On secure and reliable communications in wireless sensor networks: Towards k-connectivity under a random pairwise key predistribution scheme

Size: px
Start display at page:

Download "On secure and reliable communications in wireless sensor networks: Towards k-connectivity under a random pairwise key predistribution scheme"

Transcription

1 O secure ad reliable commuicatios i wireless sesor etworks: Towards k-coectivity uder a radom pairwise key predistributio scheme Faruk Yavuz Dept. of ECE ad CyLab Caregie Mello Uiversity Moffett Field, CA fyavuz@adrew.cmu.edu Ju Zhao Dept. of ECE ad CyLab Caregie Mello Uiversity Pittsburgh, PA juzhao@cmu.edu Osma Yağa Dept. of ECE ad CyLab Caregie Mello Uiversity Moffett Field, CA oyaga@ece.cmu.edu Virgil Gligor Dept. of ECE ad CyLab Caregie Mello Uiversity Pittsburgh, PA gligor@cmu.edu Abstract To be cosidered for a IEEE Jack eil Wolf ISIT Studet Paper Award. We study the secure ad reliable coectivity of wireless sesor etworks. Security is assumed to be esured by the radom pairwise key predistributio scheme of Cha, Perrig, ad Sog, ad ureliable wireless liks are represeted by idepedet o/off chaels. Modelig the etwork by a itersectio of a radom -out graph ad a Erdős-Réyi graph, we preset scalig coditios o the umber of odes, the scheme parameter, ad the probability of a wireless chael beig o such that the resultig graph cotais o odes with degree less tha k with high probability, whe the umber of odes gets large. Results are give i the form of zero-oe laws ad are show to improve the previous results by Yağa ad Makowski o the absece of isolated odes i.e., absece of odes with degree zero. Via simulatios, the established zero-oe laws are show to hold also for the property of k-coectivity; i.e., the property that graph remais coected despite the deletio of ay k 1 odes or edges. eywords: Radom graphs, Coectivity, Zero-oe laws, Wireless sesor etworks. I. INTRODUCTION Wireless sesor etworks WSNs are distributed collectio of small sesor odes that gather security-sesitive data ad cotrol security-critical operatios i a wide rage of idustrial, home ad busiess applicatios [1]. May applicatios require deployig sesor odes i hostile eviromets where a adversary ca eavesdrop sesor commuicatios, ad ca eve capture a umber of sesors ad surreptitiously use them to compromise the etwork. Therefore, cryptographic protectio is required to secure the sesor commuicatio as well as to detect sesor capture ad to revoke the compromised keys. Give the limited commuicatio ad computatioal resources available at each sesor, security is expected to be a key challege i WSNs [2], [3], [4]. Radom key predistributio is oe of the approaches proposed i the literature for addressig security challeges i resource costraied WSNs. The idea of radomly assigig secure keys to the sesor odes prior to etwork deploymet was first itroduced by Escheauer ad Gligor [2]. Followig their origial work, a large umber of key predistributio schemes have bee proposed; see the survey articles [4], [5] ad refereces therei. Here we cosider the radom pairwise key predistributio scheme proposed by Cha et al. i [3]: Before deploymet, each of the sesor odes is paired offlie with distict odes which are radomly selected from amogst all other odes. For each sesor ad ay sesor paired to it, a uique pairwise key is geerated ad stored i their memory modules alog with their ids. Two odes ca the secure a existig wireless commuicatio lik if at least oe of them is paired to the other so that the two odes have at least oe pairwise key i commo. Precise implemetatio details are give i Sectio II. Let H; deote the udirected radom graph o the vertex set {1,..., } where distict odes i ad j are adjacet if they have a pairwise key i commo as described earlier; this radom graph models the radom pairwise predistributio scheme uder full visibility whereby all odes have a wireless lik i betwee. The radom graph H; is kow i the literature o radom graphs as the radom -out graph [6], [7], [8]; several properties of this graph have bee recetly aalyzed by Yağa ad Makowski [9], [10], [11], [12]. Recetly, there has bee a sigificat iterest [13], [14], [15], [16], [17] to drop the full visibility assumptio ad to model ad aalyze radom key predistributio schemes uder more realistic situatios that accout for the possibility that commuicatio liks betwee odes may ot be available This could occur due to the presece of physical barriers betwee odes or because of harsh evirometal coditios severely impairig trasmissio. With this i mid, several authors [14], [15], [16], [17] have started with a simple commuicatio model where wireless liks are represeted by idepedet chaels that are either o with probability p or off with probability 1 p. This suggests a overall modelig framework that is costructed by itersectig the radom - out graph H;, with a Erdős-Réyi ER graph model G; p [6].

