# Every Good Key Must Be A Model Of The Lock It Opens. (The Conant & Ashby Theorem Revisited)

Save this PDF as:

Size: px
Start display at page:

Download "Every Good Key Must Be A Model Of The Lock It Opens. (The Conant & Ashby Theorem Revisited)"

## Transcription

1 Every Good Key Must Be A Model Of The Lock It Opens (The Conant & Ashby Theorem Revisited) By Daniel L. Scholten

2 Every Good Key Must Be A Model Of The Lock It Opens Page 2 of 45 Table of Contents Introduction...3 Finding Good Regulators: A Search Algorithm...6 The Search Algorithm, Formally Stated...12 Working Through An Example...16 Finding Excellent Approximations to Ideal Good-Regulator Models...24 Real-World Applications: Goals for Future Research...24 Even Decent Regulators Must Be Models...26 A Law of Requisite Back-Up Plans...28 Ashby s First Law: The Any-Port-In-A-Storm Theorem...29 Every Good Solution Must Be A Model Of The Problem It Solves...35 Conclusion...40

3 Every Good Key Must Be A Model Of The Lock It Opens Page 3 of 45 Introduction The title of the present paper is really a metaphor for what might have been a more literal title: Every Good Solution Must be a Model of the Problem it Solves. It is also a metaphor for the so-called Conant and Ashby Theorem referred to in the sub-title. That theorem published in 1970 by Roger C. Conant and W. Ross Ashby establishes that, Every Good Regulator of a System Must be a Model of that System. 1 What all of this means, more or less, is that the pursuit of a goal by some dynamic agent (Regulator) in the face of a source of obstacles (System) places at least one particular and unavoidable demand on that agent, which is that the agent's behaviors must be executed in such a reliable and predictable way that they can serve as a representation (Model) of that source of obstacles. As a refinement to this paraphrase, we could specify that the particular style of pursuit be both optimal and maximally simple, where optimal means that the actualized goal is as close as possible to its ideal form given the circumstances, and maximally simple means that the agent is achieving this best-attainable goal without unnecessary expense or effort. A careful reading of Conant and Ashby's paper 2 reveals a distinction that can be made between such an idealized good-regulator model, which is really a dynamic entity, and its technical specification, which we might call its control-model. Another distinction to be recognized is that whereas the good-regulator model is dynamic, the control-model may be either static or dynamic. As an example of a static control-model, consider an inexperienced cook attempting to make a roast duck with the help of a recipe. In this case, the system to be regulated consists of the various ingredients and kitchen tools to be used to create the meal, the dynamic goodregulator model is the human being doing the cooking, and the recipe is what we are calling the static control-model. The recipe is a control-model because the human being uses it, like a technical specification, to guide (control) his behavior and thus to turn himself into (i.e. to act as-if he were) a good-regulator model. As an example of a dynamic control-model, consider the case in which a child learns to use an idiomatic expression such as two wrongs don't make a right by overhearing an adult use that expression in a conversation. In this case the system to be regulated is a 1 Roger C. Conant and W. Ross Ashby, Every Good Regulator of a System Must be a Model of that System, International Journal of Systems Science, 1970, vol 1., No. 2, A Primer For The Conant And Ashby Theorem, Available on the internet at

4 Every Good Key Must Be A Model Of The Lock It Opens Page 4 of 45 particular portion of some conversation in which the child is participating, the dynamic good-regulator model is the child, and the dynamic control-model is the adult role-model. The idea here is that the adult's behavior serves as a type of dynamic technical specification that the child then uses to control his or her own behavior in the context of the given conversation. It is important to make these distinctions between a dynamic good-regulator model and its static or dynamic technical specification because otherwise the theorem appears to prove that the technical specification (control-model) is necessary, which is really a misunderstanding of the theorem. The theorem only proves that the good-regulator model is necessary, although it does appear to be an empirical fact that such technical specifications are also necessary, or at least extremely useful. One objective of the present paper is to offer the key-lock and solution-problem formulations as useful metaphorical equivalents to this important result by Conant & Ashby (henceforth C&A). But the present paper s primary objective is to explore a line of inquiry that this theorem establishes, and which, as far as I can tell, has yet to be explored. In what follows, I will show how C&A's good-regulator theorem, despite being just one of potentially various necessary conditions to successful regulation, has yet a great deal more to say about the nature of these idealized good-regulator models 3. In particular, I will show that the theorem points the way to a search-algorithm (of the type used in the field of Operations Research) that can be implemented by a computer program 4 and used to find excellent approximations to these idealized entities given certain high-level measurements taken on the system in question and the resources available to regulate that system 5. Furthermore, the analysis leading to this search algorithm will also lead us to an alternate proof of the C&A theorem which is both more general and allows us to assert that Even A Decent Regulator Of A System Must Be A Model Of That System. This more general theorem has two primary benefits. First of all, however valuable or interesting a true good-regulator model might be, any realistic scenario has such an astronomically large search-space that finding such unicorns is a truly rare occurrence. Much more likely is the discovery of a decent approximation to the beast, and this more general version of Conant and Ashby's theorem allows us to include these much more common decent-regulator models in our discussions of actual good-regulator models. The second benefit is that the proof of this more general version of the good-regulator theorem is substantially easier for a lay-person to understand, mainly because it doesn t rely on the Shannon Entropy function. Such a simpler proof should go a long way toward making this important theorem accessible to a much wider audience. In addition to these two primary results, I will also examine a number of related results. One of these is a corollary which we might call a Law of Requisite Back-Up Plans the gist of which tells us that a good-regulator must have its priorities straight This program is currently in development. 5 If the System to be regulated and the available regulatory resources are not too complicated, then the search algorithm will actually find the associated ideal good-regulator models. The problem is that most real-world applications will probably involve Systems that do not fulfil this simplicity criterion.

5 Every Good Key Must Be A Model Of The Lock It Opens Page 5 of 45 This corollary establishes that a good-regulator must know, given a set of possible outcomes, which of these is its favorite, which is its second favorite, and so on, all the way through to its least favorite outcome. As it pertains to us humans, it tells us, contrary to what we might like to think, that our most lofty aspirations are not more important than what we will do if we fail to attain them. And I will also discuss a principle that I have come to think of as Ashby s First Law, or perhaps, the Any-Port- In-A-Storm Theorem. This result appears to explain a great deal of human behavior, especially our tendency to sanctify and ferociously defend even the most delusional ideas. The gist of Ashby s First Law is that any model is better than no model at all, which basically means that even if we can t figure out the truth of a situation, we are almost always better off just making up any old thing rather than muddling around in the muck of our own ignorance. If you have ever wondered how a person could believe so seriously in, say, faeries or werewolves, to the point where they are willing to hurt themselves or someone else, Ashby s First Law may provide a meaningful clue. Finally, I will also discuss two useful metaphors for the C&A theorem, namely the key-lock and solution-problem metaphors referred to above and in this paper s title. This latter metaphor, in particular, casts the C&A Theorem as a fundamental theorem of problem solving and as such shows us how to make meaningful progress toward the solution of any problem whatsoever. After discussing these topics, I will turn to a question that is grounded in the observation that the C&A Theorem is itself a control-model (technical specification) for a good-regulator model. The system to be regulated in this case is nothing other than the system of good- and decent-regulator models that we humans are using more and more to regulate our interactions with each other and the world. Recognition of this fact raises the question as to why the C&A theorem is not more famous than it is. Given the preponderance of control-models that are used by humans (the evidence for this preponderance will be surveyed in the latter part of the paper), and especially given the obvious need to regulate that system, one might guess that the C&A theorem would be at least as famous as, say, the Pythagorean Theorem ( a + b = c ), the 2 Einstein mass-energy equivalence ( E = mc, which can be seen on T-shirts and bumper stickers), or the DNA double helix (which actually shows up in TV crime dramas and movies about super heroes). And yet, it would appear that relatively few lay-persons have ever even heard of C&A s important prerequisite to successful regulation. This state-of-affairs strikes the present author as a problem in need of a solution, a lock that needs a key. It is my hope that the present paper can contribute to finding that key. Note: throughout the following discussion I will assume that the reader has studied Conant &Ashby s original paper, possesses the level of technical competence required to understand their proof, and is familiar with the components of the basic model that they used to prove their theorem, e.g. the payoff matrix, the outcome mapping ψ : R S Z, and the definition of regulation in terms of the Shannon entropy function, etc. If the current reader does not already fit this profile but would like to, he or she is invited to study the references in the footnote at the end of this sentence. 6 6 The reference to the original paper can be found in a previous footnote. The paper is also readily available on the internet at Everything you need to

