

 Clementine Cox
 1 years ago
 Views:
Transcription
1 Software Reliability via RuTime ResultCheckig Hal Wasserma Uiversity of Califoria, Berkeley ad Mauel Blum City Uiversity of Hog Kog ad Uiversity of Califoria, Berkeley We review the eld of resultcheckig, discussig simple checkers ad selfcorrectors. We argue that such checkers could protably be icorporated i software as a aid to eciet debuggig ad ehaced reliability. We cosider how to modify traditioal checkig methodologies to make them more appropriate for use i realtime, realumber computer systems. I particular, we suggest that checkers should be allowed to use stored radomess: i.e., that they should be allowed to geerate, preprocess, ad store radom bits prior to rutime, ad the to use this iformatio repeatedly i a series of rutime checks. I a case study of checkig ageeral realumber liear trasformatio (for example, a Fourier Trasform), we preset a simple checker which uses stored radomess, ad a selfcorrector which is particularly eciet if stored radomess is employed. Categories ad Subject Descriptors: D..5 [Software Egieerig]: Testig ad Debuggig F.. [Aalysis of Algorithms]: Numerical Algorithms Computatio of trasforms F.3. [Logics ad Meaigs of Programs]: Specifyig ad Verifyig ad Reasoig about Programs Geeral Terms: Reliability, Algorithms, Vericatio Additioal Key Words ad Phrases: Builti testig, cocurret error detectio, debuggig, fault tolerace, Fourier Trasform, resultcheckig, selfcorrectig This work was supported i part by a MICRO grat from Hughes Aircraft Compay ad the State of Califoria, by NSF Grat ccr9009, ad by NDSEG Fellowship daah0493g067. A prelimiary versio of this paper appears as: \Program resultcheckig: a theory of testig meets a test of theory," Proc. 35th IEEE Symp. Foudatios of Computer Sciece (994), pp. 38{39. Name: Hal Wasserma Aliatio: Computer Sciece Divisio, Uiversity of Califoria at Berkeley Address: Berkeley, CA 9470, http.cs.berkeley.edu/halw Name: Mauel Blum Aliatio: Computer Sciece Departmet, City Uiversity of Hog Kog Address: 83 Tat Chee Ave., Kowloo Tog, Kowloo, Hog Kog, Aliatio: Computer Sciece Divisio, Uiversity of Califoria at Berkeley Address: Berkeley, CA 9470, http.cs.berkeley.edu/blum Permissio to make digital or hard copies of part or all of this work for persoal or classroom use is grated without fee provided that copies are ot made or distributed for prot or direct commercial advatage ad that copies show this otice o the rst page or iitial scree of a display alog with the full citatio. Copyrights for compoets of this work owed by others tha ACM must be hoored. Abstractig with credit is permitted. To copy otherwise, to republish, to post o servers, to redistribute to lists, or to use ay compoet of this work i other works, requires prior specic permissio ad/or a fee. Permissios may be requested from Publicatios Dept, ACM Ic., 55 Broadway, New York, NY 0036 USA, fax + () , or
2 H. Wasserma ad M. Blum. RESULTCHECKING AND ITS APPLICATIONS. Assurig Software Reliability Methodologies for assurig software reliability form a importat part of the techology of programmig. Yet the problem of ecietly idetifyig software bugs remais a dicult oe, ad oe to which o perfect solutio is likely to be foud. Software is geerally debugged via testig suites: oe rus a program o a variety of carefully selected iputs, idetifyig a bug wheever the program fails to perform correctly. This approach leaves two importat questios icompletely aswered. First, how do we kow whether or ot the program's performace is correct? Geerally, some sort of a oracle is used here: our program's output may be compared to the output of a older, slower program believed to be more reliable, or the programmers may subject the output to a paistakig (ad likely subjective ad icomplete) examiatio by eye. Secod, give that a test suite feeds a program oly selected iputs outofthe ofte eormous space of all possibilities, how do we assure that every bug i the code will be evideced? Ideed, particular combiatios of circumstaces leadig to a failure maywellgoutested. Furthermore, if the testig suite fails to accurately simulate the iput distributio which the program will ecouter i its lifetime, a supposedly debugged program may i fact fail quite frequetly. Oe alterative to testig is formal vericatio, a methodology i which mathematical claims about the behavior of a program are stated ad proved. Thus it is possible to demostrate oce ad for all that the program must behave correctly o all possible iputs. Ufortuately, costructig such proofs for eve simple programs has proved uexpectedly dicult. Moreover, may programmers would likely d it upleasat tohave to formalize their expectatios of program behavior ito mathematical theorems. Aother alterative isfault tolerace. Accordig to this methodology, the reliability of critical software may beehacedbyhavig several groups of programmers create separate versios. At rutime, all of the versios are executed, ad their outputs are compared. The gross ieciecy of this approach is evidet, i terms of programmig mapower as well as either icreased rutime or additioal parallelhardware requiremets. Moreover, the method fails if commo miscoceptios amog the several developmet groups result i correspodig errors [Butler ad Fielli 993]. We d more covicig ispiratio i the eld of commuicatios, where errordetectig ad errorcorrectig codes allow for the ideticatio of arbitrary rutime trasmissio errors. Such codes are pragmatic ad are backed by mathematical guaratees of reliability. We wish to provide such rutime errorideticatio i a more geeral computatioal cotext. This motivates us to review the eld of resultcheckig.. Simple Checkers It is a matter of theoretical curiosity that, for certai computatios, the time required to carry out the computatio is asymptotically greater tha the time required, give a tetative aswer, to determie whether or ot the aswer is correct.
