Zero error list-decoding capacity of the q/(q 1) channel

Size: px
Start display at page:

Download "Zero error list-decoding capacity of the q/(q 1) channel"

Transcription

1 Zero error list-decoding capacity of the q/q 1) channel Sourav Chakraborty 1, Jaikuar Radhakrishnan 2,3, Nandakuar Raghunathan 4, and Prashant Sasatte 5 1 Departent of Coputer Science, University of Chicago, Chicago, USA 2 Toyota Technological Institute at Chicago, USA 3 School of Technology and Coputer Science, Tata Institute of Fundaental Research, Mubai, India 4 Microsoft, Seattle, USA 5 University of Waterloo, Waterloo, Canada Abstract. Let, q, l be positive integers such that l q. A faily H of functions fro [] to [q] is said to be an, q, l)-faily if for every subset S of [] with l eleents, there is an h H such that hs) = [q]. Let, N, q, l) be the size of the sallest, q, l)-faily. We show that for all q, l 1.58q and all sufficiently large, we have N, q, l) = expωq)) log. Special cases of this follow fro results shown earlier in the context of perfect hashing: a theore of Fredan & Kolós 1984) iplies that N, q, q) = expωq)) log, and a theore of Körner 1986) shows that N, q, q + 1) = expωq)) log. We conjecture that N, q, l) = expωq)) log if l = Oq). A standard probabilistic construction shows that for all q, l q and all sufficiently large, N, q, l) = expoq)) log. Our otivation for studying this proble arises fro its close connection to a proble in coding theory, naely, the proble of deterining the zero error listdecoding capacity for a certain channel studied by Elias [IEEE Transactions on Inforation Theory, Vol. 34, No. 5, , 1988]. Our result iplies that for the so called q/q 1) channel, the capacity is exponentially sall in q, even if the list size is allowed to be as big as 1.58q. The earlier results of Fredan & Kolós and Körner cited above iply that the capacity is exponentially sall if the list size is at ost q Introduction Shannon [S56] studied the zero error capacity of discrete finite eoryless noisy channels. Such a channel can be odeled as a bipartite graph V, W, E), Work done while the author was at the University of Chicago. Work done while the author was at TIFR, Mubai.

2 2 Chakraborty, Radhakrishnan, Raghunathan, Sasatte where v, w) E iff the letter w can be received when the letter v is transitted. The goal then, is to encode essages as strings of letters fro the input alphabet V and recover it fro the received essage. The goal naturally is to use as few input letters as possible and still recover the intended essage perfectly. Shannon [S56] and Lovász [L79] deterined the best rate of transission achievable under this odel for several specific channels. We are interested in the list-decoding version of this proble, studied by Elias [E88]. For exaple, consider the channel shown in Figure 1. It is not hard to see that for this channel, no atter how any letters are used in the encoding, it is ipossible to recover an input essage uniquely assuing there are at least two possibilities for the input essage). However, it is not hard to see that one can always encode essages using strings of letters such that based on the received essage one can narrow down the possibilities to just two, that is, we cannot decode exactly but we can list-decode with a list of size two. This otivates the following definition. Fig. 1. The 3/2 channel Definition 1 Code, Rate). Consider a channel C = [q], [q ], E) with q input letters and q output letters. We say that a sequence σ [q] n is copatible with σ [q ] n if for i = 1, 2,..., n, we have σ[i], σ [i]) E. A subset S [q] n is said to be a zero error l-list-decoding code for the channel C if for all σ in [q ] n, {σ S : σ and σ are copatible} l. Let n, C, l) be the iniu n such that there is a zero error l-list-decoding code S for the channel C, such that S. The zero error list-of-l rate of the code S is R C,l S) = 1 ) n log, l and the zero error capacity of the channel C is the least upper bound of the attainable zero error list-of-l rates of all codes.

3 Zero error list-decoding capacity of the q/q 1) channel 3 For the 3/2 channel Elias [E88] proved that the zero error capacity when l = 2 is lower bounded by log3) and upper bounded see 2) below) by log3) In this paper, we study generalization s of the 3/2 channel. The q/q 1) channel corresponds to the coplete bipartite graph K q,q inus a perfect atching. Thus, the transission of any letter can result in all but one of the letters being received. It is easy to see that that it is not possible to design a code where one can always recover the original essage exactly. However, it is possible to design codes that perfor list-decoding with lists of size q 1. In fact a routine probabilistic arguent shows the following. Proposition 1. n, q, q 1) = expoq)) log. The q/q 1) channel is thus a natural and siple channel where exact decoding is not possible, but list-decoding with oderate size lists is possible. The ain point of interest for us is that the rate of the code proised by Proposition 1 is exponentially sall as a function of q. Is this exponentially sall rate the best we can hope for if the list size is restricted to be q 1? Yes, and this follows fro a lower bound on the size of failies of perfect hash functions shown by Fredan and Kolós [FK84]. A generalization of the result of Fredan and Kolós obtained by Körner [K86], iplies that the rate is exponentially sall even if we allow the decoder to produce lists of size q. For what list size, then, can we expect list-decoding codes with constant or inverse polynoial rate? Proposition 2. For all q we have, n, q, q ln q ) = Oq log ). On the other hand, it can be shown that the rate cannot be better than 1 q unless the list size is allowed to depend on. Proposition 3. All functions l : Z + Z + and all q, for all large enough, n, q, lq)) q log. Thus, we know that the rate is exponentially sall when the list size is required to be exactly q, and it is an inverse polynoial when the list size is θq ln q). These observations, however, do not copletely deterine the dependence of the rate on the list size, or even the sallest list size as a function of q) for which there are codes with rate significantly better than an inverse exponential. We conjecture the following. Conjecture 1 The conjecture has two parts. 1. For all constants c > 0, there is a constant ɛ, such that for all large, we have n, q, cq) expɛq) log