6 Every Good Key Must Be A Model Of The Lock It Opens Page 6 of 45 Finding Good Regulators: A Search Algorithm In order to motivate the present discussion, we will use a concrete example which is organized around the following payoff matrix: ψ s s s s s s r a h d g b h r c f i e c d r f d e b a i r a d c e a f The above matrix represents every possible outcome that can occur when a behavior S = s, s, s, s, s, s combines with a from some system with behavioral repertoire { } behavior from some other system with behavioral repertoire R { r1, r2, r3, r4 } produce outcomes from a set Z { a, b, c, d, e, f, g, h, i} mapping ψ : R S Z. = to =, as determined by the In addition, we assume that S is executing its behaviors according to some p( S) = p s, p s, p s, p s, p s, p s that R is { } probability distribution responding to these behaviors according to some conditional distribution p R S = p r s : r R, s S and that together these two distributions determine, { } via the rule p ( ri, s j ) p ( ri s j ) p ( s j ) =, the following distribution for Z : ( 1, 1 ) ( 3, 5 ) ( 4, 1 ) ( 4, 5 ), = ( 1, 5 ) + ( 3, 4 ), = ( 2, 1 ) + ( 2, 5 ) + ( 4, 3 ), = ( 1 3 ) + ( 2 6 ) + ( 3 2 ) + ( 4 2 ) ( 2, 4 ) ( 3, 3 ) ( 4, 4 ), = ( 2, 2 ) + ( 3, 1 ) + ( 4, 6 ), = p ( r1, s4 ), = ( 1, 2 ) + ( 1, 6 ), = (, ) + (, ) p a = p r s + p r s + p r s + p r s p b p r s p r s p c p r s p r s p r s p d p r, s p r, s p r, s p r, s, p ( Z ) = p e = p r s + p r s + p r s p f p r s p r s p r s p g p h p r s p r s p i p r2 s3 p r3 s6 learn about the Shannon entropy function in order to understand C & A s proof can be acquired by reading the first 26 pages (especially problem 1.6) of Information Theory, by Robert B. Ash, 1990 (1965), Dover Publications, New York. For a self-contained exposition, the reader can also consult the present author s A Primer For The Conant & Ashby Theorem available at

7 Every Good Key Must Be A Model Of The Lock It Opens Page 7 of 45 Also, we can use the above distribution to calculate the Shannon Entropy associated H Z p z log p z. with the outcomes of Z, which is given by Furthermore, we will assume, given any example such as the one we are considering, that the distribution p ( S ) has been given to us as a set of fixed probabilities over which we have no control, and that, on the contrary, we have complete freedom to set the conditional probabilities of p ( R S ) to any values we choose. And finally, we will assume that the goal of regulator design is to set these conditional probabilities of p ( R S ) so that H ( Z ) is made as small as possible, given the constraints imposed by the mapping ψ : R S Z, in which case, the regulator is said to be optimal. Now, given only these assumptions, we can observe that in the most general case, H Z the task of finding a regulator (i.e. a distribution p ( R S ) ) that will minimize is daunting indeed. The problem is that the solution space, even for a relatively simple example such as the one we are considering, is nothing short of huge. If all we have is the option of grinding through every possible distribution p R S = p r s : r R, s S then the search space is infinite and the task is { } impossible. What we need is some way to reduce the search space. In their 1970 paper, C & A showed the world how to cut that search space down to a much more manageable size. In particular, they showed us a lemma (henceforth, the C&A lemma) which tells us that whenever R is behaving so that H ( Z ) is as small as possible, then it must be the case that R is picking out exactly one outcome per column of the table. In other words, their lemma establishes that optimal regulation can only occur via some sort of mapping from the set S to the set Z. Note that C&A chose to define model in terms of just such a mapping and we will continue with that convention here, although this particular model is not the one referred to in the title of their paper and, in fact, the whole purpose of regulation is make this model an especially poor one. The idea here is that the regulator acts as a buffer between the system and the outcomes produced, so that the outcomes become a lousy representation of the system. Let s call the mapping that creates this poor underdog model of the system u : S Z, where u stands for underdog. C&A then went on to show that by adding the economically reasonable assumption that R should achieve as simply as possible its one outcome per column meaning that in response to a given column s j S the same rj R is always executed in order to produce that column s unique outcome then yet a different mapping would be established from S to R, which we will refer to here as g : S R ( g for good regulator ). It is this latter mapping that creates the model referred to by the C&A theorem the model that is the good regulator of the system being regulated. Contrary to the relatively poor underdog model referred to in the previous z Z

8 Every Good Key Must Be A Model Of The Lock It Opens Page 8 of 45 paragraph, this good-regulator model will tend to be a fairly detailed representation of the system. Now, without plugging in some actual numbers for p( S ), we really can t say much else about the example under consideration, but let s just imagine that there is some example we could use for p( S ) such that the following mapping u : S Z will H Z : minimize u s1 s2 s3 s4 s5 s6 a d d b a d The implication of this mapping is that the probability distribution p( Z ) is a much simpler function of just the column probabilities of p( S ). Let s illustrate this by working through an example. Referring to the table for p( Z ) above, we have that: = (, ) + (, ) + (, ) + (, ) p a p r s p r s p r s p r s or = ( ) + ( ) + ( ) + ( ) p a p r s p s p r s p s p r s p s p r s p s or = ( ) + ( ) + ( ) + ( ) p a p r s p r s p s p r s p r s p s So far, p ( a ) appears to be a function of both p( S ) and p( R S ). But the mapping u : S Z implies that we, as regulator designers, have respected the following p R S : constraint on ( ) + ( ) = 1 and p ( r s ) p ( r s ) p r s p r s = 1, which, in turn, means that, p a = p s + p s = p s + p s The reader can verify that performing this sort of analysis for each element in Z for our chosen example yields the following:

9 Every Good Key Must Be A Model Of The Lock It Opens Page 9 of 45 p Z = ( 1 ) + ( 5 ), = p ( s4 ), = 0, = ( 2 ) + ( 3 ) + ( 6 ) 0, = 0, = 0, = 0, = 0 p a p s p s p b p c p d p s p s p s = p e = p f p g p h p i Now, we can make two observations about this state-of-affairs. I will make them here with respect to our current example, but similar observations can be made in general about every such example. These are as follows: 1. Because the probabilities in the distribution p( Z ) are real numbers, they have a natural ordering. That is, there is a way to rename the elements in the Z = z, z,..., z and set Z using indexes such that { } p ( z ) p ( z )... p ( z ) To put it most generally, we can say that there is a mapping from the set Z to the set of natural numbers (excluding zero), let s call it : 1 f Z, such that Z { z1, z2,..., z Z } ( 1 ) ( 2 )... ( Z ). p z p z p z = and 2. The probability p ( b ) does not use up all of the column probability that it might use. That is, since the outcome b is available in both columns s4 as well as s 5, it might have been the case that p ( b) = p ( s4 ) + p ( s5 ), but this did not happen. For some reason, our optimal regulator preferred to give the p s to outcome a instead of to outcome b. column probability 5 This natural ordering of the outcome probabilities coupled with the observation that an optimal regulator behaves as if it preferred some outcomes over others, suggests that at we can jump to the following conclusion:

10 Every Good Key Must Be A Model Of The Lock It Opens Page 10 of 45 When all is said and done and we have managed to find an optimal regulator (i.e., a p ( R S ) that minimizes H ( Z ) ), then the behavior of this optimal regulator will accord with at least one preference ranking on the outcomes in Z. Although there may be many such preference rankings, one of these is the mapping f : Z 1 that is determined by the natural ordering of the probabilities in P( Z ). Finally, this preference ranking is logically equivalent to the optimal regulator, which means that they both produce exactly the same outcomes and thus exactly the same minimized value of H ( Z ). Now, I say that we can jump to this conclusion, but it really needs to be proven. The proof relies on the following lemma which uses the same useful property of the Shannon Entropy function that C&A used to prove their lemma: Given some ψ : R S Z and a p ( R S ) that minimizes H ( Z ), if z k is the outcome selected for column s j, and if z h is any other outcome in the column s j, then p ( z ) p z k >. h Proof: Suppose to the contrary that p ( zk ) p ( zh ). Then we can change p ( R S ) so that z h is selected for column s j instead. Doing so will increase the difference p ( zh ) p ( zk ) and thus reduce our assumption that H ( Z ) is a minimum. contradiction proves the result. H Z thus contradicting The In order to prove the main proposition under consideration, we have to show that the mapping f : Z 1 produces exactly the same outcomes as the distribution p ( R S ) that minimized the entropy function. This has to be proven because even though a minimized H ( Z ) implies f : Z 1, it is conceivable that f : Z 1 doesn t return the favor. That is, perhaps we are dealing with a simple one-way material conditional and not a material bi-conditional.

11 Every Good Key Must Be A Model Of The Lock It Opens Page 11 of 45 To accomplish this proof, consider an arbitrary s j S and suppose that z k is the outcome produced by p ( R S ). If z h is any other available outcome in s j, we know (by the lemma proven above) that p ( z ) > p ( z ) which means that our preference k ranking favors z k over z h. Since s j S was assumed to be arbitrary, such a result will hold for every column of the table which means that our preference ranking will p R S. This establishes the result. produce exactly the same outcomes as h Now, how does all of this translate into a search algorithm? To see how, we observe that the existence of this preference ranking implies that p ( z 1 ) (the largest of all the probabilities in p( Z ) ) is the sum of all of the column probabilities associated with the outcome z 1. That is, whenever z 1 is available in some column j included as an addend in the sum for 1 s, then ( j ) p s is p z. Yet another way to put it is that p ( z ) gobbles up all of the column probabilities that are available to produce the outcome z 1. Likewise, p ( z 2 ) gobbles up whatever is leftover for z 2, and so on until nothing is left for the remaining outcomes and everybody else gets nothing. This means that we can begin our search for an optimal regulator by creating a table of these total probabilities for each possible outcome in Z and then trying to identify which of these total probabilities is really our p ( z 1 ). That s the first step in the search. For the next step we adjust our table, removing from consideration the column probabilities p z, and then try to identify which of the remaining total that were used to calculate 1 probabilities is p ( z 2 ) and so forth until there aren t any column probabilities left to use. 1 Now, in each step I say we proceed by trying to identify which total probability is the next in the sequence. This raises the question of the best way to accomplish this. There are two intuitively appealing approaches to this problem, and although they are both useful heuristics, it turns out that neither works in all cases. These are as follows: 1. At each step in the process, choose the outcome with the greatest total probability available. 2. At each step in the process, choose the outcome that occupies the greatest number of columns. I have written a computer program that compares both of these approaches to a brute-force exhaustive search of the solution space for relatively small tables (e.g. R = 5, S = 7 and Z = 12 ) and I have also tried various ways to combine them both and the upshot is that it appears that the only way to always find the real minimum for

12 Every Good Key Must Be A Model Of The Lock It Opens Page 12 of 45 H ( Z ) is just to check every path 7. This can still be quite a large search space, but it is substantially less than the brute-force approach. Furthermore, if we organize that search by always beginning with the outcome with the greatest total probability, and then proceeding at each level with the next largest, and then the next largest, and so forth, we greatly increase the chances of encountering the solution sooner rather than later. This approach has the added benefit of being easily convertible to a very useful search heuristic and I have found experimentally that limiting the search to the first two of these (largest and next largest probability) captures very close to every case, at least for the relatively small tables that I have tested 8. The Search Algorithm, Formally Stated The purpose of the preceding discussion is to motivate and to illustrate the gist and justification of a formal search algorithm for the identification of the underdog mapping(s) u : S Z that minimize(s) H ( Z ). This algorithm, which can be implemented in any high-level programming language (I have used Java), consists of three steps: an initialization step, an iterato-recursive step, and a completion step. I will now present the complete and formal details of this algorithm. Unfortunately, the completeness and formality of these details might appear at first glance as something of a pedagogical quagmire. Therefore, the reader is encouraged to skim over these details for the time being and then read back over them more carefully as we work through an illustrative example. I assure you that the following algorithm is no where near as complicated as it may look: 1. Initialization: this step takes as input the information contained in the payoff matrix : R S Z p S and uses it to ψ as well as the distribution construct a data structure that we will call Total - Probability - Set (the meaning of the empty parentheses will be explained in step 2.b.ii), which will be used as the initial input to the iterato-recursive process of step (2). The construction of Total - Probability - Set is accomplished as follows: a. For each outcome element z Z ptot z, i.e. the total probability available to the outcome z, as follows: for each s S, examine the contents of the corresponding column in the payoff matrix ψ to determine if the outcome z is available in that column., calculate 7 Strictly speaking there are ways to eliminate a few additional paths, but I m trying to summarize the gist of the process at this point; these refinements will be covered shortly. In any case, it may be that these refinements won t enhance the performance of a computer program that implements them to a degree that would justify the additional complexity that they add to such a program. 8 I have to restrict my tests to relatively small tables because my control population is generated with a brute-force, every-possible-combination algorithm and if the tables get too big, the time required to run through all of these possibilities becomes too long.