2 I this paper, we iitiate a aalysis towards the k-coectivity for the resultig itersectio graph H G;, p. A etwork or graph is said to be k- coected if its coectivity is preserved despite the failure of ay k 1 odes or liks [18]. Therefore, the property of k-coectivity provides a guaratee of etwork reliability agaist the possible failures of sesors or liks due to adversarial attacks or battery depletio; a much eeded property give the key applicatio areas of sesor etworks such as health moitorig, battlefield surveillace, ad evirometal moitorig. Fially, k-coectivity has importat beefits i mobile wireless sesor etworks. For istace, if a etwork is kow to be k-coected, the ay k 1 odes i the etwork are free to move aywhere i the etwork while the rest of the etwork remais at least 1-coected. Our mai result is a zero-oe law for the property that the miimum ode degree of H G;, p is at least k. Namely, we preset scalig coditios o the parameters p ad with respect to, such that the resultig graph cotais o odes with degree less tha k with probability approachig to zero, or oe, respectively, as the umber of odes gets large. The established results already imply the zero-law for the k-coectivity, sice a graph ca ot be k-coected uless all odes have degree at least k. Further, i most if ot all radom graph models i the literature, icludig ER graphs, radom geometric graphs [18], ad radom key graphs [17], the coditios that esure k-coectivity coicide with those esurig miimum ode degree to be at least k. This is ofte established by showig the improbability of a graph beig ot k-coected whe all odes have at least k eighbors. Here, we demostrate this pheomeo via simulatios which idicate that our zero-oe laws hold also for the property of k- coectivity. Fially, our results costitute a improvemet of the previous results by Yağa ad Makowski [19], [14] o the absece of isolated odes i.e., absece of odes with degree zero i H G;, p. A word o the otatio: All statemets ivolvig limits are uderstood with goig to ifiity. I comparig the asymptotic behaviors of the sequeces {a }, {b }, we use a ob, a Ob, a Ωb, ad a Θb, with their meaig i the stadard Ladau otatio. II. MODEL A. The radom pairwise key predistributio scheme We parametrize the pairwise key distributio scheme by two positive itegers ad such that <. There are odes, labelled i 1,...,, with uique ids Id 1,..., Id. Write N {1,... } ad set N i N {i} for each i 1,...,. With ode i we associate a subset Γ,i of odes selected at radom from N i We say that each of the odes i Γ,i is paired to ode i. Thus, for ay subset A N i, we require P [Γ,i A] 1 1 if A 0 otherwise. The selectio of Γ,i is doe uiformly amogst all subsets of N i which are of size ad the rvs Γ,1,..., Γ, are assumed to be mutually idepedet. Oce this offlie radom pairig has bee created, we costruct the key rigs Σ,1,..., Σ,, oe for each ode, as i [12], [10], [14]. I a utshell, key rigs are costructed such that two odes i ad j share a pairwise key that is assiged exclusively to the pair of odes i ad j if at least oe of the evets i Γ,j or j Γ,i take place. I this case ode i ad j ca secure a existig wireless commuicatio lik available to them. B. Radom -out graphs The pairwise key predistributio scheme aturally gives rise to the followig class of radom graphs: With 2, 3,... ad positive iteger <, we say that the distict odes i ad j are -adjacet, writte i j, if ad oly if they have at least oe key i commo i their key rigs, amely i j iff Σ,i Σ,j. 1 Let H; deote the udirected radom graph o the vertex set {1,..., } iduced by the adjacecy otio 1; this correspods to modelig the pairwise distributio scheme uder full visibility. We have P [i j] λ where λ is the lik assigmet probability i H; give by see [10], [12] λ The radom graph H; is kow i the literature o radom graphs as the radom -out graph [6], [7], [8]: To each of the vertices assig exactly arcs to distict vertices that are selected uiformly at radom, ad the igore the orietatio of the arcs. C. Itersectio of radom graphs As metioed earlier, we assume a simple wireless commuicatio model that cosists of idepedet chaels, each of which ca be either o or off. Thus, with p i 0, 1, let {B ij p, 1 i < j } deote i.i.d. {0, 1}-valued rvs with success probability p. The chael betwee odes i ad j is available resp. up with probability p ad uavailable resp. dow with the complemetary probability 1 p. Distict odes i ad j are said to be B-adjacet, writte i B j, if B ij p 1. B-adjacecy defies the stadard Erdős-Réyi ER graph G; p o the vertex set {1,..., } [6]. Obviously, P [i B j] p. The radom graph model studied here is obtaied by itersectig the radom graphs iduced by the pairwise key predistributio scheme, ad by the o-off commuicatio model, respectively. Namely, we cosider the itersectio of H; with the ER graph G; p. I this case, distict odes i ad j are said to be adjacet, writte i j, if ad oly they are both -adjacet ad B-adjacet, amely i j iff Σ,i Σ,j ad B ij p 1. 3

3 The resultig udirected radom graph defied o the vertex set {1,..., } through this otio of adjacecy is deoted H G;, p. The relevace of H G;, p i the cotext of secure WSNs is ow clear. Two odes that are coected by a edge i H G;, p share at least oe cryptographic key ad have a wireless lik available to them, so that they ca establish a secure commuicatio lik. Throughout we assume the collectios of rvs {Γ,1,..., Γ, } ad {B ij p, 1 i < j } to be idepedet, i which case the edge occurrece probability i H G;, p is give by P [i j] P [i j] P [i B j] pλ. 4 III. MAIN RESULT Our mai techical result is give ext. To fix the termiology, we refer to ay mappig : N 0 N 0 as a scalig for radom -out graphs provided it satisfies the atural coditios < for each 1, 2,.... Similarly, we let ay mappig p : N 0 [0, 1] defie a scalig for Erdős-Réyi graphs. To lighte the otatio we ofte group the parameters ad p ito the ordered pair θ, p. Theorem 3.1: Cosider scaligs : N 0 N 0 ad p : N 0 [0, 1] such that lim 2 ad lim sup p < 1. With the sequece γ : N 0 R defied through we have p 1 log1 p p log + k 1 log log + γ, [ ] lim P Mi ode degree of H G; θ is o less tha k 0 if lim γ 1 if lim γ +. The proof of Theorem 3.1 passes through the method of first ad secod momets [8], applied to the radom variable coutig the umber of odes with degree l, with l 0, 1,..., k 1. Although this techique is stadard i the literature, its applicatio to the itersectio graph H G; θ is far from beig straightforward due to itricate depedecies amogst the degrees of odes. Due to space limitatios, we refer the reader to [20] for a proof of Theorem 3.1. The extra coditios eforced by Theorem 3.1 are required for techical reasos; i.e., for the method of momets to be applied successfully to the aforemetioed cout variables. However, we remark that these coditios are mild ad do o preclude their applicatio i realistic WSN scearios. First, the coditio lim sup p < 1 eforces that wireless commuicatio chaels betwee odes do ot become available with probability oe as gets large. The situatio lim sup p 1 is remiiscet of the full visibility case cosidered i [12], ad is ot likely to hold i practice. I fact, as the umber of odes gets large, it may be expected that p goes to zero due to iterferece associated with a large umber of odes commuicatig simultaeously. Secod, the coditio lim 2 will already follow if 2 c for some c < 1. Give that 2 is equal to the mea umber of keys stored per sesor i the pairwise scheme [11], this coditio eeds to hold i ay practical WSN sceario due to limited memory ad computatioal capability of the sesors. I fact, Di Pietro et al. [21] oted that key rig sizes o the order of log are feasible for WSNs. IV. COMMENTS AND DISCUSSION A. Compariso with Erdős-Réyi Graphs For each p i [0, 1] ad 2, 3,..., let G; p deote the Erdős-Réyi graph o the vertex set {1,..., } with edge probability p. It is kow that edge assigmets are mutually idepedet i G; p, whereas they are strogly correlated i H; i that they are egatively associated i the sese of Joag-Dev ad Proscha [22]; see [14] for details. Thus, H; caot be equated with G; p eve whe the parameters p ad are selected so that the edge assigmet probabilities i these two graphs coicide, say λ; p. Therefore, H G; θ caot be equated with a ER graph either, ad the results obtaied here are ot mere cosequeces of classical results for ER graphs. However, some similarities do exist betwee H G; θ ad ER graphs. We start by presetig the followig wellkow zero-oe law for k-coectivity i ER graphs [23]: For ay scalig p : N 0 [0, 1] satisfyig p log + k 1 log log + γ for some γ : N 0 R, it holds that 0 if γ lim P [ G; p is k-coected ] 1 if γ +. The same result also holds for the property that miimum ode degree is at least k. O the other had, the coditio 5 ca be rephrased as p 1 log1 p p log + k 1 log log + γ, with the result 7 uchaged. Sice log1 p p, we get from 2 that p 1 log1 p p p λ Hece, i ER graphs the threshold of k-coectivity, ad of miimum ode degree beig at least k, appears whe the lik probability is compared agaist log + k 1 log log /. I H G; θ, our result shows that the threshold appears whe a quatity that is always larger tha the lik probability p λ is compared agaist log + k 1 log log /. This idicates that H G; θ teds to exhibit the property that all odes have at least k eighbors easier tha ER graphs; 8