4 4 Chakraborty, Radhakrishnan, Raghunathan, Sasatte 2. For all function lq) = oq log q) and for all large we have n, q, lq)) q ω1) log In this paper, we ake progress towards the first part of the conjecture. Theore 1 Main result). For ɛ > 0, there is a delta > 0 such that for all large q and for all large enough, we have n, q, γ ɛ)q)) expδq) log, where γ = e/e 1) Techniques As stated above the inverse exponential upper bounds on the rate when the list size is q 1 or q follow fro results proved earlier in connection with hashing. In this section, we forally state this connection, review the previous techniques, and then outline the arguent we use to obtain our result. 2.1 Connection to hashing Definition 2. Let q, l, be integers such that 1 q l. A faily H of functions fro [] to [q] is said to be an, q, l)-faily of hash functions if for all l-sized subsets S of [], there is a function h H such that hs) = [q]. N, q, l) is the size of the sallest, q, l)-faily of hash functions. For convenience, we will allow, q and l to positive real nubers, and use N, q, l) to ean the size of the sallest, q, l )-faily where, q and l are integers such that, q q and l l. The connection between the faily of hash functions and zero error listdecoding codes for the q/q 1) channel is straightforward. Suppose we have an, q, l)-code C [q] n. Such a code naturally gives rise to n functions h 1, h 2,..., h n fro [] to [q]: where h i j) = k iff the i-th letter of the j- th codeword is k [q]. It is then straightforward to verify that for every set S [] of size l + 1, we have h i S) = [q] for soe i {1, 2,..., n}. This translations works in the other direction as well: if there is an, q, l)-faily of hash functions of size n, then there is an, q, l 1)-code C [q] n. Proposition 4. For all, q, and l, we have n, q, l) = N, q, l + 1). In light of the above, we will concentrate on showing lower bounds for N, q, l). Our ain result can then be reforulated as follows. Theore 2. For all ɛ > 0, there is a δ > 0, such that for all large q, l e e 1 ɛ ) q, and all large enough, N, q, l) expδq) log.

5 Zero error list-decoding capacity of the q/q 1) channel 5 It is easy to see that Theore 1 follows iediately fro this. In Section 4.2 we will forally prove this theore. We now present an overview. 2.2 The lower bound arguent It will be helpful to review the proof of the lower bound shown by Fredan and Kolós [FK84]. Theore 3. For all large q and all large enough, N, q, q) Oq 1/2 expq)) log. First, we note two siple lower bounds on N, q, q). First, any one hash function can perfectly hash at ost q ) q sets of size q. So, N, q, l) q ) q ) q 1 2πq expq). 1) This bound has the required exponential dependence on q but not the logarithic dependence on. A different arguent gives us a logarithic dependence on. If we restrict attention to all eleents of [] that are apped by the first hash function to soe q 1 of the [q] eleents of [], then clearly every q-sized subset of these eleents ust be perfectly hashed by at least one of the reaining ) hash functions. Fro this, we conclude that N, q, q) N q 1 q ), q, q provided q), which iplies N, q, q) log q q 1 ) ) q log. 2) q 1 q 1 [A siilar calculation can be used to justify Proposition 3.] This bound, gives us the required logarithic dependence on but not the exponential dependence on q. Fredan and Kolós devised an ingenious arguent that cobined the erits of 1) and 2). Consider a set T of size q 2. Clearly, if a function aps two of the eleents of T to the sae value in [q], then this hash function is incapable of perfectly hashing any q-eleent superset T T. An averaging arguent shows that for if T is chosen uniforly at rando then all but an exponentially sall fraction of the original faily do ap soe two eleents of T to the sae eleent. Furtherore, for every two eleents of [] T one of the reaining hash functions that are on-to-one on T ) ust ap these two eleents differently. By 2), the nuber of hash functions reaining ust be at least log q + 2). Thus, the size of original faily ust be at expωq)) log q + 2). The arguents used by Fredan and Kolós and Körner are ore sophisticated and yield slightly better bounds.)

6 6 Chakraborty, Radhakrishnan, Raghunathan, Sasatte Our arguent is siilar. Suppose we have an, q, l) faily of hash functions where l = e ɛ for soe ɛ > 0). As in the arguent above, we pick a set T of size q 2. The ain observation now is that for any fixed function h : [] [q], the expected size ht ) as T is chosen at rando) is about q 1 1 e), and there is a sharp concentration of easure near this ean value. Thus, only for an exponentially sall fraction of the hash functions in the faily is the iage of T at least q 1 1 e + ɛ). The ajority of the functions already suffer so any collisions on T, that they cannot cover all of [q] when an additional 1 e ɛ) q eleents are added to T. Using an arguent siilar to the one used to show 2), we conclude that an exponentially sall fraction of the original faily ust be at least log q + 2). The lower bound will follow fro this. This arguent is presented in detail in Section 4.1. It however is soewhat weaker than the bound claied in Theore 2. The stronger result is obtained by applying this idea recursively. The foral proof proceeds by induction, and is presented in Section Preliinaries In this section we develop the tools that will be necessary in the proof of Theore 2 in Section 4.1 and 4.2. Definition 3 Derived function). Let, q, q be integers such that q > q 1 and let T [] Let h : [] [q] be a hash function such that ht ) q q. Then, the function h T,q is defined as follows. Let j 1, j 2,..., j q be the sallest q eleents of [q] ht ). Then, for all i [], let h T,q i) = { k if hi) = jk 1 otherwise. The following proposition follows iediately fro our definition. Proposition 5. Let h : [] [q]. If T, T [] are such that ht ) q q and ht T ) = [q], then h T,q T ) = [q ]. Lea 1. If H is a faily of hash functions fro [] to [2]. Then, there is a subset U [] of size at least /2 H such that hu) = 1, for all h H. Proof. Consider the ap fro [] to {1, 2} H defined by i hi) : h H. The range of this ap has size exactly 2 H. It follows that there are at least /2 H eleents of the doain [] that ap to the sae eleent. Definition 4 Dangerous function). We say that the function h : [] [q] is ɛ-dangerous for the set T [] if ht ) q 1 1 e + ɛ).

