The MagnusDerek Game


 Steven Wiggins
 2 years ago
 Views:
Transcription
1 The MagnusDerek Game Z. Nedev S. Muthukrishnan Abstract We introduce a new combinatorial game between two layers: Magnus and Derek. Initially, a token is laced at osition 0 on a round table with n ositions. In each round of the game Magnus chooses the number of ositions for the token to move, and Derek decides in which direction, + (clockwise) or (counterclockwise), the token will be moved. Magnus aims to maximize the total number of ositions visited during the course of the game, while Derek aims to minimize this quantity. We define f (n) to be the eventual size of of the set of visited ositions when both layers lay otimally. We rove a closed form exression for f (n) in terms of the rime factorization of n, and rovide algorithmic strategies for Magnus and Derek to meet this bound. We note the relevance of the game for a mobile agent exloring a ring network with faulty sense of direction, and we ose variants of the game for future study. 1 Introduction We will introduce a new class of combinatorial games that we call the MagnusDerek games, and we will study in detail the basic version of the game. The game is layed on a circular table with n ositions labeled consecutively from 0 to n 1, and with a token initially laced at osition 0. The two layers are called Magnus (from magnitude) and Derek (from direction). Suose the token s current osition is i. A round consists of Magnus calling a magnitude l with 0 < l n followed by Derek calling a direction + (clockwise) or (counterclockwise). The token is then moved to osition i + l mod n or i l mod n according to Derek s choice of direction. Thus, Magnus must choose a set N = {i + l, i l} of two ossibilities for the next osition, and Derek chooses which of these ositions is realized. (In our exlanations of the algorithms, rather than stating the token moves we will often say the next osition will be or even say Magnus moves identifying Magnus with the token.) Magnus s goal is to maximize the cardinality of the set of all ositions visited by the token in the course of the game. Derek s goal is to minimize the cardinality of this set. Note that revisiting a osition does not affect the cardinality. The current token osition, the size of the table (n), and the set of already visited ositions are known to both layers at all times. The algorithmic strategies we resent for both layers are adative: that is, a layer s move deends both on the set of already visited ositions and on the current token osition. We will assume that both layers know the factorization of n at the beginning of the game. We define f (n) to be the eventual cardinality of the set of ositions visited when both layers lay otimally. We will show that f (n) is well defined: Magnus has a strategy to ensure that at least f (n) ositions are visited, and Derek has a strategy to ensure that at most f (n) ositions are visited, irresective of each others strategies. Thus we examine three roblems: Univ. of Victoria, Part of the work was done while visiting DIMACS. DIMACS Permanent Member Rutgers Univ., 1
2 1. What is f (n) for a given n? Clearly f (n) n.. What algorithm for Magnus will ensure that at least f (n) ositions are visited? We refer an algorithm that minimizes the number of moves required to achieve this goal. Less imortantly, we want to minimize the time required for Magnus to comute a magnitude in each round. 3. What algorithm for Derek will ensure that no more than f (n) ositions are visited? Again, we want to minimize the time require for Derek to comute a direction in each round. We are also interested in a lower bound on the number of moves until f (n) ositions are visited. The Main Result Theorem 1 If n = k for some k, then f (n) = n. In this case Magnus has a strategy for visiting all ositions in exactly n 1 moves; the strategy can be formulated as a sequence of n 1 magnitudes at the start of the game, and calculating the sequence requires O(n) time. If n = m where is the smallest odd rime factor of n, then f (n) = ( 1)n and there exists a strategy for Derek to ensure at most f (n) ositions are visited. Derek s calculations require O(1) time in each round. Furthermore there exists a strategy for Magnus to visit at least f (n) ositions in g(n) moves where: If m = 1, g(n) = O(n ) moves. If m = k, g(n) = O( + n) moves. Otherwise, if m = k m 1 where m 1 is bigger than two and odd, g(n) = O( n ) moves. Magnus s comutations require O(1) time in each round. As n increases from 1 to, f (n) is 1,,, 4, 4, 4, 6, 8, 6, 8, 10, 8, 1, 1, 10, 16,.... This sequence has not reviously aeared in the Encycloedia of Integer Sequences [3]. 3 Motivation A mobile agent (MA) is an autonomous comuter rogram that can move itself from host to host in an MAenabled network. Mobile agents have been roosed as efficient solutions for many distributed comuting and network maintenance tasks; one examle is intrusion detection in comuter networks [7]. A common task for an MA is to visit as many as ossible of the hosts or nodes in a network. The notion of a network with a sense of direction is defined in [4, 6]. In [5], the following informal definition is given for a sense of direction in a network with a ring architecture: Sense of direction refers to the caability of a rocessor to distinguish between its adjacent communication lines, according to some globally consistent scheme. In a ring network this roerty is usually referred to as orientation, which exresses the rocessor s ability to distinguish between left and right, where left means the same to all rocessors. A network may be without a sense of direction due to a hardware or software fault, or due to malicious activity by an intruder. We consider a ring network of n hosts in which there is inconsistent global sense of direction. That is, if H 0, H 1,..., H n 1 are our n hosts, H i is connected to (and can communicate only with)
3 H i+1( mod n) and H i 1( mod n). Furthermore, although each host can distinguish between its two adjacent neighbours, the labelling left and right is not consistent across hosts and may not be consistent over time. The game is designed to model an MA attemting to exlore or visit all hosts in such a network. In our model we assume that the each time the MA moves it has no control over the initial direction ( left or right ) of its movement. However, the MA may redetermine how many hosts to ass through before stoing (the magnitude of its movement), and is able to kee moving in the same direction on the ring until it stos. The MA can only exlore hosts at which it stos; it is unable to exlore the hosts through which it asses while moving. In this aer we give an algorithmic strategy for an MA exloring such a network. The strategy ensures that the MA exlores as many hosts as ossible, even when its directions of movement are maliciously chosen to force the MA to visit a minimal number of hosts. Secondary goals of the MA are to (1) minimize the number of moves necessary, and () efficiently comute the magnitude of each move. We