4 i.e., this property ca be esured by a smaller lik probability betwee odes which leads to smaller average ode degree. The situatio is more itricate if it holds that lim p 0, whece we have This leads p log1 p p p2 1 + o log1 p p p λ 1 + o1 9 The o1 term i this last expressio ca be writte more precisely as Θp. Thus, i the practically relevat case whe the wireless chaels become weaker as gets large, the threshold for miimum ode degree of H G; θ to be at least k appears whe a quatity that is asymptotically equivalet to lik probability is compared agaist log + k 1 log log /; a situatio that is remiiscet of the ER graphs. A similar observatio was made i [14] for the threshold of 1-coectivity ad absece of isolated odes. Nevertheless, it is worth metioig that eve uder lim p 0, the zero-oe laws for the miimum ode degree beig at least k i ER graphs ad H G; θ are ot exactly aalogous. This is because, the term o1 i 9 may chage the behavior of the sequece γ appearig i 8 sice γ will be give by γ p λ 1 + o1 log k 1 log log. Replacig o1 with the more precise term Θp, ad otig that that λ Θ /, we coclude that the two results will be exactly aalogous if ad oly if p 2 is bouded; i.e., it does ot approach to ifiity as gets large. B. Compariso with results by Yağa ad Makowski for k 1 We ow compare our results with those by Yağa ad Makowski [14] who established zero-oe laws for 1- coectivity, ad for the absece of isolated odes i.e., odes with degree zero i H G; θ. Here, we preset their result i a slightly differet form: Cosider scaligs : N 0 N 0 ad p : N 0 0, 1 such that p 2 1 log1 p p 2 c log, 10 for some c > 0. Assume also that lim p p exists. The, we have lim P [H G; θ cotais o isolated odes] lim P [H G; θ is coected] 0 if c < if c > 1. To better compare this result with ours, we set k 1 ad rewrite our scalig coditio 5 as p 2 1 log1 p p 1 log + γ uder which Theorem 3.1 gives [ ] lim P H G; θ 0 if γ has o isolated odes 1 if γ +. We ow argue how our result o absece of isolated odes costitutes a improvemet o the result of [14]. The assumptio that limit lim p p exists was the key i establishig 11 uder 10 ad our results i this paper explais why. First, it is clear that if p 0, the 1 log1 p p lim 1 log1 p p 1 lim so that the left had sides of 12 ad 10 are asymptotically equivalet. Next, if p > 0, the it follows that Olog see [14] uder 10. This agai yields the asymptotical equivalece of the left had sides of 12 ad 10. Therefore, uder the assumptio that p has a limit, a scalig coditio that is equivalet to 10 is give by p 2 1 log1 p p c log, 13 with the results 11 uchaged. Comparig 12 with 13, we see that our absece of isolated odes result is more fie-graied tha the oe give i [14]. I a utshell, the scalig coditio 13 eforced i [14] requires a deviatio of γ ±Ωlog from the threshold log to get the zero-oe law, whereas i our formulatio 12, it suffices to have a ubouded deviatio; e.g., eve γ ± log log log will do. Put differetly, we cover the case of c 1 i 11 uder 13 ad show that H G; θ could be almost surely free of or ot free of isolated odes, depedig o the limit of γ ; i fact, if 13 holds with c > 1, we see from Theorem 3.1 that H G; θ is ot oly free of isolated odes but also all of its odes will have degree larger tha k for all k 1, 2,.... C. Numerical results ad a cojecture We ow preset some umerical results to check the validity of Theorem 3.1, particularly i the o-asymptotic regime, i.e., whe parameter values are set i accordace with realworld wireless sesor etwork scearios. I all experimets, we fix the umber of odes at The for a give parameter pair, p, we geerate 200 idepedet samples of the graph H G;, p ad cout the umber of times out of a possible 200 that the obtaied graphs have miimum ode degree o less tha k ad ii are k-coected, for k 1, 2,.... Dividig the couts by 200, we obtai the empirical probabilities for the evets of iterest. Due to space limitatios, we oly provide a small subset of the umerical results we have obtaied; see [20] for a complete discussio. I Figure 1, we depict the resultig empirical probability that each ode i H G;, p has degree at least 2 as a fuctio of for various p values. For each p value, we also show the critical threshold of havig miimum degree at least 2 asserted by Theorem 3.1 viz. 5 by a

