Mapping the Discrete Logarithm: Talk 2
|
|
- Britton Lewis
- 5 years ago
- Views:
Transcription
1 Mapping the Discrete Logarithm: Talk 2 Joshua Holden Joint work with Daniel Cloutier, Nathan Lindle (Senior Theses), Max Brugger, Christina Frederick, Andrew Hoffman, and Marcus Mace (RHIT REU) Rose-Hulman Institute of Technology Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 1 / 45
2 The Question Definition A functional graph is a directed graph such that each vertex must have exactly one edge directed out from it. Definition An m-ary functional graph is a functional graph where each node has in-degree of exactly zero or m. We are investigating the functional graph induced by the discrete exponentiation map x g x mod p. Question How much does the discrete exponentiation functional graph (DEFG) look like a random graph? (By random graph we mean a randomly chosen graph of a specified type on a specified number of nodes.) Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 2 / 45
3 Example: x 3 x mod 23 Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 3 / 45
4 Some Measurements of Interest Number of connected components Number of cyclic nodes Number of image nodes Average component size (as seen from a node) Average cycle length (as seen from a node) Average tail length (as seen from a node) Maximum cycle length Maximum tail length Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 4 / 45
5 Strategy 1 Figure out what a random graph looks like. (Combinatorics exponential generating functions, Analysis) 2 Figure out what a discrete exponentiation functional graph (DEFG) looks like. (Number Theory, Computation) 3 Compare. (Statistics) Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 5 / 45
6 First Example of Exponential Generating Functions A permutation consists of a set of components, each of which is a (nonempty) cycle of nodes. The number of ways to make nodes into a (nonempty) cycle is counted by x + 2! x 2 2 2! + 3! 3 x 3 3! + = x + x x 3 ( = ln The number of ways to make a permutation is counted by e ln( 1 1 x ) = 1 1 x = 1 + 1!x + 2!x 2 So there are n! permutations on n nodes. 1 x 2! + 3!x 3 3! +. ). Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 6 / 45
7 Second Example of Exponential Generating Functions A component of a functional graph is a cycle of rooted trees (connected by their roots). The number of ways to make a rooted tree is counted by t(x) such that t(x) = xe t(x), so t(x) = W ( x). The number of ways to make nodes into these components is counted by ( ) ( ) c(x) = ln = ln. 1 1 t(x) W ( x) The number of ways to make nodes into a functional graph is counted by f (x) = e c(x) = n=0 n n x n n!. So there are n n functional graphs on n nodes. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 7 / 45
8 Third Example of Exponential Generating Functions A component of a binary functional graph (bfg) is a cycle of nodes, each of which is connected to a binary tree. The number of ways to make a binary tree is counted by b(x) such that b(x) = x + x b(x)2 1, so b(x) = 2 1 2x 2. x The number of ways to make nodes into these components is counted by ( ) ( ) 1 1 c 2 (x) = ln = ln. 1 xb(x) 1 2x 2 The number of ways to make nodes into a bfg is counted by ( ) 2n (2n)! f 2 (x) = e c2(x) x 2n = n 2 n (2n)!. n=0 So there are ( ) 2n (2n)! n 2 binary functional graphs on 2n nodes. n Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 8 / 45
9 Bivariate Egf s Now we can count a total number of functional graphs. How can we find out what a random one looks like? Theorem Let f n be the number of ways to carry out a task on {1,..., n}, n 1. Let g n be the number of ways to carry out a second task on {1,..., n}. Let h k,n be the number of ways to split {1,..., n} into k disjoint nonempty subsets, carry out the first task on each subset, and carry out the second task on the set of subsets. x i Let F(x) = f i i!, G(x) = x i g i i!, and H(x, u) = h k,i u k x i i!. i=1 Then H(x, u) = G(uF(x)). i=0 k,i=0 Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 9 / 45
10 Examples of Bivariate Egf s The number of ways to make n nodes into a functional graph with k components is counted by ( ) ξ(x, u) = e uc(x) = e u ln 1 1+W ( x) = 1 + 1ux + (3u + 1u 2 ) x 2 2! + (17u + 9u2 + 1u 3 ) x 3 3! + The number of ways to make n nodes into a bfg with k components is counted by ξ 2 (x, u) = e uc 2(x) = e u ln = 1 + 2u x 2 ( ) 1 1 2x 2 2! + (24u + 12u2 ) x 4 4! + Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 10 / 45
11 Weighted Totals Now we can get total measurements. Theorem (Differentiation Formula) Let f n be the number of ways to carry out a task on {1,..., n}, n 1. Let g n be the number of ways to carry out a second task on {1,..., n}. Let h n be the number of ways to split {1,..., n} into zero or more disjoint nonempty subsets, carry out the first task on each subset, and carry out the second task on the set of subsets, with each way weighted by the number of subsets. x i Let F(x) = f i i!, G(x) = x i g i i!, and H(x) = i=1[ ] i=0 i=0 Then H(x) = u G(uF(x)). u=1 h i x i i!. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 11 / 45
12 Example of Average Measurements The total number of components in all functional graphs with n nodes is counted by [ ] ( ) 1 Ξ(x) = u euc(x) = u=1 1 + W ( x) ln W ( x) = 1x + 5 x ! + 38x 3! + 390x 4! +. So the average number of components in a functional graph with n nodes is 1, 5 2 2, , ,.... Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 12 / 45
