors ( and 3 matrices). The addition and scalar
More informationThe degree sequence of Fibonacci and Lucas cubes
The degree sequence of Fibonacci and Lucas cubes Sandi Klavžar Faculty of Mathematics and Physics University of Ljubljana, Slovenia and Faculty of Natural Sciences and Mathematics University of Maribor,
More informationMinimax strategy for prediction with expert advice under stochastic assumptions
Minimax strategy for prediction ith expert advice under stochastic assumptions Wojciech Kotłosi Poznań University of Technology, Poland otlosi@cs.put.poznan.pl Abstract We consider the setting of prediction
More informationCHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum
CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum 1997 19 CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION 3.0. Introduction
More informationOn the approximation of real powers of sparse, infinite, bounded and Hermitian matrices
On the approximation of real poers of sparse, infinite, bounded and Hermitian matrices Roman Werpachoski Center for Theoretical Physics, Al. Lotnikó 32/46 02-668 Warszaa, Poland Abstract We describe a
More informationTowards a Theory of Societal Co-Evolution: Individualism versus Collectivism
Toards a Theory of Societal Co-Evolution: Individualism versus Collectivism Kartik Ahuja, Simpson Zhang and Mihaela van der Schaar Department of Electrical Engineering, Department of Economics, UCLA Theorem
More informationStat 8112 Lecture Notes Weak Convergence in Metric Spaces Charles J. Geyer January 23, Metric Spaces
Stat 8112 Lecture Notes Weak Convergence in Metric Spaces Charles J. Geyer January 23, 2013 1 Metric Spaces Let X be an arbitrary set. A function d : X X R is called a metric if it satisfies the folloing
More informationOn Fast Bitonic Sorting Networks
On Fast Bitonic Sorting Networks Tamir Levi Ami Litman January 1, 2009 Abstract This paper studies fast Bitonic sorters of arbitrary width. It constructs such a sorter of width n and depth log(n) + 3,
More informationLong run input use-input price relations and the cost function Hessian. Ian Steedman Manchester Metropolitan University
Long run input use-input price relations and the cost function Hessian Ian Steedman Manchester Metropolitan University Abstract By definition, to compare alternative long run equilibria is to compare alternative
More informationBloom Filters and Locality-Sensitive Hashing
Randomized Algorithms, Summer 2016 Bloom Filters and Locality-Sensitive Hashing Instructor: Thomas Kesselheim and Kurt Mehlhorn 1 Notation Lecture 4 (6 pages) When e talk about the probability of an event,
More informationMinimize Cost of Materials
Question 1: Ho do you find the optimal dimensions of a product? The size and shape of a product influences its functionality as ell as the cost to construct the product. If the dimensions of a product
More informationSTATC141 Spring 2005 The materials are from Pairwise Sequence Alignment by Robert Giegerich and David Wheeler
STATC141 Spring 2005 The materials are from Pairise Sequence Alignment by Robert Giegerich and David Wheeler Lecture 6, 02/08/05 The analysis of multiple DNA or protein sequences (I) Sequence similarity
More informationBucket handles and Solenoids Notes by Carl Eberhart, March 2004
Bucket handles and Solenoids Notes by Carl Eberhart, March 004 1. Introduction A continuum is a nonempty, compact, connected metric space. A nonempty compact connected subspace of a continuum X is called
More informationBivariate Uniqueness in the Logistic Recursive Distributional Equation
Bivariate Uniqueness in the Logistic Recursive Distributional Equation Antar Bandyopadhyay Technical Report # 629 University of California Department of Statistics 367 Evans Hall # 3860 Berkeley CA 94720-3860
More informationUC Berkeley Department of Electrical Engineering and Computer Sciences. EECS 126: Probability and Random Processes
UC Berkeley Department of Electrical Engineering and Computer Sciences EECS 26: Probability and Random Processes Problem Set Spring 209 Self-Graded Scores Due:.59 PM, Monday, February 4, 209 Submit your
More informationEcon 201: Problem Set 3 Answers
Econ 20: Problem Set 3 Ansers Instructor: Alexandre Sollaci T.A.: Ryan Hughes Winter 208 Question a) The firm s fixed cost is F C = a and variable costs are T V Cq) = 2 bq2. b) As seen in class, the optimal
More informationAverage Coset Weight Distributions of Gallager s LDPC Code Ensemble
1 Average Coset Weight Distributions of Gallager s LDPC Code Ensemble Tadashi Wadayama Abstract In this correspondence, the average coset eight distributions of Gallager s LDPC code ensemble are investigated.