formulate the roblem as an adversarial game between two layers: Magnus, reresenting the MA, attemts to visit as many hosts as ossible. Derek, reresenting a malicious adversary, attemts to revent Magnus from achieving this goal. 4 When n = k In this section, we consider the case when n = k. We use C(l, d, s) to denote {s + i d 0 i < l}; that is, the set of l ositions beginning at s that are successively d aart. Lemma If n = k, there is a strategy for Magnus forcing the token to visit all ositions, and Magnus does not need to adat as the game rogresses. Rather, Magnus s strategy (a sequence of n 1 magnitudes) can be determined at the start of the game. Proof. The strategy (and the roof) can be described inductively on the ower k. Let k = 1 so that n =. Magnus calls the magnitude 1 and irresective of Derek s chosen direction, the token moves to the unvisited osition. Hence f () = and only a single move is required. Now let k > 1. We assume that f ( k 1 ) = k 1 and that there exists a sequence d 1, d,..., d k 1 1 of magnitudes to achieve visiting all ositions irresective of Derek s choice of directions. Let n = k. We artition the set C(n, 1, 0) into C( n,, 0) and C( n,, 1). Magnus first uses d 1, d,..., d n to visit all ositions in C( n,, 0). Then, regardless of the resultant osition, Magnus calls 1 forcing the token to move to some osition j in C( n,, 1). Thereafter, Magnus s choices would be d 1, d,..., d n 1 to visit all ositions in C( n,, 1). Therefore, all n ositions are visited and the total number of moves is n 1. The roof is constructive and Magnus s strategy is easy to generate in O(n) time at the start of the game. If n = k for some k, then Magnus can declare the following sequence of moves: ( n 1 ; n ; n 1 ); n 3 ; ( n 1 ; n ; n 1 ); n 4 ; (:::);...; n k ; (:::); Here (:::) means a reetition of all the moves starting from the beginning of the sequence until, but not including, the move before the current (:::). Notice that the sequence as a whole is a alindrome, that its first and second halves are each alindromes, and so forth. 1 Examle. For n = 16, Magnus s choices are (in order and with brackets for clarifications): ((8; 4; 8; ); (8; 4; 8; ))1; ((8; 4; 8; ); (8; 4; 8; )) Henceforth, we will consider values of n that are not exact owers of two. 3
4 5 Derek s Strategy and Proof of f (n) ( 1)n This is the easier art of Theorem 1. Lemma 3 Let n = m where is the smallest odd rime factor of n ( > ). Then f (n) ( 1)n and there exists a strategy for Derek with O(1) running time in each round ensuring that at most f (n) ositions are visited. Proof. Consider the following strategy for Derek. At the beginning of the game, he chooses a osition k where 1 k 1. We claim that Derek can revent any osition congruent to k mod from being visited. The token starts at osition i = 0, which is not congruent to k mod. In each round Derek must choose the next osition from the set {i + l, i l} where i denotes the current osition (not congruent to k mod ) and l denotes the magnitude chosen by Magnus. At least one of i + l and i l is not congruent to k mod, for, otherwise, both i + l = k mod and i l = k mod and by adding the two equations we obtain the contradiction i = k mod, or i = k mod. Derek s algorithm insures that the token never visits any osition in C( n,, k), the set of ositions congruent to k mod. This set has cardinality n and this immediately imlies that f (n) (n n ( 1)n ) = Derek s strategy does not deend on the entire set of reviously visited ositions, but only on the currently visited osition and Magnus s choice of l. In each turn, the calculations for Derek s choice run in O(1) time. Thus, we have roved the Derek s art in Theorem 1. In fact, we have roved a stronger result. Derek can secify in advance a set of ositions (C( n,, k) for a suitable k) and ensure that the token never visits those ositions. It may be of further interest to find a strategy for Derek that not only achieves at most f (n) ositions visited but also revents the token from visiting f (n) ositions before a certain minimum number of rounds are layed in the game. 6 Magnus s Strategy and Proof of f (n) ( 1)n For greater insight into the roblem, we will show two quite different algorithmic strategies for Magnus to visit at least f (n) different ositions. The two strategies share a common idea: although in many situations Magnus cannot reach a given redetermined osition, he can often reach at least one of two redetermined ositions. 6.1 First Strategy for Magnus To rove the general result for n k, we will first state the above idea as a lemma, and then use it to derive an algorithm for Magnus. Lemma 4 Let n k, and let the current osition be K, and let I and J be two distinct ositions such that J > I and gcd(j I, n) = f for some nonnegative integer f (gcd is the greatest common divisor). Then Magnus can find a set of magnitudes with cardinality O(n) such that the token can be moved from K to one of I and J regardless of Derek s choices. These magnitudes can be found in time O(n ). 4
5 Proof. With resect to the air of distinct ositions I and J, we artition all ositions 0,..., n 1 into classes as follows. Class C 0 contains I and J. Class C 1 contains every osition C 0 for which there exists a magnitude d such that both +d mod n C 0 and d mod n C 0. That is, if the current osition is in C 1, Magnus can call a magnitude such that the token ends in a osition in C 0 irresective of Derek s choice. More generally, class C m contains every osition C 0 C 1 C m 1 such that there exists a magnitude d for which both +d mod n C 0 C 1 C m 1 and d mod n C 0 C 1 C m 1. We define C m = C 0 C 1 C m. We will rove that if C m+1 = 0 for any m, then C m = {0,..., n 1}. In other words, as we let i increase and construct C i, if we cannot find at least one osition for C m, then we have exhausted all ositions. We rove this by contradiction. Suose C m+1 = 0 for some m and that there exists a osition α C m. Since C 1 contains at least 1 osition (see construction, below), (m + 1) and we can always find at least three ositions in C m. Consider all ositions in C m sorted in increasing order α 1 < α <... < α t. In the next eleven lines, the index arithmetic is by mod t; for examle, index t (by mod t). If α i α i 1 is even for some i, then there are an odd number of ositions between these ositions. The osition equidistant from both, namely α i 1 + α i+α i 1, belongs to C m+1, giving the contradiction. Suose α i α i 1 is odd for all i. Consider any three consecutive ositions α l 1, α l, α l+1 from Cm. Then, α l+1 α l 1 must be even. If the midoint α l 1 + α l+1+α l 1 is not in Cm, it must belong to C m+1, giving the contradiction. Otherwise, the midoint equals α l. Reeating this argument for each consecutive trile from Cm, we obtain either a contradiction, or that α 1, α,... are arranged as vertices of a regular olygon of less than n vertices (since α Cm) with sides α i α i 1 = L for all i, where L 3 and L is odd. Therefore, n = al for some ositive integer a. Furthermore, since I, J {α 1, α,...