5 Pr{H G;θ has mi. degree 2} p 0.3 p 0.5 p 0.7 p Fig. 1. Probability that all odes i H G;, p have degree at least 2 as a fuctio of for p 0.3, p 0.5, p 0.7, ad p 0.9 with Pr{H G;θ is 2-coected} p 0.3 p 0.5 p 0.7 p Fig. 2. Probability that all odes i H G;, p is 2-coected as a fuctio of for p 0.3, p 0.5, p 0.7, ad p 0.9 with Its resemblace with Figure 2 suggests that a aalog of Theorem 3.1 holds also for the property of k-coectivity. vertical dashed lie. Namely, the vertical dashed lies stad for the miimum iteger value of that satisfies log1 p p 1 > log + log log 14 p Eve with 2000, we ca observe the threshold behavior suggested by Theorem 3.1; i.e., the probability that H G;, p has miimum ode degree at least k trasitios from zero to oe as varies very slightly from a certai value. For larger, we would expect the curves to look more like a shifted uit step fuctio with a jump discotiuity i.e., a threshold at aroud the value that gives P [mi ode degree is at least k] 1 2 i the curret plots. Those values match well the vertical dashed lies suggested by Theorem 3.1, leadig to the coclusio that umerical experimets are i good agreemet with our theoretical results. Figure 2 is obtaied i the same way with Figure 1, this time for the probability that H G;, p is 2-coected. It is clear that two figures show a strog similarity with curves correspodig to each p value beig almost idistiguishable. I fact, we ra umerous experimets with differet parameter pairs, ad each time observed that the empirical probabilities of H G;, p beig k-coected ad havig miimum ode degree at least k are almost equal. This suggests that i H G;, p as well, the properties of k-coectivity ad the miimum ode degree beig at least k are asymptotically equivalet, leadig us to cast the followig cojecture. Cojecture 4.1: Cosider scaligs : N 0 N 0 ad p : N 0 [0, 1] such that lim 2 ad lim sup p < 1, ad a sequece γ : N 0 R defied through 5. The, lim P [H G; θ is k-coected] REFERENCES 0 if γ 1 if γ +. [1] I. F. Akyildiz, W. Su, Y. Sakarasubramaiam, ad E. Cayirci, Wireless sesor etworks: a survey, Computer etworks, vol. 38, [2] L. Escheauer ad V. Gligor, A key-maagemet scheme for distributed sesor etworks, i Proc. of ACM CCS, [3] H. Cha, A. Perrig, ad D. Sog, Radom key predistributio schemes for sesor etworks, i Proc. of IEEE S&P, [4] Y. Wag, G. Attebury, ad B. Ramamurthy, A survey of security issues i wireless sesor etworks, Commuicatios Surveys Tutorials, IEEE, vol. 8, o. 2, pp. 2 23, [5] Y. Xiao ad V.. Rayi ad B. Su ad X. Du ad F. Hu ad M. Galloway, A survey of key maagemet schemes i wireless sesor etworks, Computer Commuicatios, vol. 30, pp , [6] B. Bollobás, Radom graphs. Cambridge uiversity press, [7] T. I. Feer ad A. M. Frieze, O the coectivity of radom m- orietable graphs ad digraphs, Combiatorica, vol. 2, o. 4, [8] S. Jaso, T. Łuczak, ad A. Ruciński, Radom graphs. 2000, Wiley Itersci. Ser. Discrete Math. Optim, [9] O. Yağa ad A. M. Makowski, O the gradual deploymet of radom pairwise key distributio schemes, i Proc. of WiOpt, [10], Coectivity results for sesor etworks uder a radom pairwise key predistributio scheme, i Iformatio Theory Proceedigs ISIT, 2012 IEEE Iteratioal Symposium o, 2012, pp [11], O the scalability of the radom pairwise key predistributio scheme: Gradual deploymet ad key rig sizes, Performace Evaluatio, vol. 70, o. 78, pp , [12], O the coectivity of sesor etworks uder radom pairwise key predistributio, IEEE Trasactios o Iformatio Theory, vol. 59, o. 9, pp , [13] B. risha, A. Gaesh, ad D. Majuath, O coectivity thresholds i superpositio of radom key graphs o radom geometric graphs, i Proc. of IEEE ISIT, 2013, pp [14] O. Yağa ad A. M. Makowski, Modelig the pairwise key predistributio scheme i the presece of ureliable liks, IEEE Trasactios o Iformatio Theory, vol. 59, o. 3, pp , [15] O. Yağa, Performace of the Escheauer-Gligor key distributio scheme uder a o/off chael, IEEE Trasactios o Iformatio Theory, vol. 58, o. 6, pp , Jue [16] J. Zhao, O. Yağa, ad V. Gligor, Secure k-coectivity i wireless sesor etworks uder a o/off chael model, i Proc. of IEEE Itl. Symp. Ifo. Theory ISIT, 2013, pp [17], k-coectivity i secure wireless sesor etworks with physical lik costraits - the o/off chael model, Arxiv, Jue 2012, submitted to IEEE Trasactios o Iformatio Theory. Available olie at arxiv: [cs.it]. [18] M. D. Perose, Radom Geometric Graphs. Oxford Uiversity Press, Jul [19] O. Yağa ad A. M. Makowski, Desigig securely coected wireless sesor etworks i the presece of ureliable liks, i Commuicatios ICC, 2011 IEEE Iteratioal Coferece o, 2011, pp [20] F. Yavuz, J. Zhao, O. Yağa, ad V. Gligor, O the k-coectivity of the radom graph iduced by a pairwise key predistributio scheme with ureliable liks, to be submitted. [Olie]. Available: oyaga/jourals/k co PER.pdf [21] R. Di Pietro, L. V. Macii, A. Mei, A. Pacoesi, ad J. Radhakrisha, Redoubtable sesor etworks, ACM Tras. If. Syst. Secur., vol. 11, o. 3, pp. 13:1 13:22, March [22]. Joag-Dev ad F. Proscha, Negative associatio of radom variables with applicatios, The Aals of Statistics, o. 1, pp , [23] P. Erdős ad A. Réyi, O the stregth of coectedess of radom graphs, Acta Math. Acad. Sci. Hugar, pp , 1961.