More informationCombining Shared Coin Algorithms
Combining Shared Coin Algorithms James Aspnes Hagit Attiya Keren Censor Abstract This paper shows that shared coin algorithms can be combined to optimize several complexity measures, even in the presence
More informationValidating Collective Classification Using Cohorts
Validating Collective Classification Using Cohorts Eric Bax, James Li, Abdullah Sonmez, and Zehra Cataltepe Abstract Many netorks gro by adding successive cohorts layers of nodes. Often, the nodes in each
More informationWhy do Golf Balls have Dimples on Their Surfaces?
Name: Partner(s): 1101 Section: Desk # Date: Why do Golf Balls have Dimples on Their Surfaces? Purpose: To study the drag force on objects ith different surfaces, ith the help of a ind tunnel. Overvie
More informationBusiness Cycles: The Classical Approach
San Francisco State University ECON 302 Business Cycles: The Classical Approach Introduction Michael Bar Recall from the introduction that the output per capita in the U.S. is groing steady, but there
More informationPossible Cosmic Influences on the 1966 Tashkent Earthquake and its Largest Aftershocks
Geophys. J. R. mtr. Sac. (1974) 38, 423-429. Possible Cosmic Influences on the 1966 Tashkent Earthquake and its Largest Aftershocks G. P. Tamrazyan (Received 1971 August 13)* Summary I present evidence
More informationCSC Metric Embeddings Lecture 8: Sparsest Cut and Embedding to
CSC21 - Metric Embeddings Lecture 8: Sparsest Cut and Embedding to Notes taken by Nilesh ansal revised by Hamed Hatami Summary: Sparsest Cut (SC) is an important problem ith various applications, including
More informationCompetitive Concurrent Distributed Queuing
Competitive Concurrent Distributed Queuing Maurice Herlihy Srikanta Tirthapura Roger Wattenhofer Brown University Brown University Microsoft Research Providence RI 02912 Providence RI 02912 Redmond WA
More informationCALCULATION OF STEAM AND WATER RELATIVE PERMEABILITIES USING FIELD PRODUCTION DATA, WITH LABORATORY VERIFICATION
CALCULATION OF STEAM AND WATER RELATIVE PERMEABILITIES USING FIELD PRODUCTION DATA, WITH LABORATORY VERIFICATION Jericho L. P. Reyes, Chih-Ying Chen, Keen Li and Roland N. Horne Stanford Geothermal Program,
More informationPolynomial and Rational Functions
Polnomial and Rational Functions Figure -mm film, once the standard for capturing photographic images, has been made largel obsolete b digital photograph. (credit film : modification of ork b Horia Varlan;
More informationLecture 3a: The Origin of Variational Bayes
CSC535: 013 Advanced Machine Learning Lecture 3a: The Origin of Variational Bayes Geoffrey Hinton The origin of variational Bayes In variational Bayes, e approximate the true posterior across parameters
More informationA proof of topological completeness for S4 in (0,1)
A proof of topological completeness for S4 in (,) Grigori Mints and Ting Zhang 2 Philosophy Department, Stanford University mints@csli.stanford.edu 2 Computer Science Department, Stanford University tingz@cs.stanford.edu
More informationEnhancing Generalization Capability of SVM Classifiers with Feature Weight Adjustment
Enhancing Generalization Capability of SVM Classifiers ith Feature Weight Adjustment Xizhao Wang and Qiang He College of Mathematics and Computer Science, Hebei University, Baoding 07002, Hebei, China
More informationMath 249B. Geometric Bruhat decomposition
Math 249B. Geometric Bruhat decomposition 1. Introduction Let (G, T ) be a split connected reductive group over a field k, and Φ = Φ(G, T ). Fix a positive system of roots Φ Φ, and let B be the unique
More informationEnergy Minimization via a Primal-Dual Algorithm for a Convex Program
Energy Minimization via a Primal-Dual Algorithm for a Convex Program Evripidis Bampis 1,,, Vincent Chau 2,, Dimitrios Letsios 1,2,, Giorgio Lucarelli 1,2,,, and Ioannis Milis 3, 1 LIP6, Université Pierre
More information11.1 Set Cover ILP formulation of set cover Deterministic rounding
