A relationship between generalized Davenport-Schinzel sequences and interval chains

Size: px
Start display at page:

Download "A relationship between generalized Davenport-Schinzel sequences and interval chains"

Transcription

1 A relationhip between generalized Davenport-Schinzel equence and interval chain The MIT Faculty ha made thi article openly available. Pleae hare how thi acce benefit you. Your tory matter. Citation A Publihed Publiher Geneon, Jee. "A relationhip between generalized Davenport-Schinzel equence and interval chain." Electronic Journal of Combinatoric (3) (Augut 015). p19 European Mathematical Information Service (EMIS) Verion Final publihed verion Acceed Sun Dec 5 03:1:36 EST 016 Citable Link Term of Ue Detailed Term Article i made available in accordance with the publiher' policy and may be ubject to US copyright law. Pleae refer to the publiher' ite for term of ue.

2 A relationhip between generalized Davenport-Schinzel equence and interval chain Jee Geneon Department of Mathematic Maachuett Intitute of Technology Maachuett, U.S.A. Submitted: Oct 0, 014; Accepted: Jul 4, 015; Publihed: Aug 14, 015 Mathematic Subject Claification: 05D99 Abtract Let an (r, )-formation be a concatenation of permutation of r ditinct letter, and let a block of a equence be a ubequence of conecutive ditinct letter. A k-chain on [1, m] i a equence of k conecutive, dijoint, nonempty interval of the form [a 0, a 1 ][a 1 + 1, a ]... [a k 1 + 1, a k ] for integer 1 a 0 a 1 <... < a k m, and an -tuple i a et of ditinct integer. An -tuple tab an interval chain if each element of the -tuple i in a different interval of the chain. Alon et al. (008) oberved imilaritie between bound for interval chain and Davenport-Schinzel equence, but did not identify the caue. We how for all r 1 and 1 k m that the maximum number of ditinct letter in any equence S on m + 1 block avoiding every (r, + 1)-formation uch that every letter in S occur at leat k + 1 time i the ame a the maximum ize of a collection X of (not necearily ditinct) k-chain on [1, m] o that there do not exit r element of X all tabbed by the ame -tuple. Let D,k (m) be the maximum number of ditinct letter in any equence which can be partitioned into m block, ha at leat k occurrence of every letter, and ha no ubequence forming an alternation of length. Nivach (010) proved that D 5,d+1 (m) = Θ(mα d (m)) for all fixed d. We how that D +1, (m) = ( m ) for all. We alo prove new lower bound which imply that D5,6 (m) = Θ(m log log m) and D 5,d+ (m) = Θ(mα d (m)) for all fixed d 3. Keyword: alternation, formation, generalized Davenport-Schinzel equence, interval chain, invere Ackermann function, permutation Supported by the NSF Graduate Reearch Fellowhip under Grant No the electronic journal of combinatoric (3) (015), #P3.19 1

3 1 Introduction A equence contain a equence u if ome ubequence of can be changed into u by a one-to-one renaming of it letter. If doe not contain u, then avoid u. A equence i called r-pare if any r conecutive letter in are ditinct. Collection of contiguou ditinct letter in are called block. A generalized Davenport-Schinzel equence i an r-pare equence avoiding a fixed forbidden equence (or et of equence) with r ditinct letter. Bound on the length of generalized Davenport-Schinzel equence were ued to bound the complexity of lower envelope of olution et of linear homogeneou differential equation [5], the complexity of face in arrangement of arc [1], and the maximum number of edge in k-quaiplanar graph with no pair of edge interecting in more than O(1) point [6, 14]. Let λ (n) be the maximum length of any -pare equence with n ditinct letter which avoid alternation of length +. For = 1 and =, λ (n) = Θ(n). However, Hart and Sharir [7] howed that λ 3 (n) = Θ(nα(n)), uch that α(n) denote the invere λ Ackermann function. Nivach [10] and Klazar [9] proved that lim 3 (n) n =. nα(n) Agarwal, Sharir, Shor [] and Nivach [10] proved that λ (n) = n 1 t! α(n)t ±O(α(n) t 1 ) for even 4 with t =. Pettie [1] proved that λ 5(n) = Θ(nα(n) α(n) ) and that λ (n) = n 1 t! α(n)t ±O(α(n) t 1) for odd 7 with t = 3. In [10], imilar bound were alo derived for a different equence extremal function. Let an (r, )-formation be a concatenation of permutation of r ditinct letter. For example abcddcbaadbc i a (4, 3)-formation. Define F r, (n) to be the maximum length of any r-pare equence with n ditinct letter which avoid all (r, )-formation. Klazar [8] proved that F r, (n) = Θ(n) and F r,3 (n) = Θ(n) for every r > 0. Nivach proved that F r,4 (n) = Θ(nα(n)) for r. Nivach [10] howed that F r, (n) = n 1 t! α(n)t ±O(α(n) t 1) for all r and odd 5 with t = 3. Pettie [13] proved for r = that F r,6 (n) = Θ(nα(n) α(n) ) and that F r, (n) = n 1 t! α(n)t ±O(α(n) t 1) for even 8 with t = 4. When r 3, Pettie proved that F r,(n) = n 1 t! α(n)t log α(n)±o(α(n) t) for even 6 with t = 4. To define the Ackermann hierarchy let A 1 (n) = n and for k, A k (0) = 1 and A k (n) = A k 1 (A k (n 1)) for n 1. To define the invere function let α k (x) = min {n : A k (n) x} for all k 1. We define the Ackermann function A(n) to be A n (3) a in [10]. The invere Ackermann function α(n) i defined to be min {x : A(x) n}. Nivach bound on λ (n) were derived uing an extremal function which maximize number of ditinct letter intead of length. Let D,k (m) be the maximum number of ditinct letter in any equence on m block avoiding alternation of length uch that every letter occur at leat k time. Clearly D,k (m) = 0 if m < k and D,k (m) = if k < 1 and k m. Nivach proved that Ψ (m, n) k(d,k (m)+n) [10], where Ψ (m, n) denote the maximum poible length of any equence on m block with n ditinct letter that avoid alternation of length. Nivach alo proved that D 5,d+1 (m) = Θ(mα d (m)) for each fixed d (but noted that the bound on D 5,k (m) were not tight for even k). Sundar [15] derived imilar bound the electronic journal of combinatoric (3) (015), #P3.19