13 Example of Variance Measurements The sum of squares of the number of components in all functional graphs with n nodes is counted by [ ( )] Ξ (x) = u u u euc(x) u=1 ( ( ) ( )) 1 1 = ln + ln W ( x) 1 + W ( x) 1 + W ( x) = 1x + 7 x 2 2! + 62x 3 3! + 700x 4 4! +. ( N ) Then we use the formula Var(z) = 1 N i=1 z 2 i z 2. So the variance in the number of components in a functional graph with (e.g.) 2 nodes is ( ) = Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 13 / 45
14 Example of Cumulative Measurements We want to find the average cycle length as seen from a node over all functional graphs. Every node in a component sees the cycle length of that component. So each component should be weighted by the number of nodes times the number of cyclic nodes. This is counted by [ 2 Ξ(x) = u w ec(x) = 1x + 10 x 2 ] 1 = 1 ut(wx) u=1,w=1 2! + 117x 3 3! x 4 4! +. W ( x) (1 + W ( x)) 4 Then we divide by the number of graphs and the number of nodes in each graph. So the average cycle length as seen from a node is 1, , , 1648,... for n = 1, 2, 3, 4,... nodes Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 14 / 45
15 Extremal Measurements Theorem Let f n be the number of ways to carry out a task on {1,..., n}, n 1. Let g n be the number of ways to carry out a second task on {1,..., n}. Let h n be the number of ways to split {1,..., n} into zero or more disjoint nonempty subsets, carry out the first task on each subset, and carry out the second task on the set of subsets, with each way weighted by the size of the largest subset. x i k Let F(x) = f i i!, F [k] (x) = i=1 i=1 x i G(x) = g i i!, and H(x) = i=0 Then H(x) = k=0 i=0 f i x i i!, h i x i i!. [ ] G(F(x)) G(F [k] (x)). Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 15 / 45
16 Explanation of the Extremal Measurements Formula G(F(x)) counts the number of ways to carry out both tasks. G(F [k] (x)) counts the number of ways to carry out both tasks if the largest subset has size at most k. So [ G(F(x)) G(F [k] (x)) ] counts the number of ways to carry out both tasks if the largest subset has size at least k + 1. Let H i (x) count the number of ways to carry out both tasks if the largest subset has size exactly i. Then H(x) = = = ih i (x) = i=1 k=1 k=0 i=1 k=1 i H i (x) = [ G(F(x)) G(F [k 1] (x)) [ ] G(F(x)) G(F [k] (x)) k=1 i=k ] H i (x) Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 16 / 45
17 Example of Extremal Measurements Recall that a permutation consists of a set of components, each of which is a (nonempty) cycle of nodes. The number of ways to make nodes into a (nonempty) cycle is counted by x + 2! x 2 2 2! + 3! 3 x 3 3! + = x + x x 3 ( = ln 1 x The number of ways to make a permutation weighted by the size of the largest cycle is counted by [ e ln( ] 1 1 x ) k e i=1 xi i = x + 3 x ! + 13x 3! + 67x 4! +. k=0 So the average maximum cycle size in a permutation with n nodes is 1, 3 2!, 13 3!, 67,... for n = 1, 2, 3, 4,... nodes. 4! ). Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 17 / 45
18 Random Graph Measurements (Standard Results from Literature) The expected mean values for the measurements of interest in a random functional graph of size n, as n, are: Number of components ln (2n) + γ 2 Number of cyclic nodes πn/2 1 3 Number of image nodes (1 e 1 )n Notation h(n) k(n) will mean h(n) = k(n) + lower order terms Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 18 / 45
19 Random Graph Measurements (II) Average cycle length Average tail length Maximum cycle length πn/8 πn/8 c 1 πn n c 1 = 0 [ ( 1 exp v e u du )] u dv Maximum tail length 2πn ln n Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 19 / 45
20 First data set p = = (2)(50021) + 1 ( safe prime ) p = = (2 3 )(3)(11)(379) + 1 p = = (2 2 )(3)(5)(7)(11)(23) + 1 For each g = 1, 2,..., p 1 we build the graph. Then we compute measurements over all graphs. The original code was written in C++ by Daniel Cloutier (2006), using the RHIT parallel cluster. There were later revisions by Nathan Lindle (2008) and by Andrew Hoffman and Marc Mace (2009). Result Arbitrary random graphs aren t a good model. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 20 / 45
21 Next Step So what is a better model? We will use some number theory(!) to understand why DEFG s aren t quite as random as the graphs we have analyzed so far. We need to account for a little bit more structure. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 21 / 45
22 m-ary Functional Graphs Let φ(k) = # {1 c k gcd(c, k) = 1} be the Euler phi function. Proposition If m (p 1) then there are φ( p 1 m ) m-ary functional graphs produced by varying g for a given p. Furthermore, the values of g that produce an m-ary graph are precisely those for which g is a strictly perfect mth power modulo p. Proof (sketch). Fix a primitive root r. Then g is a strictly perfect mth power modulo p iff g = r a and m = gcd(a, p 1). If y = r b, then g x = r ax y = r b mod p iff ax b mod p 1. This has m solutions if m b and no solutions otherwise, so the graph is m-ary. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 22 / 45
23 Image Nodes Proposition The number of image nodes in an m-ary functional graph with p 1 nodes is exactly p 1 m. Proof. In any finite directed graph, the sum of the in-degrees equals the sum of the out-degrees. In a functional graph, the sum of the out-degrees equals the number of nodes. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 23 / 45
