Using Stein s Method to Show Poisson and Normal Limit Laws for Fringe Subtrees

Size: px
Start display at page:

Download "Using Stein s Method to Show Poisson and Normal Limit Laws for Fringe Subtrees"

Transcription

1 AofA 2014, Paris, France DMTCS proc. (subm., by the authors, 1 12 Using Stein s Metho to Show Poisson an Normal Limit Laws for Fringe Subtrees Cecilia Holmgren 1 an Svante Janson 2 1 Department of Mathematics, Stockholm University, Stockholm, Sween 2 Department of Mathematics, Uppsala University, SE Uppsala, Sween Abstract. We consier sums of functions of fringe subtrees of binary search trees an ranom recursive trees (of total size n. The use of Stein s metho an certain couplings allow provision of simple proofs showing that in both of these trees, the number of fringe subtrees of size k < n, where k, can be approximate by a Poisson istribution. Combining these results an another version of Stein s metho, we can also show that for k = o( n, the number of fringe subtrees in both types of ranom trees has asymptotically a normal istribution as n. Furthermore, using the Cramér Wol evice, we show that a ranom vector with components corresponing to the ranom number of copies of certain fixe fringe subtrees T i, has asymptotically a multivariate normal istribution. We can then use these general results on fringe subtrees to obtain simple solutions to a broa range of problems relating to ranom trees; as an example, we can prove that the number of protecte noes in the binary search tree has asymptotically a normal istribution. Keywors: Fringe subtrees. Stein s metho. Couplings. Limit laws. Binary search trees. Recursive trees. 1 Introuction In this paper we consier fringe subtrees of the ranom binary search tree, as well as of the ranom recursive tree; recall that a fringe subtree is a subtree consisting of some noe an all its escenants, see Alous [1] for a general theory, an note that fringe subtrees typically are small compare to the whole tree. This is an extene abstract of [9] where further etails are given. We will use a representation of Devroye [4, 5] for the binary search tree, an a well-known bijection between binary trees an recursive trees, together with ifferent applications of Stein s metho for both normal an Poisson approximation to give both new general results on the asymptotic istributions for ranom variables epening on fringe subtrees, an more irect proofs of several earlier results in the fiel. Supporte in part by the Sweish Research Council. Supporte in part by the Knut an Alice Wallenberg Founation. subm. to DMTCS c by the authors Discrete Mathematics an Theoretical Computer Science (DMTCS, Nancy, France

2 2 Cecilia Holmgren, an Svante Janson The binary search tree is the tree representation of the sorting algorithm Quicksort, see e.g. [11]. Starting with n istinct numbers calle keys, we raw one of the keys at ranom an associate it to the root. Then we raw one of the remaining keys. We compare it with the root, an associate it to the left chil if it is smaller than the key at the root, an to the right chil if it is larger. We continue recursively by rawing new keys until the set is exhauste. The comparison for each new key starts at the root, an at each noe the key visits, it procees to the left/right chil if it is smaller/larger than the key associate to that noe; eventually, the new key is associate to the first empty noe it visits. In the final tree, all the n orere numbers are sorte by size, so that smaller numbers are in left subtrees, an larger numbers are in right subtrees. We use the representation of the binary search tree by Devroye [4, 5]. We may clearly assume that the keys are 1,..., n. We assign, inepenently, each key k a uniform ranom variable U k in (0, 1 which we regar as a time stamp inicating the time when the key is rawn. (We may an will assume that the U k are istinct. The ranom binary search tree constructe by rawing the keys in this orer, i.e., in orer of increasing U k, then is the unique binary tree with noes labelle by (1, U 1,..., (n, U n with the property that it is a binary search tree with respect to the first coorinates in the pairs, an along every path own from the root the values U i are increasing. We will also use a cyclic version of this representation escribe in Section 2.3. Recall that the ranom recursive tree is constructe recursively, by starting with a root with label 1, an at stage i (i = 2,..., n a new noe with label i is attache uniformly at ranom to one of the previous noes 1,..., i 1. We let Λ n enote a ranom recursive tree with n noes. There is a well-known bijection between orere trees of size n an binary trees of size n 1, see e.g. Knuth [12, Section 2.3.2] who calls this the natural corresponence (the same bijection is also calle the rotation corresponence: Given an orere tree with n noes, eliminate first the root, an arrange all its chilren in a path from left to right, as right chilren of each other. Continue recursively, with the chilren of each noe arrange in a path from left to right, with the first chil attache to its parent as the left chil. This yiels a binary tree with n 1 noes, an the transformation is invertible. As note by Devroye [4], see also Fuchs, Hwang an Neininger [8], the natural corresponence extens to a coupling between the ranom recursive tree Λ n an the binary search tree T n 1 ; the probability istributions are equal by inuction because the n possible places to a a new noe to Λ n correspon to the n possible places (external leaves to a a new noe to T n 1, an these places have equal probabilities for both moels. Note that a left chil in the binary search tree correspons to an elest chil in the ranom recursive tree, while a right chil correspons to a sibling. We say that a proper subtree in a binary tree is left-roote [right-roote] if its root is a left [right] chil. Thus, for 1 < k < n, fringe subtrees of size k in the ranom recursive tree Λ n, correspon to left-roote fringe subtrees of size k 1 in the binary search tree T n 1, while fringe subtrees of size 1 (i.e., leaves correspon to noes without a left chil. We consier first only the sizes of the fringe subtrees. The results in the following two theorems, except the explicit rate in (3 (4, were shown by Feng, Mahmou an Panholzer [6] an Fuchs [7] by using variants of the metho of moments. Theorem 1.3 was earlier prove for fixe k by Devroye [4] (using the central limit theorem for m-epenent variables, see also Alous [1]. The part (5 of Theorem 1.3 was prove for a smaller range of k by Devroye [5] using Stein s metho. (The mean (1 is also foun in [5]. In the present paper we continue this approach, an use Stein s metho for both Poisson an normal approximations to provie simple proofs for the full range. We recall the efinition of the total variation istance between two probability measures.

3 Using Stein s metho to show Poisson an normal limit laws for fringe subtrees 3 Definition 1.1 Let (X, A be any measurable space. The total variation istance T V between two probability measures µ 1 an µ 2 on X is efine to be T V (µ 1, µ 2 := sup µ 1 (A µ 2 (A. A A Let L(X enote the istribution of a ranom variable X. Po(µ enotes the Poisson istribution with mean µ, an N (0, 1 the stanar normal istribution. Convergence in istribution is enote by. Theorem 1.2 Let X n,k be the number of fringe subtrees of size k in the ranom binary search tree T n an similarly let ˆXn,k be the number of fringe subtrees in the ranom recursive tree Λ n. Let k = k n where k < n. Furthermore, let Then, for the binary search tree, 2(n + 1 µ n,k := E(X n,k = (k + 1(k + 2, (1 ˆµ n,k := E( ˆX n n,k = k(k + 1. (2 T V (L(X n,k, Po(µ n,k = 1 P(X n,k = l e µ (µ n,k n,k l ( 1 = O, (3 2 l! k an for the ranom recursive tree, l 0 T V (L( ˆX n,k, Po(ˆµ n,k = 1 P( 2 ˆX n,k = l e ˆµ (ˆµ n,k n,k l ( 1 = O. (4 l! k Consequently, if n an k, then l 0 T V (L(X n,k, Po(µ n,k 0 an T V (L( ˆX n,k, Po(ˆµ n,k 0. Theorem 1.3 Let X n,k be the number of fringe subtrees of size k in the binary search tree T n an similarly let ˆXn,k be the number of fringe subtrees of size k in the ranom recursive tree Λ n. Let k = k n = o( n. Then, as n, for the binary search tree X n,k E(X n,k Var(Xn,k N (0, 1 (5 an, similarly, for the ranom recursive tree ˆX n,k E( ˆX n,k Var( ˆX n,k N (0, 1. (6