Connectivity in Secure Wireless Sensor Networks under Transmission Constraints

Connectivity in Secure Wireless Sensor Networks under Transmission Constraints Coectivity i Secure Wireless Sesor Networks uder Trasmissio Costraits Ju Zhao Osma Yaga ad Virgil Gligor March 3 04 CMU-CyLab-4-003 CyLab Caregie Mello Uiversity Pittsburgh PA 53 Coectivity i Secure Wireless

More information

Department of Computer Science, University of Otago

Department of Computer Science, University of Otago Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly

More information

Asymptotic Growth of Functions

Asymptotic Growth of Functions CMPS Itroductio to Aalysis of Algorithms Fall 3 Asymptotic Growth of Fuctios We itroduce several types of asymptotic otatio which are used to compare the performace ad efficiecy of algorithms As we ll

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

On the Capacity of Hybrid Wireless Networks

On the Capacity of Hybrid Wireless Networks O the Capacity of Hybrid ireless Networks Beyua Liu,ZheLiu +,DoTowsley Departmet of Computer Sciece Uiversity of Massachusetts Amherst, MA 0002 + IBM T.J. atso Research Ceter P.O. Box 704 Yorktow Heights,

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13 EECS 70 Discrete Mathematics ad Probability Theory Sprig 2014 Aat Sahai Note 13 Itroductio At this poit, we have see eough examples that it is worth just takig stock of our model of probability ad may

More information

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria

More information

Irreducible polynomials with consecutive zero coefficients

Irreducible polynomials with consecutive zero coefficients Irreducible polyomials with cosecutive zero coefficiets Theodoulos Garefalakis Departmet of Mathematics, Uiversity of Crete, 71409 Heraklio, Greece Abstract Let q be a prime power. We cosider the problem

More information

5 Boolean Decision Trees (February 11)

5 Boolean Decision Trees (February 11) 5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected

More information

Chapter 5 O A Cojecture Of Erdíos Proceedigs NCUR VIII è1994è, Vol II, pp 794í798 Jeærey F Gold Departmet of Mathematics, Departmet of Physics Uiversity of Utah Do H Tucker Departmet of Mathematics Uiversity

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable Week 3 Coditioal probabilities, Bayes formula, WEEK 3 page 1 Expected value of a radom variable We recall our discussio of 5 card poker hads. Example 13 : a) What is the probability of evet A that a 5

More information

Universal coding for classes of sources

Universal coding for classes of sources Coexios module: m46228 Uiversal codig for classes of sources Dever Greee This work is produced by The Coexios Project ad licesed uder the Creative Commos Attributio Licese We have discussed several parametric

More information

Capacity of Wireless Networks with Heterogeneous Traffic

Capacity of Wireless Networks with Heterogeneous Traffic Capacity of Wireless Networks with Heterogeeous Traffic Migyue Ji, Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer Egieerig Uiversity of Califoria, Sata

More information

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio

More information

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

On k-connectivity and Minimum Vertex Degree in Random s-intersection Graphs

On k-connectivity and Minimum Vertex Degree in Random s-intersection Graphs O k-coectivity ad Miimum Vertex Degree i Radom -Iterectio Graph Ju Zhao Oma Yağa Virgil Gligor CyLab ad Dept. of ECE Caregie Mello Uiverity Email: {juzhao, oyaga, virgil}@adrew.cmu.edu Abtract Radom -iterectio

More information

Properties of MLE: consistency, asymptotic normality. Fisher information.

Properties of MLE: consistency, asymptotic normality. Fisher information. Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

Lecture 2: Karger s Min Cut Algorithm

Lecture 2: Karger s Min Cut Algorithm priceto uiv. F 3 cos 5: Advaced Algorithm Desig Lecture : Karger s Mi Cut Algorithm Lecturer: Sajeev Arora Scribe:Sajeev Today s topic is simple but gorgeous: Karger s mi cut algorithm ad its extesio.

More information

Incremental calculation of weighted mean and variance

Incremental calculation of weighted mean and variance Icremetal calculatio of weighted mea ad variace Toy Fich faf@cam.ac.uk dot@dotat.at Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

THE ABRACADABRA PROBLEM

THE ABRACADABRA PROBLEM THE ABRACADABRA PROBLEM FRANCESCO CARAVENNA Abstract. We preset a detailed solutio of Exercise E0.6 i [Wil9]: i a radom sequece of letters, draw idepedetly ad uiformly from the Eglish alphabet, the expected

More information

Tradigms of Astundithi and Toyota

Tradigms of Astundithi and Toyota Tradig the radomess - Desigig a optimal tradig strategy uder a drifted radom walk price model Yuao Wu Math 20 Project Paper Professor Zachary Hamaker Abstract: I this paper the author iteds to explore

More information

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat

More information

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights Ceter, Spread, ad Shape i Iferece: Claims, Caveats, ad Isights Dr. Nacy Pfeig (Uiversity of Pittsburgh) AMATYC November 2008 Prelimiary Activities 1. I would like to produce a iterval estimate for the

More information

LECTURE 13: Cross-validation

LECTURE 13: Cross-validation LECTURE 3: Cross-validatio Resampli methods Cross Validatio Bootstrap Bias ad variace estimatio with the Bootstrap Three-way data partitioi Itroductio to Patter Aalysis Ricardo Gutierrez-Osua Texas A&M

More information

Chapter 7 Methods of Finding Estimators

Chapter 7 Methods of Finding Estimators Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of

More information

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return EVALUATING ALTERNATIVE CAPITAL INVESTMENT PROGRAMS By Ke D. Duft, Extesio Ecoomist I the March 98 issue of this publicatio we reviewed the procedure by which a capital ivestmet project was assessed. The

More information

CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION

CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION www.arpapress.com/volumes/vol8issue2/ijrras_8_2_04.pdf CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION Elsayed A. E. Habib Departmet of Statistics ad Mathematics, Faculty of Commerce, Beha

More information

Normal Distribution.