13 Every Good Key Must Be A Model Of The Lock It Opens Page 13 of 45 If it is available, then include p ( s ) as an addend in the sum for p ( z ). tot b. Place each of these total-probability elements in an ordered set, sorted top to bottom from largest to smallest. These can be indexed tot 1,2,3,... p z is the largest, as p ( z ) j,0, for j { }, where tot 1,0 ptot ( z ) 2,0 the second largest, etc. This descending-ordered set of total-probability elements is what we are calling Total - Probability - Set. 2. Iterato-Recursive process: the goal of this process is to produce a list of values for H ( Z ) which are candidates for the smallest possible such value, which will be determined in (3), the completion step, below. Toward this p Z are calculated, which are in turn used to end, various distributions for calculate the values for H ( Z ). I m calling this an iterato-recursive process because it is comprised of an iterative process that occurs within a larger recursive process. By definition, a recursive process is any process that includes an execution of itself, which creates a sequence of recursion-levels. We will refer to these as the 1 st recursion-level, 2 nd recursion-level, etc., and in the general case, the k th recursion-level. Furthermore, within each of these recursion-levels occurs an iterative process that performs an identical set of operations over a sequence of distinct elements (to be explained momentarily). We will index these as element 1,k, element 2,k, etc., and in the general case, element j,k, where the index k indicates the recursion-level inside of which these iterations are performed. Now, the input to the k th recursion-level, which we will call Total - Probability - Set ( j1, j2,..., jk 1 ) (the sequence j1, j2,..., jk 1 will be explained in step 2.b.ii) is either the output from step (1) (i.e. Total - Probability - Set ) or else the output from the (k-1) th recursion level. On the other hand, the output from the k th recursion-level is either a p z along with value for H ( Z ), or else a value for ( k ) Total - Probability - Set j1, j2,..., j k, where the method used to produce this latter Total-Probability-Set is explained below in sub-step 2.b.ii. To begin this iterato-recursive process, the input Total - Probability - Set ( j1, j2,..., jk 1 ) is first examined to see if it contains any non-zero total-probability elements (where the fact that it might will be explained in sub-step 2.b.ii). The answer to this question determines which of the following is executed: Total - Probability - Set j1, j2,..., jk 1 contains no nonzero total-probability elements the process has reached the end of a a. If the input

14 Every Good Key Must Be A Model Of The Lock It Opens Page 14 of 45 search-path. In this case the distribution p ( Z ) is complete and is used to calculate a value for H ( Z ) which is stored in a list, which will later become the input to the completion step (3, below). After calculating and storing the value for H ( Z ), the process returns to the (k-1) th recursion level where it resumes its iterations on sub-step (2.b). Total - Probability - Set j1, j2,..., jk 1 is found to contain at least one non-zero total-probability element, then two tasks (i and ii, explained below) are executed for each non-zero totalprobability element in Total - Probability - Set ( j1, j2,..., jk 1 ), b. If the input p z, and beginning first with the largest such element, i.e. tot 1, k 1 proceeding to the second largest, i.e. ptot ( z ) 2, k 1 and so forth. These are the elements, referred to above, that are processed iteratively ptot z. Note that the and which are indexed in general as j, k 1 elements with value of zero are excluded. When both of tasks i and ii have been performed for each such non-zero total-probability element, the k th recursion level is deemed completed and the process returns to the (k-1) th recursion level where it resumes its iterations on sub-step (2.b) at that level. Now, the two tasks that are performed in each iteration are as follows: i. On the (j,k) th iteration, the outcome z that is associated with ptot z p z is j, k 1 is assigned the index k, meaning that ( k ) p z assigned the value tot j, k 1. The significance of this is that ptot ( z ) j, k 1 is assumed to be the k th largest probability in a distribution p ( Z ) that will be used to calculate the smallest value for H ( Z ). Whether this assumption will turn out to be correct will be tested below in the completion step (3). This p Z value for k p z is stored in a list that represents which, when complete, will be used as input into sub-step (2.a). ii. Next, the process produces Total - Probability - Set ( j1, j2,..., j k ) and sends it as input into the (k+1) th recursion-level. Note that the invocation of the (k+1) th recursion-level temporarily interrupts the iterative process occurring on the k th recursion-level, but this k th

15 Every Good Key Must Be A Model Of The Lock It Opens Page 15 of 45 recursion-level iterative process will be resumed upon completion of the (k+1) th recursion-level. Now, regarding the production of Total - Probability - Set ( j1, j2,..., j k ), this is accomplished by first making a clone (copy) of Total - Probability - Set ( j1, j2,..., jk 1 ) and then deleting the total-probability element tot j, k 1 p z that was used in substep (2.b.i) as the candidate for z k. Next, the remaining totalprobability elements are adjusted by removing from each of their respective summations, any of the column probabilities ptot z. Finally, the remaining that were used to calculate j, k 1 total-probability elements are sorted, top to bottom, from largest to smallest, re-indexed to reflect both the new ordering and the k th recursion-level, and this freshly processed, reorganized clone is then renamed Total - Probability - Set ( j1, j2,..., j k ). Now it is time to explain the meaning of the sequence j1, j2,..., j k. You may have noticed that it gets longer with each recursion-level, which is to say that the index k tracks these recursion-levels. On the other hand, the variable j i tracks the iteration that was interrupted in order to begin the (i+1) th recursion-level. Thus, for example, Total - Probability - Set 3,4,2 is the input to the 4 th recursion-level, and was produced after interrupting, respectively, the 3 rd iteration of the 1 st recursion-level, the 4 th iteration of the 2 nd recursion-level, and the 2 nd iteration of the 3 rd recursion-level. This will become clearer as we work through a couple of specific examples, below. 3. Completion: In this step the list of H ( Z ) values that were produced by substep (2.b) is searched for the smallest (minimized) value. The identification of this smallest value for H ( Z ) completes the algorithm.

16 Every Good Key Must Be A Model Of The Lock It Opens Page 16 of 45 Working Through An Example The completeness and formality of the above presentation of this algorithm may have left the reader feeling a little baffled as to just how it works. As I said, it s really not as complicated as it might appear. The following example should go a long way toward illustrating its fundamental simplicity and efficacy. We will continue with the illustrative example used earlier, e.g. the payoff matrix : R S Z p S, reproduced here: ψ and the distribution ψ s s s s s s r a h d g b h r c f i e c d r f d e b a i r a d c e a f { ( 1 ) ( 2 ) ( 3 ) ( 4 ) ( 5 ) ( 6 ) } P( S) = p s, p s, p s, p s, p s, p s And in order to make the following discussion more concrete, we will arbitrarily assign the following numbers to the probabilities in P( S ) as follows: p S ( 1 ) ( 2 ) ( 3 ) ( 4 ) ( 5 ) p s = 0.05, p s = 0.20, p s = 0.15, = p s = 0.10, p s 0.30, = p s6 = 0.20 The three steps of the algorithm are applied as follows: Initialization Step: 1. For each element z Z ptot z, i.e. the sum of all of the column probabilities that are available to that element and list these with appropriate (j,0) indexes in a descending-ordered table to be called Total - Probability - Set. For our chosen example, the table we would create would be the following:, calculate

17 Every Good Key Must Be A Model Of The Lock It Opens Page 17 of 45 Total Probability Set 1, , , ,0 4 5 = p ( s ) 6,0 2 p s6 7, ,0 3 4 = p ( s ) = 0.10, p d = p s + p s + p s = = 0.55, p c = p s + p s + p s = = 0.50, p f = p s + p s + p s = = 0.45, p a = p s + p s = = 0.35, p b = p s + p s = = 0.40, p h 9,0 4 + = = 0.40, p i = p s + p s = = 0.40, p e = p s + p s = = 0.25, p g The above table is our initial input into the subsequent iterato-recursive process. Iterato-Recursive Process: 2. First, as instructed by the algorithm, we examine Total - Probability - Set to see if it contains any non-zero total-probability elements, which it clearly does (the alternative is trivial and wouldn t have made a very good illustrative example). Thus we execute sub-step (2.b) of the algorithm by performing tasks 2.b.i and 2.b.ii over each of the non-zero total-probability elements in Total - Probability - Set, beginning with the largest at the top of the list and working our way down. We will not walk through each of these iterations here because they will combine multiplicatively with the iterations in subsequent recursion-levels and produce, needless to say, far too many examples than we actually need to illustrate the algorithm. But we p d will begin with at least the first which is 1,0 set z1 = d and p ( z1 ) p ( d ) ,0 that H ( Z ) will be minimized with a distribution p ( z ) p ( d ) ,0. Task 2.b.i requires that we = =, which is to say that we hypothesize p Z in which = =. At this point this is only a hypothesis, although in the tests I have done with relatively small tables it turns out to be true in the large majority of cases. The whole purpose of the search algorithm, however, is to find all of the cases and this can only be done by checking all of the relevant candidates, hence the iterative part of this step.