4 4 Cecilia Holmgren, an Svante Janson Remark 1.4 If k/ n, then µ n,k, ˆµ n,k 0, an the convergence result in Theorem 1.2 reuces to p the trivial X n,k 0 an ˆX p n,k 0; the rate of convergence in (3 (4 is still of interest. If k/ n c (0,, then µ n,k 2c 2 an ˆµ n,k c 2 ; an we obtain the Poisson istribution limits X n,k Po(2c 2 an ˆX n,k Po(c 2 [6, 7]. We also consier the number of fringe subtrees that are equal to a fixe tree T in the binary search tree T n, which we enote by X T n. Combining the Cramér Wol evice [3, Theorem 7.7] an Stein s metho we show that ranom vectors of fringe subtrees are multivariate normally istribute. These results are also useful for proving general theorems for sums of functions of fringe subtrees. Theorem 1.5 Let T be a binary tree of size k an let T be a binary tree of size m where m k. Let Xn T be the number of fringe subtrees T an let X T n be the number of fringe subtrees T in the binary search tree T n with n noes. Let p k,t := P(T k = T an p m,t := P(T m = T, an let qt T be the number of fringe subtrees of T that are copies of T. If n > k + m + 1, then the covariance between Xn T an X T n is equal to Cov(X T n, X T n = (n + 1σ T,T, (7 where, with σ T,T := 2 (k + 1(k + 2 qt T p k,t γ(k, mp k,t p m,t, (8 γ(k, m := 4(k + m + 3 (k + 1(k + 2(m + 1(m + 2 4(k 2 + 3km + m 2 + 4k + 4m + 3 (k + 1 (m + 1 (k + m + 1 (k + m + 2 (k + m + 3. (9 Theorem 1.6 Let Xn T be the number of fringe subtrees T in the ranom binary search tree T n. Let T 1,..., T be a fixe sequence of istinct binary trees an let X n = (X T 1 n, X T 2 n,..., X T n. Let ( µ n := E(X T 1 n, E(X T 2 n,..., E(X T n an let Γ = (γ ij i,j=1 enote the matrix with elements 1 γ ij = lim n n Cov(XT n with notation as in (7 (8. Then Γ is non-singular an n 1/2 ( X n µ n i, X T j n = σ T i,t j, (10 N (0, Γ. (11 In [9] there are corresponing multivariate-normal istribution results for the number of fringe subtrees Λ in the ranom recursive tree Λ n. In Section 5 we explain how Theorem 1.6 can be use to prove that the number of the so calle protecte noes in the binary search trees asymptotically has a normal istribution.

5 Using Stein s metho to show Poisson an normal limit laws for fringe subtrees 5 2 Representations using uniform ranom variables 2.1 Devroye s representation for the binary search tree We use the representation of the binary search tree T n by Devroye [4, 5] escribe in Section 1, using i.i.. ranom time stamps U i U(0, 1 assigne to the keys i = 1,..., n. Write, for 1 k n an 1 i n k + 1, σ(i, k = {(i, U i,..., (i + k 1, U i+k 1 }, (12 i.e., the sequence of k labels (j, U j starting with j = i. For every noe u T n, the fringe subtree T n (u roote at u consists of the noes with labels in a set σ(i, k for some such i an k, where k = T n (u, but note that not every set σ(i, k is the set of labels of the noes of a fringe subtree; if it is, we say simply that σ(i, k is a fringe subtree. We efine the inicator variable I i,k := 1{σ(i, k is a fringe subtree in T n }. It is easy to see that, for convenience efining U 0 = U n+1 = 0, I i,k = 1 { U i 1 an U i+k are the two smallest among U i 1,..., U i+k }. (13 Note that if i = 1 or i = n k + 1, this reuces to I 1,k = 1 { U k+1 is the smallest among U 1,..., U k+1 }, (14 I n k+1,k = 1 { U n k is the smallest among U n k,..., U n }. (15 For k = n, when we only consier i = 1, we have I 1,n = 1. Let f(t be a function from the set of (unlabelle binary trees to R. We are intereste in the functional X n := u T n f(t n (u, (16 summing over all fringe subtrees of T n. For example, one obtains the number of fringe subtrees that are equal (up to labelling to a given binary tree T by choosing f(t = 1{T T } (where enotes equality when we ignore labels, an one obtains the number of fringe subtrees with exactly k noes by letting f(t = 1{ T = k}. We refer to Devroye [5] for several other examples showing the generality of this representation. Since a permutation (σ 1,..., σ k efines a binary search tree (by rawing the keys in orer σ 1,..., σ k, we can also regar f as a function of permutations (of arbitrary length. Moreover, any set σ(i, k efines a permutation (σ 1, σ 2,..., σ k where the values j, 1 j k, are orere accoring to the orer of U i+j 1. We can thus also regar f as a mapping from the collection of all sets σ(i, k. Note that if σ(i, k correspons to a fringe subtree T n (u of T n, then, ignoring labels, T n (u is the binary search tree efine by the permutation efine by σ(i, k, an thus f ( T n (u = f ( σ(i, k. Consequently, see [5], X n := u T n f(t n (u = n k=1 n k+1 i=1 I i,k f(σ(i, k. (17

6 6 Cecilia Holmgren, an Svante Janson 2.2 The ranom recursive tree Consier now instea the ranom recursive tree Λ n. Let f(t be a function from the set of orere roote trees to R. In analogy with (16, we efine Y n := u Λ n f(λ n (u, (18 summing over all fringe subtrees of Λ n. As sai in the introuction, the natural corresponence yiels a coupling between the ranom recursive tree Λ n an the binary search tree T n 1. The subtrees in Λ n correspon to the left subtrees at the noes in T n 1 together with the whole tree, incluing an empty left subtree at every noe in T n 1 without a left chil, corresponing to a subtree of size 1 (a leaf in Λ n. Thus, as note by [4], the representation in Section 2.1 yiels a similar representation for the ranom recursive tree, which can be escribe as follows. Define f as the functional on binary trees corresponing to f by f(t := f(t, where T is the orere tree corresponing to the binary tree T by the natural corresponence. (Thus T = T + 1. We regar the empty binary tree as corresponing to the (unique orere tree with only one vertex, an thus we efine f( := f(. Assume first 1 < k < n an recall that subtrees of size k in the ranom recursive tree Λ n correspon to left-roote subtrees of size k 1 in the binary search tree T n 1. As sai in Section 2.1, a subtree of size k 1 in T n 1 correspons to a set σ(i, k 1 for some i {1,..., n k + 1}. The parent of the root of this subtree is either i 1 or i + k 1; it is i 1, an the subtree is right-roote, if U i 1 > U i+k 1, an it is i + k 1, an the subtree is left-roote, if U i 1 < U i+k 1. We efine Using (13 it follows that, in analogy with (17, I L i,k 1 := 1{σ(i, k 1 is a left-roote subtree in T n 1 }. (19 Y n := This is easily extene to k = 1 too. 2.3 Cyclic representations u Λ n f(λ n (u = n k=1 n k+1 i=1 I L i,k 1 f(σ(i, k 1. (20 The representation (17 of X n using a linear sequence U 1,..., U n of i.i.. ranom variables is natural an useful, but it has the (minor isavantage that terms with i = 1 or i = n k + 1 have to be treate specially because of bounary effects, as seen in (14 (15. It will be convenient to use a relate cyclic representation, where we take n + 1 i.i.. uniform variables U 0,..., U n U(0, 1 an exten them to an infinite perioic sequence of ranom variables by U i := U i mo (n+1, i Z, (21 where i mo (n+1 is the remainer when i is ivie by n+1, i.e., the integer l [0, n] such that i l (mo n + 1. (We may an will assume that U 0,..., U n are istinct. We efine further I i,k as in (13, but now for all i an k. Similarly, we efine σ(i, k by (12 for all i an k. We then have the following cyclic representation of X n. (We are inebte to Allan Gut for suggesting a cyclic representation.