3 Software Reliability via RuTime ResultCheckig 3 As a easy example, cosider the followig task: give as iput a composite iteger c, output ay otrivial factor d of c. Carryig out this computatio is curretly believed to be dicult, ad yet, give I/O pair hc di, ittakes just oe divisio to determie whether or ot d is a correct output o iput c. These ideas have bee formalized ito the cocept of a simple checker [Blum 988]. Let f be a fuctio with smallest possible computatio time T (), where is iput legth (or, if a strog lower boud caot be determied, we iformally set T () equal to the smallest kow computatio time for f). The a simple checker for f is a algorithm (geerally radomized) with I/O specicatios as follows: Iput: I/O pair hx yi. Correct output: If y =f(x), accept otherwise, reject. Reliability: For all hx yi: o iput hx yi the checker must retur correct output with probability (over iteral radomizatio) p c, for p c a costat close to. \Littleo rule": The checker is limited to time o(t ()). The \littleo rule" is importat i that it requires a simple checker to be eciet, ad also i that it forces the checker to determie whether or ot y =f(x) bymeas other tha simply recomputig f(x) hece the checker must be i some maer dieret from the program which it checks. We will see i Sectio.5 that this gives rise to certai hopes that checkers are ideed \idepedet" of the programs they check,adsomay more reliably idetify program errors. For a example of simple checkig, cosider a sortig task: iput ~x =(x ::: x ) is a array ofitegers output ~y =(y ::: y ) should be ~x sorted i icreasig order. Completig this task at least via a geeral comparisobased sort is kow to require time ( log ). Thus, if we limit our checker to time O(), this will suce to satisfy the littleo rule. Give h~x ~y i, to check correctess we must rst verify that the elemets of ~y are i icreasig order. This may easily be doe i time O(). But we must also check that ~y is a permutatio of ~x. It might be coveiet here to modify our sorter's I/O specicatios, requirig that each elemet of ~y have attached a poiter to its origial positio i ~x. Ay atural sortig program could easily be altered to maitai such poiters, ad oce they are available we ca readily complete our check itimeo(). But what if ~y caot be augmeted with such poiters? Similarly, what if ~x ad ~y are oly available olie from sequetial storage, so that O()time poiterdereferecig is ot possible? The we may still employ a radomized method due to [Wegma ad Carter 98 Blum 988], which requires oly oe pass through each of ~x ad ~y. Variats of the littleo rule have also bee cosidered: for example, requirig checkers to use less space tha the programs they check, or to be implemetable with smallerdepth circuits. For example, a rather trivial result is that, if the successive coguratios of a arbitrary Turig Machie computatio are available, the the computatio may be checked by a very shallow circuit. Ufortuately, it is oly the mechaical operatio of the Turig Machie which isbeig checked here, ot the correctess of the Turig Machie's program. Hece we retur to the traditioal littleo rule, which has geerally proved to be the best route to creative, otrivial checkers.
4 4 H. Wasserma ad M. Blum We radomly select a determiistic hashfuctio h from a suitably deed set of possibilities, ad we compare h(x )++ h(x )withh(y )++ h(y ). If ~y is ideed a permutatio of ~x, the two values must be equal coversely, it is readily prove that, if ~y is ot a permutatio of ~x, thetwovalues will dier with probability. Thus, if we accept oly h~x ~y i pairs which pass t such trials, the our checker ; t,whichmay has probability oferror be made arbitrarily small. A al ote: our deitio of simple checkig is ot ew, but has perhaps ot bee clearly expressed i the checkig literature. I particular, simple checkig has bee deed oly implicitly, as the most eciet case of complex checkig (Sectio.3). Here our particular iterest i very fast checkig has led us to brig out this distictio..3 SelfCorrectors Agai let f be a fuctio with smallest (kow) computatio time T (). Let D be a welldeed probability distributio o iputs to f, ad let P be a program such that, if x is chose Dradomly, P(x) equals f(x) with probability of error limited to a small value p. I the curret paper, D will always be the uiformradom distributio so we are requirig simply that P computes f correctly o most iputs. That P ideed has this property may be determied (with high probability) by testig P o p Dradom iputs ad usig some sort of a oracle or a simple checker to determie the correctess of each output. We evisio this testig stage as beig completed prior to rutime. Aother possibility istheuseofaself tester [Blum et al. 993], which ca give such assuraces ecietly, atrutime, ad with little reliace o ay outside oracle. A selfcorrector for f [Blum et al. 993 Lipto 99] is the a algorithm (geerally radomized) with I/O specicatios as follows: Iput: x (a iput to f), alog with P, a program kow to compute f with probability of error o Dradom iputs limited to a small value p. The corrector is allowed to call P repeatedly, usig it as a subroutie. Correct output: f(x). Reliability: For all hx Pi: o iput hx Pi the corrector must retur correct output with probability (over iteral radomizatio) p c, for p c a costat close to. Timeboud: The corrector's timeboud, icludig subroutie calls to P, must be limited to a costat multiple of P's timeboud the corrector's timeboud, coutig each subroutie call to P as just oe step, must be o(t ()). As a example [Blum et al. 993], cosider a task of multiplicatio over a ite eld: iput is w x F output is product wx F. We assume additio over F to be quicker ad more reliable tha multiplicatio. Assume we kow from testig that program P computes multiplicatio correctly for all but a fractio of possible hw xi iputs. (Note that this kowledge is 00 A rather uusual set of hash fuctios is required moreover, the time required to calculate h, ad hece to complete a check, is debatable. Refer to [Blum 988] for details.
5 Software Reliability via RuTime ResultCheckig 5 i itself oly a very weak assurace of the reliability ofp, asthat fractio 00 of \dicult iputs" might well appear far more tha of the time i the life of 00 the program.) The a selfcorrector may be specied as follows: Algorithm. O iput hw xi, Geerate uiformradom r r F. Call P four times to calculate P(w ; r x; r ), P(w ; r r ), P(r x; r ), ad P(r r ). Retur, as our corrected value for wx, y c := P(w ; r x; r ) + P(w ; r r ) + P(r x; r ) + P(r r ): Why doesthiswork? Note that each of the four calls to P is o a pair of iputs uiformradomly distributed over F, ad so will retur the correct aswer with probability of error at most. Thus, all four retur values are likely to be correct: 00 4 the probabilityoferrorisatmost. Ad if all the retur values are correct, the 00 y c = P(w ; r x; r ) + P(w ; r r ) + P(r x; r ) + P(r r ) = (w ; r )(x ; r )+(w ; r )r + r (x ; r )+r r = [(w ; r )+r ][(x ; r )+r ] = wx: Note that corrected output y c is superior to umodied output P(w x) i that there are o \dicult iputs": for ay hw xi, each timewe compute a corrected value y c for wx, the chace of error (over the choice of r r )is 4. Moreover 00 (usig ew radom values of r r for each y c (i) )adpick the majority aswer as our al output, we thereby make the chace of error arbitrarily small. The price we payforthis ehaced reliability isamultiplicatio of P's usual rutime by a factor of 4t. This performace loss will be further cosidered below. A al ote o selfcorrectig. Above we speak of eedig a assurace that P is correct o all but a small fractio of iputs. Such laguage implies a assumptio that P's behavior is xed (except for possible radomizatio) prior to the selfcorrectig process: i.e., that P is ot a adversary which ca adapt i respose to the corrector. This assumptio is ecessary, as a adaptable adversary could easily fool a corrector such as the above. 3 Achecker, i cotrast, is required to be secure agaist eve a adaptable adversary. Oe may also dee a complex checker [Blum 988], which outputs a accept/reject correctesscheck similar to that of a simple checker, but which, like a selfcorrector, is allowed to poll P at several locatios (ad so, like a selfcorrector, teds to be less eciet tha a simple checker). I geeral, a complex checker seeks to determie the correctess of P(x) by comparig P(x) to several of P's other outputs. More formally, acomplex checker for f is deed as follows: observe that, if we compute several corrected outputs y c () ::: y c (t) 3 [Gemmell et al. 99] however demostrates that selftestig/correctig may be possible eve whe a program has limited adversarial power.