} they must be vertices of the olygon and, consequently, J I = bl for some ositive integer b. This imlies that gcd(j I, n) = cl for some ositive integer c. Then gcd(j I, n) f, contradicting the assumtion in the lemma. We have now roven that Cl contains all ositions 0, 1,..., n 1 for some l n 1. We now show how to construct the classes by induction and find an algorithm for Magnus to reach I or J starting from K. For efficiency, we consider each class to be stored as a list. Trivially, C 0 = {I, J}. For convenience, we call the elements of {0, 1, 1, 1 + 1,..., n, n 1 1, n 1, n 1 } oints on the table. In other words, the set of all oints on the the table is the union of the set of all ositions and the set of all (noninteger) midoints between them. To construct C 1, there are only four candidates to consider: the two oints diametrically oosite I and J, and the two midoints between I and J (namely, the two oints equidistant from I and J). From these four ossible oints, we take only those that are integers, and therefore valid ositions. If n is odd, C 1 contains either I + J I or I + J I+n mod n, deending on which is an integer. If n is even, C 1 contains the two ositions oosite to I and J, resectively I + n/ mod n and J + n/ mod n. When n is even, the two midoints are either both integers or both nonintegers; if they are integers, we also include them in C 1. Notice that it is not ossible for I and J to be diametrically oosite to each other. If they were, gcd((j I), n) = gcd( n, n) = n and cannot be f since n k. Therefore, C1 3 regardless of whether n is even or odd. Now suose we have already constructed C 0, C 1,, C m, C m 1 as lists. Notice that this defines an order for each element in Cm 1 (and, eventually, will define an order for {0, 1,..., n 1}): first come the elements from C 0, in their order, then the elements from C 1, in their order, and so forth. For each C m 1, we consider its diametrically oosite oint, + n mod n, and all midoints between and any q Cm 1 with q occuring before in the order. We add to C m whichever of these are integers and do not already belong to Cm 1 (or C m). The construction requires O(j) time for a table 5
6 osition in the jth lace in the order; therefore, the entire rocess takes O(1) + O() O(n) = O(n ) time. Each osition i = 0,..., n 1 belongs to some class C h(i). The construction also shows how to determine for each initial osition i a magnitude d i such that Magnus can force the token to a osition in class C h(i) 1, irresective of Derek s choice. Now, suose K belongs to some class C h(k). Magnus can choose d K to move to a osition in C h(k) 1. Iterating this rocess, the token finally moves to a osition in C 0, roving the lemma. Using lemma 4, we can now rove that f (n) ( 1) n. Lemma 5 Let n = m k where m, k are nonnegative integers and is the smallest odd rime factor of n. Then there exists an O(n 3 ) time algorithm for Magnus that roduces a sequence of O(n ) moves such that f (n) ( 1) n. Proof. From any current osition K, if there exist two unvisited ositions I and J, J > I, such that gcd(j I, n) = f for some integer f, Magnus emloys the algorithm in lemma 4 to reach either I or J. After Magnus reaches either I or J, Magnus reeats this rocedure until no air of unvisited ositions I and J satisfy gcd(j I, n) = f. We claim that at most n ositions remain unvisited. Suose otherwise. We artition all n ositions into n consecutive grous of ositions as follows: (0, 1,,..., 1), (, +1, +,..., 1),..., (n, n +1,..., n 1). By the igeonhole rincile, there will be at least one grou containing two unvisited ositions, say I and J. We have J I 1 since they both belong to the same grou. Since is the smallest odd rime factor of n, gcd(j I, n) must be a ower of (including 0 = 1), which is a contradiction. The above strategy for Magnus roves the main theorem and yields insight into the structure of the roblem. We will now give an alternative, more efficient strategy for Magnus. 6. Second Strategy for Magnus First, we will rovide a strategy for the simle case when n is rime and then use it as a tool for the general case n = m. Although the techniques of this strategy differ from the revious one, it is built on the same substrategy: in many situations Magnus can reach at least one osition from a set of two. Lemma 6 If n > is rime, then f (n) n 1 and there exists a corresonding strategy for Magnus that requires O(n ) moves. At each move Magnus s comutations run in O(1) time. Proof. First, we rovide a O(n) stes rocedure for Magnus to reach at least one osition from a set of two different ositions α and β, β > α. Let d = β α mod n and say Magnus is at osition 0 currently. Then we can reresent o as [ 0 = α + ( 0 α)1 = α + ( 0 α)d 1] 0 d = α + µ 0 0 d where d 1 is the inverse of d and µ 0 = [ ( 0 α)d 1]. Let i be the token s osition at the end of ste i for i = 0, 1,..., n 1. A ste does not always corresond to a round, so it is ossible i = i 1, in which case only the formula for the current osition changes. Consider the following strategy for Magnus. At each ste i, if µ i 1 is even, let µ i µ i 1 / and no move is erformed; only the current osition changes its reresentation to i 1 = i = α+µ i i d mod n. If µ i 1 is odd, Magnus calls l = i 1 d mod n and moves to i = [ ] α + µ i 1 i 1 d ± i 1 d = α + [µ i 1 ± 1] i 1 d = α + 6 [ µi 1 ± 1 ] i d
7 deending on whether Derek s resonse is + or. Setting µ i if Derek s resonse is + or µ i = µ i 1 1 otherwise, the osition at the end of ste i can be reresented again as i = α + µ i i d mod n = µ i 1+1 After n 1 iterations, µ n 1 = 0 or 1 since µ 0 n 1 and µ i < µ i 1 unless µ i 1 was 0 or 1. Hence, n 1 = α + 0 n 1 d = α or n 1 = α + 1 n 1 d mod n. By Fermat s little theorem [], we know that n 1 = 1 mod n for rime n. Hence, Magnus is in either α or α + d = β after O(n) stes. Therefore, the rocedure takes O(n) moves (since one ste corresonds to zero or one round), and each ste takes O(1) time to calculate µ i. Now starting with any osition, Magnus has a strategy to achieve f (n) n 1. Whenever there are two or more unvisited ositions, he alies the above substrategy of O(n) moves for a total of O(n ) moves, giving the lemma. The lemma holds regardless of the starting osition. Also, the easiest way to calculate the new i d is to multily the old i 1 d by mod n. Combining lemma 6 with lemma 3 gives the value for f (n) when n is rime. As an aside, the study of the length of the µ i sequence with adversarial sequence of + and resonses from Derek may be of indeendent interest. Now we turn to the general case of n. Lemma 7 Let n = k 1... s where 1,,..., s are rime numbers, s and s 1 is an integer. Then there exists a strategy for Magnus such that f (n) ( 1)n and the number of moves and the running time for calculating the strategy is bounded as follows. If s = 1, that is, n = k 1, so (n/ 1 ) = k, then the uer bound is O( 1 + n). Otherwise, the uer bound is O(n / 1 ). Proof. For convenience let = 1, that is, we denote with the smallest odd rime factor of n. We artition the set of all ositions, C(n, 1, 0), into sets, C(n/ = m,, i), for i = 0, 1,..., 