4 in term of m on function related to the Deque conjecture. Let F r,,k (m) be the maximum number of ditinct letter in any equence on m block avoiding every (r, )-formation uch that every letter occur at leat k time. Clearly F r,,k (m) = 0 if m < k and F r,,k (m) = if k < and k m. Every (r, )-formation contain an alternation of length + 1 for every r, o D +1,k (m) F r,,k (m) for every r. Nivach proved that Ψ r,(m, n) k(f r,,k (m) + n) [10], where Ψ r,(m, n) denote the maximum poible length of any equence on m block with n ditinct letter that avoid every (r, )-formation. Nivach alo proved for r that F r,4,d+1 (m) = Θ(mα d (m)) for each fixed d. The recurive inequalitie for the upper bound on F r,4,d+1 (m) in [10] alo imply that F r,4,6 (m) = O(m log log m) and that F r,4,d+ (m) = O(mα d (m)). Similar bound were alo derived on an extremal function related to interval chain. A k-chain on [1, m] i a equence of k conecutive, dijoint, nonempty interval of the form [a 0, a 1 ][a 1 + 1, a ]... [a k 1 + 1, a k ] for integer 1 a 0 a 1 <... < a k m. An -tuple i a et of ditinct integer. An -tuple tab an interval chain if each element of the -tuple i in a different interval of the chain. Let ζ,k (m) denote the minimum ize of a collection of -tuple uch that every k-chain on [1, m] i tabbed by an -tuple in the collection. Clearly ζ,k (m) = 0 if m < k and ζ,k (m) i undefined if k < and k m. Alon et al. [3] howed that ζ, (m) = ( m ) for 1, ζ3,4 (m) = Θ(m log m), ζ 3,5 (m) = Θ(m log log m), and ζ 3,k (m) = Θ(mα k (m)) for k 6. Alon et al. [3] oberved imilaritie between bound for interval chain and Davenport-Schinzel equence, but did not identify the caue. Let η r,,k (m) denote the maximum ize of a collection X of not necearily ditinct k-chain on [1, m] o that there do not exit r element of X all tabbed by the ame -tuple. Clearly η r,,k (m) = 0 if m < k and η r,,k (m) = if k < and k m. In Section we how that η r,,k (m) = F r,+1,k+1 (m+1) for all r 1 and 1 k m. Lemma 1.1. ζ,k (m) η,,k (m) for all 1 k m. Proof. Let X be a collection of k-chain on [1, m] o that there do not exit element of X that are tabbed by the ame -tuple. Then by the pigeonhole principle, X i the minimum poible ize of a collection Y of -tuple uch that every k-chain in X i tabbed by an -tuple in Y. The lat lemma and the equality in Section imply that D +,k+1 (m + 1) ζ,k (m) for all 1 k m. Thi implie that D +1, (m) ( m ) for all, D5,6 (m) = O(m log log m), and D 5,d+ (m) = O(mα d (m)) for d 3. In Section 3 we contruct alternation-avoiding equence to prove lower bound on D,k (m). We prove that D +1, (m) = ( m ) for all. Furthermore we how that D 5,6 (m) = Ω(m log log m) and D 5,d+ (m) = Ω( 1 d mα d(m)) for d 3. Thu the bound on D 5,d (m) have a multiplicative gap of O(d) for all d. the electronic journal of combinatoric (3) (015), #P3.19 3

5 Proof that F r,+1,k+1 (m + 1) = η r,,k (m) We how that F r,+1,k+1 (m + 1) = η r,,k (m) for all r 1 and 1 k m uing map like thoe between matrice and equence in [4] and [11]. Lemma.1. F r,+1,k+1 (m + 1) η r,,k (m) for all r 1 and 1 k m. Proof. Let P be a equence with F r,+1,k+1 (m + 1) ditinct letter and m + 1 block 1,..., m + 1 uch that no ubequence i a concatenation of + 1 permutation of r different letter and every letter in P occur at leat k + 1 time. Contruct a collection of k-chain on [1, m] by converting each letter in P to a k-chain: if the firt k +1 occurrence of letter a are in block a 0,..., a k, then let a be the k-chain with i th interval [a i 1, a i 1]. Suppoe for contradiction that there exit r ditinct letter q 1,..., q r in P uch that q 1,..., q r are tabbed by the ame -tuple 1 j 1 <... < j m. Let j 0 = 0 and j +1 = m + 1. Then for each 1 i + 1, q n occur in ome block b n,i uch that b n,i [j i 1 + 1, j i ] for every 1 n r. Hence the letter q 1,..., q r make an (r, + 1)- formation in P, a contradiction. Corollary.. D +,k+1 (m + 1) ζk (m) for all 1 k m. The bound on ζ,k (m) in [3] imply the next corollary. Corollary.3. D +1, (m) ( m ) for, D5,5 (m) = O(m log m), D 5,6 (m) = O(m log log m), and D 5,k (m) = O(mα k 1 (m)) for k 7. To prove that F r,+1,k+1 (m + 1) η r,,k (m) for all r 1 and 1 k m, we convert collection of k-chain into equence with a letter correponding to each k-chain. Lemma.4. F r,+1,k+1 (m + 1) η r,,k (m) for all r 1 and 1 k m. Proof. Let X be a maximal collection of k-chain on [1, m] o that there do not exit r element of X all tabbed by the ame -tuple. To change X into a equence P create a letter a for every k-chain a in X, and put a in every block i uch that either a ha an interval with leat element i or a ha an interval with greatet element i 1. Order the letter in block tarting with the firt block and moving to the lat. Let L i be the letter in block i which alo occur in ome block j < i and let R i be the letter which have firt occurrence in block i. All of the letter in L i occur before all of the letter in R i. If a and b are in L i, then a appear before b in block i if the lat occurrence of a before block i i after the lat occurrence of b before block i. The letter in R i may appear in any order. P i a equence on m + 1 block in which each letter occur k + 1 time. Suppoe for contradiction that there exit r letter q 1,..., q r which form an (r, + 1)-formation in P. Lit all (r, + 1)-formation on the letter q 1,..., q r in P lexicographically, o that formation f appear before formation g if there exit ome i 1 uch that the firt i 1 element of f and g are the ame, but the i th element of f appear before the i th element of g in P. the electronic journal of combinatoric (3) (015), #P3.19 4