7 Using Stein s metho to show Poisson an normal limit laws for fringe subtrees 7 Lemma 2.1 Let U 0,..., U n U(0, 1 be inepenent an exten this sequence perioically by (21. Then, with notations as above, X n := u T n f(t n (u = X n := n n+1 I i,k f(σ(i, k. (22 k=1 i=1 Proof: The ouble sum in (22 is invariant uner a cyclic shift of U 0,..., U n. If we shift these values so that U 0 becomes the smallest, we obtain the same istribution of (U 0,..., U n as if we instea conition on the event that U 0 is the smallest U i, i.e., on {U 0 = min i U i }. Hence, ( X n = Xn U 0 = min U i. (23 i Furthermore, the variables I i,k epen only on the orer relations among {U i }, so if U 0 is minimal, they remain the same if we put U 0 = 0. Moreover, in this case also U n+1 = U 0 = 0 an it follows from (13 that I i,k = 0 if i n + 1 i + k 1; hence the terms in (22 with n k + 1 < i n + 1 vanish. Note also that in the remaining terms, f(σ(i, k oes not epen on U 0. Consequently, X n = ( n k=1 n k+1 i=1 I i,k f(σ(i, k U 0 = 0 = X n, (24 by (17, showing that the cyclic an linear representations in (17 an (22 are equivalent. Since U i is efine for all i Z an has perio n + 1, it is natural to regar the inex i as an element of Z n+1 ; similarly, I i,k is efine for all i Z with perio n + 1 in i, so we can regar it as efine for i Z n+1. When iscussing these variables, we will use the natural metric on Z n+1 efine by i j n+1 := min i j l (n + 1. (25 l Z For the ranom recursive tree Λ n we argue in the same way, now using (20; for further etails see [9]. The cyclic representations lea to simple exact calculations of means an variances. In [9] we use the cyclic representation to show general results for sums of functions of fringe subtrees. 3 Poisson approximations by Stein s metho an couplings To prove Theorems 1.2 we use Stein s metho with couplings as escribe by Barbour et al. [2]. In general, let A be a finite inex set an let (I α, α A be inicator ranom variables. We write W := α A I α an λ := E(W. To approximate W with a Poisson istribution Po(λ, this metho uses a coupling for each α A between W an a ranom variable W α which is efine on the same probability space as W an has the property L(W α = L(W I α I α = 1. (26 A common way to construct such a coupling (W, W α is to fin ranom variables (J βα, β A efine on the same probability space as (I α, α A in such a way that for each α A, an jointly for all β A, L(J βα = L(I β I α = 1. (27

8 8 Cecilia Holmgren, an Svante Janson Then W α = β α J βα is efine on the same probability space as W an (26 hols. Suppose that J βα are such ranom variables, an that, for each α, the set A α := A\{α} is partitione into A α an A 0 α in such a way that J βα I β if β A α, (28 with no conition if β A 0 α. We will use the following result from [2] (with a slightly simplifie constant. ([2] also contain similar results using a thir part A + α of A α, where (28 hols in the opposite irection; we will not nee them an note that it is always possible to inclue A + α in A 0 α an then use the following result. Theorem 3.1 ([2, Corollary 2.C.1] Let W = α A I α an λ = E(W. Let A α = A\{α} an A α, A 0 α be efine as above. Then ( T V (L(W, Po(λ (1 λ 1 λ Var(W + 2 α A E(I α I β. β A 0 α Couplings for proving Theorem 1.2 Returning to the binary search tree, we use the cyclic representation in Section 2.3 to prove the following lemma where we give exact expressions for the expecte value an the variance of X n,k. Lemma 3.2 Let 1 k < n. For the ranom binary search tree T n, an E(X n,k = 2(n + 1 (k + 1(k + 2 E X n,k (n + 1 Var(X n,k = E X n,k + 2 n 64 (n+3, 2 E X n,k (E X n,k 2 = E X n,k 22k 2 +44k+12 (k+1(k+2 2 (2k+1(2k+3, 4(n+12 (k+1 2 (k+2, 2 k < n 1 2, k = n 1 2, (29 k > n 1 2. (30 Hence, ( n Var(X n,k = E(X n,k + O k 3, (31 except when k = (n 1/2; in this case Var(X n,k = E(X n,k + 2 ( n ( 1 n + O k 3 = E(X n,k + O. (32 n To prove this lemma, we use the cyclic representation (22, which in this case is n+1 X n,k = I i,k, (33 i=1

9 Using Stein s metho to show Poisson an normal limit laws for fringe subtrees 9 where now I i,k are efine by (13 with U i given by (21. By (13 an symmetry, for any i an 1 k < n, 2 E(I i,k = (k+2(k+1, an thus (29 follows irectly from (33. Using the cyclic representation we can also simply prove that (30 hols; however for Poisson approximation we only nee the weak asymptotics in (31 (32. Recall the construction of I i,k in (13 an the istance i j n+1 on Z n+1 given by (25. Lemma 3.3 Let k {1,..., n 1} an let I i,k be as in Section 2.3. Then for each i 1,..., n+1, there exists a coupling ((I j,k j, (Zji k j such that L(Zji k = L(I j,k I i,k = 1 jointly for all j 1,..., n + 1. Furthermore, Zji k = I j,k if j i n+1 > k + 1, Zji k I j,k if j i n+1 = k + 1, Zji k = 0 I j,k if 0 < j i n+1 k. Proof: We efine Zji k as follows. (Inices are taken moulo n + 1. Let m an m be the inices in i 1,..., i + k such that U m an U m are the two smallest of U i 1,..., U i+k ; if one of these is i 1 we choose m = i 1, an if one of them is i + k we choose m = i + k, otherwise, we ranomize the choice of m among these two inices so that P(m < m = 1 2, inepenently of everything else. Now exchange U i 1 U m an U i+k U m, i.e., let U i 1 := U m, U m := U i 1, U i+k := U m, U m := U i+k, an U l := U l for all other inices l. Finally, let, cf. (13, Z k ji = 1 { U j 1 an U j+k are the two smallest among U j 1,..., U j+k}. (34 Then, L ( ( U 1,..., U n = L (U1,..., U n I i,k = 1 an thus L(Zji k = L(I j,k I i,k = 1 jointly for all j. Note that U l = U l if l / {i 1,..., i + k} an thus Zji k = I j,k if j i n+1 > k + 1. On the other han, if 0 < j i < k + 1, then Zji k = 0 since i + k lies in {j,..., j + k 1} an U i+k is smaller than U j 1 by construction; the case k 1 < j i < 0 is similar. (This says simply that two ifferent fringe subtrees of the same size cannot overlap, which is obvious. Finally, if j = i + k + 1 with j + k + 1 < i + n + 1 (i.e., k + 1 < (n + 1/2, then j 1 = i + k an thus U j 1 U j 1 while U l = U l for l j,..., j + k; hence Zji k I j,k. The cases j = i + k + 1 with j + k + 1 = i + n + 1 an j = i k 1 with j k 1 > i n 1 are similar. See Figures 1 2 that illustrate an example for such a coupling in the case k = 3. Proof of Theorem 1.2: We prove the result for the binary search tree, using the representation X n,k = n+1 i=1 I i,k in (33. (For the ranom recursive tree the proof is similar an uses the representation ˆX n n,k = i=1 IL i,k 1 ; see [9]. Let A := {1,..., n + 1}. From Lemma 3.3 we see that for each i A we can apply Theorem 3.1 with A i := A \ {i, i ± (k + 1}, A 0 i := {i ± (k + 1}; this yiels, using Lemma 3.2 an the fact that E(I i,k I i+k+1,k = O ( 1 k (which is shown easily, 3 T V (L(X n,k, Po(µ n,k ( 1 µ n,k ( 1 µ n,k Var(X n,k + 4 E(I i,k I i+k+1,k ( 1 = O n ( 1 µ n,k k 3 = O, k 1 i n+1