7 Zero error list-decoding capacity of the q/q 1) channel 7 Lea 2. Let h : [] [q]. Let T be a rando subset of [] chosen uniforly fro aong all subsets of [] of size q 2. Then, if q, Pr T [h is ɛ-dangerous for T ] 2 exp 2ɛ2 q). To prove Lea 2, we will need the following concentration result due to McDiarid. Lea 3 see McDiarid [M89]). Let X 1, X 2,..., X n be independent rando variables with each X k taking values in a finite set A and let f : A n R. For all k, let f change by at ost c k if only the value of X k is changed, that is, ax x A k fx) fy) c k, when x and y differ only in the kth coordinate. If Y = fx 1, X 2,..., X n ) is the rando variable with expectation E[Y ], then for any t 0, ) 2t 2 Pr[Y E[Y ] t] exp n. i=1 c2 k Proof of Lea 2). Pick q 2 eleents fro [] with) replaceent, let the resulting set be T. With probability ore than 1 q 2 2 ) we have that T = q 2. Now, fix an h H. For j [q], the probability that j ht ) is exactly, ) 1 h 1 j) q 2. Thus, by linearity of expectation, we have E[ [q] ht ) ] = q q j=1 ) q 2 1 h 1 j) 1 1 q = q 1 1 q = q q exp q e. j=1 ) q q 1 q 2 q 1 q h 1 j) ) q 2) The second inequality follows fro Holder s Inequality. Thus, E[ ht ) ] q1 1 e ). We think of ht ) as a function of fx 1, X 2,..., X q ), of q 2 ) q 2

8 8 Chakraborty, Radhakrishnan, Raghunathan, Sasatte independent rando variables X 1, X 2,..., X q 2 each distributed uniforly over the set []). Note that f changes at ost by 1 if the value of any of the the variables is changed leaving the rest unchanged). We ay thus conclude fro Lea 3 that [ Pr ht ) q 1 1e )] + ɛ exp 2 ɛ2 q 2 ) exp 2ɛ 2 q ). q 2 This iplies that if T is chosen to be a rando set of size q 2, then the probability that h is dangerous for T is at ost 1 q 2 2 )) 1 exp 2ɛ 2 q ) 2 exp 2ɛ 2 q ). Corollary 1. Let H be a faily of hash functions fro [] to [q]. Then, there is a set T [] of size q 2 such that at ost 2 exp 2ɛ 2 q) H hash functions in H are ɛ-dangerous for T. Proof. Pick T at rando. By Lea 2, the expected nuber of ɛ-dangerous hash functions for T is at ost 2 exp 2ɛ 2 q) H. There ust be a at least one choice for T with this property. 4 Proof of Theore A weaker bound Our goal in this section is to show the following weaker for of the ain theore, which will serve as the basis for the inductive arguent, when we present the proof of the ain result. Theore 4. For ɛ > 0, large q and all large enough, we have N, q, γ ɛ)q) expδq) log, where γ = e Proof. Let H be an, q, l)-faily with l γ ɛ)q. By Corollary 1, we have a set T of size q 2 such that the nuber of functions that are ɛ-dangerous for T is at ost 2 exp 2ɛ 2 q) H. Fix such a T and consider the derived faily H = {h T,2 : h H is ɛ-dangerous for T }. By Lea 1, there is a set U [] of size /2 H such that h U) = 1 for all h H. We clai that U < q 1 e ɛ). For, otherwise let T be a subset

9 Zero error list-decoding capacity of the q/q 1) channel 9 of U of size q = q 1 e ɛ), and consider the set T T. If h H is not dangerous then ht ) < q q and, therefore, ht T ) < q. On the other hand if h is ɛ-dangerous for T, then our definition of U ensures that ht ) = 1 and, therefore, ht T ) T + 1 < q. Thus, 2 H < q 1 e ɛ ). This, together with H 2 exp 2ɛ 2 q) H iplies our clai. 4.2 The general bound In this section, we will prove the Theore 2. It will be convenient to restate it in a for suitable for an inductive proof. For k 1 and ɛ > 0, let l k q, ɛ) = q 1 + 1e + 1e e ) k ɛ 2k. Theore 5 Version of ain theore). For all k 1, ɛ > 0, q 2k and all large enough, N, q, l k q, ɛ)) 1 2ɛ 2 ) 4k exp q e 2k log. Proof. We will use induction on k. The base case k = 1, follows fro the Theore 4 proved in the previous section. Induction step: Suppose the clai is false, that is, there is an k, q k, l k )-faily H k such that l k l k q k, ɛ) and H k < 1 2ɛ 2 ) 4k exp q k e 2k log. 3) [We use k in the subscript for paraeters associated with the H k to ake ephasize the correspondence with the paraeter k used in the induction.] Fro H k we will derive an k 1, q k 1, l k 1 )-faily H k 1 such that H k 1 H k ; 4) k k k ; 5) 1 q k 1 q k e ɛ ) q k 4 ɛ 2 ; 6) l k 1 l k 1 q k 1, ɛ). 7)