Normal Distribution. Normal Distributio www.icrf.l Normal distributio I probability theory, the ormal or Gaussia distributio, is a cotiuous probability distributio that is ofte used as a first approimatio to describe realvalued

More information

Lecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009)

Lecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009) 18.409 A Algorithmist s Toolkit October 27, 2009 Lecture 13 Lecturer: Joatha Keler Scribe: Joatha Pies (2009) 1 Outlie Last time, we proved the Bru-Mikowski iequality for boxes. Today we ll go over the

More information

THE ARITHMETIC OF INTEGERS. - multiplication, exponentiation, division, addition, and subtraction

THE ARITHMETIC OF INTEGERS. - multiplication, exponentiation, division, addition, and subtraction THE ARITHMETIC OF INTEGERS - multiplicatio, expoetiatio, divisio, additio, ad subtractio What to do ad what ot to do. THE INTEGERS Recall that a iteger is oe of the whole umbers, which may be either positive,

More information

Designing Incentives for Online Question and Answer Forums

Designing Incentives for Online Question and Answer Forums Desigig Icetives for Olie Questio ad Aswer Forums Shaili Jai School of Egieerig ad Applied Scieces Harvard Uiversity Cambridge, MA 0238 USA shailij@eecs.harvard.edu Yilig Che School of Egieerig ad Applied

More information

Sequences and Series

Sequences and Series CHAPTER 9 Sequeces ad Series 9.. Covergece: Defiitio ad Examples Sequeces The purpose of this chapter is to itroduce a particular way of geeratig algorithms for fidig the values of fuctios defied by their

More information

INVESTMENT PERFORMANCE COUNCIL (IPC)

INVESTMENT PERFORMANCE COUNCIL (IPC) INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks

More information

A probabilistic proof of a binomial identity

A probabilistic proof of a binomial identity A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two

More information

Amendments to employer debt Regulations

Amendments to employer debt Regulations March 2008 Pesios Legal Alert Amedmets to employer debt Regulatios The Govermet has at last issued Regulatios which will amed the law as to employer debts uder s75 Pesios Act 1995. The amedig Regulatios

More information

G r a d e. 2 M a t h e M a t i c s. statistics and Probability

G r a d e. 2 M a t h e M a t i c s. statistics and Probability G r a d e 2 M a t h e M a t i c s statistics ad Probability Grade 2: Statistics (Data Aalysis) (2.SP.1, 2.SP.2) edurig uderstadigs: data ca be collected ad orgaized i a variety of ways. data ca be used

More information

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity

More information

THE HEIGHT OF q-binary SEARCH TREES

THE HEIGHT OF q-binary SEARCH TREES THE HEIGHT OF q-binary SEARCH TREES MICHAEL DRMOTA AND HELMUT PRODINGER Abstract. q biary search trees are obtaied from words, equipped with the geometric distributio istead of permutatios. The average

More information

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please

More information

PSYCHOLOGICAL STATISTICS

PSYCHOLOGICAL STATISTICS UNIVERSITY OF CALICUT SCHOOL OF DISTANCE EDUCATION B Sc. Cousellig Psychology (0 Adm.) IV SEMESTER COMPLEMENTARY COURSE PSYCHOLOGICAL STATISTICS QUESTION BANK. Iferetial statistics is the brach of statistics

More information

ODBC. Getting Started With Sage Timberline Office ODBC

ODBC. Getting Started With Sage Timberline Office ODBC ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.

More information

Measures of Spread and Boxplots Discrete Math, Section 9.4

Measures of Spread and Boxplots Discrete Math, Section 9.4 Measures of Spread ad Boxplots Discrete Math, Sectio 9.4 We start with a example: Example 1: Comparig Mea ad Media Compute the mea ad media of each data set: S 1 = {4, 6, 8, 10, 1, 14, 16} S = {4, 7, 9,

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics

More information

Statistical inference: example 1. Inferential Statistics

Statistical inference: example 1. Inferential Statistics Statistical iferece: example 1 Iferetial Statistics POPULATION SAMPLE A clothig store chai regularly buys from a supplier large quatities of a certai piece of clothig. Each item ca be classified either

More information

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth Questio 1: What is a ordiary auity? Let s look at a ordiary auity that is certai ad simple. By this, we mea a auity over a fixed term whose paymet period matches the iterest coversio period. Additioally,

More information

3 Basic Definitions of Probability Theory

3 Basic Definitions of Probability Theory 3 Basic Defiitios of Probability Theory 3defprob.tex: Feb 10, 2003 Classical probability Frequecy probability axiomatic probability Historical developemet: Classical Frequecy Axiomatic The Axiomatic defiitio

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

Chapter 7 - Sampling Distributions. 1 Introduction. What is statistics? It consist of three major areas:

Chapter 7 - Sampling Distributions. 1 Introduction. What is statistics? It consist of three major areas: Chapter 7 - Samplig Distributios 1 Itroductio What is statistics? It cosist of three major areas: Data Collectio: samplig plas ad experimetal desigs Descriptive Statistics: umerical ad graphical summaries

More information

Confidence Intervals for One Mean

Confidence Intervals for One Mean Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a

More information

Data Analysis and Statistical Behaviors of Stock Market Fluctuations

Data Analysis and Statistical Behaviors of Stock Market Fluctuations 44 JOURNAL OF COMPUTERS, VOL. 3, NO. 0, OCTOBER 2008 Data Aalysis ad Statistical Behaviors of Stock Market Fluctuatios Ju Wag Departmet of Mathematics, Beijig Jiaotog Uiversity, Beijig 00044, Chia Email:

More information

The Stable Marriage Problem

The Stable Marriage Problem The Stable Marriage Problem William Hut Lae Departmet of Computer Sciece ad Electrical Egieerig, West Virgiia Uiversity, Morgatow, WV William.Hut@mail.wvu.edu 1 Itroductio Imagie you are a matchmaker,