6 6 H. Wasserma ad M. Blum Iput: x (a iput to f), alog with P, a program which may compute f o all, some, or o iputs. The checker is allowed to call P repeatedly, usig it as a subroutie. Correct output: If P is correct both o x ad o all the other outputs sampled by the checker, must accept. If P(x) is icorrect, must reject. Reliability: For all hx Pi: o iput hx Pi the checker must retur correct output with probability (over iteral radomizatio) p c, for p c a costat close to. Timeboud: The checker's timeboud, icludig subroutie calls to P, must be limited to a costat multiple of P's timeboud the checker's timeboud, coutig each subroutie call to P as just oe step, must be o(t ()) (where T () is agai the smallest possible time to compute f). Observe a ecessary weakess of this deitio: i the case that P(x) is correct but at least oe of P's other outputs sampled by the checker is icorrect, the checker may either accept or reject. This weakess is ecessary (if we are to allow algorithms which go beyod simple checkig) because, i the case that P returs oly juk aswers, we caot expect the checker to gure out whether or ot P(x) is correct. I spite of this weakess, the complex checker tells us what we eed to kow: if the checker accepts, wekowthatp(x) is correct if the checker rejects, wekowthatp failed o at least oe of a small, kow set of iputs. A example complex checker (for graph isomorphism) is described i Sectio.7. For more iformatio o resultcheckig, refer to the aotated bibliography..4 Debuggig via Checkers We will argue here that embeddig checkers i software products may be a substatial aid i debuggig those products ad assurig their reliability. It is our hope that resultcheckig may form the basis for a debuggig methodology more rigorous tha the testig suite ad more pragmatic tha vericatio. Throughout the process of software testig, embedded checkers may be used to idetify icorrect output. They will thereby serve as a eciet alterative to a covetioal testig oracle. Furthermore, eve after software is put ito use, leavig the checkers i the code will allow for the eective detectio of ligerig bugs. We evisio that, each time a checker ds a bug, a iformative output will be writte to a le this le will the be periodically reviewed by softwaremaiteace egieers. Aother possibility isa immediate warig message, so that the user of a critical system will ot be duped ito acceptig erroeous output. While it could be argued that buggy output would be oticed by the user i ay case, a automatic system for idetifyig errors should i fact reduce the probability that bugs will be igored or forgotte. Moreover, a checker ca catch a error i a program compoet whose eects may ot be readily apparet to the user. Thus achecker might well idetify a bug i a critical system before it goes o to cause a catastrophic failure. Moreover, checkers may trigger automatic selfcorrectio: potetially a method for the creatio of extremely reliable systems. By writig a checker, oe group of programmers may assure themselves that aother group's code is ot udermiig theirs by passig alog erroeous output. Similarly, the software egieer who creates the specicatios for a program compo
7 Software Reliability via RuTime ResultCheckig 7 et ca write a checker to verify that the programmers have truly uderstood ad provided the fuctioality he required. Sice checkers deped oly o the I/O specicatios of a computatioal task, oe may check eve a program compoet whose iterals are ot available for examiatio, such as a library of utilities ruig o a remote machie. Thus checkers facilitate the discovery of those misuderstadigs at the \seams" of programs which so ofte uderlie a software failure. Evidetly, all of this applies well to objectorieted paradigms. Ulike vericatio, checkig reveals icorrect output origiatig i ay cause whether due to software bugs, hardware bugs, or trasiet rutime errors. Moreover, sice a checker cocers itself oly with the I/O specicatios of a computatioal task, the itroductio of a potetially ureliable ew algorithm for solvig a old task may ot require substatial chage to the associated checker. Ad so, as a program is modied throughout its lifetime ofte without a adequate repeat of the testig process its checkers will cotiue to guard agaist errors..5 CheckerBased Debuggig Cocers Performace loss: Simple checkers are iheretly eciet: due to the littleo rule,a simple checker should ot sigicatly slow the program P that it checks. Selfcorrectors, o the other had, require multiple calls to P, ad so multiply executiotime by a small costat (or, alteratively, require additioal parallel hardware). I a realtime computer system, such a slowdow may ot be acceptable. Hece it is desirable to check a give program by implemetig both a simple checker ad a selfcorrector. The simple checker may the be ru o each output, while oly i the (hopefully rare) case that the output is icorrect eed the selfcorrector be ru as well hece the selfcorrector is kept o the commocase path. Alteratively, i Sectio.6 we will cosider a chage to our deitios which will allow for certai selfcorrectig algorithms to ru at realtime speeds. Realumber issues (see [Gemmell et al. 99 Ar et al. 993]): Traditioal resultcheckig algorithms, such as the example selfcorrector from Sectio.3, ofte rely o the orderly properties of ite elds. I may programmig tasks, we are more likely to ecouter real umbers i.e., approximate reals represeted by a xed umber of bits. Such umbers will be limited to a legal subdomai of <. I Sectio.4, we will see how to modify a traditioal selfcorrectig methodology to accout for this. Moreover, limited precisio will likely result i roudo errors withi P. We must the determie how much arithmetic error may allowably occur withi P, ad must check correctess oly up to the limit of this errordelta. I Sectio, we will see that limited precisio calculatios, while a substatial challege, are by o meas fatal to our checkig project. Testig checkers: A checker, like ay software compoet, must be carefully debugged. Otherwise, a degeerate checker C may idiscrimiately report program P to be correct, thereby givig a false sese of assurace. The problem of costructig a suitable testig suite for a checker is otrivial. Evidetly testig a checker o correct program output is isuciet: we must also test the checker's ability to recogize bugs ad ot just agrat, radom bugs, but various ad subtle oes. Oe possibility would be to employ a mutatio model of software error: i.e., to test C o the output from mutated variats of P.