10 10 Chakraborty, Radhakrishnan, Raghunathan, Sasatte Then, using the induction hypothesis, we obtain 1 2ɛ 2 H k H k 1 4k 1) exp q k 1 e 2k 1) 1 2ɛ 2 ) 4k 1) exp q k e 2k 1 1 k = 1 2ɛ 2 ) 4k exp q k e 2k log k, ) log k 1 ) log k ; by the induction hypothesis) contradicting 3). It reains to describe how H k 1 is obtained fro H k. The idea, as outlined in the introduction, is this. In the hope of using induction, we will first pick a subset T of size q k 2, which ost hash functions ap into a sall nuber of eleents. These functions can now be viewed as apping [ k ] T to [q k ], so that the proble reduces to one of covering a large subset of [q k ] with l k q k + 2. However, not all functions are guaranteed to be so well-behaved. For the few functions that do perfor well on T, we need to take evasive action, by restricting attention to a subset of the universe on which these functions are guaranteed to be fail. This idea is ipleented as follows. Using Corollary 1, we first obtain a set T [ k ] of size q k 2 such that at ost 2 exp ) ɛ 2 2 qk H k 2 exp 4) ) ɛ 2 2 qk 4) 1 4k exp 2ɛ 2 ) q k e 2k log 1 2k log k hash functions in H k are ɛ 4) -dangerous for T. Now consider the faily of derived functions H = {h T,2 : h H k is ɛ 4) -dangerous for T }. Using Lea 1, we obtain a set U [ k ] of size at least k q k + 2) 1 2k k such that hu) = 1 for all h H. Our faily H k 1 will be the following set of hash functions fro U to [q k 1 ] where q k 1 = q k 1 e ɛ 4 ) ). H k 1 = {h T,qk 1 : h H k is not ɛ 4) -dangerous for T }. We clai that for all T U of size l k q k 2), there is a function h H k 1 such that ht ) = [q k 1 ]. For, consider the set T T of size l k. By the definition of H k there is an h H k such that ht T ) = [q k ]. Such an h is not ɛ 4) - dangerous for T because our definition of U ensures that ht T ) < q k. So for such an h we have ht ) < q k 1 1 e + ɛ ) q k q k 1e 4 ɛ4 ) = q k q k 1.

11 Zero error list-decoding capacity of the q/q 1) channel 11 Hence, for such an h, by Proposition 5, we have h T,qk 1 T ) = [q k 1 ]. Thus, H k 1 is an k 1, q k 1, l k 1 )-faily for l k 1 = l k q k 2). In particular l k 1 q k 1. We need to verify 4) 7). The definition of H k 1 iediately iplies 4). To verify 5) note that for k q k, U k q k + 2) 1 2k k 1 1 k k. Since q k 1 = q k 1 e ɛ 4 ), 6) holds. Finally, to justify 7), note that 1 l k 1 q k 1, ɛ) q k e ɛ ) e ) e k 1 ɛ 2k 1) [ 1 q k e + 1 e e k ɛ e ɛ e )] e k 1 2k 1) 1 q k e + 1 e ) e k ɛ 2k 1) q k e ) e k 1 ɛ 2k q k + 2 l k q k, ɛ) q k 2) l k q k 2) = l k 1. Acknowledgeent We thank Venkat Guruswai for introducing us to this proble. References E88. P. Elias. Zero Error Capacity Under List Decoding, IEEE Transactions on Inforation Theory, vol. 34, No. 5, 1988): FK84. M. Fredan, J. Kolós. On the Size of Separating Systes and Failies of Perfect Hash Functions, SIAM J. Alg. and Disc. Meth., Vol. 5, No ): K86. J. Körner. Fredan-Kolós bounds and inforation theory, SIAM J. Algebraic and Discrete Methods, ): L79. L. Lovász. On the Shannon Capacity of a Graph, IEEE Trans. Infor. Theory, Vol. IT ): 1-7. M89. C. McDiarid. On the ethod of bounded differences, Surveys in Cobinatorics, vol 141 LMS Lecture Notes Series 1989): S56. C.E. Shannon. The zero error capacity of a noisy channel, IEEE Trans. Infor. Theory, Vol. IT-2, no. 3, 1956): Reprinted in D. Slepian, Ed., Key Papers in the Developent of Inforation Theory. New York: IEEE Press 1974): )

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128 ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute

More information

MINIMUM VERTEX DEGREE THRESHOLD FOR LOOSE HAMILTON CYCLES IN 3-UNIFORM HYPERGRAPHS

MINIMUM VERTEX DEGREE THRESHOLD FOR LOOSE HAMILTON CYCLES IN 3-UNIFORM HYPERGRAPHS MINIMUM VERTEX DEGREE THRESHOLD FOR LOOSE HAMILTON CYCLES IN 3-UNIFORM HYPERGRAPHS JIE HAN AND YI ZHAO Abstract. We show that for sufficiently large n, every 3-unifor hypergraph on n vertices with iniu

More information

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois

More information

Machine Learning Applications in Grid Computing

Machine Learning Applications in Grid Computing Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA gvc@dartouth.edu, guofei.jiang@dartouth.edu

More information

arxiv:0805.1434v1 [math.pr] 9 May 2008

arxiv:0805.1434v1 [math.pr] 9 May 2008 Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of

More information

Factor Model. Arbitrage Pricing Theory. Systematic Versus Non-Systematic Risk. Intuitive Argument

Factor Model. Arbitrage Pricing Theory. Systematic Versus Non-Systematic Risk. Intuitive Argument Ross [1],[]) presents the aritrage pricing theory. The idea is that the structure of asset returns leads naturally to a odel of risk preia, for otherwise there would exist an opportunity for aritrage profit.