10 10 Cecilia Holmgren, an Svante Janson 6,1 7,1 3,2 8,3 3,2 8,3 1, ,8 10,4 1, ,4 2,10 4,7 9,9 2,10 4,7 6,8 9,9 Fig. 1: A binary search tree with no fringe subtree of size three containing the keys {4, 5, 6}. Fig. 2: A coupling forcing a fringe subtree of size three containing the keys {4, 5, 6} in the tree in Fig. 1. which shows (3. 4 Normal approximations by Stein s metho In this section we will prove Theorem 1.6. As in [5, Theorem 5] we will apply the following result, see [10, Theorem 6.33] for a proof, an for the efinition of a epenency graph. Lemma 4.1 Suppose that (S n 1 is a sequence of ranom variables such that S n = α V n Z nα, where for each n, {Z nα } α is a family of ranom variables with epenency graph (V n, E n. Let N( enote the close neighborhoo of a noe or set of noes in this graph. Suppose further that there exist numbers M n an Q n such that α V n E( Z nα M n an for every α, α V n, E( Z nβ Z nα, Z nα Q n. β N(α,α Let σ 2 n = Var(S n. If lim n M nq 2 n σ 3 n = 0, then it hols that Sn E(Sn Var(Sn N (0, 1. Proof of Theorem 1.6: Recall that X n = (X T 1 n, X T 2 n,..., X T n an let Z = (Z 1,..., Z, where Z is multivariate normal with the istribution N (0, Γ, where Γ is the matrix with elements γ ij = 1 lim n n Cov(XT i n, X T j n, see (10 above. By the Cramér Wol evice [3, Theorem 7.7], to show that n 1 2 ( X n µ n converges in istribution to Z, it is enough to show that for every fixe vector (t 1,..., t R we have j=1 t jx T j n E ( j=1 t jx T j n t j Z j, (35 n j=1

11 Using Stein s metho to show Poisson an normal limit laws for fringe subtrees 11 where j=1 t jz j N ( 0, γ 2 with γ 2 := j,k=1 t jt k γ ij. Let S n := j=1 t jx T j n. Theorem 1.5 implies that, as n, Var(S n n j,k=1 t j t k σ T i,t j = n j,k=1 t j t k γ ij = nγ 2. (36 In particular, if γ 2 = 0, then (35 is trivial, with the limit 0. To show that (35 hols when γ 2 > 0, we will use the same metho as was use in [5, Theorem 5] for proving this theorem (in a more general form in the 1-imensional case = 1. Let Ii,k T = 1{σ(i, k T }. Let T j = k j, 1 j. We use the cyclic representation (22, which in this case can be written as X T j n = n+1 i=1 Ij i, for some inicator variable Ij i = I i,k j I T j i,k j epening only on U i 1,..., U i+kj. We efine V n := {(i, j : 1 i n + 1, 1 j } an let for each (i, j V n, A i,j be the set {i 1,..., i + k j }, regare as a subset of Z n+1. Thus I j i epens only on {U k : k A i,j }, an thus we can efine a epenency graph L n with vertex set V n by connecting (i, j an (i, j when A i,j A i,j. Let K := max{k 1, k 2,..., k } an M := max{t 1, t 2,..., t }. It is easy to see that for the sum S n := j=1 n+1 t j X T j n = i=1 j=1 t j I j i = (i,j V n t j I j i, we can choose the numbers M n an Q n in Lemma 4.1 as M n = (n + 1M an Q n = 2M Since σ n n 1/2 M by (36, it hols that lim nq 2 n n σn 3 It is shown in [9] that the matrix Γ is non-singular. sup N((i, j 2M(2K + 3. (i,j V n = 0, an Lemma 4.1 shows that (35 hols. The proof of Theorem 1.3 when k = o( n an k tens to infinity follows irectly from Theorem 1.2 an (31, since then E(X n,k an Var(X n,k ten to infinity as n tens to infinity. For the case k = O(1 we can apply Lemma 4.1 similarly to the proof of Theorem 1.6 an repeat the arguments use in [5, Theorem 5]; see [9] for etails. 5 Protecte noes We consier the number of protecte noes. A noe is protecte if the shortest istance to a leaf is at least two, i.e., it is neither a leaf or the parent of a leaf. The following theorem was shown by Mahmou an War [13, Theorem 3.1] using generating functions. Theorem 5.1 Let X n enote the number of protecte noes in a binary search tree T n. Then it hols that X n n ( N 0, 29. n 225

12 12 Cecilia Holmgren, an Svante Janson We can show this result from a simple application of Theorem 1.6. Using the formulation of fringe subtrees, we note that the number of unprotecte noes in the binary search tree equals twice the number of leaves (counting all the leaves an all the parents of the leaves minus the number of cherry subtrees, i.e., subtrees consisting of a root with one left an one right chil that both are leaves (since these are the only cases when a parent is counte twice. Hence, since any linear combination of the components in a ranom vector with a multivariate normal istribution is normal, Theorem 5.1 follows from Theorem 1.6. Moreover, our approach using fringe subtrees also allows us to provie a simple proof of the following result which was conjecture in [13, Conjecture 2.1]. See [9] for etaile proofs of Theorems Theorem 5.2 Let X n enote the number of protecte noes in a binary search tree T n. For each fixe integer k 1, there exists a polynomial p k (n of egree k, the leaing term of which is ( k, such that E(Xn k = p k (n for all n 4k. References [1] Alous, D., Asymptotic fringe istributions for general families of ranom trees. Ann. Appl. Probab. 1 (1991, no. 2, [2] Barbour, A. D., Holst L. an Janson S., Poisson Approximation. Oxfor University Press, New York, [3] Billingsley P., Convergence of Probability Measures. John Wiley an Sons, New York, [4] Devroye L., Limit laws for local counters in ranom binary search trees. Ranom Structures Algorithms 2 (1991, no. 3, [5] Devroye L., Limit laws for sums of functions of subtrees of ranom binary search trees. SIAM J. Comput. 32 (2002/03, no. 1, [6] Feng Q., Mahmou H. M. an Panholzer A., Phase changes in subtree varieties in ranom recursive an binary search trees. SIAM J. Discrete Math. 22 (2008, no. 1, [7] Fuchs M., Subtree sizes in recursive trees an binary search trees: Berry Esseen bouns an Poisson approximations. Combin. Probab. Comput. 17 (2008, no. 5, [8] Fuchs, M., Hwang, H.-K. an Neininger, R., Profiles of ranom trees: limit theorems for ranom recursive trees an binary search trees. Algorithmica 46 (2006, no. 3-4, [9] Holmgren C. an Janson S., Limit Laws for Functions of Fringe subtrees for Binary Search Trees an Recursive Trees. In preparation. [10] Janson S., Łuczak T. an Ruciński A., Ranom Graphs. John Wiley, New York, [11] Knuth D.E., The Art of Computer Programming, Vol. 3 : Sorting an Searching Aison-Wesley Publishing Co., Reaing, Mass., [12] Knuth D.E., The Art of Computer Programming. Volume 1: Funamental Algorithms. Thir e eition. Aison-Wesley Publishing Co., Reaing, Mass., [13] Mahmou H.M. an War M.D., Asymptotic istribution of two-protecte noes in ranom binary search trees. Appl. Math. Lett. 25 (2012, no. 12,