18 Every Good Key Must Be A Model Of The Lock It Opens Page 18 of 45 Next, we store this hypothesized value for p ( z 1 ) in a list, e.g. p ( Z ) = { p ( z 1 ) = 0.55,... }, and proceed with task 2.b.ii. In this task we make a clone (copy) of Total - Probability - Set, delete p ( d ) 1,0 and adjust the remaining total-probability elements by removing from their respective summations any column probability that was used in the sum for p ( d ) 1,0, i.e. p ( s 2 ) = 0.20, p ( s 3 ) = 0.15 and p ( s 6 ) = Then we reindex and re-sort the total-probability elements, re-name the clone to Total - Probability - Set ( 1), and finally we interrupt the 1 st recursion-level s iteration and invoke the 2 nd recursion-level, using Total - Probability - Set 1 as the input. Let s walk through this one step at a time. First we make the clone: Total Probability Set (clone) 1, , ,0 1 5 ( 4 ) ( 5 ) 5,0 6, , ,0 3 4 = p ( s ) = 0.10, p d = p s + p s + p s = = 0.55, p c = p s + p s + p s = = 0.50, p f = p s + p s + p s = = 0.45, p a = p s + p s = = 0.35, p b = p s + p s = = 0.40, p h = p s + p s = = 0.40, p i = p s + p s = = 0.40, p e = p s + p s = = 0.25, p g 9,0 4 Now we delete p ( d ) 1,0 from the clone, and remove the column probabilities p ( s ) =, p ( s ) = and p ( s ) = from where ever else they appear in the clone, which gives us:

19 Every Good Key Must Be A Model Of The Lock It Opens Page 19 of 45 Total Probability Set = p ( s ) 3,0 1 = 0.05, 4, , ,0 7,0 = = 0, 0, = p ( s4 ) 8,0 = 0.10, = p ( s ) = 0.10, 9,0 4 (clone, partially adjusted) p c = p s + p s = = 0.35, p f p a = p s + p s = = 0.35, p b = p s + p s = = 0.40, p h p i p e p g Now we re-sort and re-index the total-probability elements that remain in Total - Probability - Set 1, thus: the clone and re-name the clone to Total Probability Set 1, ,1 1 5 = p ( s ) 4,1 4 = 0.10, = p ( s4 ) 5,1 = 0.10, = p ( s1 ) 6,1 = 0.05, 7,1 = 0, = 0, 8,1 ( 1) p b = p s + p s = = 0.40, p c = p s + p s = = 0.35, p a = p s + p s = = 0.35, p e p g p f p h p i Note that the ( 1 ) suffixed to the name of this Total-Probability-Set indicates that it was created as input to the 2 nd recursion-level by interrupting the 1 st iteration of the 1 st recursion-level. 3. Now, we interrupt the iterative process of the 1 st recursion-level and begin the 2 nd recursion-level using Total - Probability - Set ( 1) as the input. (Note that if we were to walk through all of the iterations at each recursion-level then we would resume the 1 st recursion-level iterative process only when the 2 nd recursion-level has been completed). Because it contains non-zero totalprobability elements this means we execute step (2.b), iterating, as we are in

20 Every Good Key Must Be A Model Of The Lock It Opens Page 20 of 45 the process of doing for the 1 st recursion-level, from the top to the bottom of Total - Probability - Set 1. Thus, we begin the 2 nd the elements in recursion-level s iterative process with p ( b ) 1,1 and hypothesize that z2 = b and thus that p ( z2 ) = p ( b) = ,1. Thus, again, we are assuming that H ( Z ) will be minimized with a distribution p ( Z ) in which p ( z2 ) = p ( b) = ,1. As we did in the 1 st recursion-level, we store this hypothesized value for p ( z 2 ) in the list p ( Z ) = p ( z ) = 0.55, p ( z ) = 0.40,.... { 1 2 } In task (2.b.ii) we make a clone (copy) of Total - Probability - Set ( 1), delete p ( b ) 1,1 and adjust the remaining total-probability elements by removing from their respective summations any column probability that was used in the sum for p ( b ) 1,1, i.e. p ( s 4 ) = 0.10 and p ( s 5 ) = Then we re-index and re-sort the total-probability elements, re-name the clone to Total - Probability - Set ( 1,1 ), and finally we interrupt the 2 nd recursionlevel s iterative process and invoke the 3 rd recursion-level, using as input Total - Probability - Set 1,1 which (the reader can check) appears as follows: Total Probability Set p ( s ) 1,2 1 p ( s ) p ( s ) 3,2 1 4,2 5,2 6,2 = = = 0, 0, 0, = 0, p a p c p f p e p g p h p i 7,2 = = = = = = 0.05, 0.05, 0.05, ( 1,1 ) 4. Because Total - Probability - Set ( 1,1 ) has non-zero total-probability elements we initiate the iterative process beginning with p ( a ) = p ( s1 ) = This means that we set z3 = a and 1,2 p ( a ) p z = = Also, we store this information in the list (which is 3 1,2 now a complete probability distribution since its elements sum to unity):

### each college c i C has a capacity q i - the maximum number of students it will admit

n colleges in a set C, m applicants in a set A, where m is much larger than n. each college c i C has a capacity q i - the maximum number of students it will admit each college c i has a strict order i

### It is time to prove some theorems. There are various strategies for doing

CHAPTER 4 Direct Proof It is time to prove some theorems. There are various strategies for doing this; we now examine the most straightforward approach, a technique called direct proof. As we begin, it

### 3. Mathematical Induction

3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)

### 2. Methods of Proof Types of Proofs. Suppose we wish to prove an implication p q. Here are some strategies we have available to try.

2. METHODS OF PROOF 69 2. Methods of Proof 2.1. Types of Proofs. Suppose we wish to prove an implication p q. Here are some strategies we have available to try. Trivial Proof: If we know q is true then

### 11 Ideals. 11.1 Revisiting Z

11 Ideals The presentation here is somewhat different than the text. In particular, the sections do not match up. We have seen issues with the failure of unique factorization already, e.g., Z[ 5] = O Q(

### Notes on Factoring. MA 206 Kurt Bryan

The General Approach Notes on Factoring MA 26 Kurt Bryan Suppose I hand you n, a 2 digit integer and tell you that n is composite, with smallest prime factor around 5 digits. Finding a nontrivial factor

### An Innocent Investigation

An Innocent Investigation D. Joyce, Clark University January 2006 The beginning. Have you ever wondered why every number is either even or odd? I don t mean to ask if you ever wondered whether every number

### CHAPTER 3. Methods of Proofs. 1. Logical Arguments and Formal Proofs

CHAPTER 3 Methods of Proofs 1. Logical Arguments and Formal Proofs 1.1. Basic Terminology. An axiom is a statement that is given to be true. A rule of inference is a logical rule that is used to deduce

### arxiv:1112.0829v1 [math.pr] 5 Dec 2011

How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman Thomas P. Hayes arxiv:1112.0829v1 [math.pr] 5 Dec 2011 Abstract Consider a gambling game in which we are allowed to repeatedly

### Prime Numbers. Chapter Primes and Composites

Chapter 2 Prime Numbers The term factoring or factorization refers to the process of expressing an integer as the product of two or more integers in a nontrivial way, e.g., 42 = 6 7. Prime numbers are

### Two-State Options. John Norstad. j-norstad@northwestern.edu http://www.norstad.org. January 12, 1999 Updated: November 3, 2011.

