Hamming Weight of the Non-Adjacent-Form under Various Input Statistics. Clemens Heuberger and Helmut Prodinger
|
|
- Bethanie Bell
- 5 years ago
- Views:
Transcription
1 FoSP Algorithmen & mathematische Modellierung FoSP Forschungsschwerpunkt Algorithmen und mathematische Modellierung Hamming Weight of the Non-Adjacent-Form under Various Input Statistics Clemens Heuberger and Helmut Prodinger Project Area(s): Analysis of Digital Expansions with Applications in Cryptography Institut für Optimierung und Diskrete Mathematik (Math B) Report 007-, April 007
2 HAMMING WEIGHT OF THE NON-ADJACENT-FORM UNDER VARIOUS INPUT STATISTICS CLEMENS HEUBERGER AND HELMUT PRODINGER Abstract. The Hamming weight of the non-adjacent form is studied in relation to the Hamming weight of the standard binary expansion. In particular, we investigate the expected Hamming weight of the NAF of a n-digit binary expansion with k ones where k is either fixed or proportional to n. The expected Hamming weight of NAFs of binary expansions with large ( n/) Hamming weight is studied. Finally, the covariance of the Hamming weights of the binary expansion and the NAF is computed. Asymptotically, these Hamming weights become independent and normally distributed.. Introduction Signed digit expansions of low Hamming weight are important in various branches of Mathematics and Computer Science, such as efficient arithmetic [6], coding theory [8], and cryptography [5]. A prominent example is the so-called Non-Adjacent-Form (NAF) which uses the digits 0,, and and base : n m = ε j j j=0 with ε j ε j+ = 0 for all j. It is well-known [6] that every integer admits exactly one such representation and that it minimises the Hamming weight (the number of non-zero digits) over all representations of the same integer with digit 0,, (but without imposing the syntactic restriction). The expected Hamming weight of a non-negative integer less than n is known to be n + O(), cf. for instance [, 5, ]. A more detailed analysis can be found in [7], [8], 3 and [9]. The aim of this paper is to study the expected Hamming weight under more refined input models, for instance: Does the expected Hamming weight increase, if the input is known Date: April, Mathematics Subject Classification. A63; 68W40 68Q45 05A6 05A5. Key words and phrases. Non-adjacent form; binary expansion; Hamming weight; transducer; generating function; Omega operator; singularity analysis; quasi-power theorem; multivariate asymptotics. This paper was written while C. Heuberger was a visitor at the Center of Experimental Mathematics at the University of Stellenbosch. He thanks the center for its hospitality. He is also supported by the Austrian Science Foundation FWF, project S9606, that is part of the Austrian National Research Network Analytic Combinatorics and Probabilistic Number Theory. H. Prodinger is supported by the NRF grant of the South African National Research Foundation and by the Center of Experimental Mathematics of the University of Stellenbosch.
3 CLEMENS HEUBERGER AND HELMUT PRODINGER to have a binary expansion of large Hamming weight? How big is the correlation between the Hamming weights of the binary expansion and the NAF? Are they independent? Obviously, the non-negative integers less than n are exactly those with standard binary expansion of length at most n. We study the expected Hamming weight of the NAF of such an integer under the assumption that its binary expansion has Hamming weight k for k/n in a certain range (Theorem ). For instance, if k/n α, the expected Hamming weight is asymptotically equal to ) 4 ( α ( ) α n. For α = /, this equals n/3 as in the unrestricted case, otherwise, the expected Hamming weight is smaller. If k is fixed and only n tends to infinity, Theorem states that the expected Hamming weight is k + O(/n ). The intuitive explanation is that for k small with respect to n, i.e., the ones in the binary expansion are sparse, the NAF tends to agree with the binary expansion. In Theorem 3, we study the expected Hamming weight under the assumption that the Hamming weight of the binary expansion is large, i.e., at least n/. So these are the worst cases of the binary expansion. The NAF, however, is quite immune: the expected Hamming weight is still asymptotic to n (7 + ( ) n ) 9π n + O ( ). n The difference to the unrestricted input model only occurs in the coefficient of / n. Finally, we consider the Hamming weight of the binary expansion and the Hamming weight of the NAF as a random vector and study their covariance as well as its limiting distribution (Theorem 4). The covariance is ( n ) 3 + O, n which is an order of magnitude smaller than the variances, but still non-zero. Asymptotically, however, the coordinates of the random vector become independent and normally distributed. The methods used include transducer automata and generating functions, in particular bivariate rational generating functions. Asymptotics in the central region are derived via Bender and Richmond s [3, 4] method, in the case of fixed k by singularity analysis as introduced by Flajolet and Odlyzko [6], cf. also the forthcoming book of Flajolet and Sedgewick [7]. For the large input Hamming weight case, MacMahon s Omega operator [4] is used to select the relevant terms of the generating function, cf. also []. The coefficients are again estimated by singularity analysis. Finally, the limiting distribution of the random vector outlined above is derived via a variant of Hwang s [3] quasi-power theorem, cf. [0]. Acknowledgement. The authors thank S. Wagner for fruitful discussions on Theorem.
4 HAMMING WEIGHT OF THE NON-ADJACENT-FORM UNDER VARIOUS INPUT STATISTICS 3. Generating Functions As usual, the unsigned (or standard) binary expansion of an integer m is the unique sequence ε j, j 0, with ε j {0, } such that m = j 0 ε j j. We will sometimes omit the words unsigned or standard and just speak about the binary expansion. The nonadjacent-form (NAF) of an integer m is the unique sequence ε j, j 0, with ε j {, 0, } such that m = j 0 ε j j and ε j ε j+ = 0 for j 0. Existence and uniqueness of the NAF have been proved in [6]. The Hamming weight of an expansion ε j, j 0, is the number of nonzero ε j. Let a kln be the number of nonnegative integers less than n whose unsigned binary expansion has Hamming weight k and whose NAF has Hamming weight l. We consider the generating function G(x, y, z) = a k,l,n x k y l z n. k,l,n 0 To compute G(x, y, z), we use the transducer automaton mapping the unsigned binary expansion of an integer to its NAF. It is shown in Figure (for instance, it is equivalent to the transducer in [, Figure ]). The labels of the states correspond to carries. Note that input and output are read resp. written from right to left. An edge with input Hamming ε ε Figure. Transducer mapping a binary expansion of an integer to its NAF. weight k and output Hamming weight l corresponds to an entry x k y l z in the transition matrix M of this transducer: M = z xz 0 yz 0 xyz. 0 z xz Here, the states have been ordered as 0,.,. Given an integer m less than n, the transducer runs from the initial state 0 to some state reading the n-digit unsigned binary input. If this run ends in some state 0 (representing some carry), the output is not yet finished: If ending in state. or, there is an additional output 0 (corresponding to a contribution y) in both cases. Therefore, the generating function G is given by G(x, y, z) = (, 0, 0)(I M) (, y, y) t, where the superscript t indicates transposition of the vector. This can be evaluated to G(x, y, z) = x y z x yz xyz xz + xyz + x yz 3 + xyz 3 + xz xyz xz z +.