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS Contents 1. Moment generating functions 2. Sum of a ranom number of ranom variables 3. Transforms

More information

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions A Generalization of Sauer s Lemma to Classes of Large-Margin Functions Joel Ratsaby University College Lonon Gower Street, Lonon WC1E 6BT, Unite Kingom J.Ratsaby@cs.ucl.ac.uk, WWW home page: http://www.cs.ucl.ac.uk/staff/j.ratsaby/

More information

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION MAXIMUM-LIKELIHOOD ESTIMATION The General Theory of M-L Estimation In orer to erive an M-L estimator, we are boun to make an assumption about the functional form of the istribution which generates the

More information

Firewall Design: Consistency, Completeness, and Compactness

Firewall Design: Consistency, Completeness, and Compactness C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,

More information

Factoring Dickson polynomials over finite fields

Factoring Dickson polynomials over finite fields Factoring Dickson polynomials over finite fiels Manjul Bhargava Department of Mathematics, Princeton University. Princeton NJ 08544 manjul@math.princeton.eu Michael Zieve Department of Mathematics, University

More information

Sensitivity Analysis of Non-linear Performance with Probability Distortion

Sensitivity Analysis of Non-linear Performance with Probability Distortion Preprints of the 19th Worl Congress The International Feeration of Automatic Control Cape Town, South Africa. August 24-29, 214 Sensitivity Analysis of Non-linear Performance with Probability Distortion

More information

Ch 10. Arithmetic Average Options and Asian Opitons

Ch 10. Arithmetic Average Options and Asian Opitons Ch 10. Arithmetic Average Options an Asian Opitons I. Asian Option an the Analytic Pricing Formula II. Binomial Tree Moel to Price Average Options III. Combination of Arithmetic Average an Reset Options

More information

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,

More information

Math 230.01, Fall 2012: HW 1 Solutions

Math 230.01, Fall 2012: HW 1 Solutions Math 3., Fall : HW Solutions Problem (p.9 #). Suppose a wor is picke at ranom from this sentence. Fin: a) the chance the wor has at least letters; SOLUTION: All wors are equally likely to be chosen. The

More information

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sewoong Oh an Anrea Montanari Electrical Engineering an Statistics Department Stanfor University, Stanfor,

More information

On Adaboost and Optimal Betting Strategies

On Adaboost and Optimal Betting Strategies On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore

More information

A Comparison of Performance Measures for Online Algorithms

A Comparison of Performance Measures for Online Algorithms A Comparison of Performance Measures for Online Algorithms Joan Boyar 1, Sany Irani 2, an Kim S. Larsen 1 1 Department of Mathematics an Computer Science, University of Southern Denmark, Campusvej 55,

More information

Inverse Trig Functions

Inverse Trig Functions Inverse Trig Functions c A Math Support Center Capsule February, 009 Introuction Just as trig functions arise in many applications, so o the inverse trig functions. What may be most surprising is that

More information

10.2 Systems of Linear Equations: Matrices

10.2 Systems of Linear Equations: Matrices SECTION 0.2 Systems of Linear Equations: Matrices 7 0.2 Systems of Linear Equations: Matrices OBJECTIVES Write the Augmente Matrix of a System of Linear Equations 2 Write the System from the Augmente Matrix

More information

The Quick Calculus Tutorial

The Quick Calculus Tutorial The Quick Calculus Tutorial This text is a quick introuction into Calculus ieas an techniques. It is esigne to help you if you take the Calculus base course Physics 211 at the same time with Calculus I,

More information

2r 1. Definition (Degree Measure). Let G be a r-graph of order n and average degree d. Let S V (G). The degree measure µ(s) of S is defined by,

2r 1. Definition (Degree Measure). Let G be a r-graph of order n and average degree d. Let S V (G). The degree measure µ(s) of S is defined by, Theorem Simple Containers Theorem) Let G be a simple, r-graph of average egree an of orer n Let 0 < δ < If is large enough, then there exists a collection of sets C PV G)) satisfying: i) for every inepenent

More information

Which Networks Are Least Susceptible to Cascading Failures?

Which Networks Are Least Susceptible to Cascading Failures? Which Networks Are Least Susceptible to Cascaing Failures? Larry Blume Davi Easley Jon Kleinberg Robert Kleinberg Éva Taros July 011 Abstract. The resilience of networks to various types of failures is

More information

Lagrangian and Hamiltonian Mechanics

Lagrangian and Hamiltonian Mechanics Lagrangian an Hamiltonian Mechanics D.G. Simpson, Ph.D. Department of Physical Sciences an Engineering Prince George s Community College December 5, 007 Introuction In this course we have been stuying

More information

Measures of distance between samples: Euclidean

Measures of distance between samples: Euclidean 4- Chapter 4 Measures of istance between samples: Eucliean We will be talking a lot about istances in this book. The concept of istance between two samples or between two variables is funamental in multivariate

More information

I. GROUPS: BASIC DEFINITIONS AND EXAMPLES

I. GROUPS: BASIC DEFINITIONS AND EXAMPLES I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called

More information

The one-year non-life insurance risk

The one-year non-life insurance risk The one-year non-life insurance risk Ohlsson, Esbjörn & Lauzeningks, Jan Abstract With few exceptions, the literature on non-life insurance reserve risk has been evote to the ultimo risk, the risk in the

More information

Pythagorean Triples Over Gaussian Integers

Pythagorean Triples Over Gaussian Integers International Journal of Algebra, Vol. 6, 01, no., 55-64 Pythagorean Triples Over Gaussian Integers Cheranoot Somboonkulavui 1 Department of Mathematics, Faculty of Science Chulalongkorn University Bangkok

More information

Notes on tangents to parabolas

Notes on tangents to parabolas Notes on tangents to parabolas (These are notes for a talk I gave on 2007 March 30.) The point of this talk is not to publicize new results. The most recent material in it is the concept of Bézier curves,

More information

Modelling and Resolving Software Dependencies

Modelling and Resolving Software Dependencies June 15, 2005 Abstract Many Linux istributions an other moern operating systems feature the explicit eclaration of (often complex) epenency relationships between the pieces of software

More information

Data Center Power System Reliability Beyond the 9 s: A Practical Approach

Data Center Power System Reliability Beyond the 9 s: A Practical Approach Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical

More information

Continued Fractions and the Euclidean Algorithm

Continued Fractions and the Euclidean Algorithm Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction

More information

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5 Binomial Moel Hull, Chapter 11 + ections 17.1 an 17.2 Aitional reference: John Cox an Mark Rubinstein, Options Markets, Chapter 5 1. One-Perio Binomial Moel Creating synthetic options (replicating options)

More information

1 if 1 x 0 1 if 0 x 1

1 if 1 x 0 1 if 0 x 1 Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or

More information

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1. MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column

More information

Section 3.3. Differentiation of Polynomials and Rational Functions. Difference Equations to Differential Equations

Section 3.3. Differentiation of Polynomials and Rational Functions. Difference Equations to Differential Equations Difference Equations to Differential Equations Section 3.3 Differentiation of Polynomials an Rational Functions In tis section we begin te task of iscovering rules for ifferentiating various classes of

More information

Graphs without proper subgraphs of minimum degree 3 and short cycles

Graphs without proper subgraphs of minimum degree 3 and short cycles Graphs without proper subgraphs of minimum degree 3 and short cycles Lothar Narins, Alexey Pokrovskiy, Tibor Szabó Department of Mathematics, Freie Universität, Berlin, Germany. August 22, 2014 Abstract

More information

Full and Complete Binary Trees

Full and Complete Binary Trees Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full

More information

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH 31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,

More information

Coupled best proximity point theorems for proximally g-meir-keelertypemappings in partially ordered metric spaces

Coupled best proximity point theorems for proximally g-meir-keelertypemappings in partially ordered metric spaces Abkar et al. Fixe Point Theory an Applications 2015) 2015:107 DOI 10.1186/s13663-015-0355-9 R E S E A R C H Open Access Couple best proximity point theorems for proximally g-meir-keelertypemappings in

More information

A New Evaluation Measure for Information Retrieval Systems

A New Evaluation Measure for Information Retrieval Systems A New Evaluation Measure for Information Retrieval Systems Martin Mehlitz martin.mehlitz@ai-labor.e Christian Bauckhage Deutsche Telekom Laboratories christian.bauckhage@telekom.e Jérôme Kunegis jerome.kunegis@ai-labor.e

More information

BV has the bounded approximation property

BV has the bounded approximation property The Journal of Geometric Analysis volume 15 (2005), number 1, pp. 1-7 [version, April 14, 2005] BV has the boune approximation property G. Alberti, M. Csörnyei, A. Pe lczyński, D. Preiss Abstract: We prove

More information

How To Find Out How To Calculate Volume Of A Sphere

How To Find Out How To Calculate Volume Of A Sphere Contents High-Dimensional Space. Properties of High-Dimensional Space..................... 4. The High-Dimensional Sphere......................... 5.. The Sphere an the Cube in Higher Dimensions...........

More information

Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany

Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany Parameterize Algorithms for -Hitting Set: the Weighte Case Henning Fernau Trierer Forschungsberichte; Trier: Technical Reports Informatik / Mathematik No. 08-6, July 2008 Univ. Trier, FB 4 Abteilung Informatik

More information

On the k-path cover problem for cacti

On the k-path cover problem for cacti On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China zeminjin@eyou.com, x.li@eyou.com Abstract In this paper we

More information

HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)!

HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)! Math 7 Fall 205 HOMEWORK 5 SOLUTIONS Problem. 2008 B2 Let F 0 x = ln x. For n 0 and x > 0, let F n+ x = 0 F ntdt. Evaluate n!f n lim n ln n. By directly computing F n x for small n s, we obtain the following

More information

UNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH

UNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH UNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH OLIVIER BERNARDI AND ÉRIC FUSY Abstract. This article presents unifie bijective constructions for planar maps, with control on the face egrees

More information

Digital barrier option contract with exponential random time

Digital barrier option contract with exponential random time IMA Journal of Applie Mathematics Avance Access publishe June 9, IMA Journal of Applie Mathematics ) Page of 9 oi:.93/imamat/hxs3 Digital barrier option contract with exponential ranom time Doobae Jun

More information

Lemma 5.2. Let S be a set. (1) Let f and g be two permutations of S. Then the composition of f and g is a permutation of S.

Lemma 5.2. Let S be a set. (1) Let f and g be two permutations of S. Then the composition of f and g is a permutation of S. Definition 51 Let S be a set bijection f : S S 5 Permutation groups A permutation of S is simply a Lemma 52 Let S be a set (1) Let f and g be two permutations of S Then the composition of f and g is a

More information

INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS

INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS STEVEN P. LALLEY AND ANDREW NOBEL Abstract. It is shown that there are no consistent decision rules for the hypothesis testing problem

More information

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law Detecting Possibly Frauulent or Error-Prone Survey Data Using Benfor s Law Davi Swanson, Moon Jung Cho, John Eltinge U.S. Bureau of Labor Statistics 2 Massachusetts Ave., NE, Room 3650, Washington, DC

More information

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues Minimum-Energy Broacast in All-Wireless Networks: NP-Completeness an Distribution Issues Mario Čagal LCA-EPFL CH-05 Lausanne Switzerlan mario.cagal@epfl.ch Jean-Pierre Hubaux LCA-EPFL CH-05 Lausanne Switzerlan

More information

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market RATIO MATHEMATICA 25 (2013), 29 46 ISSN:1592-7415 Optimal Control Policy of a Prouction an Inventory System for multi-prouct in Segmente Market Kuleep Chauhary, Yogener Singh, P. C. Jha Department of Operational

More information

Mathematics Review for Economists

Mathematics Review for Economists Mathematics Review for Economists by John E. Floy University of Toronto May 9, 2013 This ocument presents a review of very basic mathematics for use by stuents who plan to stuy economics in grauate school

More information

15.2. First-Order Linear Differential Equations. First-Order Linear Differential Equations Bernoulli Equations Applications

15.2. First-Order Linear Differential Equations. First-Order Linear Differential Equations Bernoulli Equations Applications 00 CHAPTER 5 Differential Equations SECTION 5. First-Orer Linear Differential Equations First-Orer Linear Differential Equations Bernoulli Equations Applications First-Orer Linear Differential Equations

More information

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS Systems of Equations and Matrices Representation of a linear system The general system of m equations in n unknowns can be written a x + a 2 x 2 + + a n x n b a

More information

Stationary random graphs on Z with prescribed iid degrees and finite mean connections

Stationary random graphs on Z with prescribed iid degrees and finite mean connections Stationary random graphs on Z with prescribed iid degrees and finite mean connections Maria Deijfen Johan Jonasson February 2006 Abstract Let F be a probability distribution with support on the non-negative

More information

Mannheim curves in the three-dimensional sphere

Mannheim curves in the three-dimensional sphere Mannheim curves in the three-imensional sphere anju Kahraman, Mehmet Öner Manisa Celal Bayar University, Faculty of Arts an Sciences, Mathematics Department, Muraiye Campus, 5, Muraiye, Manisa, urkey.