Two-State Options John Norstad j-norstad@northwestern.edu http://www.norstad.org January 12, 1999 Updated: November 3, 2011 Abstract How options are priced when the underlying asset has only two possible

### Induction. Margaret M. Fleck. 10 October These notes cover mathematical induction and recursive definition

Induction Margaret M. Fleck 10 October 011 These notes cover mathematical induction and recursive definition 1 Introduction to induction At the start of the term, we saw the following formula for computing

### Mathematical Induction

Mathematical Induction In logic, we often want to prove that every member of an infinite set has some feature. E.g., we would like to show: N 1 : is a number 1 : has the feature Φ ( x)(n 1 x! 1 x) How

### Recall this chart that showed how most of our course would be organized:

Chapter 4 One-Way ANOVA Recall this chart that showed how most of our course would be organized: Explanatory Variable(s) Response Variable Methods Categorical Categorical Contingency Tables Categorical

### Critical analysis. Be more critical! More analysis needed! That s what my tutors say about my essays. I m not really sure what they mean.

Critical analysis Be more critical! More analysis needed! That s what my tutors say about my essays. I m not really sure what they mean. I thought I had written a really good assignment this time. I did

### What mathematical optimization can, and cannot, do for biologists. Steven Kelk Department of Knowledge Engineering (DKE) Maastricht University, NL

What mathematical optimization can, and cannot, do for biologists Steven Kelk Department of Knowledge Engineering (DKE) Maastricht University, NL Introduction There is no shortage of literature about the

### (Refer Slide Time: 01:52)

Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This

### Microsoft Excel IF & AND Functions. By Stephen Groulx

Microsoft Excel IF & AND Functions By Stephen Groulx Excel IF & AND Functions Table of Contents Page Introduction... 3 IF Function, Simplified... 6 IF Function, Nested... 8 AND Function... 16 Assumptions

### Factoring & Primality

Factoring & Primality Lecturer: Dimitris Papadopoulos In this lecture we will discuss the problem of integer factorization and primality testing, two problems that have been the focus of a great amount

### CHAPTER 3 Numbers and Numeral Systems

CHAPTER 3 Numbers and Numeral Systems Numbers play an important role in almost all areas of mathematics, not least in calculus. Virtually all calculus books contain a thorough description of the natural,

### Abstraction in Computer Science & Software Engineering: A Pedagogical Perspective

Orit Hazzan's Column Abstraction in Computer Science & Software Engineering: A Pedagogical Perspective This column is coauthored with Jeff Kramer, Department of Computing, Imperial College, London ABSTRACT

### We now explore a third method of proof: proof by contradiction.

CHAPTER 6 Proof by Contradiction We now explore a third method of proof: proof by contradiction. This method is not limited to proving just conditional statements it can be used to prove any kind of statement

### THE ROOMMATES PROBLEM DISCUSSED

THE ROOMMATES PROBLEM DISCUSSED NATHAN SCHULZ Abstract. The stable roommates problem as originally posed by Gale and Shapley [1] in 1962 involves a single set of even cardinality 2n, each member of which

### Lecture 3. Mathematical Induction

Lecture 3 Mathematical Induction Induction is a fundamental reasoning process in which general conclusion is based on particular cases It contrasts with deduction, the reasoning process in which conclusion

### THE FUNDAMENTAL THEOREM OF ARBITRAGE PRICING

THE FUNDAMENTAL THEOREM OF ARBITRAGE PRICING 1. Introduction The Black-Scholes theory, which is the main subject of this course and its sequel, is based on the Efficient Market Hypothesis, that arbitrages

### IS YOUR DATA WAREHOUSE SUCCESSFUL? Developing a Data Warehouse Process that responds to the needs of the Enterprise.

IS YOUR DATA WAREHOUSE SUCCESSFUL? Developing a Data Warehouse Process that responds to the needs of the Enterprise. Peter R. Welbrock Smith-Hanley Consulting Group Philadelphia, PA ABSTRACT Developing

### A simple algorithm with no simple verication

A simple algorithm with no simple verication Laszlo Csirmaz Central European University Abstract The correctness of a simple sorting algorithm is resented, which algorithm is \evidently wrong" at the rst

### Pascal is here expressing a kind of skepticism about the ability of human reason to deliver an answer to this question.

Pascal s wager So far we have discussed a number of arguments for or against the existence of God. In the reading for today, Pascal asks not Does God exist? but Should we believe in God? What is distinctive

### Database Management System Dr. S. Srinath Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No.

Database Management System Dr. S. Srinath Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No. # 8 Functional Dependencies and Normal Forms Two different kinds

### well as explain Dennett s position on the arguments of Turing and Searle.

Perspectives on Computer Intelligence Can computers think? In attempt to make sense of this question Alan Turing, John Searle and Daniel Dennett put fourth varying arguments in the discussion surrounding

### Cracking the Sudoku: A Deterministic Approach

Cracking the Sudoku: A Deterministic Approach David Martin Erica Cross Matt Alexander Youngstown State University Center for Undergraduate Research in Mathematics Abstract The model begins with the formulation

### 13 Infinite Sets. 13.1 Injections, Surjections, and Bijections. mcs-ftl 2010/9/8 0:40 page 379 #385

mcs-ftl 2010/9/8 0:40 page 379 #385 13 Infinite Sets So you might be wondering how much is there to say about an infinite set other than, well, it has an infinite number of elements. Of course, an infinite

### Cost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation:

CSE341T 08/31/2015 Lecture 3 Cost Model: Work, Span and Parallelism In this lecture, we will look at how one analyze a parallel program written using Cilk Plus. When we analyze the cost of an algorithm

### Chapter II. Controlling Cars on a Bridge

Chapter II. Controlling Cars on a Bridge 1 Introduction The intent of this chapter is to introduce a complete example of a small system development. During this development, you will be made aware of the

### CS 2336 Discrete Mathematics

CS 2336 Discrete Mathematics Lecture 5 Proofs: Mathematical Induction 1 Outline What is a Mathematical Induction? Strong Induction Common Mistakes 2 Introduction What is the formula of the sum of the first

### Steps to Proving a Theorem

Steps to Proving a Theorem Step 1: Understand Goal What am I looking for? What should the last sentence in my proof say? What are some equivalent ways to state what I want? Are there any complicated definitions

### Students in their first advanced mathematics classes are often surprised

CHAPTER 8 Proofs Involving Sets Students in their first advanced mathematics classes are often surprised by the extensive role that sets play and by the fact that most of the proofs they encounter are

### 1.3 Induction and Other Proof Techniques

4CHAPTER 1. INTRODUCTORY MATERIAL: SETS, FUNCTIONS AND MATHEMATICAL INDU 1.3 Induction and Other Proof Techniques The purpose of this section is to study the proof technique known as mathematical induction.