1. As a reliminary, we show that with O() moves Magnus can visit a osition from any two sets C(n/,, j 1 ) and C(n/,, j ), where j 1 j. Magnus uses an adatation of the technique from lemma 6. He calculates the magnitudes to call as if the table size were ; if his current osition is k, he assumes that the current osition is k mod ; and he lays as if he wanted to visit one of the two ositions j 1 or j on that imaginary table. The ositions he visits will not be the same as if he were laying on a table with size, but since the table size n = m, they will be congruent by (mod ) to the ositions he would have visited if the table size were. After O() moves, he will be in a real osition that is either congruent to j 1 or j, and, therefore, the osition will belong to C(n/,, j 1 ) or C(n/,, j ). Magnus roceeds in two hases and inductively uses the same two hase strategy on smaller roblem instances. Phase 1. Phase 1 consists of the reetition of two main stes: A and B. Magnus alies ste A after the token comes for the first time on a osition from any set C(n/ = m,, i). In ste A, Magnus lays as if the table size were n/: if n/ is a ower of, he alies the strategy from Section 4. On each round, he calculates an intermediate magnitude l, laying as if only the ositions in C(n/,, i) existed, but then he calls l. if n/ is not a ower of, he alies recursively this two hase algorithm. On each round, he calculates an intermediate magnitude l, laying as if only the ositions in C(n/,, i) existed, but then he calls l. 7
8 When he has visited at least f (n/) ositions from C(n/,, i), we say that Magnus has exlored the set C(n/,, i) and then he erforms ste B. There may be some unvisited ositions left from C(n/,, i). In ste B, Magnus chooses any two sets C(n/,, j 1 ) and C(n/,, j ) never exlored before and using the adatation of the technique from lemma 6, Magnus comes to one of these sets in O() moves. Then he alies ste A again. Phase 1 ends after 1 of the C(n/,, i) sets have been thus exlored and in each navigated set at least f (n/) ositions have been visited. Let at the end of this hase, the unexlored set be C(n/,, γ). There may also exist ositions not in C(n/,, γ) that Magnus has not visited; if no such ositions exist, Phase is not needed. Phase. Consider any osition α / C(n/,, γ) Then α C(n/,, β), with β γ. Magnus can use the following strategy to get with O() moves into either α or a osition from C(n/,, γ). First, using the adatation of the technique from lemma 6 described above, in O() moves, Magnus comes into a osition in either C(n/,, γ) or C(n/,, (β + γ)/) where the division / is erformed on rime field []. Suose Magnus gets onto a osition δ in C(n/,, (β + γ)/). Then Magnus s next move is α δ. If Derek resonds +, Magnus reaches δ + (α δ) which is α. Else, if Derek resonds, then Magnus reaches δ + (δ α) = δ α which is a osition in C(n/,, γ). This is because we have δ = (β + γ)/ + l 1 and α = β + l for some nonnegative integers l 1 and l. Thus δ α = γ + (l 1 l ). Using the above strategy reeatedly with unvisited ositions outside of the set C(n/,, γ) Magnus can either visit them all in which case the hases are comlete or come onto a osition in C(n/,, γ). In this second case, Magnus exlores C(n/,, γ) by using this two hase algorithm recursively as in ste A of Phase 1. Thus, Magnus visits f (n/) ositions in C(n/,, γ) and the hases are comlete. We can now count the number of visited ositions. There are two ossibilities: either all ositions in each set C(n/,, i), where i γ are visited, or all C(n/,, i) s are visited and exlored using the two hase strategy. Hence, we have f (n) min{( 1)n/, f (n/)} Observe that inductively we can set f (n/) ( 1)(n/) since either n/ is exact ower of two in which case f (n/) = n/ or otherwise because is no larger than the smallest odd rime factor of n/. That roves f (n) ( 1)n. We can uer bound the number of moves, say g(n). Case 1. If s = 1, that is, n = k so (n/) = k. Then once Magnus reaches for the first time a set C(n/,, i γ), he can use the algorithm from Section 4 to visit all ositions in it for (n/) 1 moves. So g(n) + ( 1)( k 1) + n. Case. If n has at least two odd rime factors, that is, s and n = k 1... s where 1,,..., s are the odd rime factors of n sorted in increasing order. Then Magnus needs at most 1 moves in total to get for the first time into each of the sets C(n/ 1, 1, i γ) s. Together for Phase 1 and Phase, the total number of moves for navigating within the various C(n/ 1, 1, i) s is uer bounded by ( 1 1)g(n/ 1 ) + g(n/ 1 ) + ( 1 1)(n/ 1 )(1/ 1 )( 1 ) where the first summand is for navigating within the 1 1 sets C(n/ 1, 1, i γ) s in Phase 1, and the second summand is for navigating C(n/ 1, 1, γ) if Magnus reaches ositions in it in Phase. The third summand is for visiting all unvisited nodes left after Phase 1 in the 1 1 number of sets C(n/ 1, 1, i γ). To visit each of these unvisited nodes takes at most 1 moves and in each such set there are at most (1/ 1 )(n/ 1 ) nodes left unvisited after Phase 1. Hence, g(n) g(n/ 1 ) + n. (1) 8
9 Using the above inequality (1), we get that for j = 1,,..., s we have From Case 1 it follows that n g( ) n n j j+1 g( ) () 1... j 1... j 1... j+1 n g( ) n s + (3) 1... s s 1 Alying recursively the inequalities from () and from (3) to the right hand side of inequality (1), we get g(n) n g(n/ 1 ) n n + 1 g( n 1 ) 4n n + n n 1 3 g( 1 3 )... n(s 1) s 1 g( 1... s 1 ) n(s 1) s 1 ( n s s 1 ) n(s 1) + n s + n n s + n(s 1) (4) Since obviously (s 1) 1... s 1, we have the simler g(n) n s +n / s n / 1 = O(n / 1 ). Because, at each move, Magnuss comutations in lemma 6 run in O(1) time, here, in the general case of n, Magnuss comutations run also in O(1) time. Both the number of moves and the running time of the algorithm for Magnus are nonmonotonic functions over n; similarly, f (n) is also nonmonotonic with increasing n. These three factors deend on the factorization of n, and esecially on its smallest odd rime factor. 7 Concluding Remarks We have initiated the study of two erson games we call the MagnusDerek games. We have roved tight existential bounds and shown matching algorithmic strategies on the basic version of the roblem. An immediate oen roblem is if we can imrove the number of moves (or the running time) of the algorithms. The following variants for the game may be of further interest. Dual roblems. Say the game stos after no more than m rounds, and let f m(n) be the size of visited set if both layers lay otimally. What is f m(n) and what are associated strategies? Off line strategy construction. Given a sequence d 1, d,..., d k of Magnus s moves, design corresonding + s or s for the Derek so that f (n) is minimized. Nonadative strategies. Limit Magnus and/or Derek to use only nonadative strategies, that is, Magnus (res. Derek) resecifies a sequence of moves without knowing Derek s (res. Magnus s) resonses, and evaluate the sequence when Derek (res. Magnus) later secifies resonses in order to otimize their goal. What is f (n) and what are associated nonadative strategies? Limit revisits. Suose Magnus may not visit a osition more than say k times. Then, what is f k (n) and what are associated strategies? Random strategies. Suose Magnus or Derek used random strategies. The roblem is to estimate the exected f (n). This is akin to random walks with random stes, but differs in having either one of the layer being deterministic or adversarial. Limiting information. Suose Magnus and/or Derek do not know n or knows n but does not have a way to factorize it. This is similar to grah exloration roblems studied in theoretical comuter science with limited number of tokens or memory. [1]. 9