More information

Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition

Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition Mathematical Moels of Therapeutical Actions Relate to Tumour an Immune System Competition Elena De Angelis (1 an Pierre-Emmanuel Jabin (2 (1 Dipartimento i Matematica, Politecnico i Torino Corso Duca egli

More information

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations This page may be remove to conceal the ientities of the authors An intertemporal moel of the real exchange rate, stock market, an international ebt ynamics: policy simulations Saziye Gazioglu an W. Davi

More information

Differentiability of Exponential Functions

Differentiability of Exponential Functions Differentiability of Exponential Functions Philip M. Anselone an John W. Lee Philip Anselone (panselone@actionnet.net) receive his Ph.D. from Oregon State in 1957. After a few years at Johns Hopkins an

More information

An example of a computable

An example of a computable An example of a computable absolutely normal number Verónica Becher Santiago Figueira Abstract The first example of an absolutely normal number was given by Sierpinski in 96, twenty years before the concept

More information

Calibration of the broad band UV Radiometer

Calibration of the broad band UV Radiometer Calibration of the broa ban UV Raiometer Marian Morys an Daniel Berger Solar Light Co., Philaelphia, PA 19126 ABSTRACT Mounting concern about the ozone layer epletion an the potential ultraviolet exposure

More information

Metric Spaces. Chapter 7. 7.1. Metrics

Metric Spaces. Chapter 7. 7.1. Metrics Chapter 7 Metric Spaces A metric space is a set X that has a notion of the distance d(x, y) between every pair of points x, y X. The purpose of this chapter is to introduce metric spaces and give some

More information

Department of Mathematical Sciences, University of Copenhagen. Kandidat projekt i matematik. Jens Jakob Kjær. Golod Complexes

Department of Mathematical Sciences, University of Copenhagen. Kandidat projekt i matematik. Jens Jakob Kjær. Golod Complexes F A C U L T Y O F S C I E N C E U N I V E R S I T Y O F C O P E N H A G E N Department of Mathematical Sciences, University of Copenhagen Kaniat projekt i matematik Jens Jakob Kjær Golo Complexes Avisor:

More information

Example Optimization Problems selected from Section 4.7

Example Optimization Problems selected from Section 4.7 Example Optimization Problems selecte from Section 4.7 19) We are aske to fin the points ( X, Y ) on the ellipse 4x 2 + y 2 = 4 that are farthest away from the point ( 1, 0 ) ; as it happens, this point

More information

Mathematical Induction

Mathematical Induction Mathematical Induction (Handout March 8, 01) The Principle of Mathematical Induction provides a means to prove infinitely many statements all at once The principle is logical rather than strictly mathematical,

More information

Mathematics Course 111: Algebra I Part IV: Vector Spaces

Mathematics Course 111: Algebra I Part IV: Vector Spaces Mathematics Course 111: Algebra I Part IV: Vector Spaces D. R. Wilkins Academic Year 1996-7 9 Vector Spaces A vector space over some field K is an algebraic structure consisting of a set V on which are

More information

Optimal Energy Commitments with Storage and Intermittent Supply

Optimal Energy Commitments with Storage and Intermittent Supply Submitte to Operations Research manuscript OPRE-2009-09-406 Optimal Energy Commitments with Storage an Intermittent Supply Jae Ho Kim Department of Electrical Engineering, Princeton University, Princeton,

More information

QUASIRANDOM LOAD BALANCING

QUASIRANDOM LOAD BALANCING SIAM J. COMPUT. Vol. 41, No. 4, pp. 747 771 c 01 Society for Inustrial an Applie Mathematics QUASIRANDOM LOAD BALANCING TOBIAS FRIEDRICH, MARTIN GAIRING, AND THOMAS SAUERWALD Abstract. We propose a simple

More information

Lecture L25-3D Rigid Body Kinematics

Lecture L25-3D Rigid Body Kinematics J. Peraire, S. Winall 16.07 Dynamics Fall 2008 Version 2.0 Lecture L25-3D Rigi Boy Kinematics In this lecture, we consier the motion of a 3D rigi boy. We shall see that in the general three-imensional

More information

Option Pricing for Inventory Management and Control

Option Pricing for Inventory Management and Control Option Pricing for Inventory Management an Control Bryant Angelos, McKay Heasley, an Jeffrey Humpherys Abstract We explore the use of option contracts as a means of managing an controlling inventories

More information

RESULTANT AND DISCRIMINANT OF POLYNOMIALS

RESULTANT AND DISCRIMINANT OF POLYNOMIALS RESULTANT AND DISCRIMINANT OF POLYNOMIALS SVANTE JANSON Abstract. This is a collection of classical results about resultants and discriminants for polynomials, compiled mainly for my own use. All results

More information

Optimizing Multiple Stock Trading Rules using Genetic Algorithms

Optimizing Multiple Stock Trading Rules using Genetic Algorithms Optimizing Multiple Stock Traing Rules using Genetic Algorithms Ariano Simões, Rui Neves, Nuno Horta Instituto as Telecomunicações, Instituto Superior Técnico Av. Rovisco Pais, 040-00 Lisboa, Portugal.

More information

CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010

CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010 CS 598CSC: Combinatorial Optimization Lecture date: /4/010 Instructor: Chandra Chekuri Scribe: David Morrison Gomory-Hu Trees (The work in this section closely follows [3]) Let G = (V, E) be an undirected

More information

Linear Programming. March 14, 2014

Linear Programming. March 14, 2014 Linear Programming March 1, 01 Parts of this introduction to linear programming were adapted from Chapter 9 of Introduction to Algorithms, Second Edition, by Cormen, Leiserson, Rivest and Stein [1]. 1

More information

CONTINUED FRACTIONS AND PELL S EQUATION. Contents 1. Continued Fractions 1 2. Solution to Pell s Equation 9 References 12

CONTINUED FRACTIONS AND PELL S EQUATION. Contents 1. Continued Fractions 1 2. Solution to Pell s Equation 9 References 12 CONTINUED FRACTIONS AND PELL S EQUATION SEUNG HYUN YANG Abstract. In this REU paper, I will use some important characteristics of continued fractions to give the complete set of solutions to Pell s equation.

More information

NOTES ON LINEAR TRANSFORMATIONS

NOTES ON LINEAR TRANSFORMATIONS NOTES ON LINEAR TRANSFORMATIONS Definition 1. Let V and W be vector spaces. A function T : V W is a linear transformation from V to W if the following two properties hold. i T v + v = T v + T v for all

More information

1 Short Introduction to Time Series

1 Short Introduction to Time Series ECONOMICS 7344, Spring 202 Bent E. Sørensen January 24, 202 Short Introduction to Time Series A time series is a collection of stochastic variables x,.., x t,.., x T indexed by an integer value t. The

More information

Systems of Linear Equations

Systems of Linear Equations Systems of Linear Equations Beifang Chen Systems of linear equations Linear systems A linear equation in variables x, x,, x n is an equation of the form a x + a x + + a n x n = b, where a, a,, a n and

More information

An Introduction to Event-triggered and Self-triggered Control

An Introduction to Event-triggered and Self-triggered Control An Introuction to Event-triggere an Self-triggere Control W.P.M.H. Heemels K.H. Johansson P. Tabuaa Abstract Recent evelopments in computer an communication technologies have le to a new type of large-scale

More information

MATH10040 Chapter 2: Prime and relatively prime numbers

MATH10040 Chapter 2: Prime and relatively prime numbers MATH10040 Chapter 2: Prime and relatively prime numbers Recall the basic definition: 1. Prime numbers Definition 1.1. Recall that a positive integer is said to be prime if it has precisely two positive

More information

Regular Languages and Finite Automata

Regular Languages and Finite Automata Regular Languages and Finite Automata 1 Introduction Hing Leung Department of Computer Science New Mexico State University Sep 16, 2010 In 1943, McCulloch and Pitts [4] published a pioneering work on a

More information

Web Appendices to Selling to Overcon dent Consumers

Web Appendices to Selling to Overcon dent Consumers Web Appenices to Selling to Overcon ent Consumers Michael D. Grubb MIT Sloan School of Management Cambrige, MA 02142 mgrubbmit.eu www.mit.eu/~mgrubb May 2, 2008 B Option Pricing Intuition This appenix

More information

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND art I. robobabilystic Moels Computer Moelling an New echnologies 27 Vol. No. 2-3 ransport an elecommunication Institute omonosova iga V-9 atvia MOEING OF WO AEGIE IN INVENOY CONO YEM WIH ANOM EA IME AN

More information

arxiv:1203.1525v1 [math.co] 7 Mar 2012

arxiv:1203.1525v1 [math.co] 7 Mar 2012 Constructing subset partition graphs with strong adjacency and end-point count properties Nicolai Hähnle haehnle@math.tu-berlin.de arxiv:1203.1525v1 [math.co] 7 Mar 2012 March 8, 2012 Abstract Kim defined

More information

Random variables P(X = 3) = P(X = 3) = 1 8, P(X = 1) = P(X = 1) = 3 8.