8 8 H. Wasserma ad M. Blum Buggy checkers: What if we evertheless fail to debug our checker? Ideed, it may be objected that resultcheckig begs the questio of software reliability: for checkig may fail due to the checker's code beig as buggy as the program's. To this objectio we respod with three argumets: argumets which are, however, heuristic rather tha rigorous. First, checkers ca ofte be simpler tha the programs they check, ad so, presumably, less likely to havebugs. For example, moder computers may use itricate, arithmetically ustable algorithms to compute matrix multiplicatio i time, say, O( :38 ), rather tha the stadard O( 3 ). Ad yet Freivalds's O( )time checker for matrix multiplicatio [Freivalds 979] uses oly the simplest of multiplicatio algorithms, ad so is seemigly likely to be bugfree. Secod, observe that oe of the followig four coditios must hold each time a (possibly buggy) simple checker C checks the output of a program P: (I). P(x) is correct C correctly accepts it. (II). P(x) is icorrect C correctly rejects it. (III). \False alarm": P(x) is correct C icorrectly rejects it. (IV). \Missed bug": P(x) is icorrect C icorrectly accepts it. Oly a \missed bug" is a truly bad outcome: for a \false alarm," while aoyig, at least draws our attetio to a bug i C. To reduce the likelihood of missed bugs, it suces to rule out a strog correlatio betwee x values at which P fails ad x values at which C(x P(x)) fails. It is our heuristic cotetio that such a correlatio is ulikely. Ideed, recall that oe eect of the \littleo rule" is that C does't have suciet time to merely reduplicate the computatio performed by P. Thus we claim (heuristically) that C must be doig somethig essetially dieret from what P does, ad so, if buggy, may reasoably be expected to make dieret errors. But the we would expect few correlated errors moreover, we would expect more ucorrelated tha correlated errors, so that a give bug could well be idetied ad xed before it goes o to geerate ay correlated errors. 4 Fially, say that correlated errors oetheless occur. This might i particular be expected due to faults i hardware or software compoets o which both P ad C deped. We argue that, eve i this case, a \missed bug" may ot result. Ideed, cosider our checker for a sortig program (Sectio.), which determies whether or ot ~y is a permutatio of ~x by comparig h(x )+ + h(x ) with h(y )++h(y ): assumig that the sortig program has failed, h(x )++h(x ) ad h(y )+ + h(y ) will ot match (with probability ). If the checker 4 It could be argued that the littleo rule oly prohibits C from duplicatig the most timecosumig of P's compoets P's simpler compoets may be trivially duplicated i C, ad so, if buggy, might produce correlated errors. To this argumet we respod that C's primary fuctio is to check the cetral algorithm of P smaller compoets eeded as subrouties by both P ad C should, if ecessary, be checked separately. As a illustratio of a related issue, cosider a stadard maxflow program, which proceeds by successively adjustig ows util it ds a coguratio which achieves optimal ow across a particular cut. A checker for this program eed do little more tha verify that optimal ow is ideed achieved across the cut which is what the program itself does i its al stage. Hece checkig this sort of program seems trivial ad ieective. Our respose is simply that such a program ideed requires o separate checker, because it is aturally selfcheckig.
9 Software Reliability via RuTime ResultCheckig 9 simultaeously fails, it may miscalculate h(x )++ h(x ) ad/or h(y )++ h(y ) but, we argue, it seemigly is ot likely to fail i exactly such a maer as to get values for the two sumswhich happe to match each other. May checkers proceed i this way, calculatig two quatities ad declarig a error if they do ot match. Degeerate checker behavior seems ulikely to yield matchig quatities ad so we argue that checkers, eve whe buggy themselves, have a atural resistace to the bad case of missig a program bug..6 Stored Radomess We here itroduce a extesio to traditioal checker deitios: we suggest that radomized checkers, rather tha havig to geerate fresh radom bits for each check, should be allowed to use preprocessed stored radomess. That is, prior to rutime while the program is idle, or durig bootup, or eve durig software developmet we geerate radom bits ad do some (perhaps legthy) preprocessig these radom bits, together with preprocessed values depedet o them, form oe or more radom packages. These packages are stored the, at rutime, each check requires such a package as a additioal iput. 5 Stored radomess has several potetial advatages. First, it allows for much or all of a checker's radomess to be geerated before rutime. This could be useful particularly i doig very quick checks of lowlevel fuctioalities such as microprocessor arithmetic (as i [Blum ad Wasserma 996]): i this cotext, havig to geerate radom bits at rutime could be a icoveiece. Secod, we shall see that stored radomess allows for the use of checkig algorithms which would otherwise require too much computatio at rutime: by payig a timecost of (T (N)) i preprocessig, we \cheat" some work out of the way, so that each rutime check ca the be completed i time o(t (N)). For a trivial example of stored radomess, we ca recosider the multiplicatio selfcorrector of Sectio.3. If i a preprocessig stage r r are geerated, P(r r ) is calculated, ad package R = hr r P(r r )i is stored, this leaves oly three calls to P at rutime, rather tha four. However, this improvemet is ot particularly impressive. Stored radomess will be further explicated through more substatial examples: i Sectios. ad.5, we will preset a simple checker which is possible oly if oe allows stored radomess, ad a selfcorrector which, if oe allows stored radomess, ca ru at realtime speeds. How much radomess must be stored? Let N be our xed iput legth, ad let ` be the umber of checks we expect to carry out at rutime. Oe approach would be to preprocess ` packages. The each check would have its ow \fresh" radomess, which would certaily be good from the poit of view of reliability. However, we might expect ` to be N or eve ukow durig preprocessig so this trivial approach could have too high a cost i preprocessig time ad storage space. A opposite approach would be to geerate a sigle radom package ad use it for every check. But would the repeated use of a \stale" radom package reduce 5 This method requires iput legth N to be xed prior to rutime equivaletly, ew preprocessig stages will be required as iput legth icreases. This use of stored iformatio is aalogous to that i the P/poly model of computatio.