More information

Hypergeometric Distributions

Hypergeometric Distributions 7.4 Hypergeometric Distributios Whe choosig the startig lie-up for a game, a coach obviously has to choose a differet player for each positio. Similarly, whe a uio elects delegates for a covetio or you

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

CHAPTER 3 DIGITAL CODING OF SIGNALS

CHAPTER 3 DIGITAL CODING OF SIGNALS CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity

More information

Convexity, Inequalities, and Norms

Convexity, Inequalities, and Norms Covexity, Iequalities, ad Norms Covex Fuctios You are probably familiar with the otio of cocavity of fuctios. Give a twicedifferetiable fuctio ϕ: R R, We say that ϕ is covex (or cocave up) if ϕ (x) 0 for

More information

Ramsey-type theorems with forbidden subgraphs

Ramsey-type theorems with forbidden subgraphs Ramsey-type theorems with forbidde subgraphs Noga Alo Jáos Pach József Solymosi Abstract A graph is called H-free if it cotais o iduced copy of H. We discuss the followig questio raised by Erdős ad Hajal.

More information

How To Solve The Homewor Problem Beautifully

How To Solve The Homewor Problem Beautifully Egieerig 33 eautiful Homewor et 3 of 7 Kuszmar roblem.5.5 large departmet store sells sport shirts i three sizes small, medium, ad large, three patters plaid, prit, ad stripe, ad two sleeve legths log

More information

Reliability Analysis in HPC clusters

Reliability Analysis in HPC clusters Reliability Aalysis i HPC clusters Narasimha Raju, Gottumukkala, Yuda Liu, Chokchai Box Leagsuksu 1, Raja Nassar, Stephe Scott 2 College of Egieerig & Sciece, Louisiaa ech Uiversity Oak Ridge Natioal Lab

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5 Sectio 13 Kolmogorov-Smirov test. Suppose that we have a i.i.d. sample X 1,..., X with some ukow distributio P ad we would like to test the hypothesis that P is equal to a particular distributio P 0, i.e.

More information

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical

More information

Overview of some probability distributions.

Overview of some probability distributions. Lecture Overview of some probability distributios. I this lecture we will review several commo distributios that will be used ofte throughtout the class. Each distributio is usually described by its probability

More information

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks The Fudametal Capacity-Delay Tradeoff i Large Mobile Ad Hoc Networks Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West Lafayette, IN 47907, U.S.A. {lix, shroff}@ec.purdue.edu

More information

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length Joural o Satisfiability, Boolea Modelig ad Computatio 1 2005) 49-60 A Faster Clause-Shorteig Algorithm for SAT with No Restrictio o Clause Legth Evgey Datsi Alexader Wolpert Departmet of Computer Sciece

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis Ruig Time ( 3.) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

MARTINGALES AND A BASIC APPLICATION

MARTINGALES AND A BASIC APPLICATION MARTINGALES AND A BASIC APPLICATION TURNER SMITH Abstract. This paper will develop the measure-theoretic approach to probability i order to preset the defiitio of martigales. From there we will apply this

More information

WHEN IS THE (CO)SINE OF A RATIONAL ANGLE EQUAL TO A RATIONAL NUMBER?

WHEN IS THE (CO)SINE OF A RATIONAL ANGLE EQUAL TO A RATIONAL NUMBER? WHEN IS THE (CO)SINE OF A RATIONAL ANGLE EQUAL TO A RATIONAL NUMBER? JÖRG JAHNEL 1. My Motivatio Some Sort of a Itroductio Last term I tought Topological Groups at the Göttige Georg August Uiversity. This

More information

A Recursive Formula for Moments of a Binomial Distribution

A Recursive Formula for Moments of a Binomial Distribution A Recursive Formula for Momets of a Biomial Distributio Árpád Béyi beyi@mathumassedu, Uiversity of Massachusetts, Amherst, MA 01003 ad Saverio M Maago smmaago@psavymil Naval Postgraduate School, Moterey,

More information

Perfect Packing Theorems and the Average-Case Behavior of Optimal and Online Bin Packing

Perfect Packing Theorems and the Average-Case Behavior of Optimal and Online Bin Packing SIAM REVIEW Vol. 44, No. 1, pp. 95 108 c 2002 Society for Idustrial ad Applied Mathematics Perfect Packig Theorems ad the Average-Case Behavior of Optimal ad Olie Bi Packig E. G. Coffma, Jr. C. Courcoubetis

More information

Lesson 17 Pearson s Correlation Coefficient

Lesson 17 Pearson s Correlation Coefficient Outlie Measures of Relatioships Pearso s Correlatio Coefficiet (r) -types of data -scatter plots -measure of directio -measure of stregth Computatio -covariatio of X ad Y -uique variatio i X ad Y -measurig

More information

Lecture 4: Cauchy sequences, Bolzano-Weierstrass, and the Squeeze theorem

Lecture 4: Cauchy sequences, Bolzano-Weierstrass, and the Squeeze theorem Lecture 4: Cauchy sequeces, Bolzao-Weierstrass, ad the Squeeze theorem The purpose of this lecture is more modest tha the previous oes. It is to state certai coditios uder which we are guarateed that limits

More information

Example 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here).