24 Permutation Measurements: Means (Standard Results from Literature) The expected mean values for the measurements of interest in a random unary functional graph (permutation) of size n are: Number of components = n i=1 1 i = Ψ(n + 1) + γ ln n + γ Average cycle length = n Maximum cycle length c 2 n n c 2 = 0 [ ( 1 exp v e u du )] u dv where Ψ(x) = d dx ln(γ(x)). Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 24 / 45
25 Example: x 5 x mod 23 Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 25 / 45
26 Permutation Measurements: Variances (Standard Results from Literature) The expected variances for the measurements of interest in a random unary functional graph (permutation) of size n are: Number of components = Ψ(n + 1) + Ψ (n + 1) + γ π2 6 ln n + γ π2 6 Average cycle length = n Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 26 / 45
27 Binary Functional Graphs For binary functional graphs, not all of the results we need seem to be in the literature. A general technique was given by Flajolet and Odlyzko: Explicitly define the structure. Convert to exponential generating functions. Mark the structures of interest. Compute expected value generating functions. Perform automatic singularity analysis to get asymptotic form of coefficients. Normalize. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 27 / 45
28 Example: x 3 x mod 23 Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 28 / 45
29 Singularity Analysis How do we get information about the coefficients of generating functions? One way is to use complex analysis, which leads to theorems such as: Notation If f (x) is a generating function, [x n ]f (x) is the coefficient of x n in f (x). Theorem (Example of a Transfer Theorem ) Let α R \ {0, 1, 2, 3, }. Then [x n ](1 x) α n α 1 Γ( α). We did automatic analysis using a Maple package. (Flajolet, Salvy, Zimmerman, et al.) It applies transfer theorems to convert the type of singularity to the asymptotics of the coefficients. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 29 / 45
30 Example of Singularity Analysis Let f (x) = 1 1 2x 2 = (1 2x 2 ) 1/2. Let z = 2x 2, so [z n ](1 z) 1/2 = [2 n x 2n ](1 2x 2 ) 1/2. Now [z n ](1 z) 1/2 n 1/2 Γ(1/2) = 1 πn, so [x 2n ](1 2x 2 ) 1/2 2n πn, and the number of bfg s with n nodes is [ ] x n 2 n/2 n! n even f (x) πn/2 n! 0 n odd. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 30 / 45
31 Alternative Technique In some cases a more precise technique was also used: Explicitly define the structure. Convert to exponential generating functions. Mark the structures of interest. Compute expected value generating functions. Obtain DEs whose solutions are the generating functions. Use the DEs to find recurrence relations. Solve the recurrence relations. Normalize. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 31 / 45
32 Example of Converting to a Recurrence Relation Let f (x) = 1 1 2x 2 = (1 2x 2 ) 1/2 again. so If f (x) = f (x) = 2 2x (1 2x 2 = ) 3/2 1 2x 2 f (x), (1 2x 2 )f (x) = 2xf (x). b i x i, then f (x) = ib i x i 1, so i=0 i=1 2 jb j 1 x j = j=1 b j+1 x j, j=0 and we can extract the recurrence relation: b n+2 = 2n + 2 n + 2 b n, b 0 = 1, b 1 = 0. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 32 / 45
33 Example of Converting to a Recurrence Relation, cont. The solution to is b n+2 = 2n + 2 n + 2 b n, b 0 = 1, b 1 = 0 n! ( [x n n ]f (x) = b n = 2)! 2 2 n/2 n even 0 n odd. Again, Maple can do all of this automatically. The two methods agree: The total number of (labeled) binary functional graphs of size n is ( n 2 n! ) 2! 2 2 n/2 n! 2 n/2. πn/2 Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 33 / 45
34 BFG Measurements: Means (Dan Cloutier, 2006 and Nathan Lindle, 2008) The expected mean values for the measurements of interest in a random binary functional graph of size n are: ( ) ( 1 n Number of components = Ψ ln (2n) + γ 2 Number of cyclic nodes = ) + πγ( n 2 + 1) Γ( n ) Γ( n ) πn/2 1 ( ) 1 γ + ln(2) 2 Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 34 / 45
35 BFG Measurements: Means (II) Average cycle length = ( 1 2 ) πγ( n 2 + 1) Γ( n ) πn/8 πγ(2 + n 2 Average tail length = ) nγ( n ) Γ( n ) nγ( n ) πn/8 Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 35 / 45
36 BFG Measurements: Means (III) (Cloutier, 2006) Maximum cycle length c 1 πn n c 1 = 0 [ ( 1 exp v e u du )] u dv (Holden, 2009) Maximum tail length 2πn ln 2 ln n 2 2 γ ln n.5 ln n Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 36 / 45
37 BFG Measurements: Variances (Nathan Lindle, 2008) The expected variances for the measurements of interest in a random binary functional graph of size n are: Number of components = 1 2 Ψ ( n ) + 2 ln(n) ln(2)2 2γ ln(2) γ 2 4 Number of cyclic nodes ( ) 1 γ + ln(2) γ2 + γ ln(2) + ln(2) 2 + n/2 1 = 2Γ( n )2 + 4 n 2 Γ( n )2 πγ( n 2 + 1)Γ( n ) πγ( n 2 + 1)2 Γ( n )2 ( 2 π ) 2πn n + 2 π l=0 Ψ(l ) (2l + 1) 1 ( n 4 Ψ ) 2 2 Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 37 / 45
38 BFG Measurements: Variances (II) Average cycle length = 1 ( 3πΓ( n 2 + 1)2 6 πγ( n 2 + 1)Γ( n ) + 16 n 2 Γ( n )2 + 8Γ( n )2 ) 12 Γ( n )2 ( 2 3 π ) 2πn n π 16 Average tail length = 1 (18Γ( n ) + 8Γ( n ) n 2 9 n 2 6 ( n 2 )Γ( n ) πγ( n 2 + 1) 9 πγ( n 2 + 1)) ( πγ( n 2 + 1) + n 2 πγ( n 2 + 1) 2Γ( n ))2 ( n 2 )2 Γ( n )2 1 4 ( 2 3 π ) n 8 2πn π 16 Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 38 / 45