More information

Data Set Generation for Rectangular Placement Problems

Data Set Generation for Rectangular Placement Problems Data Set Generation for Rectangular Placeent Probles Christine L. Valenzuela (Muford) Pearl Y. Wang School of Coputer Science & Inforatics Departent of Coputer Science MS 4A5 Cardiff University George

More information

Information Processing Letters

Information Processing Letters Inforation Processing Letters 111 2011) 178 183 Contents lists available at ScienceDirect Inforation Processing Letters www.elsevier.co/locate/ipl Offline file assignents for online load balancing Paul

More information

Lecture L9 - Linear Impulse and Momentum. Collisions

Lecture L9 - Linear Impulse and Momentum. Collisions J. Peraire, S. Widnall 16.07 Dynaics Fall 009 Version.0 Lecture L9 - Linear Ipulse and Moentu. Collisions In this lecture, we will consider the equations that result fro integrating Newton s second law,

More information

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University

More information

A quantum secret ballot. Abstract

A quantum secret ballot. Abstract A quantu secret ballot Shahar Dolev and Itaar Pitowsky The Edelstein Center, Levi Building, The Hebrerw University, Givat Ra, Jerusale, Israel Boaz Tair arxiv:quant-ph/060087v 8 Mar 006 Departent of Philosophy

More information

Halloween Costume Ideas for the Wii Game

Halloween Costume Ideas for the Wii Game Algorithica 2001) 30: 101 139 DOI: 101007/s00453-001-0003-0 Algorithica 2001 Springer-Verlag New York Inc Optial Search and One-Way Trading Online Algoriths R El-Yaniv, 1 A Fiat, 2 R M Karp, 3 and G Turpin

More information

On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes

On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes On Coputing Nearest Neighbors with Applications to Decoding of Binary Linear Codes Alexander May and Ilya Ozerov Horst Görtz Institute for IT-Security Ruhr-University Bochu, Gerany Faculty of Matheatics

More information

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed

More information

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.

More information

HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)!

HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)! Math 7 Fall 205 HOMEWORK 5 SOLUTIONS Problem. 2008 B2 Let F 0 x = ln x. For n 0 and x > 0, let F n+ x = 0 F ntdt. Evaluate n!f n lim n ln n. By directly computing F n x for small n s, we obtain the following

More information

Applying Multiple Neural Networks on Large Scale Data

Applying Multiple Neural Networks on Large Scale Data 0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree

More information

Implementation of Active Queue Management in a Combined Input and Output Queued Switch

Implementation of Active Queue Management in a Combined Input and Output Queued Switch pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University

More information

Position Auctions and Non-uniform Conversion Rates

Position Auctions and Non-uniform Conversion Rates Position Auctions and Non-unifor Conversion Rates Liad Blurosen Microsoft Research Mountain View, CA 944 liadbl@icrosoft.co Jason D. Hartline Shuzhen Nong Electrical Engineering and Microsoft AdCenter

More information

Introduction to Unit Conversion: the SI

Introduction to Unit Conversion: the SI The Matheatics 11 Copetency Test Introduction to Unit Conversion: the SI In this the next docuent in this series is presented illustrated an effective reliable approach to carryin out unit conversions

More information

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance Calculating the Return on nvestent () for DMSMS Manageent Peter Sandborn CALCE, Departent of Mechanical Engineering (31) 45-3167 sandborn@calce.ud.edu www.ene.ud.edu/escml/obsolescence.ht October 28, 21

More information

Partitioned Elias-Fano Indexes

Partitioned Elias-Fano Indexes Partitioned Elias-ano Indexes Giuseppe Ottaviano ISTI-CNR, Pisa giuseppe.ottaviano@isti.cnr.it Rossano Venturini Dept. of Coputer Science, University of Pisa rossano@di.unipi.it ABSTRACT The Elias-ano

More information

Binary Embedding: Fundamental Limits and Fast Algorithm

Binary Embedding: Fundamental Limits and Fast Algorithm Binary Ebedding: Fundaental Liits and Fast Algorith Xinyang Yi The University of Texas at Austin yixy@utexas.edu Eric Price The University of Texas at Austin ecprice@cs.utexas.edu Constantine Caraanis

More information

Transmission Eigenvalues in One Dimension

Transmission Eigenvalues in One Dimension Transission Eigenvalues in One Diension John Sylvester Abstract We show how to locate all the transission eigenvalues for a one diensional constant index of refraction on an interval. 1 Introduction The

More information

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In

More information

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:

More information

Online Bagging and Boosting

Online Bagging and Boosting Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used

More information

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters

More information

An Approach to Combating Free-riding in Peer-to-Peer Networks

An Approach to Combating Free-riding in Peer-to-Peer Networks An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008

More information

The Velocities of Gas Molecules

The Velocities of Gas Molecules he Velocities of Gas Molecules by Flick Colean Departent of Cheistry Wellesley College Wellesley MA 8 Copyright Flick Colean 996 All rights reserved You are welcoe to use this docuent in your own classes

More information

Budget-optimal Crowdsourcing using Low-rank Matrix Approximations

Budget-optimal Crowdsourcing using Low-rank Matrix Approximations Budget-optial Crowdsourcing using Low-rank Matrix Approxiations David R. Karger, Sewoong Oh, and Devavrat Shah Departent of EECS, Massachusetts Institute of Technology Eail: {karger, swoh, devavrat}@it.edu