CS787: Advanced Algorithms Lecture 11: Randomized Rounding, Concentration Bounds In this lecture we will see some more examples of approximation algorithms based on LP relaxations. This time we will use
More informationNotes on Computer Theory Last updated: November, Circuits
Notes on Computer Theory Last updated: November, 2015 Circuits Notes by Jonathan Katz, lightly edited by Dov Gordon. 1 Circuits Boolean circuits offer an alternate model of computation: a non-uniform one
More informationParallel Recursion: Powerlists. Greg Plaxton Theory in Programming Practice, Fall 2005 Department of Computer Science University of Texas at Austin
Parallel Recursion: Powerlists Greg Plaxton Theory in Programming Practice, Fall 2005 Department of Computer Science University of Texas at Austin Overview Definition of a powerlist Basic operations on
More informationEndogeny for the Logistic Recursive Distributional Equation
Zeitschrift für Analysis und ihre Anendungen Journal for Analysis and its Applications Volume 30 20, 237 25 DOI: 0.47/ZAA/433 c European Mathematical Society Endogeny for the Logistic Recursive Distributional
More informationChapter 3. Systems of Linear Equations: Geometry
Chapter 3 Systems of Linear Equations: Geometry Motiation We ant to think about the algebra in linear algebra (systems of equations and their solution sets) in terms of geometry (points, lines, planes,
More informationCS 6820 Fall 2014 Lectures, October 3-20, 2014
Analysis of Algorithms Linear Programming Notes CS 6820 Fall 2014 Lectures, October 3-20, 2014 1 Linear programming The linear programming (LP) problem is the following optimization problem. We are given
More informationCHARACTERIZATION OF ULTRASONIC IMMERSION TRANSDUCERS
CHARACTERIZATION OF ULTRASONIC IMMERSION TRANSDUCERS INTRODUCTION David D. Bennink, Center for NDE Anna L. Pate, Engineering Science and Mechanics Ioa State University Ames, Ioa 50011 In any ultrasonic
More informationMinimizing and maximizing compressor and turbine work respectively
Minimizing and maximizing compressor and turbine ork respectively Reversible steady-flo ork In Chapter 3, Work Done during a rocess as found to be W b dv Work Done during a rocess It depends on the path
More informationCS264: Beyond Worst-Case Analysis Lecture #18: Smoothed Complexity and Pseudopolynomial-Time Algorithms
CS264: Beyond Worst-Case Analysis Lecture #18: Smoothed Complexity and Pseudopolynomial-Time Algorithms Tim Roughgarden March 9, 2017 1 Preamble Our first lecture on smoothed analysis sought a better theoretical
More informationOn Shortest Single/Multiple Path Computation Problems in Fiber-Wireless (FiWi) Access Networks
2014 IEEE 15th International Conference on High Performance Sitching and Routing (HPSR) On Shortest Single/Multiple Path Computation Problems in Fiber-Wireless (FiWi) Access Netorks Chenyang Zhou, Anisha
More information1 :: Mathematical notation
1 :: Mathematical notation x A means x is a member of the set A. A B means the set A is contained in the set B. {a 1,..., a n } means the set hose elements are a 1,..., a n. {x A : P } means the set of
More informationShortest paths with negative lengths
Chapter 8 Shortest paths with negative lengths In this chapter we give a linear-space, nearly linear-time algorithm that, given a directed planar graph G with real positive and negative lengths, but no
More informationPareto-Improving Congestion Pricing on General Transportation Networks
Transportation Seminar at University of South Florida, 02/06/2009 Pareto-Improving Congestion Pricing on General Transportation Netorks Yafeng Yin Transportation Research Center Department of Civil and
More informationPolynomial and Rational Functions
Polnomial and Rational Functions Figure -mm film, once the standard for capturing photographic images, has been made largel obsolete b digital photograph. (credit film : modification of ork b Horia Varlan;