39 Ternary Functional Graphs For ternary functional graphs, a slightly different technique was used: Explicitly define the structure. Convert to exponential generating functions. Mark the structures of interest. Compute expected value generating functions. Obtain DEs whose solutions are the generating functions. Use the DEs to find recurrence relations. Recursively compute expected values. Normalize. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 39 / 45
40 TFG Structure A ternary functional graph (tfg) is a set of components. Each component is a cycle of nodes, each of which is connected to two ternary trees. A ternary tree consists of either a root node or a root node and three interchangeable nonempty ternary tree branches. Shorthand: TernFunGraph = set(components) Component = cycle(node*set(terntree, cardinality=2) TernTree = Node + Node*set(TernTree, cardinality = 3) Node = Atomic Unit Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 40 / 45
41 Convert to Generating Functions f (z) = e c(z) c(z) = ln 1 1 z 2 t2 (z) (Ternary functional graphs) (Connected components) t(z) = z + 1 3! zt3 (z) (Ternary trees) Note the increasing difficulty in solving explicitly for the tree function. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 41 / 45
42 TFG Generating Functions The expected mean values for the measurements of interest in a random ternary functional graph of size n are given by the following generating functions: (Max Brugger and Christina Frederick, 2007) [ ] Number of components: u euc(z) u=1 ( ) Number of cyclic nodes: (Brugger, 2008) Average tail length: u eln [ u uzt2 (z) u=1 zut(z) ( zt2 (z) ) 2 ( uzt2 (z) ) ] u=1 Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 42 / 45
43 TFG Generating Functions (II) For the following measurements, a double marking technique was used: (Brugger and Frederick, 2007) [ ( )] 2 1 Average component size: u w ec(z) ln uwzt2 (uwz) [ ( )] 2 1 Average cycle length: u w ec(z) ln uwzt2 (wz) u=1,w=1 u=1,w=1 Generating functions for maximum measurements have not yet been derived in the ternary case. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 43 / 45
44 Next Question How do the actual discrete exponentiation functional graphs compare with this model? We will look at the collected data and some statistical analysis. Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 44 / 45
45 Thanks! Joshua Holden (RHIT) Mapping the Discrete Logarithm: Talk 2 45 / 45
The Discrete Logarithm Problem and Ternary Functional Graphs
Rose-Hulman Institute of Technology Rose-Hulman Scholar Mathematical Sciences Technical Reports (MSTR) Mathematics 8-5-2007 The Discrete Logarithm Problem and Ternary Functional Graphs Max F. Brugger Oregon
More informationThe Discrete Logarithm Problem and Ternary Functional Graphs
The Discrete Logarithm Problem and Ternary Functional Graphs Max F. Brugger Christina A. Frederick August 5, 2007 Abstract Encryption is essential to the security of transactions and communications, but
More informationCombinatorial Enumeration. Jason Z. Gao Carleton University, Ottawa, Canada
Combinatorial Enumeration Jason Z. Gao Carleton University, Ottawa, Canada Counting Combinatorial Structures We are interested in counting combinatorial (discrete) structures of a given size. For example,
More informationk-protected VERTICES IN BINARY SEARCH TREES
k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from
More informationNotes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.
Lecture: Hélène Barcelo Analytic Combinatorics ECCO 202, Bogotá Notes by Zvi Rosen. Thanks to Alyssa Palfreyman for supplements.. Tuesday, June 2, 202 Combinatorics is the study of finite structures that
More informationGenerating Functions
Semester 1, 2004 Generating functions Another means of organising enumeration. Two examples we have seen already. Example 1. Binomial coefficients. Let X = {1, 2,..., n} c k = # k-element subsets of X
More informationMath 2: Algebra 2, Geometry and Statistics Ms. Sheppard-Brick Chapter 4 Test Review
Chapter 4 Test Review Students will be able to (SWBAT): Write an explicit and a recursive function rule for a linear table of values. Write an explicit function rule for a quadratic table of values. Determine
More informationGENERATING FUNCTIONS AND CENTRAL LIMIT THEOREMS
GENERATING FUNCTIONS AND CENTRAL LIMIT THEOREMS Michael Drmota Institute of Discrete Mathematics and Geometry Vienna University of Technology A 1040 Wien, Austria michael.drmota@tuwien.ac.at http://www.dmg.tuwien.ac.at/drmota/
More information2.6 Logarithmic Functions. Inverse Functions. Question: What is the relationship between f(x) = x 2 and g(x) = x?
Inverse Functions Question: What is the relationship between f(x) = x 3 and g(x) = 3 x? Question: What is the relationship between f(x) = x 2 and g(x) = x? Definition (One-to-One Function) A function f
More informationCombinatorial/probabilistic analysis of a class of search-tree functionals
Combinatorial/probabilistic analysis of a class of search-tree functionals Jim Fill jimfill@jhu.edu http://www.mts.jhu.edu/ fill/ Mathematical Sciences The Johns Hopkins University Joint Statistical Meetings;
More informationDifferentiation Shortcuts
Differentiation Shortcuts Sections 10-5, 11-2, 11-3, and 11-4 Prof. Nathan Wodarz Math 109 - Fall 2008 Contents 1 Basic Properties 2 1.1 Notation............................... 2 1.2 Constant Functions.........................