### 6.080 / 6.089 Great Ideas in Theoretical Computer Science Spring 2008

MIT OpenCourseWare http://ocw.mit.edu 6.080 / 6.089 Great Ideas in Theoretical Computer Science Spring 2008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.

### WHAT ARE MATHEMATICAL PROOFS AND WHY THEY ARE IMPORTANT?

WHAT ARE MATHEMATICAL PROOFS AND WHY THEY ARE IMPORTANT? introduction Many students seem to have trouble with the notion of a mathematical proof. People that come to a course like Math 216, who certainly

### 1 Limiting distribution for a Markov chain

Copyright c 2009 by Karl Sigman Limiting distribution for a Markov chain In these Lecture Notes, we shall study the limiting behavior of Markov chains as time n In particular, under suitable easy-to-check

### [Refer Slide Time: 05:10]

Principles of Programming Languages Prof: S. Arun Kumar Department of Computer Science and Engineering Indian Institute of Technology Delhi Lecture no 7 Lecture Title: Syntactic Classes Welcome to lecture

### 1. Probabilities lie between 0 and 1 inclusive. 2. Certainty implies unity probability. 3. Probabilities of exclusive events add. 4. Bayes s rule.

Probabilities as betting odds and the Dutch book Carlton M. Caves 2000 June 24 Substantially modified 2001 September 6 Minor modifications 2001 November 30 Material on the lottery-ticket approach added

### 1.7 Graphs of Functions

64 Relations and Functions 1.7 Graphs of Functions In Section 1.4 we defined a function as a special type of relation; one in which each x-coordinate was matched with only one y-coordinate. We spent most

### Experimental Designs (revisited)

Introduction to ANOVA Copyright 2000, 2011, J. Toby Mordkoff Probably, the best way to start thinking about ANOVA is in terms of factors with levels. (I say this because this is how they are described

### Module 3: Functional Requirements

smart BA Distance Learning Programme Module 3: Functional Requirements Hello and welcome to the smart BA distance learning programme Module 3 in this module you are going to analyse the requirements of

### NODAL ANALYSIS. Circuits Nodal Analysis 1 M H Miller

NODAL ANALYSIS A branch of an electric circuit is a connection between two points in the circuit. In general a simple wire connection, i.e., a 'short-circuit', is not considered a branch since it is known

### Chapter Four: How to Collaborate and Write With Others

Chapter Four: How to Collaborate and Write With Others Why Collaborate on Writing? Considering (and Balancing) the Two Extremes of Collaboration Peer Review as Collaboration * A sample recipe for how peer

### CHAPTER 7 GENERAL PROOF SYSTEMS

CHAPTER 7 GENERAL PROOF SYSTEMS 1 Introduction Proof systems are built to prove statements. They can be thought as an inference machine with special statements, called provable statements, or sometimes

### Section Notes 3. The Simplex Algorithm. Applied Math 121. Week of February 14, 2011

Section Notes 3 The Simplex Algorithm Applied Math 121 Week of February 14, 2011 Goals for the week understand how to get from an LP to a simplex tableau. be familiar with reduced costs, optimal solutions,

### WRITING PROOFS. Christopher Heil Georgia Institute of Technology

WRITING PROOFS Christopher Heil Georgia Institute of Technology A theorem is just a statement of fact A proof of the theorem is a logical explanation of why the theorem is true Many theorems have this

### COLORED GRAPHS AND THEIR PROPERTIES

COLORED GRAPHS AND THEIR PROPERTIES BEN STEVENS 1. Introduction This paper is concerned with the upper bound on the chromatic number for graphs of maximum vertex degree under three different sets of coloring

### Double Deck Blackjack

Double Deck Blackjack Double Deck Blackjack is far more volatile than Multi Deck for the following reasons; The Running & True Card Counts can swing drastically from one Round to the next So few cards

### Chapter 15 Introduction to Linear Programming

Chapter 15 Introduction to Linear Programming An Introduction to Optimization Spring, 2014 Wei-Ta Chu 1 Brief History of Linear Programming The goal of linear programming is to determine the values of

### 11.3 BREAK-EVEN ANALYSIS. Fixed and Variable Costs

385 356 PART FOUR Capital Budgeting a large number of NPV estimates that we summarize by calculating the average value and some measure of how spread out the different possibilities are. For example, it

### CONTRIBUTIONS TO ZERO SUM PROBLEMS

CONTRIBUTIONS TO ZERO SUM PROBLEMS S. D. ADHIKARI, Y. G. CHEN, J. B. FRIEDLANDER, S. V. KONYAGIN AND F. PAPPALARDI Abstract. A prototype of zero sum theorems, the well known theorem of Erdős, Ginzburg

### Some Polynomial Theorems. John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 rkennedy@ix.netcom.

Some Polynomial Theorems by John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 rkennedy@ix.netcom.com This paper contains a collection of 31 theorems, lemmas,

### Revised Version of Chapter 23. We learned long ago how to solve linear congruences. ax c (mod m)

Chapter 23 Squares Modulo p Revised Version of Chapter 23 We learned long ago how to solve linear congruences ax c (mod m) (see Chapter 8). It s now time to take the plunge and move on to quadratic equations.

### THE ROLE OF PROJECT MANAGEMENT IN KNOWLEDGE MANAGEMENT

1-04-15 INFORMATION MANAGEMENT: STRATEGY, SYSTEMS, AND TECHNOLOGY THE ROLE OF PROJECT MANAGEMENT IN KNOWLEDGE MANAGEMENT Ralph L. Kliem INSIDE Basics of Knowledge Management and Project Management; Work

### Definition 10. A proposition is a statement either true or false, but not both.

Chapter 2 Propositional Logic Contrariwise, continued Tweedledee, if it was so, it might be; and if it were so, it would be; but as it isn t, it ain t. That s logic. (Lewis Carroll, Alice s Adventures

### Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements

Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Cecilia Wirfelt Louise Wallin Email: {cecwi155, louwa538}@student.liu.se Supervisor: Jan-Åke Larsson,

### Copyrighted Material. Chapter 1 DEGREE OF A CURVE

Chapter 1 DEGREE OF A CURVE Road Map The idea of degree is a fundamental concept, which will take us several chapters to explore in depth. We begin by explaining what an algebraic curve is, and offer two

### Introduction to. Hypothesis Testing CHAPTER LEARNING OBJECTIVES. 1 Identify the four steps of hypothesis testing.

Introduction to Hypothesis Testing CHAPTER 8 LEARNING OBJECTIVES After reading this chapter, you should be able to: 1 Identify the four steps of hypothesis testing. 2 Define null hypothesis, alternative

### Chapter 6: The Information Function 129. CHAPTER 7 Test Calibration

Chapter 6: The Information Function 129 CHAPTER 7 Test Calibration 130 Chapter 7: Test Calibration CHAPTER 7 Test Calibration For didactic purposes, all of the preceding chapters have assumed that the

### 1. R In this and the next section we are going to study the properties of sequences of real numbers.

+a 1. R In this and the next section we are going to study the properties of sequences of real numbers. Definition 1.1. (Sequence) A sequence is a function with domain N. Example 1.2. A sequence of real

### Subsets of Euclidean domains possessing a unique division algorithm

Subsets of Euclidean domains possessing a unique division algorithm Andrew D. Lewis 2009/03/16 Abstract Subsets of a Euclidean domain are characterised with the following objectives: (1) ensuring uniqueness