More informationOutline of lectures 3-6
GENOME 453 J. Felsenstein Evolutionary Genetics Autumn, 013 Population genetics Outline of lectures 3-6 1. We ant to kno hat theory says about the reproduction of genotypes in a population. This results
More informationConcurrent Counting is Harder than Queuing
Concurrent Counting is Harder than Queuing Srikanta Tirthapura 1, Costas Busch 2 1 Iowa State University 2 Rensselaer Polytechnic Inst. Dept. of Elec. and Computer Engg. Computer Science Department Ames,
More informationFundamentals of DC Testing
Fundamentals of DC Testing Aether Lee erigy Japan Abstract n the beginning of this lecture, Ohm s la, hich is the most important electric la regarding DC testing, ill be revieed. Then, in the second section,
More informationSemi-simple Splicing Systems
Semi-simple Splicing Systems Elizabeth Goode CIS, University of Delaare Neark, DE 19706 goode@mail.eecis.udel.edu Dennis Pixton Mathematics, Binghamton University Binghamton, NY 13902-6000 dennis@math.binghamton.edu
More informationOn the Energy-Delay Trade-off of a Two-Way Relay Network
On the Energy-Delay Trade-off of a To-Way Relay Netork Xiang He Aylin Yener Wireless Communications and Netorking Laboratory Electrical Engineering Department The Pennsylvania State University University
More informationLanguage Recognition Power of Watson-Crick Automata
01 Third International Conference on Netorking and Computing Language Recognition Poer of Watson-Crick Automata - Multiheads and Sensing - Kunio Aizaa and Masayuki Aoyama Dept. of Mathematics and Computer
More informationUniversal Traversal Sequences for Expander Graphs
Universal Traversal Sequences for Expander Graphs Shlomo Hoory Avi Wigderson Hebrew University, Jerusalem Keywords: Universal traversal sequence, space-bounded computation, explicit construction, connectivity,
More informationTHE LINEAR BOUND FOR THE NATURAL WEIGHTED RESOLUTION OF THE HAAR SHIFT
THE INEAR BOUND FOR THE NATURA WEIGHTED RESOUTION OF THE HAAR SHIFT SANDRA POTT, MARIA CARMEN REGUERA, ERIC T SAWYER, AND BRETT D WIC 3 Abstract The Hilbert transform has a linear bound in the A characteristic
More informationOn a generalized combinatorial conjecture involving addition mod 2 k 1
On a generalized combinatorial conjecture involving addition mod k 1 Gérard Cohen Jean-Pierre Flori Tuesday 14 th February, 01 Abstract In this note, e give a simple proof of the combinatorial conjecture
More information1 Randomized Computation
CS 6743 Lecture 17 1 Fall 2007 1 Randomized Computation Why is randomness useful? Imagine you have a stack of bank notes, with very few counterfeit ones. You want to choose a genuine bank note to pay at
More informationCounting Networks 1. August 4, Abstract. Many fundamental multi-processor coordination problems can be expressed as
Counting Networks 1 James Aspnes y Maurice Herlihy z Nir Shavit x August 4, 1993 Abstract Many fundamental multi-processor coordination problems can be expressed as counting problems: processes must cooperate
More informationEquivalence of Regular Expressions and FSMs
Equivalence of Regular Expressions and FSMs Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Regular Language Recall that a language
More informationA Modified ν-sv Method For Simplified Regression A. Shilton M. Palaniswami
A Modified ν-sv Method For Simplified Regression A Shilton apsh@eemuozau), M Palanisami sami@eemuozau) Department of Electrical and Electronic Engineering, University of Melbourne, Victoria - 3 Australia
More informationThreshold Counters with Increments and Decrements Λ
Threshold Counters with Increments and Decrements Λ COSTAS BUSCH Brown University, USA NEOPHYTOS DEMETRIOU University of Cyprus, Cyprus MAURICE HERLIHY Brown University, USA MARIOS MAVRONICOLAS University
More informationCSE 190, Great ideas in algorithms: Pairwise independent hash functions
CSE 190, Great ideas in algorithms: Pairwise independent hash functions 1 Hash functions The goal of hash functions is to map elements from a large domain to a small one. Typically, to obtain the required