5 4 CLEMENS HEUBERGER AND HELMUT PRODINGER We are interested in b kn := l 0 la kln, which corresponds (after division by the mass M kn = l 0 a kln) to the expected Hamming weight of the NAF of an nonnegative integer less than n with Hamming weight k of its unsigned binary expansion. The generating function k,n 0 b knx k z n can be obtained by differentiating G(x, y, z) with respect to y and setting y = : () G y (x,, z) = b kn x k z n = xz (x z + xz ) (xz + z ) (xz ). k,n 0 The mass M kn = l 0 a kln is the number of n-digit unsigned binary expansions with Hamming weight k, thus ( ) n M kn =. k Of course, this corresponds to M kn x k z n = G(x,, z) = z xz k,n 0 which is the generating function of the binomial coefficients by the recursion of Pascal s triangle. In Section 3, we need a quite trivial lower bound for b kn, which shall be derived at this point. Lemma.. For n k, the estimate b kn k(n k + ) holds. Proof. Consider the number m j = ( } 0.{{..0} } 0.{{..0} 00 }.{{..00} n j k+ digits j digits k digits for 0 j n k + given by its unsigned binary expansion. The unsigned binary expansion has Hamming weight k and equals the NAF of m j. Thus the m j, 0 j n k +, contribute (n k + )k to b kn. 3. Asymptotics of b kn The aim of this section is to derive an asymptotic expression for b kn /M kn. Theorem. Let 0 < c < d < be real numbers. Then the expected Hamming weight of the NAF of a nonnegative integer less than n with unsigned binary digit expansion of Hamming weight k is asymptotically b kn () 4 ( k n ) M kn ( ) k n, uniformly for c k/n d. n )
6 HAMMING WEIGHT OF THE NON-ADJACENT-FORM UNDER VARIOUS INPUT STATISTICS 5 Remark 3.. If k/n α for a fixed α in the interval (0, ), then the expected Hamming weight of the NAF of a nonnegative integer less than n with unsigned binary digit expansion of Hamming weight k is asymptotically b kn (3) 4 ( ) α M kn ( ) α n. Remark 3.. The coefficient 4 ( α (4) ( ) α attains its maximum /3 for α = /. Note that the average Hamming weight of a NAF of an integer less than n (without restrictions on the input Hamming weight) is also n/3+o(). The intuitive explanation for that is that M αn,n obviously attains its maximum at α = /, and the decrease of M αn,n is sufficient such that all other b αn,n /M αn,n do not influence the overall outcome too much anyway. It is also worth noting that the expression (4) is independent of the sign of (α /), i.e., b αn,n b ( α)n,n. M αn,n M ( α)n,n On the level of generating functions, this corresponds to (b kn b n k,n )x k z n = G y (x,, xz) G y (/x,, xz) = k,n 0 ) (x )z(xz + z + ) (xz + z ) (xz ). Comparing this with (), we note that in the denominator, the factor (xz + z ) only occurs once instead of twice. The main part of the proof relies the following lemma formulated by Drmota [5], which is a combination of results of Bender [3] and Bender and Richmond [4]. Note that the letters k and n have been switched in comparison to [5]. Lemma 3.3. Let c(x, z) = k,n 0 c knx k z n be a generating function of non-negative numbers c kn and let a < b be positive real numbers such that c(x, b + ε) has positive radius of convergence (as a function in x) for some ε > 0. Suppose that ϕ k (z) = n 0 c kn z n a k g(z)λ(z) k (k ) holds uniformly in R(a, b, φ) = {z : a z b, arg(z) φ} for some φ > 0, where a k > 0, g(z) is continuous and non-zero and λ(z) is non-zero and has bounded third derivative d for z R(a, b, φ). Furthermore suppose that log λ(e s ) ds e s =z 0 for z [a, b] and that there exists a δ > 0 such that c(x, z) is analytic and bounded for z [a, b], z / R(a, b, φ), and x ( + δ)/λ( z ). Then d log λ(e s ) ds e s =z > 0 and we have c kn a k g(h(n/k)) πk σ(h(n/k)) λ(h(n/k)) k h(n/k) n
7 6 CLEMENS HEUBERGER AND HELMUT PRODINGER uniformly for n/k [µ(a), µ(b)], where and h(t) is the inverse function of µ(z). µ(z) = d ds log λ(es ) e s =z, ( ) d / σ(z) = ds log λ(es ) e s =z, Proof of Theorem. We split G y (x,, z) into two summands separating the coprime factors depending on x in its denominator: G y (x,, z) = G () (x, z) + G () (x, z), G () (x, z) = xz5 + xz 4 3xz 3 + z 3 + xz z xz + 3z ( z + z ), ( xz ) G () (x, z) = xz5 + z 5 4xz 4 4z 4 + 6xz 3 + 8z 3 6xz 0z + xz + 7z ( z + z ) ( xz z). and b() kn, respec- These auxiliary functions are generating functions of some numbers b () kn tively, i.e., G (j) (x, z) = b (j) kn xk z n k,n 0 for j {, }. Our first aim is to show that the contributions b () kn are asymptotically smaller than b() kn and, in particular, that the b () kn are nonnegative, as required by Lemma 3.3. For fixed z with z <, the function G () (x, z) has a simple pole at x = /z as a function in x, thus the coefficient of x k of G () (x, z) is the negative residue of G () (x, z)/x k+ at x = /z, and we obtain z k [x k ]G () (x, z) = ( z + z ) for k. Extracting the coefficient of z n in this expansion amounts to summing up the contribution of the poles of /( z + z ). Since these are double poles, we obtain (5) b () kn := [zn ][x k ]G () (x, z) = [z n k+ ] = O(n k) ( z + z ) for n k. Together with Lemma. we conclude that b () nk := [xk ][z n ]G () (x, z) 0 for all n 0 for sufficiently large k (a precise evaluation of b () kn would show that k is sufficient, but we do not need this in order to use Lemma 3.3). Furthermore, we see that b () kn = o(b kn) for k. For the analysis of b () nk, we want to apply Lemma 3.3 on G() (x, z). We set b = c and a = d, respectively. This means 0 < a < b <. From this we see that G () (x, b + ε)
8 HAMMING WEIGHT OF THE NON-ADJACENT-FORM UNDER VARIOUS INPUT STATISTICS 7 has a positive radius of convergence, if we choose 0 < ε < b. Extracting the coefficient of x k in G () (x, z) can be done by routine calculations yielding (6) ϕ k (z) = ( z k b () kn zn = z) (z 4 + kz 3 3z 3 kz + 5z + kz 5z + ) ( z) ( z + z n 0 ). Setting λ(z) = z/( z) and yields g(z) = z ( z) ( z + z ) ϕ k (z) kg(z)λ(z) k (k ) uniformly for a < z < b. We note that g(z) is non-zero and continuous for z [a, b] and λ(z) C [a, b]. We have d ds log λ(es ) e s =z = z ( z) 0 for z [a, b]. Thus the assumptions of Lemma 3.3 are satisfied with φ = π (thus the assumption on z [a, b], z / R(a, b, φ) is empty). The quantities involved are We obtain (7) b () kn µ(z) = z, z σ(z) = z, h(t) = t. t n3/ n k k π(n nk + k ) ( n k k ) k ( ) n n n k uniformly for n/k [, ] = a b [, ]. d c An asymptotic formula for the mass M kn can be obtained from Stirling s formula: ( n ) ( ) k n k n n (8) M kn k n k πk(n k) Dividing (7) by (8) yields (), since b kn b () kn. 4. Asymptotics of b kn for fixed k In Theorem, the asymptotics of b kn were derived under the assumption that k and n both tend to infinity at the same speed. The purpose of this section is to derive the same statement for fixed k.