10 Making each layer nag as well as move. The two layers have asymmetrical roles. For each move, first, Magnus chooses its magnitude, then Derek determines its direction. While Magnus wants to maximize the cardinality of the set of visited ositions, Derek wants to maximize the cardinality of the set of unvisited ositions. In other twoerson games too, this tye of asymmetry is seen (for examle, the PusherChooser games of [8]). We roose a modified game in which Magnus and Derek alternate their roles each round. Positions visited by Magnus are colored red, and those by Derek are colored blue. Derek is restricted to nonred ositions and Magnus to nonblue. What are suitable strategies and how many ositions are visited by each layer? 8 Acknowledgements We are grateful to the following eole and institutions for their advice, discussion, and suort: Jeffrey O. Shallit, Noam Sturmwind for editing assistance, Valerie King, Uriel Feige, Nicola Santoro, Graham Cormode, Richard Guy, Susan Hoe and Peter Winkler; the School of Comuter Science at University of Waterloo and the DIMACS Center.. References [1] M. A. Bender, A. Fernandez, D. Ron, A. Sahai, and S. Vadhan. The Power of a Pebble: Exloring and Maing Directed Grahs. Proc. of the 30th Annual ACM Symosium on Theory of Comuting (STOC), ages 6978, [] I. Niven and H. Zuckerman. An introduction to the theory of numbers. John Wiley and Sons Inc, [3] N. Sloane. On line Encycloedia of Sequences. htt:// njas/sequences/ [4] N. Santoro. Sense of Direction, Toological Awareness and Communication Comlexity. SIGACT News, 16:, 1984, [5] H. Attiya, J. van Leeuwen, N. Santoro, S. Zaks. Efficient Elections in Chordal Ring Networks. Algorithmica (1989) 4: [6] P. Flocchini, B. Mans, N. Santoro. Sense of Direction: Definitions, Proerties, and Classes. Networks 3 (1998), no. 3, [7] Wayne A. Jansen. Intrusion detection with mobile agents. Comuter Communications, Volume 5, Issue 15, 15 Setember 00: [8] J. Sencer and P. Winkler. Three thresholds for a liar. Combinatorics, Probability and Comuting, 1:1 (199),
The Online Freezetag Problem
The Online Freezetag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,
More information1 Gambler s Ruin Problem
Coyright c 2009 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins
More informationAlgorithms for Constructing ZeroDivisor Graphs of Commutative Rings Joan Krone
Algorithms for Constructing ZeroDivisor Grahs of Commutative Rings Joan Krone Abstract The idea of associating a grah with the zerodivisors of a commutative ring was introduced in [3], where the author
More informationPoint Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)
Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint
More informationNumber Theory Naoki Sato <ensato@hotmail.com>
Number Theory Naoki Sato 0 Preface This set of notes on number theory was originally written in 1995 for students at the IMO level. It covers the basic background material that an
More informationX How to Schedule a Cascade in an Arbitrary Graph
X How to Schedule a Cascade in an Arbitrary Grah Flavio Chierichetti, Cornell University Jon Kleinberg, Cornell University Alessandro Panconesi, Saienza University When individuals in a social network
More informationPrice Elasticity of Demand MATH 104 and MATH 184 Mark Mac Lean (with assistance from Patrick Chan) 2011W
Price Elasticity of Demand MATH 104 and MATH 184 Mark Mac Lean (with assistance from Patrick Chan) 2011W The rice elasticity of demand (which is often shortened to demand elasticity) is defined to be the
More informationSQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWODIMENSIONAL GRID
International Journal of Comuter Science & Information Technology (IJCSIT) Vol 6, No 4, August 014 SQUARE GRID POINTS COVERAGED BY CONNECTED SOURCES WITH COVERAGE RADIUS OF ONE ON A TWODIMENSIONAL GRID
More informationSOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q. 1. Quadratic Extensions
SOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q TREVOR ARNOLD Abstract This aer demonstrates a few characteristics of finite extensions of small degree over the rational numbers Q It comrises attemts
More informationENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS
ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 lgrigore@cs.uic.edu Ugo Buy Comuter Science
More informationVariations on the Gambler s Ruin Problem
Variations on the Gambler s Ruin Problem Mat Willmott December 6, 2002 Abstract. This aer covers the history and solution to the Gambler s Ruin Problem, and then exlores the odds for each layer to win
More informationApproximate Guarding of Monotone and Rectilinear Polygons
Aroximate Guarding of Monotone and Rectilinear Polygons Erik Krohn Bengt J. Nilsson Abstract We show that vertex guarding a monotone olygon is NPhard and construct a constant factor aroximation algorithm
More informationMath 5330 Spring Notes Prime Numbers
Math 5330 Sring 206 Notes Prime Numbers The study of rime numbers is as old as mathematics itself. This set of notes has a bunch of facts about rimes, or related to rimes. Much of this stuff is old dating
More informationOn Multicast Capacity and Delay in Cognitive Radio Mobile Adhoc Networks
On Multicast Caacity and Delay in Cognitive Radio Mobile Adhoc Networks Jinbei Zhang, Yixuan Li, Zhuotao Liu, Fan Wu, Feng Yang, Xinbing Wang Det of Electronic Engineering Det of Comuter Science and Engineering
More informationFREQUENCIES OF SUCCESSIVE PAIRS OF PRIME RESIDUES
FREQUENCIES OF SUCCESSIVE PAIRS OF PRIME RESIDUES AVNER ASH, LAURA BELTIS, ROBERT GROSS, AND WARREN SINNOTT Abstract. We consider statistical roerties of the sequence of ordered airs obtained by taking
More informationPythagorean Triples and Rational Points on the Unit Circle
Pythagorean Triles and Rational Points on the Unit Circle Solutions Below are samle solutions to the roblems osed. You may find that your solutions are different in form and you may have found atterns
More informationAssignment 9; Due Friday, March 17
Assignment 9; Due Friday, March 17 24.4b: A icture of this set is shown below. Note that the set only contains oints on the lines; internal oints are missing. Below are choices for U and V. Notice that
More informationA Modified Measure of Covert Network Performance
A Modified Measure of Covert Network Performance LYNNE L DOTY Marist College Deartment of Mathematics Poughkeesie, NY UNITED STATES lynnedoty@maristedu Abstract: In a covert network the need for secrecy