More informationPaths and cycles in extended and decomposable digraphs
Paths and cycles in extended and decomposable digraphs Jørgen Bang-Jensen Gregory Gutin Department of Mathematics and Computer Science Odense University, Denmark Abstract We consider digraphs called extended
More informationLecture 4. 1 Circuit Complexity. Notes on Complexity Theory: Fall 2005 Last updated: September, Jonathan Katz
Notes on Complexity Theory: Fall 2005 Last updated: September, 2005 Jonathan Katz Lecture 4 1 Circuit Complexity Circuits are directed, acyclic graphs where nodes are called gates and edges are called
More informationExploring the relationship between a fluid container s geometry and when it will balance on edge
Exploring the relationship eteen a fluid container s geometry and hen it ill alance on edge Ryan J. Moriarty California Polytechnic State University Contents 1 Rectangular container 1 1.1 The first geometric
More informationCS264: Beyond Worst-Case Analysis Lecture #15: Smoothed Complexity and Pseudopolynomial-Time Algorithms
CS264: Beyond Worst-Case Analysis Lecture #15: Smoothed Complexity and Pseudopolynomial-Time Algorithms Tim Roughgarden November 5, 2014 1 Preamble Previous lectures on smoothed analysis sought a better
More informationSampling Methods for Action Selection in Influence Diagrams
From: AAAI- Proceedings. Copyright, AAAI (.aaai.org). All rights reserved. Sampling Methods for Action Selection in Influence Diagrams Luis E. Ortiz Computer Science Department Bron University Box 191
More informationAnnouncements Wednesday, September 06
Announcements Wednesday, September 06 WeBWorK due on Wednesday at 11:59pm. The quiz on Friday coers through 1.2 (last eek s material). My office is Skiles 244 and my office hours are Monday, 1 3pm and
More informationAn Investigation of the use of Spatial Derivatives in Active Structural Acoustic Control
An Investigation of the use of Spatial Derivatives in Active Structural Acoustic Control Brigham Young University Abstract-- A ne parameter as recently developed by Jeffery M. Fisher (M.S.) for use in
More informationThe Analytic Hierarchy Process for the Reservoir Evaluation in Chaoyanggou Oilfield
Advances in Petroleum Exploration and Development Vol. 6, No. 2, 213, pp. 46-5 DOI:1.3968/j.aped.1925543821362.1812 ISSN 1925-542X [Print] ISSN 1925-5438 [Online].cscanada.net.cscanada.org The Analytic
More information(1) Sensitivity = 10 0 g x. (2) m Size = Frequency = s (4) Slenderness = 10w (5)
1 ME 26 Jan. May 2010, Homeork #1 Solution; G.K. Ananthasuresh, IISc, Bangalore Figure 1 shos the top-vie of the accelerometer. We need to determine the values of, l, and s such that the specified requirements
More informationLinear Time Computation of Moments in Sum-Product Networks
Linear Time Computation of Moments in Sum-Product Netorks Han Zhao Machine Learning Department Carnegie Mellon University Pittsburgh, PA 15213 han.zhao@cs.cmu.edu Geoff Gordon Machine Learning Department
More informationCS Communication Complexity: Applications and New Directions
CS 2429 - Communication Complexity: Applications and New Directions Lecturer: Toniann Pitassi 1 Introduction In this course we will define the basic two-party model of communication, as introduced in the
More informationREPRESENTATIONS FOR A SPECIAL SEQUENCE
REPRESENTATIONS FOR A SPECIAL SEQUENCE L. CARLITZ* RICHARD SCOVILLE Dyke University, Durham,!\!orth Carolina VERNERE.HOGGATTJR. San Jose State University, San Jose, California Consider the sequence defined
More information5 Quantum Wells. 1. Use a Multimeter to test the resistance of your laser; Record the resistance for both polarities.
Measurement Lab 0: Resistance The Diode laser is basically a diode junction. Same as all the other semiconductor diode junctions, e should be able to see difference in resistance for different polarities.