9 8 CLEMENS HEUBERGER AND HELMUT PRODINGER Theorem. Let k be a fixed positive integer. Then the expected Hamming weight of the NAF of a nonnegative integer less than n with unsigned binary digit expansion of Hamming weight k is asymptotically (9) b kn = k k(k 3k + ) + O M kn n ( n + ), 3 n k whereas the expected Hamming weight of the NAF of a nonnegative integer less than n with unsigned binary digit expansion of Hamming weight (n k) is asymptotically b n k,n (0) = (k + ) k ( (k )k(k + ) + O M n k,n n n n + ). 3 n k Proof of Theorem. We only prove (9). The proof of (0) runs along the same lines, it suffices to replace G y (x,, z) by G y (/x,, xz). By (5), we have b kn = [z n ]ϕ k (z) + O(n) = [z n k ] (z4 + kz 3 3z 3 kz + 5z + kz 5z + ) ( z) k+ ( z + z ) + O(n), where ϕ k (z) is given in (6). We extract the asymptotics of b kn by singularity analysis, see Flajolet and Odlyzko [6] and the forthcoming book of Flajolet and Sedgewick [7]. The simple poles at z = ( ± 3)/ give a contribution of O(). Expanding around the pole at z = gives We have b kn = O(n) + [z n k ] ( k( z) k + ( k)( z) k + O( z) k). () [z n ]( sz) α = sn n α Γ( α) ( α(α + ) α(α + )(α + )(3α + ) + + n 4n + α (α + ) (α + )(α + 3) 48n 3 ( )) + O n 4 for α / {0,,,...} by [6, Eqn. (.)]. The function hidden in the O-term is meromorphic, thus its contribution to b kn does not exceed O(n k ) by [6, Theorem ]. We obtain ( ( )) (n k)k k(k + ) b kn = + + 3k4 + 4k 3 5k + 70k 48 + O + O(n). (k )! n 4n n 3 On the other hand, the mass M kn can be estimated as M kn = (n k)k k! ( k(k + ) + + 3k4 + 4k 3 + 9k k + O n 4n ( n 3 )). This yields (9).
10 HAMMING WEIGHT OF THE NON-ADJACENT-FORM UNDER VARIOUS INPUT STATISTICS 9 5. Binary Expansions of Large Weight In this section, we focus on the NAFs of integers with unsigned binary expansions of high weight, in particular, with a weight greater or equal half of the length of the binary expansion. We set c n := b kn, M n := M kn, k n/ k n/ and we are interested in the asymptotic behaviour of c n /M n. Theorem 3. The expected Hamming weight of a nonnegative integer less than n with unsigned binary expansion of weight n/ equals c n () = n M n (7 + ( ) n ) 6 ( + ( )n ) ( ) 9π n 9π n + O. n 3/ The expected Hamming weight of a nonnegative integer less than n with unsigned binary expansion of weight n/ equals (3) n 3 ( + ( )n ) 3 4 n+ π ( )n 8 + ( ) 8( )n + 3π + 7( ) n π 3π 6 +O. nπ 3/ n Remark 5.. If the assumption on the weight of the unsigned binary expansion is removed, then the expected Hamming weight of a nonnegative integer less than n equals n O( n ). This means that only the third order term is influenced by the additional assumption k n/, but for even n, the influence of the assumption k n/ is much larger. Proof of Theorem 3. We focus on the proof of (). The proof of (3) is quite similar, cf. the comments at the end of this proof. We consider G y (λ,, z/λ) = b kn λ k n z n λ 3 z(λ z + z ) = (z )(z + )(zλ λ + z), k,n 0 where z and λ are in neighbourhoods of 0 and, respectively. We want to extract those summands of the power series with k n 0, i.e., nonnegative exponents of λ, and setting λ = afterwards. This amounts to applying MacMahon s [4] Omega operator Ω (cf. Andrews, Paule and Riese []) to G y (λ,, z/λ): ΩG y (λ,, z/λ) = b kn z n = c n z n. n 0 k,n 0 k n 0 However, the Mathematica r package described in [] cannot handle this type of generating function, so we have to apply the Omega operator manually.
11 0 CLEMENS HEUBERGER AND HELMUT PRODINGER We factorise the quadratic term in λ in the denominator of G y (λ,, z/λ) and perform a partial fraction decomposition (in λ) to obtain (4) G y (λ λz +,, z/λ) = (z )(z + ) + 6z6 4wz 4 40z 4 + 3wz + 7z w (z )(z + )(z ) (z + ) (w λz + ) (z w ) z (z )(z + )(z )(z + )(w λz + ) 6z6 + 4wz 4 40z 4 3wz + 7z + w (z )(z + )(z ) (z + ) (w + λz ) (z + w ) z (z )(z + )(z )(z + )(w + λz ), where the abbreviation w := 4z has been used. We now examine every summand in order to see which contributes to non-negative powers of λ. We rewrite the denominators as keeping in mind that w λz + = ( + w) ( = +w) (λz) m λz ( + w) m+, m 0 w + λz = λz ( w λz ) = m 0 ( w) m (λz) m+, λz + w z, w λz z z = z for z 0 and λ. This implies that Ω deletes the last two summands in (4) since these obviously only contribute negative powers of λ, whereas the first three summands are kept with λ replaced by. Thus we have ΩG y (λ,, z/λ) = c n z n z + = (z )(z + ) n 0 + 6z6 4wz 4 40z 4 + 3wz + 7z w (z )(z + )(z ) (z + ) (w z + ) (z w )z (z )(z + )(z )(z + )(w z + ) = (3z ) (z + z ) (z )(z + )(z ) z4 4z 3 4z + z + (z )(z + ) ( 4z ) 3/.
12 HAMMING WEIGHT OF THE NON-ADJACENT-FORM UNDER VARIOUS INPUT STATISTICS We extract the asymptotics of c n by singularity analysis. The dominant singularities are at z = ±/. The local expansions are (5) c n z n = n ( z)/ for z / and (6) c n z n = n 0 39( + z)/ ( z) + ( z) 3/ + 8( z) ( z) ( z)3/ ( + z) / 44 5 ( + z) / 4 5( + z) 8 57( + z)3/ ( z) 43 45( + z) ( z) / 7 + O (( z) 5/) + O (( + z) 5/) for z /. Furthermore, the function hidden in the O-terms is analytic in a camembert-region, whence their contribution to c n does not exceed O(n 7/ ) by [6, Theorem ]. The contributions of the two poles can be added, cf. [7, Theorem VI.5]. Applying () to (5) and (6) yields ( ( ) n (7) c n = n π + ( )n 5 n 6 + π ( )n π 78 π + n 3/ 7 + 9( )n π 7 π n ( )n π 69 π n 5/ We now compute the total mass M n. We have M n = ( ) ( ) n n = [n even] + (( ) ( )) n n + k n/ k n k k n/ k>n/ ( ) n = [n even] + ( ) ( ) n n = [n even] + n. n/ k n/ k 0 We estimate the binomial coefficient by Stirling s formula and obtain ( (8) M n = n + + ( ( )n π n / n + 3/ 6n + 5 ( 5/ 64n + O 7/ Dividing c n by M n yields (). For proving (3), the operator Ω ( )) + O. n 7/ n 9/ ))). has to be applied, which amounts to removing the second and the third summand in (4). The remaining calculation until (7) is very similar, the only difference being that every square root is replaced by its negative. On division by M n as estimated in (8), however, the term of order n does not cancel, and this yields (3).