### This chapter is all about cardinality of sets. At first this looks like a

CHAPTER Cardinality of Sets This chapter is all about cardinality of sets At first this looks like a very simple concept To find the cardinality of a set, just count its elements If A = { a, b, c, d },

### NECESSARY AND SUFFICIENT CONDITIONS

Michael Lacewing Personal identity: Physical and psychological continuity theories A FIRST DISTINCTION In order to understand what is at issue in personal identity, it is important to distinguish between

### Decision Theory. 36.1 Rational prospecting

36 Decision Theory Decision theory is trivial, apart from computational details (just like playing chess!). You have a choice of various actions, a. The world may be in one of many states x; which one

### The Trip Scheduling Problem

The Trip Scheduling Problem Claudia Archetti Department of Quantitative Methods, University of Brescia Contrada Santa Chiara 50, 25122 Brescia, Italy Martin Savelsbergh School of Industrial and Systems

### Concept Learning. Machine Learning 1

Concept Learning Inducing general functions from specific training examples is a main issue of machine learning. Concept Learning: Acquiring the definition of a general category from given sample positive

### Stochastic Inventory Control

Chapter 3 Stochastic Inventory Control 1 In this chapter, we consider in much greater details certain dynamic inventory control problems of the type already encountered in section 1.3. In addition to the

### 1.2 Truth and Sentential Logic

Chapter 1 Mathematical Logic 13 69. Assume that B has m left parentheses and m right parentheses and that C has n left parentheses and n right parentheses. How many left parentheses appear in (B C)? How

### 6.042/18.062J Mathematics for Computer Science. Expected Value I

6.42/8.62J Mathematics for Computer Science Srini Devadas and Eric Lehman May 3, 25 Lecture otes Expected Value I The expectation or expected value of a random variable is a single number that tells you

### Online Supplement for Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers by Mohammad H. Yarmand and Douglas G.

Online Supplement for Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers by Mohammad H Yarmand and Douglas G Down Appendix A Lemma 1 - the remaining cases In this appendix,

### CONTENTS OF DAY 2. II. Why Random Sampling is Important 9 A myth, an urban legend, and the real reason NOTES FOR SUMMER STATISTICS INSTITUTE COURSE

1 2 CONTENTS OF DAY 2 I. More Precise Definition of Simple Random Sample 3 Connection with independent random variables 3 Problems with small populations 8 II. Why Random Sampling is Important 9 A myth,

### Five High Order Thinking Skills

Five High Order Introduction The high technology like computers and calculators has profoundly changed the world of mathematics education. It is not only what aspects of mathematics are essential for learning,

### Unit 1 Number Sense. In this unit, students will study repeating decimals, percents, fractions, decimals, and proportions.

Unit 1 Number Sense In this unit, students will study repeating decimals, percents, fractions, decimals, and proportions. BLM Three Types of Percent Problems (p L-34) is a summary BLM for the material

### 6.080 / 6.089 Great Ideas in Theoretical Computer Science Spring 2008

MIT OpenCourseWare http://ocw.mit.edu 6.080 / 6.089 Great Ideas in Theoretical Computer Science Spring 2008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.

### The Gravity Model: Derivation and Calibration

The Gravity Model: Derivation and Calibration Philip A. Viton October 28, 2014 Philip A. Viton CRP/CE 5700 () Gravity Model October 28, 2014 1 / 66 Introduction We turn now to the Gravity Model of trip

### What makes a good process?

Rob Davis Everyone wants a good process. Our businesses would be more profitable if we had them. But do we know what a good process is? Would we recognized one if we saw it? And how do we ensure we can

### Problems, Methods and Tools of Advanced Constrained Scheduling

Problems, Methods and Tools of Advanced Constrained Scheduling Victoria Shavyrina, Spider Project Team Shane Archibald, Archibald Associates Vladimir Liberzon, Spider Project Team 1. Introduction In this

### Chapter I Logic and Proofs

MATH 1130 1 Discrete Structures Chapter I Logic and Proofs Propositions A proposition is a statement that is either true (T) or false (F), but or both. s Propositions: 1. I am a man.. I am taller than

### Last time we had arrived at the following provisional interpretation of Aquinas second way:

Aquinas Third Way Last time we had arrived at the following provisional interpretation of Aquinas second way: 1. 2. 3. 4. At least one thing has an efficient cause. Every causal chain must either be circular,

### Optimal Auctions Continued

Lecture 6 Optimal Auctions Continued 1 Recap Last week, we... Set up the Myerson auction environment: n risk-neutral bidders independent types t i F i with support [, b i ] residual valuation of t 0 for

### CHANCE ENCOUNTERS. Making Sense of Hypothesis Tests. Howard Fincher. Learning Development Tutor. Upgrade Study Advice Service

CHANCE ENCOUNTERS Making Sense of Hypothesis Tests Howard Fincher Learning Development Tutor Upgrade Study Advice Service Oxford Brookes University Howard Fincher 2008 PREFACE This guide has a restricted

### , for x = 0, 1, 2, 3,... (4.1) (1 + 1/n) n = 2.71828... b x /x! = e b, x=0

Chapter 4 The Poisson Distribution 4.1 The Fish Distribution? The Poisson distribution is named after Simeon-Denis Poisson (1781 1840). In addition, poisson is French for fish. In this chapter we will

### LOGICAL INFERENCE & PROOFs. Debdeep Mukhopadhyay Dept of CSE, IIT Madras

LOGICAL INFERENCE & PROOFs Debdeep Mukhopadhyay Dept of CSE, IIT Madras Defn A theorem is a mathematical assertion which can be shown to be true. A proof is an argument which establishes the truth of a

### 1/9. Locke 1: Critique of Innate Ideas

1/9 Locke 1: Critique of Innate Ideas This week we are going to begin looking at a new area by turning our attention to the work of John Locke, who is probably the most famous English philosopher of all

### The Very Best Way We Know to Play the Exacta

Frandsen Publishing Presents Favorite ALL-Ways TM Newsletter Articles The Very Best Way We Know to Play the Exacta Common Sense vs. Calculator The Exacta is one of the very best wagers in racing. We do

### 7 Conclusions and suggestions for further research

7 Conclusions and suggestions for further research This research has devised an approach to analyzing system-level coordination from the point of view of product architecture. The analysis was conducted

### The Basics of Scrum An introduction to the framework

The Basics of Scrum An introduction to the framework Introduction Scrum, the most widely practiced Agile process, has been successfully used in software development for the last 20 years. While Scrum has

### How to Write a Good Paper?

How to Write a Good Paper? (www.cse.iitb.ac.in/ uday) Department of Computer Science and Engineering, Indian Institute of Technology, Bombay October 2009 CSI Convention 09 Research: Outline 1/26 Outline

### User Stories Applied

User Stories Applied for Agile Software Development Mike Cohn Boston San Francisco New York Toronto Montreal London Munich Paris Madrid Capetown Sydney Tokyo Singapore Mexico City Chapter 2 Writing Stories

### 9.2 Summation Notation

9. Summation Notation 66 9. Summation Notation In the previous section, we introduced sequences and now we shall present notation and theorems concerning the sum of terms of a sequence. We begin with a

### Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2

CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 2 Proofs Intuitively, the concept of proof should already be familiar We all like to assert things, and few of us

### The Assumption(s) of Normality

The Assumption(s) of Normality Copyright 2000, 2011, J. Toby Mordkoff This is very complicated, so I ll provide two versions. At a minimum, you should know the short one. It would be great if you knew