More informationChapter 1. Comparison-Sorting and Selecting in. Totally Monotone Matrices. totally monotone matrices can be found in [4], [5], [9],
Chapter 1 Comparison-Sorting and Selecting in Totally Monotone Matrices Noga Alon Yossi Azar y Abstract An mn matrix A is called totally monotone if for all i 1 < i 2 and j 1 < j 2, A[i 1; j 1] > A[i 1;
More informationA ROBUST BEAMFORMER BASED ON WEIGHTED SPARSE CONSTRAINT
Progress In Electromagnetics Research Letters, Vol. 16, 53 60, 2010 A ROBUST BEAMFORMER BASED ON WEIGHTED SPARSE CONSTRAINT Y. P. Liu and Q. Wan School of Electronic Engineering University of Electronic
More informationCS261: A Second Course in Algorithms Lecture #12: Applications of Multiplicative Weights to Games and Linear Programs
CS26: A Second Course in Algorithms Lecture #2: Applications of Multiplicative Weights to Games and Linear Programs Tim Roughgarden February, 206 Extensions of the Multiplicative Weights Guarantee Last
More informationA Simple Derivation of Newton-Cotes Formulas with Realistic Errors
Journal of Mathematics Research; Vol. 4, No. 5; 01 ISSN 1916-9795 E-ISSN 1916-9809 Published by Canadian Center of Science and Education A Simple Derivation of Neton-Cotes Formulas ith Realistic Errors
More informationMin/Max-Poly Weighting Schemes and the NL vs UL Problem
Min/Max-Poly Weighting Schemes and the NL vs UL Problem Anant Dhayal Jayalal Sarma Saurabh Sawlani May 3, 2016 Abstract For a graph G(V, E) ( V = n) and a vertex s V, a weighting scheme (w : E N) is called
More informationConcurrent Counting is harder than Queuing
Concurrent Counting is harder than Queuing Costas Busch Rensselaer Polytechnic Intitute Srikanta Tirthapura Iowa State University 1 rbitrary graph 2 Distributed Counting count count count count Some processors
More informationWEAK TYPE ESTIMATES FOR SINGULAR INTEGRALS RELATED TO A DUAL PROBLEM OF MUCKENHOUPT-WHEEDEN
WEAK TYPE ESTIMATES FOR SINGULAR INTEGRALS RELATED TO A DUAL PROBLEM OF MUCKENHOUPT-WHEEDEN ANDREI K. LERNER, SHELDY OMBROSI, AND CARLOS PÉREZ Abstract. A ell knon open problem of Muckenhoupt-Wheeden says
More informationComparison and Enumeration of Chemical Graphs
, http://dx.doi.org/10.5936/csbj.201302004 CSBJ Comparison and Enumeration of Chemical Graphs Tatsuya Akutsu a,*, Hiroshi Nagamochi b Abstract: Chemical compounds are usually represented as graph structured
More informationreader is comfortable with the meaning of expressions such as # g, f (g) >, and their
The Abelian Hidden Subgroup Problem Stephen McAdam Department of Mathematics University of Texas at Austin mcadam@math.utexas.edu Introduction: The general Hidden Subgroup Problem is as follos. Let G be
More informationOn the complexity of approximate multivariate integration
On the complexity of approximate multivariate integration Ioannis Koutis Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213 USA ioannis.koutis@cs.cmu.edu January 11, 2005 Abstract
More informationCS6999 Probabilistic Methods in Integer Programming Randomized Rounding Andrew D. Smith April 2003
CS6999 Probabilistic Methods in Integer Programming Randomized Rounding April 2003 Overview 2 Background Randomized Rounding Handling Feasibility Derandomization Advanced Techniques Integer Programming
More informationBayesian Properties of Normalized Maximum Likelihood and its Fast Computation
Bayesian Properties of Normalized Maximum Likelihood and its Fast Computation Andre Barron Department of Statistics Yale University Email: andre.barron@yale.edu Teemu Roos HIIT & Dept of Computer Science
More informationCommunication is bounded by root of rank
Electronic Colloquium on Computational Complexity, Report No. 84 (2013) Communication is bounded by root of rank Shachar Lovett June 7, 2013 Abstract We prove that any total boolean function of rank r
More informationPRGs for space-bounded computation: INW, Nisan
0368-4283: Space-Bounded Computation 15/5/2018 Lecture 9 PRGs for space-bounded computation: INW, Nisan Amnon Ta-Shma and Dean Doron 1 PRGs Definition 1. Let C be a collection of functions C : Σ n {0,
More informationLogic Effort Revisited
Logic Effort Revisited Mark This note ill take another look at logical effort, first revieing the asic idea ehind logical effort, and then looking at some of the more sutle issues in sizing transistors..0
More informationOn A Comparison between Two Measures of Spatial Association
Journal of Modern Applied Statistical Methods Volume 9 Issue Article 3 5--00 On A Comparison beteen To Measures of Spatial Association Faisal G. Khamis Al-Zaytoonah University of Jordan, faisal_alshamari@yahoo.com
More informationDynamic Programming: Shortest Paths and DFA to Reg Exps
CS 374: Algorithms & Models of Computation, Spring 207 Dynamic Programming: Shortest Paths and DFA to Reg Exps Lecture 8 March 28, 207 Chandra Chekuri (UIUC) CS374 Spring 207 / 56 Part I Shortest Paths
More information