13 CLEMENS HEUBERGER AND HELMUT PRODINGER 6. Limit Distribution In the previous sections, we studied b kn, i.e., we considered the length n and the weight k of the binary expansion as parameters and studied the (average) weight of the corresponding NAFs. In this section, however, we only consider n as a parameter, and we study the two random variables H(Binary(X n )) and H(NAF(X n )), where X n is a random nonnegative integer less than n, Binary(m) and NAF(m) denote the binary expansion and the NAF of m, respectively, and H( ) denotes the Hamming weight of an expansion. We are interested in the limiting distribution of the random vector V n := (H(Binary(X n )), H(NAF(X n ))) after appropriate rescaling. We use boldface letters for vectors, the components of a vector x are (x, x ), for instance. Inequalities for vectors have to be taken component-wise. Theorem 4. With the notations above, we have E(H(Binary(X n ))) = n, E(H(NAF(X n ))) = n O( n ), Var(H(Binary(X n ))) = n 4, Var(H(NAF(X n ))) = n O(n n ), Cov(H(Binary(X n )), H(NAF(X n ))) = 3 + O(n n ). The random vector V n is asymptotically normal, i.e. ( Vn ( / ) /3 n (9) P n ) ( x = 54 Φ(x 3 ) ( ) 3 )Φ x + O n, where Φ(x) = π x e t / dt is the distribution function of the standard normal distribution. This means that although H(Binary(X n )) and H(NAF(X n )) are correlated, they are asymptotically independent. Their limiting distribution is the product of two normal distributions.
14 HAMMING WEIGHT OF THE NON-ADJACENT-FORM UNDER VARIOUS INPUT STATISTICS 3 Proof of Theorem 4. The joint probability P(V n = (k, l)) is simply a kln / n in the terminology of Section, thus the probability generating function can be computed as P(x, y, z) = P(V n = (k, l))x k y l z n k,l,n 0 = k,l,n 0 a k,l,n x k y l ( z ) n = G(x, y, z/) = (x y z x yz xyz xz + xyz + 4) x yz 3 + xyz 3 + xz 4xyz 4xz 4z + 8. The denominator of P(,, z) factors as ( z)( z)( + z), thus there are analytic functions ρ j (x, y), j {,, 3}, in a neighbourhood of (x, y) = (, ) such that the denominator of P(x, y, z) exactly vanishes for z = ρ j, j {,, 3}, and we have ρ (, ) =, ρ (, ) =, ρ 3 (, ) = 3. The moment generating function of V n can be obtained by extracting the coefficient of z n in P(e s, e s, z) and has the form with E(e Vn,s ) = k,l 0 P(V n = (k, l))e ks +ls = e u(s)n+v(s) ( + O(κ n )) u(s, s ) = log ρ, ( v(s, s ) = log ( es +s ρ es +s ρ + es +s ρ es ρ + e s +s ) ρ + 4) ρ (3e s +s ρ + 3e s +s ρ + 4e s ρ 8e s +s ρ, 4e s 4) κ n = n( ǫ), where ρ = ρ (e s, e s ) for s, s in a neighbourhood of the origin and ε > 0 with min{ ρ (e s, e s ), ρ (e s, e s ) } ε. Differentiating e u(s)n+v(s) and setting (s, s ) = (0, 0) yields (up to a term O( n )) the means ( n E(V n ) t =, n ) t + O( n ) 9 and the matrix of second moments ) E(V n V t n ) = ( n 4 + n 4 n + n Thus the variance-covariance matrix equals n E(V n V t n) E(V n )E(V n ) t = ( n 4 + n n + 0n n O(n n ). ) + O(n n ). By a two-dimensional analogue [0] of Hwang s quasi-power theorem [3], we obtain the central limit law (9).
15 4 CLEMENS HEUBERGER AND HELMUT PRODINGER References. G. E. Andrews, P. Paule, and A. Riese, MacMahon s partition analysis: the Omega package, European J. Combin. (00), S. Arno and F. S. Wheeler, Signed digit representations of minimal hamming weight, IEEE Trans. Comp. 4 (993), E. A. Bender, Central and local limit theorems applied to asymptotic enumeration, J. Combinatorial Theory Ser. A 5 (973), E. A. Bender and L. B. Richmond, Central and local limit theorems applied to asymptotic enumeration. II. Multivariate generating functions, J. Combin. Theory Ser. A 34 (983), M. Drmota, Asymptotic distributions and a multivariate Darboux method in enumeration problems, J. Combin. Theory Ser. A 67 (994), Ph. Flajolet and A. Odlyzko, Singularity analysis of generating functions, SIAM J. Discrete Math. 3 (990), Ph. Flajolet and R. Sedgewick, Analytic combinatorics, in preparation, preprint available at http: //algo.inria.fr/flajolet/publications/. 8. P. J. Grabner, C. Heuberger, and H. Prodinger, Subblock occurrences in signed digit representations, Glasg. Math. J. 45 (003), P. J. Grabner, C. Heuberger, H. Prodinger, and J. Thuswaldner, Analysis of linear combination algorithms in cryptography, ACM Trans. Algorithms (005), C. Heuberger, Hwang s quasi-power-theorem in dimension two, in preparation.. C. Heuberger and H. Prodinger, On minimal expansions in redundant number systems: Algorithms and quantitative analysis, Computing 66 (00), , Analysis of alternative digit sets for nonadjacent representations, Monatsh. Math. 47 (006), H.-K. Hwang, On convergence rates in the central limit theorems for combinatorial structures, European J. Combin. 9 (998), P. A. MacMahon, Combinatory analysis, Cambridge University Press, Cambridge, 95 96, (Reprinted: Chelsea, New York, 960). 5. F. Morain and J. Olivos, Speeding up the computations on an elliptic curve using addition-subtraction chains, RAIRO Inform. Théor. Appl. 4 (990), G. W. Reitwiesner, Binary arithmetic, Advances in computers, vol., Academic Press, New York, 960, pp J. M. Thuswaldner, Summatory functions of digital sums occurring in cryptography, Period. Math. Hungar. 38 (999), J. H. Van Lint, Introduction to coding theory, nd ed., Graduate Texts in Mathematics, vol. 86, Springer, 99. Institut für Mathematik B, Technische Universität Graz, Austria address: clemens.heuberger@tugraz.at Department of Mathematics, University of Stellenbosch, South Africa address: hproding@sun.ac.za
ANALYSIS OF LINEAR COMBINATION ALGORITHMS IN CRYPTOGRAPHY
ANALYSIS OF LINEAR COMBINATION ALGORITHMS IN CRYPTOGRAPHY PETER J. GRABNER, CLEMENS HEUBERGER, HELMUT PRODINGER, AND JÖRG M. THUSWALDNER Abstract. Several cryptosystems rely on fast calculations of linear
More informationTHE ALTERNATING GREEDY EXPANSION AND APPLICATIONS TO COMPUTING DIGIT EXPANSIONS FROM LEFT-TO-RIGHT IN CRYPTOGRAPHY
THE ALTERNATING GREEDY EXPANSION AND APPLICATIONS TO COMPUTING DIGIT EXPANSIONS FROM LEFT-TO-RIGHT IN CRYPTOGRAPHY CLEMENS HEUBERGER, RAJENDRA KATTI, HELMUT PRODINGER, AND XIAOYU RUAN Abstract. The central
More informationANALYSIS OF LINEAR COMBINATION ALGORITHMS IN CRYPTOGRAPHY
Transactions on Algorithms 5), 4 ANALYSIS OF LINEAR COMBINATION ALGORITHMS IN CRYPTOGRAPHY PETER J. GRABNER, CLEMENS HEUBERGER, HELMUT PRODINGER, AND JÖRG M. THUSWALDNER Abstract. Several cryptosystems
More informationMaximizing the number of independent subsets over trees with maximum degree 3. Clemens Heuberger and Stephan G. Wagner
FoSP Algorithmen & mathematische Modellierung FoSP Forschungsschwerpunkt Algorithmen und mathematische Modellierung Maximizing the number of independent subsets over trees with maximum degree 3 Clemens
More informationAdditive irreducibles in α-expansions
Publ. Math. Debrecen Manuscript Additive irreducibles in α-expansions By Peter J. Grabner and Helmut Prodinger * Abstract. The Bergman number system uses the base α = + 5 2, the digits 0 and, and the condition
More informationMINIMAL EXPANSIONS IN REDUNDANT NUMBER SYSTEMS: FIBONACCI BASES AND GREEDY ALGORITHMS. 1. Introduction. ε j G j, n = j 0
To appear in Periodica Mathematica Hungarica MINIMAL EXPANSIONS IN REDUNDANT NUMBER SYSTEMS: FIBONACCI BASES AND GREEDY ALGORITHMS CLEMENS HEUBERGER Dedicated to Helmut Prodinger on the occasion of his
More informationSCALAR MULTIPLICATION ON KOBLITZ CURVES USING THE FROBENIUS ENDOMORPHISM AND ITS COMBINATION WITH POINT HALVING: EXTENSIONS AND MATHEMATICAL ANALYSIS
SCALAR MULTIPLICATION ON KOBLITZ CURVES USING THE FROBENIUS ENDOMORPHISM AND ITS COMBINATION WITH POINT HALVING: EXTENSIONS AND MATHEMATICAL ANALYSIS ROBERTO M. AVANZI, CLEMENS HEUBERGER, AND HELMUT PRODINGER
More informationOn the number of matchings of a tree.