6 Let f 0 be the firt (r, + 1)-formation on the lit and let π i (repectively ρ i ) be the number of the block which contain the lat (repectively firt) element of the i th permutation in f 0 for 1 i +1. We claim that π i < ρ i+1 for every 1 i. Suppoe for contradiction that for ome 1 i, π i = ρ i+1. Let a be the lat letter of the i th permutation and let b be the firt letter of the (i + 1) t permutation. Then a occur before b in block π i and the b in π i i not the firt occurrence of b in P, o the a in π i i not the firt occurrence of a in P. Otherwie a would appear after b in π i. Since the a and b in π i are not the firt occurrence of a and b in P, then the lat occurrence of a before π i mut be after the lat occurrence of b before π i. Let f 1 be the ubequence obtained by deleting the a in π i from f 0 and inerting the lat occurrence of a before π i. Since the lat occurrence of a before π i occur after the occurrence of b in the i th permutation of f 0, f 1 i alo an (r, + 1)-formation. Moreover, f 1 occur before f 0 on the lit. Thi contradict the definition of f 0, o for every 1 i, π i < ρ i+1. For every 1 j r and 1 i + 1, the letter q j appear in ome block between ρ i and π i incluive. Since π i < ρ i+1 for every 1 i, the -tuple (π 1,..., π ) tab each of the interval chain q 1,..., q r, a contradiction. Hence P contain no (r, + 1)- formation. The idea for the next lemma i imilar to a proof about doubled formation free matrice in [4]. Lemma.5. F r,, (m) (r 1) ( m ) for every r 1 and 1 m. Proof. Let P be a equence with m block uch that no ubequence of P i a concatenation of permutation of r ditinct letter and every letter of P occur at leat time. An occurrence of letter a in P i called even if there are an odd number of occurrence of a to the left of it. Otherwie the occurrence of a i called odd. Suppoe for contradiction that P ha at leat 1 + (r 1) ( m ) ditinct letter. The number of ditinct tuple (m 1,..., m ) for which a letter could have even occurrence in block m 1,..., m i equal to the number of poitive integer olution to the equation (1+x 1 )+...+(1+x )+x 1+ = m+1 if i even and (1+x 1 )+...+(1+x )+x 1+ = m if i odd. Since for each the equation ha ( m ) poitive integer olution, by the pigeonhole principle there are at leat r ditinct letter q 1,..., q r with even occurrence in the ame block of P. Then P contain a concatenation of permutation of the letter q 1,..., q r, a contradiction. The lat lemma i an alternative proof that D +1, (m) ( m ) ince D+1, (m) F r,, (m) for all, m 1 and r. 3 Lower bound In the lat ection we howed that D +1, (m) ( m ) for. The next lemma provide a matching lower bound. the electronic journal of combinatoric (3) (015), #P3.19 5

7 Lemma 3.1. D +1, (m) ( m ) for all and m + 1. Proof. For every 1 and m + 1 we build a equence X (m) with ( m ) ditinct letter. Firt conider the cae of even. The equence X (m) i the concatenation of m 1 fan, o that each fan i a palindrome coniting of two block of equal length. Firt aign letter to each fan without ordering them. Create a letter for every -tuple of non-adjacent fan, and put each letter in every fan in it -tuple. Then order the letter in each fan tarting with the firt fan and moving to the lat. Let L i be the letter in fan i which occur in ome fan j < i and let R i be the letter which have firt occurrence in fan i. In the firt block of fan i all of the letter in L i occur before all of the letter in R i. If a and b are in L i, then a occur before b in the firt block of fan i if the lat occurrence of a before fan i i after the lat occurrence of b before fan i. If a and b are in R i, then a occur before b in the firt block of fan i if the firt fan which contain a without b i before the firt fan which contain b without a. Conider for any ditinct letter x and y the maximum alternation contained in the ubequence of X (m) retricted to x and y. The maximum alternation i contructed tarting with a fan that contain only x, and ucceively adding adjacent fan. Any other fan which contain x without y or y without x add at mot 1 to the alternation length. Any fan which contain both x and y add to the alternation length. If x and y occur together in i fan, then the length of their alternation i at mot ( i) + ( i) + i =. Every pair of adjacent fan have no letter in common, o every pair of adjacent block in different fan can be joined a one block when the m 1 fan are concatenated to form X (m). Thu X (m) ha m block and ( m ) letter, and each letter occur time. For odd 3, contruct X (m) by adding a block r after X 1 (m 1) containing all of the letter in X 1 (m 1) uch that a occur before b in r if the lat occurrence of a in X 1 (m 1) i after the lat occurrence of b in X 1 (m 1). Then X (m) contain no alternation of length +1 ince X 1 (m 1) contain no alternation of length. Moreover X (m) ha m block and ( m +1 1 ) letter, and each letter occur time. The next lemma how how to extend the lower bound on D +1, (m) to F r,, (m). Lemma 3.. F r,,k (m) (r 1)F,,k (m) for all r 1 and 1 k m. Proof. Let P be a equence with F,,k (m) ditinct letter and m block uch that no ubequence i a concatenation of permutation of two ditinct letter and every letter occur at leat k time. P i the equence obtained from P by creating r 1 new letter a 1,..., a r 1 for each letter a and replacing every occurrence of a with the equence a 1... a r 1. Suppoe for contradiction that P contain an (r, )-formation on the letter q 1,..., q r. Then there exit indice i, j, k, l and ditinct letter a, b uch that q i = a j and q k = b l. P contain a (, )-formation on the letter q i and q k, o P contain a (, ) formation on the letter a and b, a contradiction. Then P i a equence with (r 1)F,,k (m) ditinct the electronic journal of combinatoric (3) (015), #P3.19 6

8 letter and m block uch that no ubequence i a concatenation of permutation of r ditinct letter and every letter occur at leat k time. Corollary 3.3. F r,, (m) = (r 1) ( m ) for all r 1 and m 1. The proof of the next theorem i much like the proof that D 5,d+1 (m) = Ω( 1 d mα d(m)) for d in [10]. The only ubtantial difference i the bae cae. Theorem 3.4. D 5,6 (m) = Ω(m log log m) and D 5,d+ (m) = Ω( 1 d mα d(m)) for d 3. We prove thi theorem by contructing a family of equence that avoid ababa. For all d, m 1, we inductively contruct equence G d (m) in which each letter appear d + time and no two ditinct letter make an alternation of length 5. Thi proof ue a different definition of fan: fan will be the concatenation of two palindrome with no letter in common. Each palindrome conit of two block of equal length. For d, m 1 the block in G d (m) containing only firt and lat occurrence of letter are called pecial block. Let S d (m) be the number of pecial block in G d (m). Every letter ha it firt and lat occurrence in a pecial block, and each pecial block in G d (m) ha m letter. Block that are not pecial are called regular. No regular block in G d (m) ha pecial block on both ide, but every pecial block ha regular block on both ide. The equence G 1 (m) are the concatenation of m + 1 fan. In each fan the econd block of the firt palindrome and the firt block of the econd palindrome make one block together ince they are adjacent and have no letter in common. The firt palindrome in the firt fan and the econd palindrome in the lat fan are empty. There i a letter for every pair of fan and the letter i in both of thoe fan. The letter with lat appearance in fan i are in the firt palindrome of fan i. They appear in fan i firt palindrome firt block in revere order of the fan in which they firt appear. The letter with firt appearance in fan i are in the econd palindrome of fan i. They appear in fan i econd palindrome firt block in order of the fan in which they lat appear. For example, the equence G 1 (4) i iomorphic to the following equence, uch that () denote pecial block boundarie, [] denote regular block boundarie, and denote fan boundarie: [](abcd)[dcba] [a](aefg)[gfe] [eb](behi)[ih] [hfc](cfhj)[j] [jigd](dgij)[] Lemma 3.5. G 1 (m) contain no alternation of length 5. Proof. Let x and y be any two letter in G 1 (m). If x and y do not occur in any fan together, then clearly the ubequence of G 1 (m) retricted to x and y contain no alternation of length 5. If x and y occur together in a fan, then their common fan contain an alternation on x and y of length or 3. By the contruction of G 1 (m), thi alternation i extended to length at mot 4 by the occurrence of x and y outide the common fan. the electronic journal of combinatoric (3) (015), #P3.19 7