More information6.042/18.062J Mathematics for Computer Science December 12, 2006 Tom Leighton and Ronitt Rubinfeld. Random Walks
6.042/8.062J Mathematics for Comuter Science December 2, 2006 Tom Leighton and Ronitt Rubinfeld Lecture Notes Random Walks Gambler s Ruin Today we re going to talk about onedimensional random walks. In
More informationA 60,000 DIGIT PRIME NUMBER OF THE FORM x 2 + x Introduction StarkHeegner Theorem. Let d > 0 be a squarefree integer then Q( d) has
A 60,000 DIGIT PRIME NUMBER OF THE FORM x + x + 4. Introduction.. Euler s olynomial. Euler observed that f(x) = x + x + 4 takes on rime values for 0 x 39. Even after this oint f(x) takes on a high frequency
More informationThe Optimal Sequenced Route Query
The Otimal Sequenced Route Query Mehdi Sharifzadeh, Mohammad Kolahdouzan, Cyrus Shahabi Comuter Science Deartment University of Southern California Los Angeles, CA 900890781 [sharifza, kolahdoz, shahabi]@usc.edu
More informationEffect Sizes Based on Means
CHAPTER 4 Effect Sizes Based on Means Introduction Raw (unstardized) mean difference D Stardized mean difference, d g Resonse ratios INTRODUCTION When the studies reort means stard deviations, the referred
More informationChapter 9, Part B Hypothesis Tests. Learning objectives
Chater 9, Part B Hyothesis Tests Slide 1 Learning objectives 1. Able to do hyothesis test about Poulation Proortion 2. Calculatethe Probability of Tye II Errors 3. Understand ower of the test 4. Determinethe
More information2.1 Simple & Compound Propositions
2.1 Simle & Comound Proositions 1 2.1 Simle & Comound Proositions Proositional Logic can be used to analyse, simlify and establish the equivalence of statements. A knowledge of logic is essential to the
More informationLecture Notes: Discrete Mathematics
Lecture Notes: Discrete Mathematics GMU Math 125001 Sring 2007 Alexei V Samsonovich Any theoretical consideration, no matter how fundamental it is, inevitably relies on key rimary notions that are acceted
More informationBranchandPrice for Service Network Design with Asset Management Constraints
BranchandPrice for Servicee Network Design with Asset Management Constraints Jardar Andersen Roar Grønhaug Mariellee Christiansen Teodor Gabriel Crainic December 2007 CIRRELT200755 BranchandPrice
More informationAutomatic Search for Correlated Alarms
Automatic Search for Correlated Alarms KlausDieter Tuchs, Peter Tondl, Markus Radimirsch, Klaus Jobmann Institut für Allgemeine Nachrichtentechnik, Universität Hannover Aelstraße 9a, 0167 Hanover, Germany
More informationStochastic Derivation of an Integral Equation for Probability Generating Functions
Journal of Informatics and Mathematical Sciences Volume 5 (2013), Number 3,. 157 163 RGN Publications htt://www.rgnublications.com Stochastic Derivation of an Integral Equation for Probability Generating
More informationIntroduction to NPCompleteness Written and copyright c by Jie Wang 1
91.502 Foundations of Comuter Science 1 Introduction to Written and coyright c by Jie Wang 1 We use timebounded (deterministic and nondeterministic) Turing machines to study comutational comlexity of
More informationA Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations
A Simle Model of Pricing, Markus and Market Power Under Demand Fluctuations Stanley S. Reynolds Deartment of Economics; University of Arizona; Tucson, AZ 85721 Bart J. Wilson Economic Science Laboratory;
More informationTRANSCENDENTAL NUMBERS
TRANSCENDENTAL NUMBERS JEREMY BOOHER. Introduction The Greeks tried unsuccessfully to square the circle with a comass and straightedge. In the 9th century, Lindemann showed that this is imossible by demonstrating
More informationMeasuring relative phase between two waveforms using an oscilloscope
Measuring relative hase between two waveforms using an oscilloscoe Overview There are a number of ways to measure the hase difference between two voltage waveforms using an oscilloscoe. This document covers
More informationLogic and Proof. George E. Hrabovsky MAST Corrections by Lawrence J. Winkler. Introduction
Logic and Proof George E. Hrabovsky MAST Corrections by Lawrence J. Winkler Introduction In what follows, I will begin by giving an overview of logic. Then I will resent a large number of arguments by
More informationStat 134 Fall 2011: Gambler s ruin
Stat 134 Fall 2011: Gambler s ruin Michael Lugo Setember 12, 2011 In class today I talked about the roblem of gambler s ruin but there wasn t enough time to do it roerly. I fear I may have confused some
More informationThe Cubic Equation. Urs Oswald. 11th January 2009
The Cubic Equation Urs Oswald th January 009 As is well known, equations of degree u to 4 can be solved in radicals. The solutions can be obtained, aart from the usual arithmetic oerations, by the extraction
More informationSimple thermodynamic systems
Simle thermodynamic systems Asaf Pe er 1 October 30, 2013 1. Different statements of the second law We have seen that Clausius defined the second law as the entroy of an isolated system cannot decrease
More informationTimeCost TradeOffs in ResourceConstraint Project Scheduling Problems with Overlapping Modes
TimeCost TradeOffs in ResourceConstraint Proect Scheduling Problems with Overlaing Modes François Berthaut Robert Pellerin Nathalie Perrier Adnène Hai February 2011 CIRRELT201110 Bureaux de Montréal
More informationStatic and Dynamic Properties of Smallworld Connection Topologies Based on Transitstub Networks
Static and Dynamic Proerties of Smallworld Connection Toologies Based on Transitstub Networks Carlos Aguirre Fernando Corbacho Ramón Huerta Comuter Engineering Deartment, Universidad Autónoma de Madrid,
More informationLoad Balancing Mechanism in Agentbased Grid
Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 5762 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa00042, 6 Pages doi:10.5899/2016/cacsa00042
More informationThe Cubic Formula. The quadratic formula tells us the roots of a quadratic polynomial, a polynomial of the form ax 2 + bx + c. The roots (if b 2 b+
The Cubic Formula The quadratic formula tells us the roots of a quadratic olynomial, a olynomial of the form ax + bx + c. The roots (if b b+ 4ac 0) are b 4ac a and b b 4ac a. The cubic formula tells us
More information(This result should be familiar, since if the probability to remain in a state is 1 p, then the average number of steps to leave the state is
How many coin flis on average does it take to get n consecutive heads? 1 The rocess of fliing n consecutive heads can be described by a Markov chain in which the states corresond to the number of consecutive
More informationNumber Theory Naoki Sato <sato@artofproblemsolving.com>
Number Theory Naoki Sato 0 Preface This set of notes on number theory was originally written in 1995 for students at the IMO level. It covers the basic background material
More informationPRIME NUMBERS AND THE RIEMANN HYPOTHESIS
PRIME NUMBERS AND THE RIEMANN HYPOTHESIS CARL ERICKSON This minicourse has two main goals. The first is to carefully define the Riemann zeta function and exlain how it is connected with the rime numbers.