More informationApplications of Number Theory in Statistics
Bonfring International Journal of Data Mining, Vol. 2, No., September 202 Applications of Number Theory in Statistics A.M.S. Ramasamy Abstract--- There have been several fascinating applications of Number
More informationCOS597D: Information Theory in Computer Science October 5, Lecture 6
COS597D: Information Theory in Computer Science October 5, 2011 Lecture 6 Lecturer: Mark Braverman Scribe: Yonatan Naamad 1 A lower bound for perfect hash families. In the previous lecture, we saw that
More informationLesson 18: Problem Set Sample Solutions
Problem Set Sample Solutions Problems 5 7 serve to review the process of computing f(g(x)) for given functions f and g in preparation for work with inverses of functions in Lesson 19. 1. Sketch the graphs
More informationSkill 6 Exponential and Logarithmic Functions
Skill 6 Exponential and Logarithmic Functions Skill 6a: Graphs of Exponential Functions Skill 6b: Solving Exponential Equations (not requiring logarithms) Skill 6c: Definition of Logarithms Skill 6d: Graphs
More information5. Analytic Combinatorics
ANALYTIC COMBINATORICS P A R T O N E 5. Analytic Combinatorics http://aofa.cs.princeton.edu Analytic combinatorics is a calculus for the quantitative study of large combinatorial structures. Features:
More information1 Structure of Finite Fields
T-79.5501 Cryptology Additional material September 27, 2005 1 Structure of Finite Fields This section contains complementary material to Section 5.2.3 of the text-book. It is not entirely self-contained
More informationFinite Fields. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay
1 / 25 Finite Fields Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay September 25, 2014 2 / 25 Fields Definition A set F together
More informationCalculus I Sample Exam #01
Calculus I Sample Exam #01 1. Sketch the graph of the function and define the domain and range. 1 a) f( x) 3 b) g( x) x 1 x c) hx ( ) x x 1 5x6 d) jx ( ) x x x 3 6 . Evaluate the following. a) 5 sin 6
More informationHMMT February 2018 February 10, 2018
HMMT February 018 February 10, 018 Algebra and Number Theory 1. For some real number c, the graphs of the equation y = x 0 + x + 18 and the line y = x + c intersect at exactly one point. What is c? 18
More informationCookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems!
Cookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems! Murat Koloğlu, Gene Kopp, Steven J. Miller and Yinghui Wang http://www.williams.edu/mathematics/sjmiller/public html Smith College, January
More informationA first order divided difference
A first order divided difference For a given function f (x) and two distinct points x 0 and x 1, define f [x 0, x 1 ] = f (x 1) f (x 0 ) x 1 x 0 This is called the first order divided difference of f (x).
More informationMATH 363: Discrete Mathematics
MATH 363: Discrete Mathematics Learning Objectives by topic The levels of learning for this class are classified as follows. 1. Basic Knowledge: To recall and memorize - Assess by direct questions. The
More informationFirst-Order Logic. 1 Syntax. Domain of Discourse. FO Vocabulary. Terms
First-Order Logic 1 Syntax Domain of Discourse The domain of discourse for first order logic is FO structures or models. A FO structure contains Relations Functions Constants (functions of arity 0) FO
More informationTHE DEGREE DISTRIBUTION OF RANDOM PLANAR GRAPHS
THE DEGREE DISTRIBUTION OF RANDOM PLANAR GRAPHS Michael Drmota joint work with Omer Giménez and Marc Noy Institut für Diskrete Mathematik und Geometrie TU Wien michael.drmota@tuwien.ac.at http://www.dmg.tuwien.ac.at/drmota/
More informationAn Introduction to Combinatorial Species
An Introduction to Combinatorial Species Ira M. Gessel Department of Mathematics Brandeis University Summer School on Algebraic Combinatorics Korea Institute for Advanced Study Seoul, Korea June 14, 2016
More informationCookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems!
Cookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems! Olivial Beckwith, Murat Koloğlu, Gene Kopp, Steven J. Miller and Yinghui Wang http://www.williams.edu/mathematics/sjmiller/public html Colby
More information1 Review of di erential calculus
Review of di erential calculus This chapter presents the main elements of di erential calculus needed in probability theory. Often, students taking a course on probability theory have problems with concepts
More informationExamples 2: Composite Functions, Piecewise Functions, Partial Fractions
Examples 2: Composite Functions, Piecewise Functions, Partial Fractions September 26, 206 The following are a set of examples to designed to complement a first-year calculus course. objectives are listed
More informationLogarithms Dr. Laura J. Pyzdrowski
1 Names: (8 communication points) About this Laboratory An exponential function of the form f(x) = a x, where a is a positive real number not equal to 1, is an example of a one-to-one function. This means
More informationCookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems!
Cookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems! Murat Koloğlu, Gene Kopp, Steven J. Miller and Yinghui Wang http://www.williams.edu/mathematics/sjmiller/public html College of the Holy Cross,
More informationCSCE 750 Final Exam Answer Key Wednesday December 7, 2005
CSCE 750 Final Exam Answer Key Wednesday December 7, 2005 Do all problems. Put your answers on blank paper or in a test booklet. There are 00 points total in the exam. You have 80 minutes. Please note
More informationMathematics 426 Robert Gross Homework 9 Answers
Mathematics 4 Robert Gross Homework 9 Answers. Suppose that X is a normal random variable with mean µ and standard deviation σ. Suppose that PX > 9 PX
More informationNumber Theory. Modular Arithmetic
Number Theory The branch of mathematics that is important in IT security especially in cryptography. Deals only in integer numbers and the process can be done in a very fast manner. Modular Arithmetic
More informationChapter 3. Formal Number Theory
Chapter 3. Formal Number Theory 1. An Axiom System for Peano Arithmetic (S) The language L A of Peano arithmetic has a constant 0, a unary function symbol, a binary function symbol +, binary function symbol,
More informationDe part en retraite de Pierre
Introduction Combinatorics Generating Series Oracle Conclusion De part en retraite de Pierre Villetaneuse, fe vrier 2013 1 / 41 De part en retraite de Pierre Introduction Combinatorics Generating Series
More informationName: Partners: PreCalculus. Review 5 Version A
Name: Partners: PreCalculus Date: Review 5 Version A [A] Circle whether each statement is true or false. 1. 3 log 3 5x = 5x 2. log 2 16 x+3 = 4x + 3 3. ln x 6 + ln x 5 = ln x 30 4. If ln x = 4, then e
More information9/21/17. Functions. CS 220: Discrete Structures and their Applications. Functions. Chapter 5 in zybooks. definition. definition
Functions CS 220: Discrete Structures and their Applications Functions Chapter 5 in zybooks A function maps elements from one set X to elements of another set Y. A B Brian C Drew range: {A, B, D} Alan
More informationAlgorithms: Background
Algorithms: Background Amotz Bar-Noy CUNY Amotz Bar-Noy (CUNY) Algorithms: Background 1 / 66 What is a Proof? Definition I: The cogency of evidence that compels acceptance by the mind of a truth or a fact.