More information

SAMPLING METHODS LEARNING OBJECTIVES

SAMPLING METHODS LEARNING OBJECTIVES 6 SAMPLING METHODS 6 Using Statistics 6-6 2 Nonprobability Sapling and Bias 6-6 Stratified Rando Sapling 6-2 6 4 Cluster Sapling 6-4 6 5 Systeatic Sapling 6-9 6 6 Nonresponse 6-2 6 7 Suary and Review of

More information

Resource Allocation in Wireless Networks with Multiple Relays

Resource Allocation in Wireless Networks with Multiple Relays Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0

More information

Preference-based Search and Multi-criteria Optimization

Preference-based Search and Multi-criteria Optimization Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne ujunker@ilog.fr

More information

Physics 211: Lab Oscillations. Simple Harmonic Motion.

Physics 211: Lab Oscillations. Simple Harmonic Motion. Physics 11: Lab Oscillations. Siple Haronic Motion. Reading Assignent: Chapter 15 Introduction: As we learned in class, physical systes will undergo an oscillatory otion, when displaced fro a stable equilibriu.

More information

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration

More information

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou

More information

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:

More information

Presentation Safety Legislation and Standards

Presentation Safety Legislation and Standards levels in different discrete levels corresponding for each one to a probability of dangerous failure per hour: > > The table below gives the relationship between the perforance level (PL) and the Safety

More information

Managing Complex Network Operation with Predictive Analytics

Managing Complex Network Operation with Predictive Analytics Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory

More information

Models and Algorithms for Stochastic Online Scheduling 1

Models and Algorithms for Stochastic Online Scheduling 1 Models and Algoriths for Stochastic Online Scheduling 1 Nicole Megow Technische Universität Berlin, Institut für Matheatik, Strasse des 17. Juni 136, 10623 Berlin, Gerany. eail: negow@ath.tu-berlin.de

More information

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES Charles Reynolds Christopher Fox reynolds @cs.ju.edu fox@cs.ju.edu Departent of Coputer

More information

x a x 2 (1 + x 2 ) n.

x a x 2 (1 + x 2 ) n. Limits and continuity Suppose that we have a function f : R R. Let a R. We say that f(x) tends to the limit l as x tends to a; lim f(x) = l ; x a if, given any real number ɛ > 0, there exists a real number

More information

Searching strategy for multi-target discovery in wireless networks

Searching strategy for multi-target discovery in wireless networks Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,

More information

Note on a generalized wage rigidity result. Abstract

Note on a generalized wage rigidity result. Abstract Note on a generalized age rigidity result Ariit Mukheree University of Nottingha Abstract Considering Cournot copetition, this note shos that, if the firs differ in labor productivities, the equilibriu

More information

Efficient Key Management for Secure Group Communications with Bursty Behavior

Efficient Key Management for Secure Group Communications with Bursty Behavior Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:

More information

HW 2. Q v. kt Step 1: Calculate N using one of two equivalent methods. Problem 4.2. a. To Find:

HW 2. Q v. kt Step 1: Calculate N using one of two equivalent methods. Problem 4.2. a. To Find: HW 2 Proble 4.2 a. To Find: Nuber of vacancies per cubic eter at a given teperature. b. Given: T 850 degrees C 1123 K Q v 1.08 ev/ato Density of Fe ( ρ ) 7.65 g/cc Fe toic weight of iron ( c. ssuptions:

More information

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS Isaac Zafrany and Sa BenYaakov Departent of Electrical and Coputer Engineering BenGurion University of the Negev P. O. Box

More information

Fuzzy Sets in HR Management

Fuzzy Sets in HR Management Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic blanka.zekova@sezna.cz Jana Talašová Faculty of Science, Palacký Univerzity,

More information

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS Artificial Intelligence Methods and Techniques for Business and Engineering Applications 210 INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE

More information

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network 2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona

More information

Use of extrapolation to forecast the working capital in the mechanical engineering companies

Use of extrapolation to forecast the working capital in the mechanical engineering companies ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance

More information

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller Research Article International Journal of Current Engineering and Technology EISSN 77 46, PISSN 347 56 4 INPRESSCO, All Rights Reserved Available at http://inpressco.co/category/ijcet Design of Model Reference

More information

Trading Regret for Efficiency: Online Convex Optimization with Long Term Constraints

Trading Regret for Efficiency: Online Convex Optimization with Long Term Constraints Journal of Machine Learning Research 13 2012) 2503-2528 Subitted 8/11; Revised 3/12; Published 9/12 rading Regret for Efficiency: Online Convex Optiization with Long er Constraints Mehrdad Mahdavi Rong

More information

Problem Set 2: Solutions ECON 301: Intermediate Microeconomics Prof. Marek Weretka. Problem 1 (Marginal Rate of Substitution)

Problem Set 2: Solutions ECON 301: Intermediate Microeconomics Prof. Marek Weretka. Problem 1 (Marginal Rate of Substitution) Proble Set 2: Solutions ECON 30: Interediate Microeconoics Prof. Marek Weretka Proble (Marginal Rate of Substitution) (a) For the third colun, recall that by definition MRS(x, x 2 ) = ( ) U x ( U ). x

More information

5.7 Chebyshev Multi-section Matching Transformer

5.7 Chebyshev Multi-section Matching Transformer /9/ 5_7 Chebyshev Multisection Matching Transforers / 5.7 Chebyshev Multi-section Matching Transforer Reading Assignent: pp. 5-55 We can also build a ultisection atching network such that Γ f is a Chebyshev