9 For all d 1 the equence G d (1) i defined to conit of d + copie of the letter 1. The firt and lat copie of 1 are both pecial block, and there are empty regular block before the firt 1 and after the lat 1. The equence G d (m) for d, m i contructed inductively from G d (m 1) and G d 1 (S d (m 1)). Let f = S d (m 1) and g = S d 1 (f). Make g copie X 1,..., X g of G d (m 1) and one copy Y of G d 1 (f), o that no copie of G d (m 1) have any letter in common with Y or each other. Let Q i be the i th pecial block of Y. If the l th element of Q i i the firt occurrence of the letter a, then inert aa right after the l th pecial block of X i. If the l th element of Q i i the lat occurrence of a, then inert aa right before the l th pecial block of X i. Replace Q i in Y by the modified X i for every i. The reulting equence i G d (m). Lemma 3.6. For all d and m, G d (m) avoid ababa. Proof. Given that the alternation in G 1 (m) have length at mot 4 for all m 1, then the ret of the proof i the ame a the proof in [10] that Z d (m) avoid ababa. Let L d (m) be the length of G d (m). Oberve that L d (m) = (d + 1)mS d (m) ince each letter in G d (m) occur d + time, twice in pecial block, and each pecial block ha m letter. Define N d (m) a the number of ditinct letter in G d (m) and M d (m) a the number of block in G d (m). Alo let X d (m) = M d(m) S d (m) V d (m) a in [10]. Lemma 3.7. For all m, d 1, X d (m) d + and V d (m) m. and V d (m) = L d(m) M d (m). We bound X d(m) and Proof. By contruction S 1 (m) = m + 1 for m 1, S d (1) = for d, and S d (m) = S d (m 1)S d 1 (S d (m 1)) for d, m. Furthermore M 1 (m) = 3m + 3, M d (1) = d + 4 for d, and M d (m) = M d (m 1)S d 1 (S d (m 1)) + M d 1 (S d (m 1)) S d 1 (S d (m 1)) for d, m. Thu S (m) = S (m 1)(S (m 1) + 1) (S (m 1)) and S (1) =. Since m 1 atifie S (m) = the recurrence S (1) = and S (m + 1) = (S (m)), then m 1 S (m) m 1. For d, S d () = S d 1 () and S 1 () = 3. So S d () = 3 d 1. For d, M d () = (d + 3)(3 d ) + M d 1 () and M 1 () = 9. Hence M d () = (6d + 3) d 1. Then X 1 (m) = 3 for all m, X d (1) = d + for all d, and X d () = d + 1 for all d. For d, m, X d (m) = X d (m 1) + X d 1(S d (m 1)) 1 S d. (m 1) We prove by induction on d that X d (m) d + for all m, d 1. Oberve that the inequality hold for X 1 (m), X d (1), and X d () for all m, d. Fix d and uppoe X d 1 (m) d for all m. Then X d (m) X d (m 1) + Hence X d (m) X d () + (d 1) n= S d(n) 1 = d (d 1) n= S d(n) 1. Since S d (m) S d (m 1) for all d, m, then n= S d(n) 1 S d () 1 = 1 1 for all d, o X d 1 d(m) d +. Hence V d (m) = L d(m) = (d+1)ms d(m) M d (m) M d m. (m) d 1. S d (m 1) 3 d The lower bound on D 5,d+ (m) for each d are proved in the following ubection. the electronic journal of combinatoric (3) (015), #P3.19 8

10 3.1 Bound for d = If d =, let m i = M (i) and n i = N (i). Then m i = X (i)s (i) 6S (i) 6( i 1 ) i + for i 1. Then i = Ω(log log m i ), o n i = L (i) 6 = V (i)m (i) 6 im (i) 1 = Ω(m i log log m i ). We ue interpolation to extend the bound from m i to m. Let i and t atify m i m < m i+1 and t = m m i. Concatenate t copie of G (i) with no letter in common for a total of at leat m m i n i = Ω(m log log m) letter. Hence D 5,6 (m) = Ω(m log log m). 3. Bound for d = 3 We prove that S 3 (m) A 3 (m) following the method of [10]. Since S 3 (m) = S 3 (m 1)S (S 3 (m 1)) S (S 3 (m 1)) S 3 (m 1)+1, then let F (m) = m+1 and G(m) = m. Then F (m) = m+1 1 m = G(m) for every m 0. Thu S 3 (m) F (m 1) (S 3 (1)) < F (m 1) (S 3 (1)) G (m 1) (S 3 (1)) = A 3 (m). Let m i = M 3 (i) and n i = N 3 (i). Therefore m i = X 3 (i)s 3 (i) 8S 3 (i) A 3 (i + ) for i 1. So i = Ω(α 3 (m i )) and n i = N 3 (i) = L 3(i) = V 3(i)M 3 (i) im 3(i) = Ω(m i α 3 (m i )). Then D 5,8 (m) = Ω(mα 3 (m)) by interpolation. 3.3 Bound for d 4 For each d 4 we prove that S d (m) A d (m + ) for m 1 by induction on d. Since S 4 (m) = S 4 (m 1)S 3 (S 4 (m 1)) S 3 (S 4 (m 1)), then let F (m) = S 3 (m). Since 4F (m) A 3 (4m) and A 4 (3) > 4S 4 (1), then S 4 (m) F (m 1) (S 4 (1)) < 4F (m 1) (S 4 (1)) A (m 1) 3 (4S 4 (1)) < A 4 (m + ). Fix d > 4 and uppoe that S d 1 (m) A d 1 (m + ). Define F (m) = S d 1 (m). Since 4F (m) A d 1 (4m) and A d (3) > 4S d (1), then S d (m) F (m 1) (S d (1)) < 4F (m 1) (S d (1)) A (m 1) d 1 (4S d (1)) < A d (m + ). Fix d 4. Let m i = M d (i) and n i = N d (i). Then m i = X d (i)s d (i) (d + )S d (i) (d + )A d (i + ) A d (i + 3). Then i α d (m i ) 3, o n i = L d(i) d+ = V d(i)m d (i) d+ im d(i) 4d+4 = Ω( 1 d m iα d (m i )). By interpolation D 5,d+ (m) = Ω( 1 d mα d(m)) for d 4. Corollary 3.8. If r, then F r,4,6 (m) = η r,3,5 (m) = Ω(m log log m) and F r,4,d+ (m) = η r,3,d+1 (m) = Ω( 1 d mα d(m)) for d 3. Acknowledgment Thi reearch wa upported by the NSF graduate reearch fellowhip under Grant No The author thank Seth Pettie for comment on thi paper and Peter Shor for improving the bound on S (m) in Lemma 3.7. The author alo thank the anonymou referee for their helpful uggetion. the electronic journal of combinatoric (3) (015), #P3.19 9