More informationBT Research at Martlesham, Suffolk
Connectivity of random graphs Keith Briggs Keith.Briggs@bt.com research.btexact.com/teralab/keithbriggs.html Alan Turing Institute 2004 November 19 1330 typeset 2004 November 17 10:55 in pdflatex on a
More informationCS 220: Discrete Structures and their Applications. Functions Chapter 5 in zybooks
CS 220: Discrete Structures and their Applications Functions Chapter 5 in zybooks Functions A function maps elements from one set X to elements of another set Y. A Brian Drew Alan Ben B C D F range: {A,
More informationPrime Labeling of Small Trees with Gaussian Integers
Rose-Hulman Undergraduate Mathematics Journal Volume 17 Issue 1 Article 6 Prime Labeling of Small Trees with Gaussian Integers Hunter Lehmann Seattle University Andrew Park Seattle University Follow this
More informationOn the parity of the Wiener index
On the parity of the Wiener index Stephan Wagner Department of Mathematical Sciences, Stellenbosch University, Stellenbosch 7602, South Africa Hua Wang Department of Mathematics, University of Florida,
More informationQuasi-reducible Polynomials
Quasi-reducible Polynomials Jacques Willekens 06-Dec-2008 Abstract In this article, we investigate polynomials that are irreducible over Q, but are reducible modulo any prime number. 1 Introduction Let
More informationCMPSCI 250: Introduction to Computation. Lecture #11: Equivalence Relations David Mix Barrington 27 September 2013
CMPSCI 250: Introduction to Computation Lecture #11: Equivalence Relations David Mix Barrington 27 September 2013 Equivalence Relations Definition of Equivalence Relations Two More Examples: Universal
More informationEnumerating connected labelled graphs
Enumerating connected labelled graphs Keith Briggs Keith.Briggs@bt.com more.btexact.com/people/briggsk2/ 2004 August 17 conn-lab-graphs.tex typeset 2004 August 17 10:40 in pdflatex on a linux system Enumerating
More informationCombinatorics of non-associative binary operations
Combinatorics of non-associative binary operations Jia Huang University of Nebraska at Kearney E-mail address: huangj2@unk.edu December 26, 2017 This is joint work with Nickolas Hein (Benedictine College),
More informationA Library of Functions
LibraryofFunctions.nb 1 A Library of Functions Any study of calculus must start with the study of functions. Functions are fundamental to mathematics. In its everyday use the word function conveys to us
More informationFighting Fish: enumerative properties. Enrica Duchi. Veronica Guerrini & Simone Rinaldi DIISM, Università di Siena.
Fighting Fish: enumerative properties Enrica Duchi IRIF, Université Paris Diderot Veronica Guerrini & Simone Rinaldi DIISM, Università di Siena Gilles Schaeffer LIX, CNRS and École Polytechnique Séminaire
More informationA note on the Isomorphism Problem for Monomial Digraphs
A note on the Isomorphism Problem for Monomial Digraphs Aleksandr Kodess Department of Mathematics University of Rhode Island kodess@uri.edu Felix Lazebnik Department of Mathematical Sciences University
More informationPart IA Probability. Theorems. Based on lectures by R. Weber Notes taken by Dexter Chua. Lent 2015
Part IA Probability Theorems Based on lectures by R. Weber Notes taken by Dexter Chua Lent 2015 These notes are not endorsed by the lecturers, and I have modified them (often significantly) after lectures.
More informationProbability & Combinatorics Test and Solutions February 18, 2012
1. A standard 12-hour clock has hour, minute, and second hands. How many times do two hands cross between 1:00 and 2:00 (not including 1:00 and 2:00 themselves)? Answer: 119 Solution: We know that the
More informationCMSC Discrete Mathematics SOLUTIONS TO FIRST MIDTERM EXAM October 18, 2005 posted Nov 2, 2005
CMSC-37110 Discrete Mathematics SOLUTIONS TO FIRST MIDTERM EXAM October 18, 2005 posted Nov 2, 2005 Instructor: László Babai Ryerson 164 e-mail: laci@cs This exam contributes 20% to your course grade.
More informationCOUNTING WITH AB-BA=1
COUNTING WITH AB-BA=1 PHILIPPE FLAJOLET, ROCQUENCOURT & PAWEL BLASIAK, KRAKÓW COMBINATORIAL MODELS OF ANNIHILATION-CREATION ; IN PREP. (2010) 1 A. = + + B. = 2 Annihilation and Creation A = Annihilate
More informationChapter Generating Functions
Chapter 8.1.1-8.1.2. Generating Functions Prof. Tesler Math 184A Fall 2017 Prof. Tesler Ch. 8. Generating Functions Math 184A / Fall 2017 1 / 63 Ordinary Generating Functions (OGF) Let a n (n = 0, 1,...)
More informationCS294: Pseudorandomness and Combinatorial Constructions September 13, Notes for Lecture 5
UC Berkeley Handout N5 CS94: Pseudorandomness and Combinatorial Constructions September 3, 005 Professor Luca Trevisan Scribe: Gatis Midrijanis Notes for Lecture 5 In the few lectures we are going to look
More information*Generating Function Topics
CHAPTER 11 *Generating Function Topics Introduction The four sections in this chapter deal with four distinct topics: systems of recursions, exponential generating functions, Pólya s Theorem and asymptotics
More informationWeek 4-5: Binary Relations
1 Binary Relations Week 4-5: Binary Relations The concept of relation is common in daily life and seems intuitively clear. For instance, let X be the set of all living human females and Y the set of all
More informationDefinition: A binary relation R from a set A to a set B is a subset R A B. Example:
Chapter 9 1 Binary Relations Definition: A binary relation R from a set A to a set B is a subset R A B. Example: Let A = {0,1,2} and B = {a,b} {(0, a), (0, b), (1,a), (2, b)} is a relation from A to B.
More informationCookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems!
Cookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems! Steven J. Miller (MC 96) http://www.williams.edu/mathematics/sjmiller/public_html Yale University, April 14, 2014 Introduction Goals of the
More informationMaximising the number of induced cycles in a graph
Maximising the number of induced cycles in a graph Natasha Morrison Alex Scott April 12, 2017 Abstract We determine the maximum number of induced cycles that can be contained in a graph on n n 0 vertices,
More informationOn the number of matchings of a tree.
On the number of matchings of a tree. Stephan G. Wagner Department of Mathematics, Graz University of Technology, Steyrergasse 30, A-800 Graz, Austria Abstract In a paper of Klazar, several counting examples
More informationAlgorithms for Combinatorial Systems: Between Analytic Combinatorics and Species Theory.
Algorithms for Combinatorial Systems: Between Analytic Combinatorics and Species Theory. Carine Pivoteau - LIGM - december 2011 joint work with Bruno Salvy and Michèle Soria Algorithms for Combinatorial
More informationDistribution of the Number of Encryptions in Revocation Schemes for Stateless Receivers
Discrete Mathematics and Theoretical Computer Science DMTCS vol. subm., by the authors, 1 1 Distribution of the Number of Encryptions in Revocation Schemes for Stateless Receivers Christopher Eagle 1 and
More informationGroups, Rings, and Finite Fields. Andreas Klappenecker. September 12, 2002
Background on Groups, Rings, and Finite Fields Andreas Klappenecker September 12, 2002 A thorough understanding of the Agrawal, Kayal, and Saxena primality test requires some tools from algebra and elementary
More informationMULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
Calculus I - Homework Chapter 2 Name MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. Determine whether the graph is the graph of a function. 1) 1)
More informationOn The Weights of Binary Irreducible Cyclic Codes
On The Weights of Binary Irreducible Cyclic Codes Yves Aubry and Philippe Langevin Université du Sud Toulon-Var, Laboratoire GRIM F-83270 La Garde, France, {langevin,yaubry}@univ-tln.fr, WWW home page:
More informationDISCRETE AND ALGEBRAIC STRUCTURES
DISCRETE AND ALGEBRAIC STRUCTURES Master Study Mathematics MAT40 Winter Semester 015/16 (Due to organisational reasons register for the course at TU and KFU) Edited by Mihyun Kang TU Graz Contents I Lectures
More informationPOD. A) Graph: y = 2e x +2 B) Evaluate: (e 2x e x ) 2 2e -x. e 7x 2
POD A) Graph: y = 2e x +2 B) Evaluate: (e 2x e x ) 2 2e -x e 7x 2 4.4 Evaluate Logarithms & Graph Logarithmic Functions What is a logarithm? How do you read it? What relationship exists between logs and
More informationDerangements with an additional restriction (and zigzags)
Derangements with an additional restriction (and zigzags) István Mező Nanjing University of Information Science and Technology 2017. 05. 27. This talk is about a class of generalized derangement numbers,
More informationC3 Revision Questions. (using questions from January 2006, January 2007, January 2008 and January 2009)
C3 Revision Questions (using questions from January 2006, January 2007, January 2008 and January 2009) 1 2 1. f(x) = 1 3 x 2 + 3, x 2. 2 ( x 2) (a) 2 x x 1 Show that f(x) =, x 2. 2 ( x 2) (4) (b) Show
More informationHomework 10 (due December 2, 2009)
Homework (due December, 9) Problem. Let X and Y be independent binomial random variables with parameters (n, p) and (n, p) respectively. Prove that X + Y is a binomial random variable with parameters (n
More informationRecitation 2: Probability
Recitation 2: Probability Colin White, Kenny Marino January 23, 2018 Outline Facts about sets Definitions and facts about probability Random Variables and Joint Distributions Characteristics of distributions
More informationMASTERS EXAMINATION IN MATHEMATICS
MASTERS EXAMINATION IN MATHEMATICS PURE MATHEMATICS OPTION FALL 2007 Full points can be obtained for correct answers to 8 questions. Each numbered question (which may have several parts) is worth the same
More informationNetworks: Lectures 9 & 10 Random graphs
Networks: Lectures 9 & 10 Random graphs Heather A Harrington Mathematical Institute University of Oxford HT 2017 What you re in for Week 1: Introduction and basic concepts Week 2: Small worlds Week 3:
More informationEvidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs
Evidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs Jonah Brown-Cohen 1 Introduction The Diffie-Hellman protocol was one of the first methods discovered for two people, say Alice
More informationare the q-versions of n, n! and . The falling factorial is (x) k = x(x 1)(x 2)... (x k + 1).