10 0 H. Wasserma ad M. Blum the reliability ofourchecker? Sectios. ad.5 iitially choose this approach ad Lemmas 4 ad 0 argue that the cosequet reductio i reliability is ot fatal. Moreover, i Sectios. ad.5 we go o to suggest a itermediate approach, which requires a umber of stored packages that is O(N) ad idepedet of `. Lemmas 5 ad argue that the resultig storedradom checkers are the highly reliable..7 Variatios o the Checkig Paradigm It may still be objected that most programmig tasks are less ameable to checkig tha are the clea mathematical problems with which theoreticias usually deal. Nevertheless, it is our experiece that may such tasks may be subjected to iterestig checks. The followig is alistof checkig ideas which may suggestto the reader how deitios ca be geeralized to make checkig more suitable as a tool for software debuggig. Partial checks: Oe may d it suciet to check oly certai aspects of a computatioal output. Programmers may focus o properties they thik particularly likely to reveal bugs or particularly critical to the success of the system. Certai checkers might oly be capable of idetifyig outputs icorrect by avery large errordelta. Eve just checkig iputs ad outputs separately to verify that they fall i a legal domai may prove useful. Timig checks: Oe might wish to moitor the executiotime of a software compoet a uexpectedly large (or small) time could the reveal a bug. For istace, a programmer's expectatio that a particular subroutie should take time 0 o iput of variable legth could be checked agaist actual performace. Checkig via iteractive proofs: There exist iteractive proofs of correctess for certai mathematical computatios ad may suchiteractive proofs may equivaletly be regarded as complex checkers. For example, it follows from the IP method of [Shamir 99] that, if program P claims to solve a PSPACEcomplete problem, the there is a checker for P which requires polyomial time plus a polyomial umber of calls to P. Similarly, the followig iteractiveproof method, due to [Goldreich et al. 99], may equivaletly be regarded as a complex checker. Say that P claims to decide graph isomorphism. If P says that A = B, we ca check this by ruig P o successively reduced versios of A ad B, thereby forcig P to reveal a particular isomorphism. Less trivially, ifp claims that A 6 = B, we repeat several times the followig check: geerate C, a radom isomorphism either of A (with probability ) or of B (with probability ) the ask P to tell us which oe of A or B is isomorphic to C. If A = B, P ca oly guess which ofthetwo we permuted. For more o iteractive proof, refer to the bibliography. Chagig I/O specicatios: I Sectio., we sawhow a easy augmetatio to the output of a sortig program could make the program easier to check. Similarly, cosider the problem of checkig a (log )time biarysearch task. As traditioally stated (see [Betley 986, p. 35], where it features i a relevat discussio of the diculty of writig correct programs), biary search has as iput a key k adaumerical array a[] ::: a[], where a[] a[], ad as output i such thata[i] =k, or0ifk is ot i the array. Note that the problem as stated is ucheckable: for, if the output is 0, it will
In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008
I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces
More informationI. Chisquared Distributions
1 M 358K Supplemet to Chapter 23: CHISQUARED DISTRIBUTIONS, TDISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad tdistributios, we first eed to look at aother family of distributios, the chisquared distributios.
More informationAsymptotic Growth of Functions
CMPS Itroductio to Aalysis of Algorithms Fall 3 Asymptotic Growth of Fuctios We itroduce several types of asymptotic otatio which are used to compare the performace ad efficiecy of algorithms As we ll
More information5 Boolean Decision Trees (February 11)
5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected
More informationLecture 2: Karger s Min Cut Algorithm
priceto uiv. F 3 cos 5: Advaced Algorithm Desig Lecture : Karger s Mi Cut Algorithm Lecturer: Sajeev Arora Scribe:Sajeev Today s topic is simple but gorgeous: Karger s mi cut algorithm ad its extesio.
More informationProperties of MLE: consistency, asymptotic normality. Fisher information.
Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout
More informationSoving Recurrence Relations
Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree
More informationHypothesis testing. Null and alternative hypotheses
Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate
More informationA probabilistic proof of a binomial identity
A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two
More informationTHE REGRESSION MODEL IN MATRIX FORM. For simple linear regression, meaning one predictor, the model is. for i = 1, 2, 3,, n
We will cosider the liear regressio model i matrix form. For simple liear regressio, meaig oe predictor, the model is i = + x i + ε i for i =,,,, This model icludes the assumptio that the ε i s are a sample
More informationKey Ideas Section 81: Overview hypothesis testing Hypothesis Hypothesis Test Section 82: Basics of Hypothesis Testing Null Hypothesis
Chapter 8 Key Ideas Hypothesis (Null ad Alterative), Hypothesis Test, Test Statistic, Pvalue Type I Error, Type II Error, Sigificace Level, Power Sectio 81: Overview Cofidece Itervals (Chapter 7) are
More informationCenter, Spread, and Shape in Inference: Claims, Caveats, and Insights
Ceter, Spread, ad Shape i Iferece: Claims, Caveats, ad Isights Dr. Nacy Pfeig (Uiversity of Pittsburgh) AMATYC November 2008 Prelimiary Activities 1. I would like to produce a iterval estimate for the
More informationChapter 6: Variance, the law of large numbers and the MonteCarlo method
Chapter 6: Variace, the law of large umbers ad the MoteCarlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value
More informationUniversal coding for classes of sources
Coexios module: m46228 Uiversal codig for classes of sources Dever Greee This work is produced by The Coexios Project ad licesed uder the Creative Commos Attributio Licese We have discussed several parametric
More informationDivide and Conquer. Maximum/minimum. Integer Multiplication. CS125 Lecture 4 Fall 2015
CS125 Lecture 4 Fall 2015 Divide ad Coquer We have see oe geeral paradigm for fidig algorithms: the greedy approach. We ow cosider aother geeral paradigm, kow as divide ad coquer. We have already see a
More informationChapter 7 Methods of Finding Estimators
Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of
More informationwhere: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return
EVALUATING ALTERNATIVE CAPITAL INVESTMENT PROGRAMS By Ke D. Duft, Extesio Ecoomist I the March 98 issue of this publicatio we reviewed the procedure by which a capital ivestmet project was assessed. The
More informationDepartment of Computer Science, University of Otago
Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS200609 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly
More informationIncremental calculation of weighted mean and variance
Icremetal calculatio of weighted mea ad variace Toy Fich faf@cam.ac.uk dot@dotat.at Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically
More informationOutput Analysis (2, Chapters 10 &11 Law)
B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should
More informationDetermining the sample size
Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors
More informationNPTEL STRUCTURAL RELIABILITY
NPTEL Course O STRUCTURAL RELIABILITY Module # 0 Lecture 1 Course Format: Web Istructor: Dr. Aruasis Chakraborty Departmet of Civil Egieerig Idia Istitute of Techology Guwahati 1. Lecture 01: Basic Statistics
More informationCHAPTER 3 DIGITAL CODING OF SIGNALS
CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity
More informationModule 4: Mathematical Induction
Module 4: Mathematical Iductio Theme 1: Priciple of Mathematical Iductio Mathematical iductio is used to prove statemets about atural umbers. As studets may remember, we ca write such a statemet as a predicate
More informationDomain 1: Designing a SQL Server Instance and a Database Solution
Maual SQL Server 2008 Desig, Optimize ad Maitai (70450) 18004186789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a
More informationRunning Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis
Ruig Time ( 3.) Aalysis of Algorithms Iput Algorithm Output A algorithm is a stepbystep procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.