11 Reference [1] M. Sharir and P.K. Agarwal. Davenport-Schinzel equence and their geometric application. Cambridge Univerity Pre, Cambridge, [] P.K. Agarwal, M. Sharir, and P. Shor. Sharp upper and lower bound for the length of general Davenport-Schinzel equence. Journal of Combinatorial Theory Serie A, 5 (1989) [3] N. Alon, H. Kaplan, G. Nivach, M. Sharir, and S. Smorodinky. Weak epilon-net and interval chain. J. ACM, 55 (008). [4] J. Cibulka and J. Kynčl. Tight bound on the maximum ize of a et of permutation with bounded vc-dimenion. Journal of Combinatorial Theory Serie A, 119 (01) [5] H. Davenport and A. Schinzel. A combinatorial problem connected with differential equation. American Journal of Mathematic, 87 (1965) [6] J. Fox, J. Pach, and A. Suk. The number of edge in k-quaiplanar graph. SIAM Journal on Dicrete Mathematic, 7 (013) [7] S. Hart and M. Sharir. Nonlinearity of Davenport-Schinzel equence and of generalized path compreion cheme. Combinatorica, 6 (1986) [8] M. Klazar. A general upper bound in the extremal theory of equence. Commentatione Mathematicae Univeritati Carolinae, 33 (199) [9] M. Klazar. On the maximum length of Davenport-Schinzel equence. Contemporary trend in dicrete mathematic (DIMACS erie in dicrete mathematic and theoretical computer cience), 49 (1999) [10] G. Nivach. Improved bound and new technique for Davenport-Schinzel equence and their generalization. Journal of the ACM, 57 (010). [11] S. Pettie. Degree of nonlinearity in forbidden 0-1 matrix problem. Dicrete Mathematic 311 (011) [1] S. Pettie. Sharp bound on Davenport-Schinzel equence of every order. Sympoium on Computational Geometry (013): [13] S. Pettie. Sharp bound on formation-free equence. Proceeding of the Twenty Sixth Annual ACM-SIAM Sympoium on Dicrete Algorithm, SODA 15 (015) [14] A. Suk and B. Walczak. New bound on the maximum number of edge in k-quaiplanar graph. Twenty-firt International Sympoium on Graph Drawing (013): [15] R. Sundar. On the Deque conjecture for the play algorithm. Combinatorica 1(1): (199). the electronic journal of combinatoric (3) (015), #P

Partial optimal labeling search for a NP-hard subclass of (max,+) problems

Partial optimal labeling search for a NP-hard subclass of (max,+) problems Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden

More information

Unit 11 Using Linear Regression to Describe Relationships

Unit 11 Using Linear Regression to Describe Relationships Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory

More information

A note on profit maximization and monotonicity for inbound call centers

A note on profit maximization and monotonicity for inbound call centers A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an

More information

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare

More information

Assessing the Discriminatory Power of Credit Scores

Assessing the Discriminatory Power of Credit Scores Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,

More information

1 - Introduction to hypergraphs

1 - Introduction to hypergraphs 1 - Introduction to hypergraph Jacque Vertraëte jacque@ucd.edu 1 Introduction In thi coure you will learn broad combinatorial method for addreing ome of the main problem in extremal combinatoric and then

More information

Scheduling of Jobs and Maintenance Activities on Parallel Machines

Scheduling of Jobs and Maintenance Activities on Parallel Machines Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 cylee@ac.tamu.edu Zhi-Long Chen** Department

More information

Mixed Method of Model Reduction for Uncertain Systems

Mixed Method of Model Reduction for Uncertain Systems SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol 4 No June Mixed Method of Model Reduction for Uncertain Sytem N Selvaganean Abtract: A mixed method for reducing a higher order uncertain ytem to a table reduced

More information

On Secure Network Coding with Unequal Link Capacities and Restricted Wiretapping Sets

On Secure Network Coding with Unequal Link Capacities and Restricted Wiretapping Sets On Secure Network Coing with Unequal Link Capacitie an Retricte Wiretapping Set Tao Cui an Tracey Ho Department of Electrical Engineering California Intitute of Technology Paaena, CA 9115, USA Email: {taocui,

More information

MSc Financial Economics: International Finance. Bubbles in the Foreign Exchange Market. Anne Sibert. Revised Spring 2013. Contents

MSc Financial Economics: International Finance. Bubbles in the Foreign Exchange Market. Anne Sibert. Revised Spring 2013. Contents MSc Financial Economic: International Finance Bubble in the Foreign Exchange Market Anne Sibert Revied Spring 203 Content Introduction................................................. 2 The Mone Market.............................................

More information

Online story scheduling in web advertising

Online story scheduling in web advertising Online tory cheduling in web advertiing Anirban Dagupta Arpita Ghoh Hamid Nazerzadeh Prabhakar Raghavan Abtract We tudy an online job cheduling problem motivated by toryboarding in web advertiing, where

More information

LECTURE 2. TURÁN S THEOREM : BIPARTITE GRAPHS

LECTURE 2. TURÁN S THEOREM : BIPARTITE GRAPHS LECTURE 2. TURÁN S THEOREM : BIPARTITE GRAPHS. Complete bipartite graph.. Kövari-Só-Turán theorem. When H i a bipartite graph, i.e., when χ(h) = 2, Erdő and Stone theorem aert that π H = 0. In other word,

More information

12.4 Problems. Excerpt from "Introduction to Geometry" 2014 AoPS Inc. Copyrighted Material CHAPTER 12. CIRCLES AND ANGLES

12.4 Problems. Excerpt from Introduction to Geometry 2014 AoPS Inc.  Copyrighted Material CHAPTER 12. CIRCLES AND ANGLES HTER 1. IRLES N NGLES Excerpt from "Introduction to Geometry" 014 os Inc. onider the circle with diameter O. all thi circle. Why mut hit O in at leat two di erent point? (b) Why i it impoible for to hit

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

Senior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow

Senior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow Senior Thei Hore Play Optimal Wager and the Kelly Criterion Author: Courtney Kempton Supervior: Profeor Jim Morrow June 7, 20 Introduction The fundamental problem in gambling i to find betting opportunitie

More information

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic

More information

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH 31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com

More information

A Note on Profit Maximization and Monotonicity for Inbound Call Centers

A Note on Profit Maximization and Monotonicity for Inbound Call Centers OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright

More information

University of Illinois at Chicago Office: SEO 521 Department of Mathematics, Statistics, (312) 413-2605 and Computer Science

University of Illinois at Chicago Office: SEO 521 Department of Mathematics, Statistics, (312) 413-2605 and Computer Science Andrew Suk Contact Information Research Interests Employment University of Illinois at Chicago Office: SEO 521 Department of Mathematics, Statistics, (312) 413-2605 and Computer Science suk@math.uic.edu

More information

Managing Customer Arrivals in Service Systems with Multiple Servers

Managing Customer Arrivals in Service Systems with Multiple Servers Managing Cutomer Arrival in Service Sytem with Multiple Server Chrito Zacharia Department of Management Science, School of Buine Adminitration, Univerity of Miami, Coral Gable, FL 3346. czacharia@bu.miami.edu

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS

INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS STEVEN P. LALLEY AND ANDREW NOBEL Abstract. It is shown that there are no consistent decision rules for the hypothesis testing problem

More information

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad

More information

HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute.

HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute. HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * By Michael Spagat Royal Holloway, Univerity of London, CEPR and Davidon Intitute Abtract Tranition economie have an initial condition of high human

More information

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET Chapter 1 NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET S. Srivatava Univerity of Miouri Kana City, USA hekhar@conrel.ice.umkc.edu S. R. Thirumalaetty now

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada

More information

Solution of the Heat Equation for transient conduction by LaPlace Transform

Solution of the Heat Equation for transient conduction by LaPlace Transform Solution of the Heat Equation for tranient conduction by LaPlace Tranform Thi notebook ha been written in Mathematica by Mark J. McCready Profeor and Chair of Chemical Engineering Univerity of Notre Dame

More information

Linear energy-preserving integrators for Poisson systems

Linear energy-preserving integrators for Poisson systems BIT manucript No. (will be inerted by the editor Linear energy-preerving integrator for Poion ytem David Cohen Ernt Hairer Received: date / Accepted: date Abtract For Hamiltonian ytem with non-canonical

More information

Progress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools

Progress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools Progre 8 meaure in 2016, 2017, and 2018 Guide for maintained econdary chool, academie and free chool July 2016 Content Table of figure 4 Summary 5 A ummary of Attainment 8 and Progre 8 5 Expiry or review

More information

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring Redeigning Rating: Aeing the Dicriminatory Power of Credit Score under Cenoring Holger Kraft, Gerald Kroiandt, Marlene Müller Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Thi verion: June

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding

More information

Abstract parsing: static analysis of dynamically generated string output using LR-parsing technology

Abstract parsing: static analysis of dynamically generated string output using LR-parsing technology Abtract paring: tatic analyi of dynamically generated tring output uing LR-paring technology Kyung-Goo Doh 1, Hyunha Kim 1, David A. Schmidt 2 1 Hanyang Univerity, Anan, South Korea 2 Kana State Univerity,

More information

Removing Even Crossings

Removing Even Crossings EuroComb 2005 DMTCS proc. AE, 2005, 105 110 Removing Even Crossings Michael J. Pelsmajer 1, Marcus Schaefer 2 and Daniel Štefankovič 2 1 Department of Applied Mathematics, Illinois Institute of Technology,

More information

2. METHOD DATA COLLECTION

2. METHOD DATA COLLECTION Key to learning in pecific ubject area of engineering education an example from electrical engineering Anna-Karin Cartenen,, and Jonte Bernhard, School of Engineering, Jönköping Univerity, S- Jönköping,

More information

Requirements Engineering Databases: The Good, The Bad, and The Ugly

Requirements Engineering Databases: The Good, The Bad, and The Ugly New England Databae Day (NEDBDay08) February 4, 2008 Requirement Engineering Databae: The Good, The Bad, and The Ugly Brian Berenbach Siemen Corporate Reearch brian.berenbach@iemen.com 1 Agenda Brief Introduction

More information

Sector Concentration in Loan Portfolios and Economic Capital. Abstract

Sector Concentration in Loan Portfolios and Economic Capital. Abstract Sector Concentration in Loan Portfolio and Economic Capital Klau Düllmann and Nancy Machelein 2 Thi verion: September 2006 Abtract The purpoe of thi paper i to meaure the potential impact of buine-ector

More information

SCORE SETS IN ORIENTED GRAPHS

SCORE SETS IN ORIENTED GRAPHS Applicable Analysis and Discrete Mathematics, 2 (2008), 107 113. Available electronically at http://pefmath.etf.bg.ac.yu SCORE SETS IN ORIENTED GRAPHS S. Pirzada, T. A. Naikoo The score of a vertex v in

More information

TRADING rules are widely used in financial market as

TRADING rules are widely used in financial market as Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a

More information

The positive minimum degree game on sparse graphs

The positive minimum degree game on sparse graphs The positive minimum degree game on sparse graphs József Balogh Department of Mathematical Sciences University of Illinois, USA jobal@math.uiuc.edu András Pluhár Department of Computer Science University

More information

MECH 2110 - Statics & Dynamics

MECH 2110 - Statics & Dynamics Chapter D Problem 3 Solution 1/7/8 1:8 PM MECH 11 - Static & Dynamic Chapter D Problem 3 Solution Page 7, Engineering Mechanic - Dynamic, 4th Edition, Meriam and Kraige Given: Particle moving along a traight

More information

All trees contain a large induced subgraph having all degrees 1 (mod k)

All trees contain a large induced subgraph having all degrees 1 (mod k) All trees contain a large induced subgraph having all degrees 1 (mod k) David M. Berman, A.J. Radcliffe, A.D. Scott, Hong Wang, and Larry Wargo *Department of Mathematics University of New Orleans New

More information

Solutions to Sample Problems for Test 3

Solutions to Sample Problems for Test 3 22 Differential Equation Intructor: Petronela Radu November 8 25 Solution to Sample Problem for Tet 3 For each of the linear ytem below find an interval in which the general olution i defined (a) x = x

More information

Max-Min Representation of Piecewise Linear Functions

Max-Min Representation of Piecewise Linear Functions Beiträge zur Algebra und Geometrie Contributions to Algebra and Geometry Volume 43 (2002), No. 1, 297-302. Max-Min Representation of Piecewise Linear Functions Sergei Ovchinnikov Mathematics Department,

More information

Assigning Tasks for Efficiency in Hadoop

Assigning Tasks for Efficiency in Hadoop Aigning Tak for Efficiency in Hadoop [Extended Abtract] Michael J. Ficher Computer Science Yale Univerity P.O. Box 208285 New Haven, CT, USA michael.ficher@yale.edu Xueyuan Su Computer Science Yale Univerity

More information

Chapter 10 Velocity, Acceleration, and Calculus

Chapter 10 Velocity, Acceleration, and Calculus Chapter 10 Velocity, Acceleration, and Calculu The firt derivative of poition i velocity, and the econd derivative i acceleration. Thee derivative can be viewed in four way: phyically, numerically, ymbolically,

More information

Transmission Scheduling for Multi-Channel Satellite and Wireless Networks

Transmission Scheduling for Multi-Channel Satellite and Wireless Networks Tranmiion Scheduling for ulti-channel Satellite and Wirele Network Anand Ganti, Eytan odiano, John N. Titikli aachuett Intitute of Technology e-mail: aganti@mit.edu, modiano@mit.edu, jnt@mit.edu Abtract

More information

Buying High and Selling Low: Stock Repurchases and Persistent Asymmetric Information