Lecture A jacques@ucsd.edu Notation: N, R, Z, F, C naturals, reals, integers, a field, complex numbers. p(n), S n,, b(n), s n, partition numbers, Stirling of the second ind, Bell numbers, Stirling of the
More informationTHE NUMBER OF INDEPENDENT DOMINATING SETS OF LABELED TREES. Changwoo Lee. 1. Introduction
Commun. Korean Math. Soc. 18 (2003), No. 1, pp. 181 192 THE NUMBER OF INDEPENDENT DOMINATING SETS OF LABELED TREES Changwoo Lee Abstract. We count the numbers of independent dominating sets of rooted labeled
More informationFrom Fibonacci Numbers to Central Limit Type Theorems
From Fibonacci Numbers to Central Limit Type Theorems Murat Koloğlu, Gene Kopp, Steven J. Miller and Yinghui Wang Williams College, October 1st, 010 Introduction Previous Results Fibonacci Numbers: F n+1
More informationFunction Practice. 1. (a) attempt to form composite (M1) (c) METHOD 1 valid approach. e.g. g 1 (5), 2, f (5) f (2) = 3 A1 N2 2
1. (a) attempt to form composite e.g. ( ) 3 g 7 x, 7 x + (g f)(x) = 10 x N (b) g 1 (x) = x 3 N1 1 (c) METHOD 1 valid approach e.g. g 1 (5),, f (5) f () = 3 N METHOD attempt to form composite of f and g
More informationSpectra of Semidirect Products of Cyclic Groups
Spectra of Semidirect Products of Cyclic Groups Nathan Fox 1 University of Minnesota-Twin Cities Abstract The spectrum of a graph is the set of eigenvalues of its adjacency matrix A group, together with
More informationSection Summary. Relations and Functions Properties of Relations. Combining Relations
Chapter 9 Chapter Summary Relations and Their Properties n-ary Relations and Their Applications (not currently included in overheads) Representing Relations Closures of Relations (not currently included
More informationWeek 4-5: Binary Relations
1 Binary Relations Week 4-5: Binary Relations The concept of relation is common in daily life and seems intuitively clear. For instance, let X be the set of all living human females and Y the set of all
More informationPollard s Rho Algorithm for Elliptic Curves
November 30, 2015 Consider the elliptic curve E over F 2 k, where E = n. Assume we want to solve the elliptic curve discrete logarithm problem: find k in Q = kp. Partition E into S 1 S 2 S 3, where the
More information2 Functions of random variables
2 Functions of random variables A basic statistical model for sample data is a collection of random variables X 1,..., X n. The data are summarised in terms of certain sample statistics, calculated as
More informationName (print): Question 4. exercise 1.24 (compute the union, then the intersection of two sets)
MTH299 - Homework 1 Question 1. exercise 1.10 (compute the cardinality of a handful of finite sets) Solution. Write your answer here. Question 2. exercise 1.20 (compute the union of two sets) Question
More informationReexam in Discrete Mathematics
Reexam in Discrete Mathematics First Year at the Faculty of Engineering and Science and the Technical Faculty of IT and Design August 15th, 2017, 9.00-13.00 This exam consists of 11 numbered pages with
More informationSection 6.1: Composite Functions
Section 6.1: Composite Functions Def: Given two function f and g, the composite function, which we denote by f g and read as f composed with g, is defined by (f g)(x) = f(g(x)). In other words, the function
More informationSRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY COIMBATORE Discrete Mathematics Functions
1 SRI RAMAKRISHNA INSTITUTE OF TECHNOLOGY COIMBATORE 641010 Discrete Mathematics Functions 1. Define function. Let X and Y be any two sets. A relation f from X to Y is called a function if for every x
More informationAlgebra: Groups. Group Theory a. Examples of Groups. groups. The inverse of a is simply a, which exists.
Group Theory a Let G be a set and be a binary operation on G. (G, ) is called a group if it satisfies the following. 1. For all a, b G, a b G (closure). 2. For all a, b, c G, a (b c) = (a b) c (associativity).
More informationRandom Boolean expressions
Random Boolean expressions Danièle Gardy PRiSM, Univ. Versailles-Saint Quentin and CNRS UMR 8144. Daniele.Gardy@prism.uvsq.fr We examine how we can define several probability distributions on the set of
More informationMath 262A Lecture Notes - Nechiporuk s Theorem
Math 6A Lecture Notes - Nechiporuk s Theore Lecturer: Sa Buss Scribe: Stefan Schneider October, 013 Nechiporuk [1] gives a ethod to derive lower bounds on forula size over the full binary basis B The lower
More informationUse a graphing utility to approximate the real solutions, if any, of the equation rounded to two decimal places. 4) x3-6x + 3 = 0 (-5,5) 4)
Advanced College Prep Pre-Calculus Midyear Exam Review Name Date Per List the intercepts for the graph of the equation. 1) x2 + y - 81 = 0 1) Graph the equation by plotting points. 2) y = -x2 + 9 2) List
More informationDesign and Analysis of Algorithms
CSE 101, Winter 2018 Design and Analysis of Algorithms Lecture 5: Divide and Conquer (Part 2) Class URL: http://vlsicad.ucsd.edu/courses/cse101-w18/ A Lower Bound on Convex Hull Lecture 4 Task: sort the
More informationCoding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013
Coding Theory and Applications Solved Exercises and Problems of Cyclic Codes Enes Pasalic University of Primorska Koper, 2013 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a collection of solved
More informationA Generic Approach for the Unranking of Labeled Combinatorial Classes
A Generic Approach for the Unranking of Labeled Combinatorial Classes Conrado Martínez, Xavier Molinero Departament de Llenguatges i Sistemes Informàtics, Universitat Politècnica de Catalunya, E-08034
More informationECEN 5022 Cryptography
Elementary Algebra and Number Theory University of Colorado Spring 2008 Divisibility, Primes Definition. N denotes the set {1, 2, 3,...} of natural numbers and Z denotes the set of integers {..., 2, 1,
More informationPre-calculus 12 Curriculum Outcomes Framework (110 hours)
Curriculum Outcomes Framework (110 hours) Trigonometry (T) (35 40 hours) General Curriculum Outcome: Students will be expected to develop trigonometric reasoning. T01 Students will be expected to T01.01
More informationCounting false entries in truth tables of bracketed formulae connected by m-implication
arxiv:1034645v1 [mathco] 1 Mar 01 Counting false entries in truth tables of bracketed formulae connected by m-implication Volkan Yildiz ah05146@qmulacuk or vo1kan@hotmailcouk Abstract Inthispaperwecount
More informationSpring 2012 Math 541B Exam 1
Spring 2012 Math 541B Exam 1 1. A sample of size n is drawn without replacement from an urn containing N balls, m of which are red and N m are black; the balls are otherwise indistinguishable. Let X denote
More information