On the number of matchings of a tree. Stephan G. Wagner Department of Mathematics, Graz University of Technology, Steyrergasse 30, A-800 Graz, Austria Abstract In a paper of Klazar, several counting examples
More informationAlmost all trees have an even number of independent sets
Almost all trees have an even number of independent sets Stephan G. Wagner Department of Mathematical Sciences Stellenbosch University Private Bag X1, Matieland 7602, South Africa swagner@sun.ac.za Submitted:
More informationFoSP. FoSP. WARING S PROBLEM WITH DIGITAL RESTRICTIONS IN F q [X] Manfred Madritsch. Institut für Analysis und Computational Number Theory (Math A)
FoSP Algorithmen & mathematische Modellierung FoSP Forschungsschwerpunkt Algorithmen und mathematische Modellierung WARING S PROBLM WITH DIGITAL RSTRICTIONS IN F q [X] Manfred Madritsch Institut für Analysis
More informationCounting Palindromes According to r-runs of Ones Using Generating Functions
3 47 6 3 Journal of Integer Sequences, Vol. 7 (04), Article 4.6. Counting Palindromes According to r-runs of Ones Using Generating Functions Helmut Prodinger Department of Mathematics Stellenbosch University
More informationCounting Palindromes According to r-runs of Ones Using Generating Functions
Counting Palindromes According to r-runs of Ones Using Generating Functions Helmut Prodinger Department of Mathematics Stellenbosch University 7602 Stellenbosch South Africa hproding@sun.ac.za Abstract
More informationDISTRIBUTION RESULTS FOR LOW-WEIGHT BINARY REPRESENTATIONS FOR PAIRS OF INTEGERS
DISTRIBUTION RESULTS FOR LOW-WEIGHT BINARY REPRESENTATIONS FOR PAIRS OF INTEGERS PETER J. GRABNER, CLEMENS HEUBERGER, AND HELMUT PRODINGER Abstract. We discuss an optimal method for the computation of
More informationGrowing and Destroying Catalan Stanley Trees
Discrete Mathematics and Theoretical Computer Science DMTCS vol. 20:1, 2018, #11 Growing and Destroying Catalan Stanley Trees Benjamin Hackl 1 Helmut Prodinger 2 arxiv:1704.03734v3 [math.co] 26 Feb 2018
More informationarxiv: v1 [math.co] 1 Aug 2018
REDUCING SIMPLY GENERATED TREES BY ITERATIVE LEAF CUTTING BENJAMIN HACKL, CLEMENS HEUBERGER, AND STEPHAN WAGNER arxiv:1808.00363v1 [math.co] 1 Aug 2018 ABSTRACT. We consider a procedure to reduce simply
More informationk-protected VERTICES IN BINARY SEARCH TREES
k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from
More informationCOUNTING OPTIMAL JOINT DIGIT EXPANSIONS. Peter J. Grabner 1. Clemens Heuberger 2.
INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 5(3) (25), #A9 COUNTING OPTIMAL JOINT DIGIT EXPANSIONS Peter J. Grabner Institut für Mathematik A, Technische Universität Graz, Steyrergasse
More informationTHE DEGREE DISTRIBUTION OF RANDOM PLANAR GRAPHS
THE DEGREE DISTRIBUTION OF RANDOM PLANAR GRAPHS Michael Drmota joint work with Omer Giménez and Marc Noy Institut für Diskrete Mathematik und Geometrie TU Wien michael.drmota@tuwien.ac.at http://www.dmg.tuwien.ac.at/drmota/
More informationRHOMBUS TILINGS OF A HEXAGON WITH TWO TRIANGLES MISSING ON THE SYMMETRY AXIS
RHOMBUS TILINGS OF A HEXAGON WITH TWO TRIANGLES MISSING ON THE SYMMETRY AXIS THERESIA EISENKÖLBL Institut für Mathematik der Universität Wien, Strudlhofgasse 4, A-1090 Wien, Austria. E-mail: Theresia.Eisenkoelbl@univie.ac.at
More informationUnbalanced digit sets and the closest choice strategy for minimal weight integer representations
Unbalanced digit sets and the closest choice strategy for minimal weight integer representations Clemens Heuberger Institut für Mathematik B Technische Universität Graz, Graz, Austria http://www.opt.math.tugraz.at/~cheub/
More informationCOMPOSITIONS WITH A FIXED NUMBER OF INVERSIONS
COMPOSITIONS WITH A FIXED NUMBER OF INVERSIONS A. KNOPFMACHER, M. E. MAYS, AND S. WAGNER Abstract. A composition of the positive integer n is a representation of n as an ordered sum of positive integers
More informationThe Number of Inversions in Permutations: A Saddle Point Approach
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 6 (23), Article 3.2.8 The Number of Inversions in Permutations: A Saddle Point Approach Guy Louchard Département d Informatique CP 212, Boulevard du
More informationForty years of tree enumeration
October 24, 206 Canada John Moon (Alberta) Counting labelled trees Canadian mathematical monographs What is our subject? Asymptotic enumeration or Probabilistic combinatorics? What is our subject? Asymptotic
More informationTHE SUM OF DIGITS OF n AND n 2
THE SUM OF DIGITS OF n AND n 2 KEVIN G. HARE, SHANTA LAISHRAM, AND THOMAS STOLL Abstract. Let s q (n) denote the sum of the digits in the q-ary expansion of an integer n. In 2005, Melfi examined the structure
More informationOn the parity of the Wiener index
On the parity of the Wiener index Stephan Wagner Department of Mathematical Sciences, Stellenbosch University, Stellenbosch 7602, South Africa Hua Wang Department of Mathematics, University of Florida,
More informationThe number of inversions in permutations: A saddle point approach
The number of inversions in permutations: A saddle point approach Guy Louchard and Helmut Prodinger November 4, 22 Abstract Using the saddle point method, we obtain from the generating function of the
More informationF ( B d > = d I 1 S (d,d-k) F _ k k=0
Canad. Math. Bull. Vol. 26 (3), 1983 ORDERED FIBONACCI PARTITIONS BY HELMUT PRODINGER (1) ABSTRACT. Ordered partitions are enumerated by F n = k fc! S(n, k) where S(n, k) is the Stirling number of the
More informationMacMahon s Partition Analysis VIII: Plane Partition Diamonds
MacMahon s Partition Analysis VIII: Plane Partition Diamonds George E. Andrews * Department of Mathematics The Pennsylvania State University University Park, PA 6802, USA E-mail: andrews@math.psu.edu Peter
More informationROSENA R.X. DU AND HELMUT PRODINGER. Dedicated to Philippe Flajolet ( )
ON PROTECTED NODES IN DIGITAL SEARCH TREES ROSENA R.X. DU AND HELMUT PRODINGER Dedicated to Philippe Flajolet (98 2) Abstract. Recently, 2-protected nodes were studied in the context of ordered trees and
More informationGENERATING FUNCTIONS AND CENTRAL LIMIT THEOREMS
GENERATING FUNCTIONS AND CENTRAL LIMIT THEOREMS Michael Drmota Institute of Discrete Mathematics and Geometry Vienna University of Technology A 1040 Wien, Austria michael.drmota@tuwien.ac.at http://www.dmg.tuwien.ac.at/drmota/
More informationThe partial inverse minimum cut problem with L 1 -norm is strongly NP-hard. Elisabeth Gassner
FoSP Algorithmen & mathematische Modellierung FoSP Forschungsschwerpunkt Algorithmen und mathematische Modellierung The partial inverse minimum cut problem with L 1 -norm is strongly NP-hard Elisabeth