Buying High and Selling Low: Stock Repurchases and Persistent Asymmetric Information RFS Advance Acce publihed February 9, 06 Buying High and Selling Low: Stock Repurchae and Peritent Aymmetric Information Philip Bond Univerity of Wahington Hongda Zhong London School of Economic Share

More information

DUE to the small size and low cost of a sensor node, a

DUE to the small size and low cost of a sensor node, a 1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang

More information

The number of generalized balanced lines

The number of generalized balanced lines The number of generalized balanced lines David Orden Pedro Ramos Gelasio Salazar Abstract Let S be a set of r red points and b = r + 2δ blue points in general position in the plane, with δ 0. A line l

More information

The Open University s repository of research publications and other research outputs

The Open University s repository of research publications and other research outputs Open Research Online The Open University s repository of research publications and other research outputs The degree-diameter problem for circulant graphs of degree 8 and 9 Journal Article How to cite:

More information

Pediatric Nurse Practitioner Program Pediatric Clinical Nurse Specialist Program Dual Pediatric Nurse Practitioner / Clinical Nurse Specialist Program

Pediatric Nurse Practitioner Program Pediatric Clinical Nurse Specialist Program Dual Pediatric Nurse Practitioner / Clinical Nurse Specialist Program Pediatric Nure Practitioner Program Pediatric Clinical Nure Specialit Program Dual Pediatric Nure Practitioner / Clinical Nure Specialit Program UCLA School of Nuring Overview: The Pediatric Nure Practitioner

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari

More information

Group Mutual Exclusion Based on Priorities

Group Mutual Exclusion Based on Priorities Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio

More information

Socially Optimal Pricing of Cloud Computing Resources

Socially Optimal Pricing of Cloud Computing Resources Socially Optimal Pricing of Cloud Computing Reource Ihai Menache Microoft Reearch New England Cambridge, MA 02142 t-imena@microoft.com Auman Ozdaglar Laboratory for Information and Deciion Sytem Maachuett

More information

Name: SID: Instructions

Name: SID: Instructions CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/

More information

COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS

COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS Alexander Burstein Department of Mathematics Howard University Washington, DC 259, USA aburstein@howard.edu Sergey Kitaev Mathematics

More information

POSSIBILITIES OF INDIVIDUAL CLAIM RESERVE RISK MODELING

POSSIBILITIES OF INDIVIDUAL CLAIM RESERVE RISK MODELING POSSIBILITIES OF INDIVIDUAL CLAIM RESERVE RISK MODELING Pavel Zimmermann * 1. Introduction A ignificant increae in demand for inurance and financial rik quantification ha occurred recently due to the fact

More information

Health Insurance and Social Welfare. Run Liang. China Center for Economic Research, Peking University, Beijing 100871, China,

Health Insurance and Social Welfare. Run Liang. China Center for Economic Research, Peking University, Beijing 100871, China, Health Inurance and Social Welfare Run Liang China Center for Economic Reearch, Peking Univerity, Beijing 100871, China, Email: rliang@ccer.edu.cn and Hao Wang China Center for Economic Reearch, Peking

More information

High degree graphs contain large-star factors

High degree graphs contain large-star factors High degree graphs contain large-star factors Dedicated to László Lovász, for his 60th birthday Noga Alon Nicholas Wormald Abstract We show that any finite simple graph with minimum degree d contains a

More information

Unobserved Heterogeneity and Risk in Wage Variance: Does Schooling Provide Earnings Insurance?

Unobserved Heterogeneity and Risk in Wage Variance: Does Schooling Provide Earnings Insurance? TI 011-045/3 Tinbergen Intitute Dicuion Paper Unoberved Heterogeneity and Rik in Wage Variance: Doe Schooling Provide Earning Inurance? Jacopo Mazza Han van Ophem Joop Hartog * Univerity of Amterdam; *

More information

COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction

COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH ZACHARY ABEL 1. Introduction In this survey we discuss properties of the Higman-Sims graph, which has 100 vertices, 1100 edges, and is 22 regular. In fact

More information

Graphical degree sequences and realizations

Graphical degree sequences and realizations swap Graphical and realizations Péter L. Erdös Alfréd Rényi Institute of Mathematics Hungarian Academy of Sciences MAPCON 12 MPIPKS - Dresden, May 15, 2012 swap Graphical and realizations Péter L. Erdös

More information

Minimally Infeasible Set Partitioning Problems with Balanced Constraints

Minimally Infeasible Set Partitioning Problems with Balanced Constraints Minimally Infeasible Set Partitioning Problems with alanced Constraints Michele Conforti, Marco Di Summa, Giacomo Zambelli January, 2005 Revised February, 2006 Abstract We study properties of systems of

More information

Research Statement. Andrew Suk

Research Statement. Andrew Suk Research Statement Andrew Suk 1 Introduction My research interests are combinatorial methods in discrete geometry. In particular, I am interested in extremal problems on geometric objects. My research

More information

Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor

Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor Online algorithms for combinatorial problems Ph.D. Thesis by Judit Nagy-György Supervisor: Péter Hajnal Associate Professor Doctoral School in Mathematics and Computer Science University of Szeged Bolyai

More information

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS Chapter Stoc and Their Valuation ANSWERS TO EN-OF-CHAPTER QUESTIONS - a. A proxy i a document giving one peron the authority to act for another, typically the power to vote hare of common toc. If earning

More information

2.3 Convex Constrained Optimization Problems

2.3 Convex Constrained Optimization Problems 42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions

More information

Bidding for Representative Allocations for Display Advertising

Bidding for Representative Allocations for Display Advertising Bidding for Repreentative Allocation for Diplay Advertiing Arpita Ghoh, Preton McAfee, Kihore Papineni, and Sergei Vailvitkii Yahoo! Reearch. {arpita, mcafee, kpapi, ergei}@yahoo-inc.com Abtract. Diplay

More information

A REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE. 1. Introduction and Preliminaries

A REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE. 1. Introduction and Preliminaries Acta Math. Univ. Comenianae Vol. LXVI, 2(1997), pp. 285 291 285 A REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE E. T. BASKORO, M. MILLER and J. ŠIRÁŇ Abstract. It is well known that Moore digraphs do

More information

Project Management Basics

Project Management Basics Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management

More information

your Rights Consumer Guarantees Understanding Consumer Electronic Devices, Home Appliances & Home Entertainment Products

your Rights Consumer Guarantees Understanding Consumer Electronic Devices, Home Appliances & Home Entertainment Products Conumer Guarantee Undertanding your Right Conumer Electronic Device, Home Appliance & Home Entertainment Product Voluntary Warranty Guide February 2014 JB Hi-Fi Group Pty Ltd (ABN 37 093 II4 286) The Autralian

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

Zachary Monaco Georgia College Olympic Coloring: Go For The Gold

Zachary Monaco Georgia College Olympic Coloring: Go For The Gold Zachary Monaco Georgia College Olympic Coloring: Go For The Gold Coloring the vertices or edges of a graph leads to a variety of interesting applications in graph theory These applications include various