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1 Secure Wireless Multicast for Delay-Sensitive Data via Network Coding Tuan T. Tran, Meber, IEEE, Hongxiang Li, Senior Meber, IEEE,

More information

Stochastic Online Scheduling on Parallel Machines

Stochastic Online Scheduling on Parallel Machines Stochastic Online Scheduling on Parallel Machines Nicole Megow 1, Marc Uetz 2, and Tark Vredeveld 3 1 Technische Universit at Berlin, Institut f ur Matheatik, Strasse des 17. Juni 136, 10623 Berlin, Gerany

More information

Airline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN

Airline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Airline Yield Manageent with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Integral Developent Corporation, 301 University Avenue, Suite 200, Palo Alto, California 94301 SHALER STIDHAM

More information

Quality evaluation of the model-based forecasts of implied volatility index

Quality evaluation of the model-based forecasts of implied volatility index Quality evaluation of the odel-based forecasts of iplied volatility index Katarzyna Łęczycka 1 Abstract Influence of volatility on financial arket forecasts is very high. It appears as a specific factor

More information

Factored Models for Probabilistic Modal Logic

Factored Models for Probabilistic Modal Logic Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008 Factored Models for Probabilistic Modal Logic Afsaneh Shirazi and Eyal Air Coputer Science Departent, University of Illinois

More information

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS 641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC arketa.zajarosova@vsb.cz Abstract Custoer relationship

More information

A GENERALIZATION OF THE CONGRUENT NUMBER PROBLEM

A GENERALIZATION OF THE CONGRUENT NUMBER PROBLEM A GENERALIZATION OF THE CONGRUENT NUMBER PROBLEM LARRY ROLEN Abstract. We study a certain generalization of the classical Congruent Nuber Proble. Specifically, we study integer areas of rational triangles

More information

2. FINDING A SOLUTION

2. FINDING A SOLUTION The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS

More information

Minimum Wage Violation in South Africa

Minimum Wage Violation in South Africa Miniu Wage Violation in South Africa Haroon Bhorat Developent Policy Research Unit Robert Leslie Social Science Building, 4th Floor, Upper Capus, Rondebosch. University of Cape Town Cape Town, South Africa

More information

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA Audio Engineering Society Convention Paper Presented at the 119th Convention 2005 October 7 10 New York, New York USA This convention paper has been reproduced fro the authors advance anuscript, without

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Equivalent Tapped Delay Line Channel Responses with Reduced Taps

Equivalent Tapped Delay Line Channel Responses with Reduced Taps Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ

More information

Dynamic Placement for Clustered Web Applications

Dynamic Placement for Clustered Web Applications Dynaic laceent for Clustered Web Applications A. Karve, T. Kibrel, G. acifici, M. Spreitzer, M. Steinder, M. Sviridenko, and A. Tantawi IBM T.J. Watson Research Center {karve,kibrel,giovanni,spreitz,steinder,sviri,tantawi}@us.ib.co

More information

SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008

SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008 SOME APPLCATONS OF FORECASTNG Prof. Thoas B. Foby Departent of Econoics Southern Methodist University May 8 To deonstrate the usefulness of forecasting ethods this note discusses four applications of forecasting

More information

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State

More information

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1 International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi

More information

ESTIMATING LIQUIDITY PREMIA IN THE SPANISH GOVERNMENT SECURITIES MARKET

ESTIMATING LIQUIDITY PREMIA IN THE SPANISH GOVERNMENT SECURITIES MARKET ESTIMATING LIQUIDITY PREMIA IN THE SPANISH GOVERNMENT SECURITIES MARKET Francisco Alonso, Roberto Blanco, Ana del Río and Alicia Sanchis Banco de España Banco de España Servicio de Estudios Docuento de

More information

A Strategic Approach to Software Protection U

A Strategic Approach to Software Protection U Â Â Strategic pproach to Software Protection U OZ SHY University of Haifa, Israel and Stockhol School of Econoics, Sweden ozshy@econ.haifa.ac.il JCQUES-FRNCË OIS THISSE CORE, Universite Catholique de Louvain,

More information

A magnetic Rotor to convert vacuum-energy into mechanical energy

A magnetic Rotor to convert vacuum-energy into mechanical energy A agnetic Rotor to convert vacuu-energy into echanical energy Claus W. Turtur, University of Applied Sciences Braunschweig-Wolfenbüttel Abstract Wolfenbüttel, Mai 21 2008 In previous work it was deonstrated,

More information

The Mathematics of Pumping Water

The Mathematics of Pumping Water The Matheatics of Puping Water AECOM Design Build Civil, Mechanical Engineering INTRODUCTION Please observe the conversion of units in calculations throughout this exeplar. In any puping syste, the role

More information

Entity Search Engine: Towards Agile Best-Effort Information Integration over the Web

Entity Search Engine: Towards Agile Best-Effort Information Integration over the Web Entity Search Engine: Towards Agile Best-Effort Inforation Integration over the Web Tao Cheng, Kevin Chen-Chuan Chang University of Illinois at Urbana-Chapaign {tcheng3, kcchang}@cs.uiuc.edu. INTRODUCTION

More information

The individual neurons are complicated. They have a myriad of parts, subsystems and control mechanisms. They convey information via a host of

The individual neurons are complicated. They have a myriad of parts, subsystems and control mechanisms. They convey information via a host of CHAPTER 4 ARTIFICIAL NEURAL NETWORKS 4. INTRODUCTION Artificial Neural Networks (ANNs) are relatively crude electronic odels based on the neural structure of the brain. The brain learns fro experience.