More informationExample 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here).
BEGINNING ALGEBRA Roots ad Radicals (revised summer, 00 Olso) Packet to Supplemet the Curret Textbook  Part Review of Square Roots & Irratioals (This portio ca be ay time before Part ad should mostly
More informationGrade 7. Strand: Number Specific Learning Outcomes It is expected that students will:
Strad: Number Specific Learig Outcomes It is expected that studets will: 7.N.1. Determie ad explai why a umber is divisible by 2, 3, 4, 5, 6, 8, 9, or 10, ad why a umber caot be divided by 0. [C, R] [C]
More informationModified Line Search Method for Global Optimization
Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o
More informationLearning outcomes. Algorithms and Data Structures. Time Complexity Analysis. Time Complexity Analysis How fast is the algorithm? Prof. Dr.
Algorithms ad Data Structures Algorithm efficiecy Learig outcomes Able to carry out simple asymptotic aalysisof algorithms Prof. Dr. Qi Xi 2 Time Complexity Aalysis How fast is the algorithm? Code the
More information3. Covariance and Correlation
Virtual Laboratories > 3. Expected Value > 1 2 3 4 5 6 3. Covariace ad Correlatio Recall that by takig the expected value of various trasformatios of a radom variable, we ca measure may iterestig characteristics
More informationThe Forgotten Middle. research readiness results. Executive Summary
The Forgotte Middle Esurig that All Studets Are o Target for College ad Career Readiess before High School Executive Summary Today, college readiess also meas career readiess. While ot every high school
More informationDiscrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13
EECS 70 Discrete Mathematics ad Probability Theory Sprig 2014 Aat Sahai Note 13 Itroductio At this poit, we have see eough examples that it is worth just takig stock of our model of probability ad may
More informationHere are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.
This documet was writte ad copyrighted by Paul Dawkis. Use of this documet ad its olie versio is govered by the Terms ad Coditios of Use located at http://tutorial.math.lamar.edu/terms.asp. The olie versio
More informationStandard Errors and Confidence Intervals
Stadard Errors ad Cofidece Itervals Itroductio I the documet Data Descriptio, Populatios ad the Normal Distributio a sample had bee obtaied from the populatio of heights of 5yearold boys. If we assume
More informationRecursion and Recurrences
Chapter 5 Recursio ad Recurreces 5.1 Growth Rates of Solutios to Recurreces Divide ad Coquer Algorithms Oe of the most basic ad powerful algorithmic techiques is divide ad coquer. Cosider, for example,
More informationCS103A Handout 23 Winter 2002 February 22, 2002 Solving Recurrence Relations
CS3A Hadout 3 Witer 00 February, 00 Solvig Recurrece Relatios Itroductio A wide variety of recurrece problems occur i models. Some of these recurrece relatios ca be solved usig iteratio or some other ad
More informationNonlife insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring
Nolife isurace mathematics Nils F. Haavardsso, Uiversity of Oslo ad DNB Skadeforsikrig Mai issues so far Why does isurace work? How is risk premium defied ad why is it importat? How ca claim frequecy
More informationChair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics
Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to
More informationNotes on exponential generating functions and structures.
Notes o expoetial geeratig fuctios ad structures. 1. The cocept of a structure. Cosider the followig coutig problems: (1) to fid for each the umber of partitios of a elemet set, (2) to fid for each the
More informationTHE ARITHMETIC OF INTEGERS.  multiplication, exponentiation, division, addition, and subtraction
THE ARITHMETIC OF INTEGERS  multiplicatio, expoetiatio, divisio, additio, ad subtractio What to do ad what ot to do. THE INTEGERS Recall that a iteger is oe of the whole umbers, which may be either positive,
More information4.1 Sigma Notation and Riemann Sums
0 the itegral. Sigma Notatio ad Riema Sums Oe strategy for calculatig the area of a regio is to cut the regio ito simple shapes, calculate the area of each simple shape, ad the add these smaller areas
More informationUnit 20 Hypotheses Testing
Uit 2 Hypotheses Testig Objectives: To uderstad how to formulate a ull hypothesis ad a alterative hypothesis about a populatio proportio, ad how to choose a sigificace level To uderstad how to collect
More information7. Sample Covariance and Correlation
1 of 8 7/16/2009 6:06 AM Virtual Laboratories > 6. Radom Samples > 1 2 3 4 5 6 7 7. Sample Covariace ad Correlatio The Bivariate Model Suppose agai that we have a basic radom experimet, ad that X ad Y
More informationResearch Method (I) Knowledge on Sampling (Simple Random Sampling)
Research Method (I) Kowledge o Samplig (Simple Radom Samplig) 1. Itroductio to samplig 1.1 Defiitio of samplig Samplig ca be defied as selectig part of the elemets i a populatio. It results i the fact
More informationGregory Carey, 1998 Linear Transformations & Composites  1. Linear Transformations and Linear Composites
Gregory Carey, 1998 Liear Trasformatios & Composites  1 Liear Trasformatios ad Liear Composites I Liear Trasformatios of Variables Meas ad Stadard Deviatios of Liear Trasformatios A liear trasformatio
More informationAnalyzing Longitudinal Data from Complex Surveys Using SUDAAN
Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical
More informationSECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES
SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,
More informationTrading the randomness  Designing an optimal trading strategy under a drifted random walk price model
Tradig the radomess  Desigig a optimal tradig strategy uder a drifted radom walk price model Yuao Wu Math 20 Project Paper Professor Zachary Hamaker Abstract: I this paper the author iteds to explore
More informationSequences and Series
CHAPTER 9 Sequeces ad Series 9.. Covergece: Defiitio ad Examples Sequeces The purpose of this chapter is to itroduce a particular way of geeratig algorithms for fidig the values of fuctios defied by their
More informationUniversity of California, Los Angeles Department of Statistics. Distributions related to the normal distribution
Uiversity of Califoria, Los Ageles Departmet of Statistics Statistics 100B Istructor: Nicolas Christou Three importat distributios: Distributios related to the ormal distributio Chisquare (χ ) distributio.