Random variables P(X = 3) = P(X = 3) = 1 8, P(X = 1) = P(X = 1) = 3 8. Random variables Remark on Notations 1. When X is a number chosen uniformly from a data set, What I call P(X = k) is called Freq[k, X] in the courseware. 2. When X is a random variable, what I call F ()

More information

FACTORING IN THE HYPERELLIPTIC TORELLI GROUP

FACTORING IN THE HYPERELLIPTIC TORELLI GROUP FACTORING IN THE HYPERELLIPTIC TORELLI GROUP TARA E. BRENDLE AND DAN MARGALIT Abstract. The hyperelliptic Torelli group is the subgroup of the mapping class group consisting of elements that act trivially

More information

LEARNING OBJECTIVES FOR THIS CHAPTER

LEARNING OBJECTIVES FOR THIS CHAPTER CHAPTER 2 American mathematician Paul Halmos (1916 2006), who in 1942 published the first modern linear algebra book. The title of Halmos s book was the same as the title of this chapter. Finite-Dimensional

More information

The wave equation is an important tool to study the relation between spectral theory and geometry on manifolds. Let U R n be an open set and let

The wave equation is an important tool to study the relation between spectral theory and geometry on manifolds. Let U R n be an open set and let 1. The wave equation The wave equation is an important tool to stuy the relation between spectral theory an geometry on manifols. Let U R n be an open set an let = n j=1 be the Eucliean Laplace operator.

More information

Rules for Finding Derivatives

Rules for Finding Derivatives 3 Rules for Fining Derivatives It is teious to compute a limit every time we nee to know the erivative of a function. Fortunately, we can evelop a small collection of examples an rules that allow us to

More information

THE SIGN OF A PERMUTATION

THE SIGN OF A PERMUTATION THE SIGN OF A PERMUTATION KEITH CONRAD 1. Introduction Throughout this discussion, n 2. Any cycle in S n is a product of transpositions: the identity (1) is (12)(12), and a k-cycle with k 2 can be written

More information

Forecasting and Staffing Call Centers with Multiple Interdependent Uncertain Arrival Streams

Forecasting and Staffing Call Centers with Multiple Interdependent Uncertain Arrival Streams Forecasting an Staffing Call Centers with Multiple Interepenent Uncertain Arrival Streams Han Ye Department of Statistics an Operations Research, University of North Carolina, Chapel Hill, NC 27599, hanye@email.unc.eu

More information

Inner Product Spaces

Inner Product Spaces Math 571 Inner Product Spaces 1. Preliminaries An inner product space is a vector space V along with a function, called an inner product which associates each pair of vectors u, v with a scalar u, v, and

More information

A Data Placement Strategy in Scientific Cloud Workflows

A Data Placement Strategy in Scientific Cloud Workflows A Data Placement Strategy in Scientific Clou Workflows Dong Yuan, Yun Yang, Xiao Liu, Jinjun Chen Faculty of Information an Communication Technologies, Swinburne University of Technology Hawthorn, Melbourne,

More information

Definition of the spin current: The angular spin current and its physical consequences

Definition of the spin current: The angular spin current and its physical consequences Definition of the spin current: The angular spin current an its physical consequences Qing-feng Sun 1, * an X. C. Xie 2,3 1 Beijing National Lab for Conense Matter Physics an Institute of Physics, Chinese

More information

Stern Sequences for a Family of Multidimensional Continued Fractions: TRIP-Stern Sequences

Stern Sequences for a Family of Multidimensional Continued Fractions: TRIP-Stern Sequences Stern Sequences for a Family of Multidimensional Continued Fractions: TRIP-Stern Sequences arxiv:1509.05239v1 [math.co] 17 Sep 2015 I. Amburg K. Dasaratha L. Flapan T. Garrity C. Lee C. Mihaila N. Neumann-Chun

More information

GRAPH THEORY LECTURE 4: TREES

GRAPH THEORY LECTURE 4: TREES GRAPH THEORY LECTURE 4: TREES Abstract. 3.1 presents some standard characterizations and properties of trees. 3.2 presents several different types of trees. 3.7 develops a counting method based on a bijection

More information

The mean-field computation in a supermarket model with server multiple vacations

The mean-field computation in a supermarket model with server multiple vacations DOI.7/s66-3-7-5 The mean-fiel computation in a supermaret moel with server multiple vacations Quan-Lin Li Guirong Dai John C. S. Lui Yang Wang Receive: November / Accepte: 8 October 3 SpringerScienceBusinessMeiaNewYor3

More information

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments 2012 IEEE Wireless Communications an Networking Conference: Services, Applications, an Business Game Theoretic Moeling of Cooperation among Service Proviers in Mobile Clou Computing Environments Dusit

More information

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems *

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems * GPRS performance estimation in GSM circuit switche serices an GPRS share resource systems * Shaoji i an Sen-Gusta Häggman Helsinki Uniersity of Technology, Institute of Raio ommunications, ommunications

More information

A Universal Sensor Control Architecture Considering Robot Dynamics

A Universal Sensor Control Architecture Considering Robot Dynamics International Conference on Multisensor Fusion an Integration for Intelligent Systems (MFI2001) Baen-Baen, Germany, August 2001 A Universal Sensor Control Architecture Consiering Robot Dynamics Frierich

More information

Calculating Viscous Flow: Velocity Profiles in Rivers and Pipes

Calculating Viscous Flow: Velocity Profiles in Rivers and Pipes previous inex next Calculating Viscous Flow: Velocity Profiles in Rivers an Pipes Michael Fowler, UVa 9/8/1 Introuction In this lecture, we ll erive the velocity istribution for two examples of laminar

More information

Lecture 1: Course overview, circuits, and formulas

Lecture 1: Course overview, circuits, and formulas Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik

More information

Optimal Control Of Production Inventory Systems With Deteriorating Items And Dynamic Costs

Optimal Control Of Production Inventory Systems With Deteriorating Items And Dynamic Costs Applie Mathematics E-Notes, 8(2008), 194-202 c ISSN 1607-2510 Available free at mirror sites of http://www.math.nthu.eu.tw/ amen/ Optimal Control Of Prouction Inventory Systems With Deteriorating Items

More information

Cost Efficient Datacenter Selection for Cloud Services

Cost Efficient Datacenter Selection for Cloud Services Cost Efficient Datacenter Selection for Clou Services Hong u, Baochun Li henryxu, bli@eecg.toronto.eu Department of Electrical an Computer Engineering University of Toronto Abstract Many clou services

More information