More informationSelected partial inverse combinatorial optimization problems with forbidden elements. Elisabeth Gassner
FoSP Algorithmen & mathematische Modellierung FoSP Forschungsschwerpunkt Algorithmen und mathematische Modellierung Selected partial inverse combinatorial optimization problems with forbidden elements
More informationA REMARK ON THE BOROS-MOLL SEQUENCE
#A49 INTEGERS 11 (2011) A REMARK ON THE BOROS-MOLL SEQUENCE J.-P. Allouche CNRS, Institut de Math., Équipe Combinatoire et Optimisation Université Pierre et Marie Curie, Paris, France allouche@math.jussieu.fr
More informationMinimality of the Hamming Weight of the τ -NAF for Koblitz Curves and Improved Combination with Point Halving
Minimality of the Hamming Weight of the τ -NAF for Koblitz Curves and Improved Combination with Point Halving Roberto Maria Avanzi 1 Clemens Heuberger 2 and Helmut Prodinger 1 Faculty of Mathematics and
More information7 Asymptotics for Meromorphic Functions
Lecture G jacques@ucsd.edu 7 Asymptotics for Meromorphic Functions Hadamard s Theorem gives a broad description of the exponential growth of coefficients in power series, but the notion of exponential
More informationSYMMETRIC DIGIT SETS FOR ELLIPTIC CURVE SCALAR MULTIPLICATION WITHOUT PRECOMPUTATION
SYMMETRIC DIGIT SETS FOR ELLIPTIC CURVE SCALAR MULTIPLICATION WITHOUT PRECOMPUTATION CLEMENS HEUBERGER AND MICHELA MAZZOLI Abstract. We describe a method to perform scalar multiplication on two classes
More informationEgyptian Fractions with odd denominators
arxiv:606.027v [math.nt] 7 Jun 206 Egyptian Fractions with odd denominators Christian Elsholtz Abstract The number of solutions of the diophantine equation k i= =, in particular when the are distinct odd
More informationCOMBINATORICS OF RAMANUJAN-SLATER TYPE IDENTITIES. James McLaughlin Department of Mathematics, West Chester University, West Chester, PA 19383, USA
COMBINATORICS OF RAMANUJAN-SLATER TYPE IDENTITIES James McLaughlin Department of Mathematics, West Chester University, West Chester, PA 9383, USA jmclaughl@wcupa.edu Andrew V. Sills Department of Mathematical
More informationarxiv:math/ v1 [math.co] 13 Jul 2005
A NEW PROOF OF THE REFINED ALTERNATING SIGN MATRIX THEOREM arxiv:math/0507270v1 [math.co] 13 Jul 2005 Ilse Fischer Fakultät für Mathematik, Universität Wien Nordbergstrasse 15, A-1090 Wien, Austria E-mail:
More informationAsymptotics of the Eulerian numbers revisited: a large deviation analysis
Asymptotics of the Eulerian numbers revisited: a large deviation analysis Guy Louchard November 204 Abstract Using the Saddle point method and multiseries expansions we obtain from the generating function
More informationLIMITING DISTRIBUTIONS FOR THE NUMBER OF INVERSIONS IN LABELLED TREE FAMILIES
LIMITING DISTRIBUTIONS FOR THE NUMBER OF INVERSIONS IN LABELLED TREE FAMILIES ALOIS PANHOLZER AND GEORG SEITZ Abstract. We consider so-called simple families of labelled trees, which contain, e.g., ordered,
More informationCOMBINATORICS OF RAMANUJAN-SLATER TYPE IDENTITIES
COMBINATORICS OF RAMANUJAN-SLATER TYPE IDENTITIES James McLaughlin Department of Mathematics, West Chester University, West Chester, PA 9383, USA jmclaughl@wcupa.edu Andrew V. Sills Department of Mathematical
More informationBALANCING GAUSSIAN VECTORS. 1. Introduction
BALANCING GAUSSIAN VECTORS KEVIN P. COSTELLO Abstract. Let x 1,... x n be independent normally distributed vectors on R d. We determine the distribution function of the minimum norm of the 2 n vectors
More informationPolynomials over finite fields. Algorithms and Randomness
Polynomials over Finite Fields: Algorithms and Randomness School of Mathematics and Statistics Carleton University daniel@math.carleton.ca AofA 10, July 2010 Introduction Let q be a prime power. In this
More informationExtremal Statistics on Non-Crossing Configurations
Extremal Statistics on Non-Crossing Configurations Michael Drmota Anna de Mier Marc Noy Abstract We analye extremal statistics in non-crossing configurations on the n vertices of a convex polygon. We prove
More informationAdditive tree functionals with small toll functions and subtrees of random trees
Additive tree functionals with small toll functions and subtrees of random trees Stephan Wagner To cite this version: Stephan Wagner. Additive tree functionals with small toll functions and subtrees of
More informationAsymptotics of Integrals of. Hermite Polynomials
Applied Mathematical Sciences, Vol. 4, 010, no. 61, 04-056 Asymptotics of Integrals of Hermite Polynomials R. B. Paris Division of Complex Systems University of Abertay Dundee Dundee DD1 1HG, UK R.Paris@abertay.ac.uk
More informationASYMPTOTICS OF THE EULERIAN NUMBERS REVISITED: A LARGE DEVIATION ANALYSIS
ASYMPTOTICS OF THE EULERIAN NUMBERS REVISITED: A LARGE DEVIATION ANALYSIS GUY LOUCHARD ABSTRACT Using the Saddle point method and multiseries expansions we obtain from the generating function of the Eulerian
More informationDepartment of Mathematics, University of California, Berkeley. GRADUATE PRELIMINARY EXAMINATION, Part A Fall Semester 2014
Department of Mathematics, University of California, Berkeley YOUR 1 OR 2 DIGIT EXAM NUMBER GRADUATE PRELIMINARY EXAMINATION, Part A Fall Semester 2014 1. Please write your 1- or 2-digit exam number on
More informationInverse Median Location Problems with Variable Coordinates. Fahimeh Baroughi Bonab, Rainer Ernst Burkard, and Behrooz Alizadeh
FoSP Algorithmen & mathematische Modellierung FoSP Forschungsschwerpunkt Algorithmen und mathematische Modellierung Inverse Median Location Problems with Variable Coordinates Fahimeh Baroughi Bonab, Rainer
More informationSeries of Error Terms for Rational Approximations of Irrational Numbers
2 3 47 6 23 Journal of Integer Sequences, Vol. 4 20, Article..4 Series of Error Terms for Rational Approximations of Irrational Numbers Carsten Elsner Fachhochschule für die Wirtschaft Hannover Freundallee
More informationSzemerédi s Lemma for the Analyst
Szemerédi s Lemma for the Analyst László Lovász and Balázs Szegedy Microsoft Research April 25 Microsoft Research Technical Report # MSR-TR-25-9 Abstract Szemerédi s Regularity Lemma is a fundamental tool
More informationDyadic diaphony of digital sequences
Dyadic diaphony of digital sequences Friedrich Pillichshammer Abstract The dyadic diaphony is a quantitative measure for the irregularity of distribution of a sequence in the unit cube In this paper we
More informationPrimary classes of compositions of numbers
Annales Mathematicae et Informaticae 41 (2013) pp. 193 204 Proceedings of the 15 th International Conference on Fibonacci Numbers and Their Applications Institute of Mathematics and Informatics, Eszterházy
More informationA class of trees and its Wiener index.