More informationEstimating the Mean and Variance of a Normal Distribution
Estimatig the Mea ad Variace of a Normal Distributio Learig Objectives After completig this module, the studet will be able to eplai the value of repeatig eperimets eplai the role of the law of large umbers
More informationMARTINGALES AND A BASIC APPLICATION
MARTINGALES AND A BASIC APPLICATION TURNER SMITH Abstract. This paper will develop the measuretheoretic approach to probability i order to preset the defiitio of martigales. From there we will apply this
More informationINVESTMENT PERFORMANCE COUNCIL (IPC)
INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks
More informationAQA STATISTICS 1 REVISION NOTES
AQA STATISTICS 1 REVISION NOTES AVERAGES AND MEASURES OF SPREAD www.mathsbox.org.uk Mode : the most commo or most popular data value the oly average that ca be used for qualitative data ot suitable if
More information1 Introduction to reducing variance in Monte Carlo simulations
Copyright c 007 by Karl Sigma 1 Itroductio to reducig variace i Mote Carlo simulatios 11 Review of cofidece itervals for estimatig a mea I statistics, we estimate a uow mea µ = E(X) of a distributio by
More informationLecture 4: Cauchy sequences, BolzanoWeierstrass, and the Squeeze theorem
Lecture 4: Cauchy sequeces, BolzaoWeierstrass, ad the Squeeze theorem The purpose of this lecture is more modest tha the previous oes. It is to state certai coditios uder which we are guarateed that limits
More informationWeek 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable
Week 3 Coditioal probabilities, Bayes formula, WEEK 3 page 1 Expected value of a radom variable We recall our discussio of 5 card poker hads. Example 13 : a) What is the probability of evet A that a 5
More informationOverview. Learning Objectives. Point Estimate. Estimation. Estimating the Value of a Parameter Using Confidence Intervals
Overview Estimatig the Value of a Parameter Usig Cofidece Itervals We apply the results about the sample mea the problem of estimatio Estimatio is the process of usig sample data estimate the value of
More information0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5
Sectio 13 KolmogorovSmirov test. Suppose that we have a i.i.d. sample X 1,..., X with some ukow distributio P ad we would like to test the hypothesis that P is equal to a particular distributio P 0, i.e.
More information.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth
Questio 1: What is a ordiary auity? Let s look at a ordiary auity that is certai ad simple. By this, we mea a auity over a fixed term whose paymet period matches the iterest coversio period. Additioally,
More informationHypergeometric Distributions
7.4 Hypergeometric Distributios Whe choosig the startig lieup for a game, a coach obviously has to choose a differet player for each positio. Similarly, whe a uio elects delegates for a covetio or you
More information{{1}, {2, 4}, {3}} {{1, 3, 4}, {2}} {{1}, {2}, {3, 4}} 5.4 Stirling Numbers
. Stirlig Numbers Whe coutig various types of fuctios from., we quicly discovered that eumeratig the umber of oto fuctios was a difficult problem. For a domai of five elemets ad a rage of four elemets,
More informationA Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design
A Combied Cotiuous/Biary Geetic Algorithm for Microstrip Atea Desig Rady L. Haupt The Pesylvaia State Uiversity Applied Research Laboratory P. O. Box 30 State College, PA 168040030 haupt@ieee.org Abstract:
More informationSequences II. Chapter 3. 3.1 Convergent Sequences
Chapter 3 Sequeces II 3. Coverget Sequeces Plot a graph of the sequece a ) = 2, 3 2, 4 3, 5 + 4,...,,... To what limit do you thik this sequece teds? What ca you say about the sequece a )? For ǫ = 0.,
More informationThe Stable Marriage Problem
The Stable Marriage Problem William Hut Lae Departmet of Computer Sciece ad Electrical Egieerig, West Virgiia Uiversity, Morgatow, WV William.Hut@mail.wvu.edu 1 Itroductio Imagie you are a matchmaker,
More informationChapter 5 O A Cojecture Of Erdíos Proceedigs NCUR VIII è1994è, Vol II, pp 794í798 Jeærey F Gold Departmet of Mathematics, Departmet of Physics Uiversity of Utah Do H Tucker Departmet of Mathematics Uiversity
More information*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.
Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.
More informationChapter 5: Inner Product Spaces
Chapter 5: Ier Product Spaces Chapter 5: Ier Product Spaces SECION A Itroductio to Ier Product Spaces By the ed of this sectio you will be able to uderstad what is meat by a ier product space give examples
More information9.8: THE POWER OF A TEST
9.8: The Power of a Test CD91 9.8: THE POWER OF A TEST I the iitial discussio of statistical hypothesis testig, the two types of risks that are take whe decisios are made about populatio parameters based
More information8.1 Arithmetic Sequences
MCR3U Uit 8: Sequeces & Series Page 1 of 1 8.1 Arithmetic Sequeces Defiitio: A sequece is a comma separated list of ordered terms that follow a patter. Examples: 1, 2, 3, 4, 5 : a sequece of the first
More informationFOUNDATIONS OF MATHEMATICS AND PRECALCULUS GRADE 10
FOUNDATIONS OF MATHEMATICS AND PRECALCULUS GRADE 10 [C] Commuicatio Measuremet A1. Solve problems that ivolve liear measuremet, usig: SI ad imperial uits of measure estimatio strategies measuremet strategies.
More informationConfidence Intervals for One Mean
Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a
More informationINVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology
Adoptio Date: 4 March 2004 Effective Date: 1 Jue 2004 Retroactive Applicatio: No Public Commet Period: Aug Nov 2002 INVESTMENT PERFORMANCE COUNCIL (IPC) Preface Guidace Statemet o Calculatio Methodology
More information7.1 Finding Rational Solutions of Polynomial Equations
4 Locker LESSON 7. Fidig Ratioal Solutios of Polyomial Equatios Name Class Date 7. Fidig Ratioal Solutios of Polyomial Equatios Essetial Questio: How do you fid the ratioal roots of a polyomial equatio?
More information1 Computing the Standard Deviation of Sample Means
Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.