Example 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here). BEGINNING ALGEBRA Roots ad Radicals (revised summer, 00 Olso) Packet to Supplemet the Curret Textbook - Part Review of Square Roots & Irratioals (This portio ca be ay time before Part ad should mostly

More information

CS103A Handout 23 Winter 2002 February 22, 2002 Solving Recurrence Relations

CS103A Handout 23 Winter 2002 February 22, 2002 Solving Recurrence Relations CS3A Hadout 3 Witer 00 February, 00 Solvig Recurrece Relatios Itroductio A wide variety of recurrece problems occur i models. Some of these recurrece relatios ca be solved usig iteratio or some other ad

More information

Exploratory Data Analysis

Exploratory Data Analysis 1 Exploratory Data Aalysis Exploratory data aalysis is ofte the rst step i a statistical aalysis, for it helps uderstadig the mai features of the particular sample that a aalyst is usig. Itelliget descriptios

More information

Subject CT5 Contingencies Core Technical Syllabus

Subject CT5 Contingencies Core Technical Syllabus Subject CT5 Cotigecies Core Techical Syllabus for the 2015 exams 1 Jue 2014 Aim The aim of the Cotigecies subject is to provide a groudig i the mathematical techiques which ca be used to model ad value

More information

Trackless online algorithms for the server problem

Trackless online algorithms for the server problem Iformatio Processig Letters 74 (2000) 73 79 Trackless olie algorithms for the server problem Wolfgag W. Bei,LawreceL.Larmore 1 Departmet of Computer Sciece, Uiversity of Nevada, Las Vegas, NV 89154, USA

More information

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL.

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL. Auities Uder Radom Rates of Iterest II By Abraham Zas Techio I.I.T. Haifa ISRAEL ad Haifa Uiversity Haifa ISRAEL Departmet of Mathematics, Techio - Israel Istitute of Techology, 3000, Haifa, Israel I memory

More information

Plug-in martingales for testing exchangeability on-line

Plug-in martingales for testing exchangeability on-line Plug-i martigales for testig exchageability o-lie Valetia Fedorova, Alex Gammerma, Ilia Nouretdiov, ad Vladimir Vovk Computer Learig Research Cetre Royal Holloway, Uiversity of Lodo, UK {valetia,ilia,alex,vovk}@cs.rhul.ac.uk

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to

More information

Entropy of bi-capacities

Entropy of bi-capacities Etropy of bi-capacities Iva Kojadiovic LINA CNRS FRE 2729 Site école polytechique de l uiv. de Nates Rue Christia Pauc 44306 Nates, Frace iva.kojadiovic@uiv-ates.fr Jea-Luc Marichal Applied Mathematics

More information

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology Adoptio Date: 4 March 2004 Effective Date: 1 Jue 2004 Retroactive Applicatio: No Public Commet Period: Aug Nov 2002 INVESTMENT PERFORMANCE COUNCIL (IPC) Preface Guidace Statemet o Calculatio Methodology

More information

NATIONAL SENIOR CERTIFICATE GRADE 12

NATIONAL SENIOR CERTIFICATE GRADE 12 NATIONAL SENIOR CERTIFICATE GRADE MATHEMATICS P EXEMPLAR 04 MARKS: 50 TIME: 3 hours This questio paper cosists of 8 pages ad iformatio sheet. Please tur over Mathematics/P DBE/04 NSC Grade Eemplar INSTRUCTIONS

More information

Present Values, Investment Returns and Discount Rates

Present Values, Investment Returns and Discount Rates Preset Values, Ivestmet Returs ad Discout Rates Dimitry Midli, ASA, MAAA, PhD Presidet CDI Advisors LLC dmidli@cdiadvisors.com May 2, 203 Copyright 20, CDI Advisors LLC The cocept of preset value lies

More information

Chapter 5: Inner Product Spaces

Chapter 5: Inner Product Spaces Chapter 5: Ier Product Spaces Chapter 5: Ier Product Spaces SECION A Itroductio to Ier Product Spaces By the ed of this sectio you will be able to uderstad what is meat by a ier product space give examples

More information

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature. Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.

More information

1. C. The formula for the confidence interval for a population mean is: x t, which was

1. C. The formula for the confidence interval for a population mean is: x t, which was s 1. C. The formula for the cofidece iterval for a populatio mea is: x t, which was based o the sample Mea. So, x is guarateed to be i the iterval you form.. D. Use the rule : p-value

More information

Lesson 15 ANOVA (analysis of variance)

Lesson 15 ANOVA (analysis of variance) Outlie Variability -betwee group variability -withi group variability -total variability -F-ratio Computatio -sums of squares (betwee/withi/total -degrees of freedom (betwee/withi/total -mea square (betwee/withi

More information

Domain 1 - Describe Cisco VoIP Implementations

Domain 1 - Describe Cisco VoIP Implementations Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.

More information

Maximum Likelihood Estimators.

Maximum Likelihood Estimators. Lecture 2 Maximum Likelihood Estimators. Matlab example. As a motivatio, let us look at oe Matlab example. Let us geerate a radom sample of size 00 from beta distributio Beta(5, 2). We will lear the defiitio

More information

Matrix Model of Trust Management in P2P Networks

Matrix Model of Trust Management in P2P Networks Matrix Model of Trust Maagemet i P2P Networks Miroslav Novotý, Filip Zavoral Faculty of Mathematics ad Physics Charles Uiversity Prague, Czech Republic miroslav.ovoty@mff.cui.cz Abstract The trust maagemet

More information

An Efficient Polynomial Approximation of the Normal Distribution Function & Its Inverse Function

An Efficient Polynomial Approximation of the Normal Distribution Function & Its Inverse Function A Efficiet Polyomial Approximatio of the Normal Distributio Fuctio & Its Iverse Fuctio Wisto A. Richards, 1 Robi Atoie, * 1 Asho Sahai, ad 3 M. Raghuadh Acharya 1 Departmet of Mathematics & Computer Sciece;

More information

CS103X: Discrete Structures Homework 4 Solutions

CS103X: Discrete Structures Homework 4 Solutions CS103X: Discrete Structures Homewor 4 Solutios Due February 22, 2008 Exercise 1 10 poits. Silico Valley questios: a How may possible six-figure salaries i whole dollar amouts are there that cotai at least

More information

The following example will help us understand The Sampling Distribution of the Mean. C1 C2 C3 C4 C5 50 miles 84 miles 38 miles 120 miles 48 miles

The following example will help us understand The Sampling Distribution of the Mean. C1 C2 C3 C4 C5 50 miles 84 miles 38 miles 120 miles 48 miles The followig eample will help us uderstad The Samplig Distributio of the Mea Review: The populatio is the etire collectio of all idividuals or objects of iterest The sample is the portio of the populatio

More information