More information

The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge,

The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, cheapest first, we had to determine whether its two endpoints

More information

CONTRIBUTIONS TO ZERO SUM PROBLEMS

CONTRIBUTIONS TO ZERO SUM PROBLEMS CONTRIBUTIONS TO ZERO SUM PROBLEMS S. D. ADHIKARI, Y. G. CHEN, J. B. FRIEDLANDER, S. V. KONYAGIN AND F. PAPPALARDI Abstract. A prototype of zero sum theorems, the well known theorem of Erdős, Ginzburg

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

Cycles in a Graph Whose Lengths Differ by One or Two

Cycles in a Graph Whose Lengths Differ by One or Two Cycles in a Graph Whose Lengths Differ by One or Two J. A. Bondy 1 and A. Vince 2 1 LABORATOIRE DE MATHÉMATIQUES DISCRÉTES UNIVERSITÉ CLAUDE-BERNARD LYON 1 69622 VILLEURBANNE, FRANCE 2 DEPARTMENT OF MATHEMATICS

More information

Change Management Plan Blackboard Help Course 24/7

Change Management Plan Blackboard Help Course 24/7 MIT 530 Change Management Plan Help Coure 24/7 Submitted by: Sheri Anderon UNCW 4/20/2008 Introduction The Univerity of North Carolina Wilmington (UNCW) i a public comprehenive univerity, one of the ixteen

More information

Benchmarking Bottom-Up and Top-Down Strategies for SPARQL-to-SQL Query Translation

Benchmarking Bottom-Up and Top-Down Strategies for SPARQL-to-SQL Query Translation Benchmarking Bottom-Up and Top-Down Strategie for SPARQL-to-SQL Query Tranlation Kahlev a, Chebotko b,c, John Abraham b, Pearl Brazier b, and Shiyong Lu a a Department of Computer Science, Wayne State

More information

Catalan Numbers. Thomas A. Dowling, Department of Mathematics, Ohio State Uni- versity.

Catalan Numbers. Thomas A. Dowling, Department of Mathematics, Ohio State Uni- versity. 7 Catalan Numbers Thomas A. Dowling, Department of Mathematics, Ohio State Uni- Author: versity. Prerequisites: The prerequisites for this chapter are recursive definitions, basic counting principles,

More information

Software Engineering Management: strategic choices in a new decade

Software Engineering Management: strategic choices in a new decade Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk

More information

COMPANY BALANCE MODELS AND THEIR USE FOR PROCESS MANAGEMENT

COMPANY BALANCE MODELS AND THEIR USE FOR PROCESS MANAGEMENT COMPANY BALANCE MODELS AND THEIR USE FOR PROCESS MANAGEMENT Mária Mišanková INTRODUCTION Balance model i in general tem of equation motl linear and the goal i to find value of required quantit from pecified

More information

Collinear Points in Permutations

Collinear Points in Permutations Collinear Points in Permutations Joshua N. Cooper Courant Institute of Mathematics New York University, New York, NY József Solymosi Department of Mathematics University of British Columbia, Vancouver,

More information

January 21, 2015. Abstract

January 21, 2015. Abstract T S U I I E P : T R M -C S J. R January 21, 2015 Abtract Thi paper evaluate the trategic behavior of a monopolit to influence environmental policy, either with taxe or with tandard, comparing two alternative

More information

A characterization of trace zero symmetric nonnegative 5x5 matrices

A characterization of trace zero symmetric nonnegative 5x5 matrices A characterization of trace zero symmetric nonnegative 5x5 matrices Oren Spector June 1, 009 Abstract The problem of determining necessary and sufficient conditions for a set of real numbers to be the

More information

arxiv:1209.1595v5 [math.co] 26 Dec 2014

arxiv:1209.1595v5 [math.co] 26 Dec 2014 TRIANGLE-FREE INTERSECTION GRAPHS OF LINE SEGMENTS WITH LARGE CHROMATIC NUMBER ARKADIUSZ PAWLIK, JAKUB KOZIK, TOMASZ KRAWCZYK, MICHAŁ LASOŃ, PIOTR MICEK, WILLIAM T. TROTTER, AND BARTOSZ WALCZAK arxiv:1209.1595v5

More information

Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing

Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing 1 Auction-Baed Reource Allocation for Sharing Cloudlet in Mobile Cloud Computing A-Long Jin, Wei Song, Senior Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abtract Driven by pervaive mobile device and

More information

A Turán Type Problem Concerning the Powers of the Degrees of a Graph

A Turán Type Problem Concerning the Powers of the Degrees of a Graph A Turán Type Problem Concerning the Powers of the Degrees of a Graph Yair Caro and Raphael Yuster Department of Mathematics University of Haifa-ORANIM, Tivon 36006, Israel. AMS Subject Classification:

More information

Sum of squares of degrees in a graph

Sum of squares of degrees in a graph Sum of squares of degrees in a graph Bernardo M. Ábrego 1 Silvia Fernández-Merchant 1 Michael G. Neubauer William Watkins Department of Mathematics California State University, Northridge 18111 Nordhoff

More information

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,

More information

FACTORING PEAK POLYNOMIALS

FACTORING PEAK POLYNOMIALS FACTORING PEAK POLYNOMIALS SARA BILLEY, MATTHEW FAHRBACH, AND ALAN TALMAGE Abstract. Let S n be the symmetric group of permutations π = π 1 π 2 π n of {1, 2,..., n}. An index i of π is a peak if π i 1

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

Testing Hereditary Properties of Non-Expanding Bounded-Degree Graphs

Testing Hereditary Properties of Non-Expanding Bounded-Degree Graphs Testing Hereditary Properties of Non-Expanding Bounded-Degree Graphs Artur Czumaj Asaf Shapira Christian Sohler Abstract We study graph properties which are testable for bounded degree graphs in time independent

More information

Availability of WDM Multi Ring Networks

Availability of WDM Multi Ring Networks Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity

More information

Class One: Degree Sequences

Class One: Degree Sequences Class One: Degree Sequences For our purposes a graph is a just a bunch of points, called vertices, together with lines or curves, called edges, joining certain pairs of vertices. Three small examples of

More information

GREATEST COMMON DIVISOR

GREATEST COMMON DIVISOR DEFINITION: GREATEST COMMON DIVISOR The greatest common divisor (gcd) of a and b, denoted by (a, b), is the largest common divisor of integers a and b. THEOREM: If a and b are nonzero integers, then their

More information

The Henstock-Kurzweil-Stieltjes type integral for real functions on a fractal subset of the real line

The Henstock-Kurzweil-Stieltjes type integral for real functions on a fractal subset of the real line The Henstock-Kurzweil-Stieltjes type integral for real functions on a fractal subset of the real line D. Bongiorno, G. Corrao Dipartimento di Ingegneria lettrica, lettronica e delle Telecomunicazioni,

More information