More informationAn important observation in supply chain management, known as the bullwhip effect,
Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David SimchiLevi Decision Sciences Deartment, National
More informationCABRS CELLULAR AUTOMATON BASED MRI BRAIN SEGMENTATION
XI Conference "Medical Informatics & Technologies"  2006 Rafał Henryk KARTASZYŃSKI *, Paweł MIKOŁAJCZAK ** MRI brain segmentation, CT tissue segmentation, Cellular Automaton, image rocessing, medical
More informationLocal Connectivity Tests to Identify Wormholes in Wireless Networks
Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University xban@cs.sunysb.edu Rik Sarkar Comuter Science Freie Universität Berlin sarkar@inf.fuberlin.de
More informationAn Analysis of Reliable Classifiers through ROC Isometrics
An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. SrinkhuizenKuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICCIKAT, Universiteit
More informationAn Efficient Method for Improving Backfill Job Scheduling Algorithm in Cluster Computing Systems
The International ournal of Soft Comuting and Software Engineering [SCSE], Vol., No., Secial Issue: The Proceeding of International Conference on Soft Comuting and Software Engineering 0 [SCSE ], San Francisco
More informationComputational Finance The Martingale Measure and Pricing of Derivatives
1 The Martingale Measure 1 Comutational Finance The Martingale Measure and Pricing of Derivatives 1 The Martingale Measure The Martingale measure or the Risk Neutral robabilities are a fundamental concet
More informationElementary Number Theory We begin with a bit of elementary number theory, which is concerned
CONSTRUCTION OF THE FINITE FIELDS Z p S. R. DOTY Elementary Number Theory We begin with a bit of elementary number theory, which is concerned solely with questions about the set of integers Z = {0, ±1,
More informationAs we have seen, there is a close connection between Legendre symbols of the form
Gauss Sums As we have seen, there is a close connection between Legendre symbols of the form 3 and cube roots of unity. Secifically, if is a rimitive cube root of unity, then 2 ± i 3 and hence 2 2 3 In
More informationWeb Application Scalability: A ModelBased Approach
Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A ModelBased Aroach Lloyd G. Williams, Ph.D. Software Engineering Research
More informationLectures on the Dirichlet Class Number Formula for Imaginary Quadratic Fields. Tom Weston
Lectures on the Dirichlet Class Number Formula for Imaginary Quadratic Fields Tom Weston Contents Introduction 4 Chater 1. Comlex lattices and infinite sums of Legendre symbols 5 1. Comlex lattices 5
More informationCoin ToGa: A CoinTossing Game
Coin ToGa: A CoinTossing Game Osvaldo Marrero and Paul C Pasles Osvaldo Marrero OsvaldoMarrero@villanovaedu studied mathematics at the University of Miami, and biometry and statistics at Yale University
More informationService Network Design with Asset Management: Formulations and Comparative Analyzes
Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT200740 Service Network Design with
More informationA Note on Integer Factorization Using Lattices
A Note on Integer Factorization Using Lattices Antonio Vera To cite this version: Antonio Vera A Note on Integer Factorization Using Lattices [Research Reort] 2010, 12 HAL Id: inria00467590
More informationA MOST PROBABLE POINTBASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION
9 th ASCE Secialty Conference on Probabilistic Mechanics and Structural Reliability PMC2004 Abstract A MOST PROBABLE POINTBASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION
More informationUnited Arab Emirates University College of Sciences Department of Mathematical Sciences HOMEWORK 1 SOLUTION. Section 10.1 Vectors in the Plane
United Arab Emirates University College of Sciences Deartment of Mathematical Sciences HOMEWORK 1 SOLUTION Section 10.1 Vectors in the Plane Calculus II for Engineering MATH 110 SECTION 0 CRN 510 :00 :00
More informationLab O3: Snell's Law and the Index of Refraction
O3.1 Lab O3: Snell's Law and the Index of Refraction Introduction. The bending of a light ray as it asses from air to water is determined by Snell's law. This law also alies to the bending of light by
More information4 Perceptron Learning Rule
Percetron Learning Rule Objectives Objectives  Theory and Examles  Learning Rules  Percetron Architecture 3 SingleNeuron Percetron 5 MultileNeuron Percetron 8 Percetron Learning Rule 8 Test Problem
More informationInt. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 23862392 (2015) ISSN: 09750290
2386 Survey: Biological Insired Comuting in the Network Security V Venkata Ramana Associate Professor, Deartment of CSE, CBIT, Proddatur, Y.S.R (dist), A.P516360 Email: ramanacsecbit@gmail.com Y.Subba
More informationConcurrent Program Synthesis Based on Supervisory Control
010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract
More informationThe risk of using the Q heterogeneity estimator for software engineering experiments
Dieste, O., Fernández, E., GarcíaMartínez, R., Juristo, N. 11. The risk of using the Q heterogeneity estimator for software engineering exeriments. The risk of using the Q heterogeneity estimator for
More informationwhere a, b, c, and d are constants with a 0, and x is measured in radians. (π radians =
Introduction to Modeling 3.61 3.6 Sine and Cosine Functions The general form of a sine or cosine function is given by: f (x) = asin (bx + c) + d and f(x) = acos(bx + c) + d where a, b, c, and d are constants
More informationRisk in Revenue Management and Dynamic Pricing
OPERATIONS RESEARCH Vol. 56, No. 2, March Aril 2008,. 326 343 issn 0030364X eissn 15265463 08 5602 0326 informs doi 10.1287/ore.1070.0438 2008 INFORMS Risk in Revenue Management and Dynamic Pricing Yuri
More informationFailure Behavior Analysis for Reliable Distributed Embedded Systems
Failure Behavior Analysis for Reliable Distributed Embedded Systems Mario Tra, Bernd Schürmann, Torsten Tetteroo {tra schuerma tetteroo}@informatik.unikl.de Deartment of Comuter Science, University of
More informationPrecalculus Prerequisites a.k.a. Chapter 0. August 16, 2013
Precalculus Prerequisites a.k.a. Chater 0 by Carl Stitz, Ph.D. Lakeland Community College Jeff Zeager, Ph.D. Lorain County Community College August 6, 0 Table of Contents 0 Prerequisites 0. Basic Set
More informationSynopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE
RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Develoment FRANCE Synosys There is no doubt left about the benefit of electrication and subsequently
More informationI. GROUPS: BASIC DEFINITIONS AND EXAMPLES
I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called
More informationDesign of A Knowledge Based Trouble Call System with Colored Petri Net Models
2005 IEEE/PES Transmission and Distribution Conference & Exhibition: Asia and Pacific Dalian, China Design of A Knowledge Based Trouble Call System with Colored Petri Net Models HuiJen Chuang, ChiaHung
More informationERDŐS SZEKERES THEOREM WITH FORBIDDEN ORDER TYPES. II
ERDŐS SEKERES THEOREM WITH FORBIDDEN ORDER TYPES. II GYULA KÁROLYI Institute of Mathematics, Eötvös University, Pázmány P. sétány /C, Budaest, H 7 Hungary GÉA TÓTH Alfréd Rényi Institute of Mathematics,
More informationPRIME FACTORS OF CONSECUTIVE INTEGERS
PRIME FACTORS OF CONSECUTIVE INTEGERS MARK BAUER AND MICHAEL A. BENNETT Abstract. This note contains a new algorithm for computing a function f(k) introduced by Erdős to measure the minimal gap size in
More informationA Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm
International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This
More information5 Elliptic Curves in Cryptography
Crytograhy (art 5): Ellitic Curves in Crytograhy (by Evan Dummit, 2016, v. 1.00) Contents 5 Ellitic Curves in Crytograhy 1 5.1 Ellitic Curves and the Addition Law................................... 1 5.1.1
More informationControl with Random Communication Delays via a DiscreteTime Jump System Approach
Control with Random Communication Delays via a DiscreteTime Jum System Aroach Lin Xiao Arash Hassibi Jonathan P How Information Systems Laboratory Stanford University Stanford, CA 9435, USA Abstract Digital
More information1 Exercise 4.1b pg 153
In this solution set, an underline is used to show the last significant digit of numbers. For instance in x = 2.51693 the 2,5,1, and 6 are all significant. Digits to the right of the underlined digit,
More informationPredicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
Predicate Encrytion Suorting Disjunctions, Polynomial Equations, and Inner Products Jonathan Katz Amit Sahai Brent Waters Abstract Predicate encrytion is a new aradigm for ublickey encrytion that generalizes
More information8 Primes and Modular Arithmetic
8 Primes and Modular Arithmetic 8.1 Primes and Factors Over two millennia ago already, people all over the world were considering the properties of numbers. One of the simplest concepts is prime numbers.
More informationCRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS
Review of the Air Force Academy No (23) 203 CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Cătălin CIOACĂ Henri Coandă Air Force Academy, Braşov, Romania Abstract: The
More informationPopulation Genetics I
Poulation Genetics I The material resented here considers a single diloid genetic locus, ith to alleles A and a; their relative frequencies in the oulation ill be denoted as and q (ith q 1 ). HardyWeinberg
More informationUniversiteitUtrecht. Department. of Mathematics. Optimal a priori error bounds for the. RayleighRitz method
UniversiteitUtrecht * Deartment of Mathematics Otimal a riori error bounds for the RayleighRitz method by Gerard L.G. Sleijen, Jaser van den Eshof, and Paul Smit Prerint nr. 1160 Setember, 2000 OPTIMAL
More informationProblem Set 5. AABB = 11k = (10 + 1)k = (10 + 1)XY Z = XY Z0 + XY Z XYZ0 + XYZ AABB
Problem Set 5 1. (a) Fourdigit number S = aabb is a square. Find it; (hint: 11 is a factor of S) (b) If n is a sum of two square, so is 2n. (Frank) Solution: (a) Since (A + B) (A + B) = 0, and 11 0, 11
More informationLargeScale IP Traceback in HighSpeed Internet: Practical Techniques and Theoretical Foundation
LargeScale IP Traceback in HighSeed Internet: Practical Techniques and Theoretical Foundation Jun Li Minho Sung Jun (Jim) Xu College of Comuting Georgia Institute of Technology {junli,mhsung,jx}@cc.gatech.edu
More informationDynamic arrays and linked lists
Unit 11 Dynamic arrays and linked lists Summary Limitations of arrays Dynamic memory management Definitions of lists Tyical oerations on lists: iterative imlementation Tyical oerations on lists: recursive
More informationSection 4.2: The Division Algorithm and Greatest Common Divisors
Section 4.2: The Division Algorithm and Greatest Common Divisors The Division Algorithm The Division Algorithm is merely long division restated as an equation. For example, the division 29 r. 20 32 948
More informationProject Management and. Scheduling CHAPTER CONTENTS
6 Proect Management and Scheduling HAPTER ONTENTS 6.1 Introduction 6.2 Planning the Proect 6.3 Executing the Proect 6.7.1 Monitor 6.7.2 ontrol 6.7.3 losing 6.4 Proect Scheduling 6.5 ritical Path Method
More informationMultiChannel Opportunistic Routing in MultiHop Wireless Networks
MultiChannel Oortunistic Routing in MultiHo Wireless Networks ANATOLIJ ZUBOW, MATHIAS KURTH and JENSPETER REDLICH Humboldt University Berlin Unter den Linden 6, D99 Berlin, Germany (zubow kurth jr)@informatik.huberlin.de
More informationMultiperiod Portfolio Optimization with General Transaction Costs
Multieriod Portfolio Otimization with General Transaction Costs Victor DeMiguel Deartment of Management Science and Oerations, London Business School, London NW1 4SA, UK, avmiguel@london.edu Xiaoling Mei
More informationOn the (in)effectiveness of Probabilistic Marking for IP Traceback under DDoS Attacks
On the (in)effectiveness of Probabilistic Maring for IP Tracebac under DDoS Attacs Vamsi Paruchuri, Aran Durresi 2, and Ra Jain 3 University of Central Aransas, 2 Louisiana State University, 3 Washington
More informationTHE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0
THE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0 RICHARD J. MATHAR Abstract. We count solutions to the RamanujanNagell equation 2 y +n = x 2 for fixed positive n. The computational
More informationLearning Human Behavior from Analyzing Activities in Virtual Environments
Learning Human Behavior from Analyzing Activities in Virtual Environments C. BAUCKHAGE 1, B. GORMAN 2, C. THURAU 3 & M. HUMPHRYS 2 1) Deutsche Telekom Laboratories, Berlin, Germany 2) Dublin City University,
More informationModeling and Simulation of an Incremental Encoder Used in Electrical Drives
10 th International Symosium of Hungarian Researchers on Comutational Intelligence and Informatics Modeling and Simulation of an Incremental Encoder Used in Electrical Drives János Jób Incze, Csaba Szabó,
More informationHomework until Test #2
MATH31: Number Theory Homework until Test # Philipp BRAUN Section 3.1 page 43, 1. It has been conjectured that there are infinitely many primes of the form n. Exhibit five such primes. Solution. Five such
More informationMaximizing the Area under the ROC Curve using Incremental Reduced Error Pruning
Maximizing the Area under the ROC Curve using Incremental Reduced Error Pruning Henrik Boström Det. of Comuter and Systems Sciences Stockholm University and Royal Institute of Technology Forum 100, 164
More informationAsymmetric Information, Transaction Cost, and. Externalities in Competitive Insurance Markets *
Asymmetric Information, Transaction Cost, and Externalities in Cometitive Insurance Markets * Jerry W. iu Deartment of Finance, University of Notre Dame, Notre Dame, IN 465565646 wliu@nd.edu Mark J. Browne
More informationChapter 6: CPU Scheduling. Basic Concepts
Chater 6: CPU Scheduling Basic Concets Scheduling Criteria Scheduling Algorithms MultileProcessor Scheduling RealTime Scheduling Thread Scheduling Oerating Systems Examles Java Thread Scheduling Algorithm
More informationOn tests for multivariate normality and associated simulation studies
Journal of Statistical Comutation & Simulation Vol. 00, No. 00, January 2006, 1 14 On tests for multivariate normality and associated simulation studies Patrick J. Farrell Matias SalibianBarrera Katarzyna
More informationPOISSON PROCESSES. Chapter 2. 2.1 Introduction. 2.1.1 Arrival processes
Chater 2 POISSON PROCESSES 2.1 Introduction A Poisson rocess is a simle and widely used stochastic rocess for modeling the times at which arrivals enter a system. It is in many ways the continuoustime
More informationPrime Numbers. Chapter Primes and Composites
Chapter 2 Prime Numbers The term factoring or factorization refers to the process of expressing an integer as the product of two or more integers in a nontrivial way, e.g., 42 = 6 7. Prime numbers are
More informationService Network Design with Asset Management: Formulations and Comparative Analyzes
Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT200740 Service Network Design with
More information