More informationCHAPTER 3 THE TIME VALUE OF MONEY
CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all
More informationIrreducible polynomials with consecutive zero coefficients
Irreducible polyomials with cosecutive zero coefficiets Theodoulos Garefalakis Departmet of Mathematics, Uiversity of Crete, 71409 Heraklio, Greece Abstract Let q be a prime power. We cosider the problem
More informationarxiv:1012.1336v2 [cs.cc] 8 Dec 2010
Uary SubsetSum is i Logspace arxiv:1012.1336v2 [cs.cc] 8 Dec 2010 1 Itroductio Daiel M. Kae December 9, 2010 I this paper we cosider the Uary SubsetSum problem which is defied as follows: Give itegers
More informationNormal Distribution.
Normal Distributio www.icrf.l Normal distributio I probability theory, the ormal or Gaussia distributio, is a cotiuous probability distributio that is ofte used as a first approimatio to describe realvalued
More informationChatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand ocpky@hotmail.com
SOLVING THE OIL DELIVERY TRUCKS ROUTING PROBLEM WITH MODIFY MULTITRAVELING SALESMAN PROBLEM APPROACH CASE STUDY: THE SME'S OIL LOGISTIC COMPANY IN BANGKOK THAILAND Chatpu Khamyat Departmet of Idustrial
More informationLecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009)
18.409 A Algorithmist s Toolkit October 27, 2009 Lecture 13 Lecturer: Joatha Keler Scribe: Joatha Pies (2009) 1 Outlie Last time, we proved the BruMikowski iequality for boxes. Today we ll go over the
More information5: Introduction to Estimation
5: Itroductio to Estimatio Cotets Acroyms ad symbols... 1 Statistical iferece... Estimatig µ with cofidece... 3 Samplig distributio of the mea... 3 Cofidece Iterval for μ whe σ is kow before had... 4 Sample
More informationThe analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection
The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity
More informationSolving DivideandConquer Recurrences
Solvig DivideadCoquer Recurreces Victor Adamchik A divideadcoquer algorithm cosists of three steps: dividig a problem ito smaller subproblems solvig (recursively) each subproblem the combiig solutios
More informationThe Power of Free Branching in a General Model of Backtracking and Dynamic Programming Algorithms
The Power of Free Brachig i a Geeral Model of Backtrackig ad Dyamic Programmig Algorithms SASHKA DAVIS IDA/Ceter for Computig Scieces Bowie, MD sashka.davis@gmail.com RUSSELL IMPAGLIAZZO Dept. of Computer
More informationThe Euler Totient, the Möbius and the Divisor Functions
The Euler Totiet, the Möbius ad the Divisor Fuctios Rosica Dieva July 29, 2005 Mout Holyoke College South Hadley, MA 01075 1 Ackowledgemets This work was supported by the Mout Holyoke College fellowship
More information5.4 Amortization. Question 1: How do you find the present value of an annuity? Question 2: How is a loan amortized?
5.4 Amortizatio Questio 1: How do you fid the preset value of a auity? Questio 2: How is a loa amortized? Questio 3: How do you make a amortizatio table? Oe of the most commo fiacial istrumets a perso
More informationA Faster ClauseShortening Algorithm for SAT with No Restriction on Clause Length
Joural o Satisfiability, Boolea Modelig ad Computatio 1 2005) 4960 A Faster ClauseShorteig Algorithm for SAT with No Restrictio o Clause Legth Evgey Datsi Alexader Wolpert Departmet of Computer Sciece
More informationSolutions to Selected Problems In: Pattern Classification by Duda, Hart, Stork
Solutios to Selected Problems I: Patter Classificatio by Duda, Hart, Stork Joh L. Weatherwax February 4, 008 Problem Solutios Chapter Bayesia Decisio Theory Problem radomized rules Part a: Let Rx be the
More informationSolving Inequalities
Solvig Iequalities Say Thaks to the Authors Click http://www.ck12.org/saythaks (No sig i required) To access a customizable versio of this book, as well as other iteractive cotet, visit www.ck12.org CK12
More informationUC Berkeley Department of Electrical Engineering and Computer Science. EE 126: Probablity and Random Processes. Solutions 9 Spring 2006
Exam format UC Bereley Departmet of Electrical Egieerig ad Computer Sciece EE 6: Probablity ad Radom Processes Solutios 9 Sprig 006 The secod midterm will be held o Wedesday May 7; CHECK the fial exam
More informationTHE HEIGHT OF qbinary SEARCH TREES
THE HEIGHT OF qbinary SEARCH TREES MICHAEL DRMOTA AND HELMUT PRODINGER Abstract. q biary search trees are obtaied from words, equipped with the geometric distributio istead of permutatios. The average
More informationSection 11.3: The Integral Test
Sectio.3: The Itegral Test Most of the series we have looked at have either diverged or have coverged ad we have bee able to fid what they coverge to. I geeral however, the problem is much more difficult
More informationEkkehart Schlicht: Economic Surplus and Derived Demand
Ekkehart Schlicht: Ecoomic Surplus ad Derived Demad Muich Discussio Paper No. 200617 Departmet of Ecoomics Uiversity of Muich Volkswirtschaftliche Fakultät LudwigMaximiliasUiversität Müche Olie at http://epub.ub.uimueche.de/940/
More informationEstimating Probability Distributions by Observing Betting Practices
5th Iteratioal Symposium o Imprecise Probability: Theories ad Applicatios, Prague, Czech Republic, 007 Estimatig Probability Distributios by Observig Bettig Practices Dr C Lych Natioal Uiversity of Irelad,
More informationConvexity, Inequalities, and Norms
Covexity, Iequalities, ad Norms Covex Fuctios You are probably familiar with the otio of cocavity of fuctios. Give a twicedifferetiable fuctio ϕ: R R, We say that ϕ is covex (or cocave up) if ϕ (x) 0 for
More informationThe second difference is the sequence of differences of the first difference sequence, 2
Differece Equatios I differetial equatios, you look for a fuctio that satisfies ad equatio ivolvig derivatives. I differece equatios, istead of a fuctio of a cotiuous variable (such as time), we look for
More informationLecture 3. denote the orthogonal complement of S k. Then. 1 x S k. n. 2 x T Ax = ( ) λ x. with x = 1, we have. i = λ k x 2 = λ k.
18.409 A Algorithmist s Toolkit September 17, 009 Lecture 3 Lecturer: Joatha Keler Scribe: Adre Wibisoo 1 Outlie Today s lecture covers three mai parts: CouratFischer formula ad Rayleigh quotiets The
More informationYour organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:
Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network
More information