A class of trees and its Wiener index. Stephan G. Wagner Department of Mathematics Graz University of Technology Steyrergasse 3, A-81 Graz, Austria wagner@finanz.math.tu-graz.ac.at Abstract In this paper,
More informationarxiv: v1 [math.co] 3 Nov 2014
SPARSE MATRICES DESCRIBING ITERATIONS OF INTEGER-VALUED FUNCTIONS BERND C. KELLNER arxiv:1411.0590v1 [math.co] 3 Nov 014 Abstract. We consider iterations of integer-valued functions φ, which have no fixed
More informationASYMPTOTIC ENUMERATION OF PERMUTATIONS AVOIDING GENERALIZED PATTERNS
ASYMPTOTIC ENUMERATION OF PERMUTATIONS AVOIDING GENERALIZED PATTERNS SERGI ELIZALDE Abstract. Motivated by the recent proof of the Stanley-Wilf conjecture, we study the asymptotic behavior of the number
More informationOn Recurrences for Ising Integrals
On Recurrences for Ising Integrals Flavia Stan Research Institute for Symbolic Computation (RISC-Linz) Johannes Kepler University Linz, Austria December 7, 007 Abstract We use WZ-summation methods to compute
More informationRedundant τ-adic Expansions I: Non-Adjacent Digit Sets and their Applications to Scalar Multiplication
Redundant τ-adic Expansions I: Non-Adjacent Digit Sets and their Applications to Scalar Multiplication Roberto Maria Avanzi, Clemens Heuberger and Helmut Prodinger Abstract. This paper investigates some
More informationON DIVISIBILITY OF SOME POWER SUMS. Tamás Lengyel Department of Mathematics, Occidental College, 1600 Campus Road, Los Angeles, USA.
INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 7 (007, #A4 ON DIVISIBILITY OF SOME POWER SUMS Tamás Lengyel Department of Mathematics, Occidental College, 600 Campus Road, Los Angeles, USA
More informationOptimal global rates of convergence for interpolation problems with random design
Optimal global rates of convergence for interpolation problems with random design Michael Kohler 1 and Adam Krzyżak 2, 1 Fachbereich Mathematik, Technische Universität Darmstadt, Schlossgartenstr. 7, 64289
More informationMATH COMPLEX ANALYSIS. Contents
MATH 3964 - OMPLEX ANALYSIS ANDREW TULLOH AND GILES GARDAM ontents 1. ontour Integration and auchy s Theorem 2 1.1. Analytic functions 2 1.2. ontour integration 3 1.3. auchy s theorem and extensions 3
More informationReceived: 2/7/07, Revised: 5/25/07, Accepted: 6/25/07, Published: 7/20/07 Abstract
INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 7 2007, #A34 AN INVERSE OF THE FAÀ DI BRUNO FORMULA Gottlieb Pirsic 1 Johann Radon Institute of Computational and Applied Mathematics RICAM,
More informationarxiv: v1 [math.oc] 3 Jan 2019
The Product Knapsack Problem: Approximation and Complexity arxiv:1901.00695v1 [math.oc] 3 Jan 2019 Ulrich Pferschy a, Joachim Schauer a, Clemens Thielen b a Department of Statistics and Operations Research,
More informationTHE DISCREPANCY OF GENERALIZED VAN-DER-CORPUT-HALTON SEQUENCES
THE DISCREPANCY OF GENERALIZED VAN-DER-CORPUT-HALTON SEQUENCES MICHAEL DRMOTA Abstract. The purpose of this paper is to provide upper bounds for the discrepancy of generalized Van-der-Corput-Halton sequences
More informationOn certain combinatorial expansions of the Legendre-Stirling numbers
On certain combinatorial expansions of the Legendre-Stirling numbers Shi-Mei Ma School of Mathematics and Statistics Northeastern University at Qinhuangdao Hebei, P.R. China shimeimapapers@163.com Yeong-Nan
More informationABSTRACT 1. INTRODUCTION
THE FIBONACCI NUMBER OF GENERALIZED PETERSEN GRAPHS Stephan G. Wagner Department of Mathematics, Graz University of Technology, Steyrergasse 30, A-8010 Graz, Austria e-mail: wagner@finanz.math.tu-graz.ac.at
More informationA Note on Extended Binomial Coefficients
A Note on Extended Binomial Coefficients Thorsten Neuschel arxiv:407.749v [math.co] 8 Jul 04 Abstract We study the distribution of the extended binomial coefficients by deriving a complete asymptotic expansion
More informationHigher order asymptotics from multivariate generating functions
Higher order asymptotics from multivariate generating functions Mark C. Wilson, University of Auckland (joint with Robin Pemantle, Alex Raichev) Rutgers, 2009-11-19 Outline Preliminaries References Our
More informationUNC Charlotte 2004 Algebra with solutions
with solutions March 8, 2004 1. Let z denote the real number solution to of the digits of z? (A) 13 (B) 14 (C) 15 (D) 16 (E) 17 3 + x 1 = 5. What is the sum Solution: E. Square both sides twice to get
More informationThe Moments of the Profile in Random Binary Digital Trees
Journal of mathematics and computer science 6(2013)176-190 The Moments of the Profile in Random Binary Digital Trees Ramin Kazemi and Saeid Delavar Department of Statistics, Imam Khomeini International
More informationarxiv: v1 [math.co] 28 Oct 2016
More on foxes arxiv:1610.09093v1 [math.co] 8 Oct 016 Matthias Kriesell Abstract Jens M. Schmidt An edge in a k-connected graph G is called k-contractible if the graph G/e obtained from G by contracting
More informationPattern avoidance in compositions and multiset permutations
Pattern avoidance in compositions and multiset permutations Carla D. Savage North Carolina State University Raleigh, NC 27695-8206 Herbert S. Wilf University of Pennsylvania Philadelphia, PA 19104-6395
More informationBounded point derivations on R p (X) and approximate derivatives
Bounded point derivations on R p (X) and approximate derivatives arxiv:1709.02851v3 [math.cv] 21 Dec 2017 Stephen Deterding Department of Mathematics, University of Kentucky Abstract It is shown that if
More informationarxiv:math/ v1 [math.co] 5 Oct 1998
RHOMBUS TILINGS OF A HEXAGON WITH TWO TRIANGLES MISSING ON THE SYMMETRY AXIS THERESIA EISENKÖLBL arxiv:math/98009v [math.co] 5 Oct 998 Abstract. We compute the number of rhombus tilings of a hexagon with
More informationEcon 508B: Lecture 5
Econ 508B: Lecture 5 Expectation, MGF and CGF Hongyi Liu Washington University in St. Louis July 31, 2017 Hongyi Liu (Washington University in St. Louis) Math Camp 2017 Stats July 31, 2017 1 / 23 Outline
More informationGENERATING SERIES FOR IRREDUCIBLE POLYNOMIALS OVER FINITE FIELDS
GENERATING SERIES FOR IRREDUCIBLE POLYNOMIALS OVER FINITE FIELDS ARNAUD BODIN Abstract. We count the number of irreducible polynomials in several variables of a given degree over a finite field. The results
More informationGEOMETRY OF BINOMIAL COEFFICIENTS. STEPHEN WOLFRAM The Institute jor Advanced Study, Princeton NJ 08540