More information

SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS

SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS WHITE PAPER SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation HEALTHCARE SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation

More information

Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information

Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO., OCTOBER 23 2697 Capacity of Multiple-Antenna Systes With Both Receiver and Transitter Channel State Inforation Sudharan K. Jayaweera, Student Meber,

More information

Exercise 4 INVESTIGATION OF THE ONE-DEGREE-OF-FREEDOM SYSTEM

Exercise 4 INVESTIGATION OF THE ONE-DEGREE-OF-FREEDOM SYSTEM Eercise 4 IVESTIGATIO OF THE OE-DEGREE-OF-FREEDOM SYSTEM 1. Ai of the eercise Identification of paraeters of the euation describing a one-degree-of- freedo (1 DOF) atheatical odel of the real vibrating

More information

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2 Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,

More information

Modeling Cooperative Gene Regulation Using Fast Orthogonal Search

Modeling Cooperative Gene Regulation Using Fast Orthogonal Search 8 The Open Bioinforatics Journal, 28, 2, 8-89 Open Access odeling Cooperative Gene Regulation Using Fast Orthogonal Search Ian inz* and ichael J. Korenberg* Departent of Electrical and Coputer Engineering,

More information

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH 31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,

More information

Construction Economics & Finance. Module 3 Lecture-1

Construction Economics & Finance. Module 3 Lecture-1 Depreciation:- Construction Econoics & Finance Module 3 Lecture- It represents the reduction in arket value of an asset due to age, wear and tear and obsolescence. The physical deterioration of the asset

More information

The Fundamentals of Modal Testing

The Fundamentals of Modal Testing The Fundaentals of Modal Testing Application Note 243-3 Η(ω) = Σ n r=1 φ φ i j / 2 2 2 2 ( ω n - ω ) + (2ξωωn) Preface Modal analysis is defined as the study of the dynaic characteristics of a echanical

More information

Lecture 22: November 10

Lecture 22: November 10 CS271 Randomness & Computation Fall 2011 Lecture 22: November 10 Lecturer: Alistair Sinclair Based on scribe notes by Rafael Frongillo Disclaimer: These notes have not been subjected to the usual scrutiny

More information

ADJUSTING FOR QUALITY CHANGE

ADJUSTING FOR QUALITY CHANGE ADJUSTING FOR QUALITY CHANGE 7 Introduction 7.1 The easureent of changes in the level of consuer prices is coplicated by the appearance and disappearance of new and old goods and services, as well as changes

More information

Online Appendix I: A Model of Household Bargaining with Violence. In this appendix I develop a simple model of household bargaining that

Online Appendix I: A Model of Household Bargaining with Violence. In this appendix I develop a simple model of household bargaining that Online Appendix I: A Model of Household Bargaining ith Violence In this appendix I develop a siple odel of household bargaining that incorporates violence and shos under hat assuptions an increase in oen

More information

Reconnect 04 Solving Integer Programs with Branch and Bound (and Branch and Cut)

Reconnect 04 Solving Integer Programs with Branch and Bound (and Branch and Cut) Sandia is a ultiprogra laboratory operated by Sandia Corporation, a Lockheed Martin Copany, Reconnect 04 Solving Integer Progras with Branch and Bound (and Branch and Cut) Cynthia Phillips (Sandia National

More information

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES Int. J. Appl. Math. Coput. Sci., 2014, Vol. 24, No. 1, 133 149 DOI: 10.2478/acs-2014-0011 AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES PIOTR KULCZYCKI,,

More information

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary

More information

Image restoration for a rectangular poor-pixels detector

Image restoration for a rectangular poor-pixels detector Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2

More information

Optimal Resource-Constraint Project Scheduling with Overlapping Modes

Optimal Resource-Constraint Project Scheduling with Overlapping Modes Optial Resource-Constraint Proect Scheduling with Overlapping Modes François Berthaut Lucas Grèze Robert Pellerin Nathalie Perrier Adnène Hai February 20 CIRRELT-20-09 Bureaux de Montréal : Bureaux de

More information

How To Get A Loan From A Bank For Free

How To Get A Loan From A Bank For Free Finance 111 Finance We have to work with oney every day. While balancing your checkbook or calculating your onthly expenditures on espresso requires only arithetic, when we start saving, planning for retireent,

More information

Pure Bending Determination of Stress-Strain Curves for an Aluminum Alloy

Pure Bending Determination of Stress-Strain Curves for an Aluminum Alloy Proceedings of the World Congress on Engineering 0 Vol III WCE 0, July 6-8, 0, London, U.K. Pure Bending Deterination of Stress-Strain Curves for an Aluinu Alloy D. Torres-Franco, G. Urriolagoitia-Sosa,

More information

Experiment 2 Index of refraction of an unknown liquid --- Abbe Refractometer

Experiment 2 Index of refraction of an unknown liquid --- Abbe Refractometer Experient Index of refraction of an unknown liquid --- Abbe Refractoeter Principle: The value n ay be written in the for sin ( δ +θ ) n =. θ sin This relation provides us with one or the standard ethods

More information

Continued Fractions and the Euclidean Algorithm

Continued Fractions and the Euclidean Algorithm Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction

More information

The Design and Implementation of an Enculturated Web-Based Intelligent Tutoring System

The Design and Implementation of an Enculturated Web-Based Intelligent Tutoring System The Design and Ipleentation of an Enculturated Web-Based Intelligent Tutoring Syste Phaedra Mohaed Departent of Coputing and Inforation Technology The University of the West Indies phaedra.ohaed@gail.co

More information

1 if 1 x 0 1 if 0 x 1

1 if 1 x 0 1 if 0 x 1 Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or

More information