Reprinted from the AMERICAN MATHEMATICAL MONTHLY Vol. 91, No.9, November 1984 GEOMETRY OF BINOMIAL COEFFICIENTS STEPHEN WOLFRAM The Institute jor Advanced Study, Princeton NJ 08540 This note describes
More informationMACMAHON S PARTITION ANALYSIS IX: k-gon PARTITIONS
MACMAHON S PARTITION ANALYSIS IX: -GON PARTITIONS GEORGE E. ANDREWS, PETER PAULE, AND AXEL RIESE Dedicated to George Szeeres on the occasion of his 90th birthday Abstract. MacMahon devoted a significant
More informationProbability and Measure
Part II Year 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2018 84 Paper 4, Section II 26J Let (X, A) be a measurable space. Let T : X X be a measurable map, and µ a probability
More informationCounting false entries in truth tables of bracketed formulae connected by m-implication
arxiv:1034645v1 [mathco] 1 Mar 01 Counting false entries in truth tables of bracketed formulae connected by m-implication Volkan Yildiz ah05146@qmulacuk or vo1kan@hotmailcouk Abstract Inthispaperwecount
More informationq-pell Sequences and Two Identities of V. A. Lebesgue
-Pell Seuences and Two Identities of V. A. Lebesgue José Plínio O. Santos IMECC, UNICAMP C.P. 6065, 13081-970, Campinas, Sao Paulo, Brazil Andrew V. Sills Department of Mathematics, Pennsylvania State
More informationMacMahon s Partition Analysis V: Bijections, Recursions, and Magic Squares
MacMahon s Partition Analysis V: Bijections, Recursions, and Magic Squares George E. Andrews, Peter Paule 2, Axel Riese 3, and Volker Strehl 4 Department of Mathematics The Pennsylvania State University
More informationCOMBINATORICS OF GENERALIZED q-euler NUMBERS. 1. Introduction The Euler numbers E n are the integers defined by E n x n = sec x + tan x. (1.1) n!
COMBINATORICS OF GENERALIZED q-euler NUMBERS TIM HUBER AND AE JA YEE Abstract New enumerating functions for the Euler numbers are considered Several of the relevant generating functions appear in connection
More informationTHE EXPONENTIAL DISTRIBUTION ANALOG OF THE GRUBBS WEAVER METHOD
THE EXPONENTIAL DISTRIBUTION ANALOG OF THE GRUBBS WEAVER METHOD ANDREW V. SILLS AND CHARLES W. CHAMP Abstract. In Grubbs and Weaver (1947), the authors suggest a minimumvariance unbiased estimator for
More informationCOMPUTER ALGEBRA AND POWER SERIES WITH POSITIVE COEFFICIENTS. 1. Introduction
COMPUTER ALGEBRA AND POWER SERIES WITH POSITIVE COEFFICIENTS MANUEL KAUERS Abstract. We consider the question whether all the coefficients in the series expansions of some specific rational functions are
More informationAlgebraic function fields
Algebraic function fields 1 Places Definition An algebraic function field F/K of one variable over K is an extension field F K such that F is a finite algebraic extension of K(x) for some element x F which
More informationOn the indecomposability of polynomials
On the indecomposability of polynomials Andrej Dujella, Ivica Gusić and Robert F. Tichy Abstract Applying a combinatorial lemma a new sufficient condition for the indecomposability of integer polynomials
More informationOn the mean connected induced subgraph order of cographs
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 71(1) (018), Pages 161 183 On the mean connected induced subgraph order of cographs Matthew E Kroeker Lucas Mol Ortrud R Oellermann University of Winnipeg Winnipeg,
More informationEuler characteristic of the truncated order complex of generalized noncrossing partitions
Euler characteristic of the truncated order complex of generalized noncrossing partitions D. Armstrong and C. Krattenthaler Department of Mathematics, University of Miami, Coral Gables, Florida 33146,
More informationOn the Logarithmic Calculus and Sidorenko s Conjecture
On the Logarithmic Calculus and Sidorenko s Conjecture by Xiang Li A thesis submitted in conformity with the requirements for the degree of Msc. Mathematics Graduate Department of Mathematics University
More informationCongruent Numbers, Elliptic Curves, and Elliptic Functions
Congruent Numbers, Elliptic Curves, and Elliptic Functions Seongjin Cho (Josh) June 6, 203 Contents Introduction 2 2 Congruent Numbers 2 2. A certain cubic equation..................... 4 3 Congruent Numbers
More informationPRIME NUMBERS YANKI LEKILI
PRIME NUMBERS YANKI LEKILI We denote by N the set of natural numbers: 1,2,..., These are constructed using Peano axioms. We will not get into the philosophical questions related to this and simply assume
More informationComplex Analysis for F2
Institutionen för Matematik KTH Stanislav Smirnov stas@math.kth.se Complex Analysis for F2 Projects September 2002 Suggested projects ask you to prove a few important and difficult theorems in complex
More information2016 EF Exam Texas A&M High School Students Contest Solutions October 22, 2016
6 EF Exam Texas A&M High School Students Contest Solutions October, 6. Assume that p and q are real numbers such that the polynomial x + is divisible by x + px + q. Find q. p Answer Solution (without knowledge
More informationarxiv: v1 [math.co] 12 Sep 2018
ON THE NUMBER OF INCREASING TREES WITH LABEL REPETITIONS arxiv:809.0434v [math.co] Sep 08 OLIVIER BODINI, ANTOINE GENITRINI, AND BERNHARD GITTENBERGER Abstract. In this paper we study a special subclass
More informationOn a Conjectured Inequality for a Sum of Legendre Polynomials
On a Conjectured Inequality for a Sum of Legendre Polynomials Stefan Gerhold sgerhold@fam.tuwien.ac.at Christian Doppler Laboratory for Portfolio Risk Management Vienna University of Technology Manuel
More informationFactorization of integer-valued polynomials with square-free denominator
accepted by Comm. Algebra (2013) Factorization of integer-valued polynomials with square-free denominator Giulio Peruginelli September 9, 2013 Dedicated to Marco Fontana on the occasion of his 65th birthday
More informationCoupling Binomial with normal
Appendix A Coupling Binomial with normal A.1 Cutpoints At the heart of the construction in Chapter 7 lies the quantile coupling of a random variable distributed Bin(m, 1 / 2 ) with a random variable Y
More informationMATH 590: Meshfree Methods
MATH 590: Meshfree Methods Chapter 14: The Power Function and Native Space Error Estimates Greg Fasshauer Department of Applied Mathematics Illinois Institute of Technology Fall 2010 fasshauer@iit.edu
More information