Two betting strategies that predict all compressible sequences
|
|
- Madison Carr
- 8 years ago
- Views:
Transcription
1 Two betting strategies that predict all compressible sequences T. Petrović Seventh International Conference on Computability, Complexity and Randomness (CCR 2012) T. Petrović Predicting compressible sequences CCR / 17
2 Outline 1 Betting Games Definition of Sequence-set Betting Comparison with Martingale Processes Comparison with Non-monotonic Betting 2 Algorithm that Constructs Two Betting Strategies T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17
3 Betting Games Sequence-set Betting Definition of Sequence-set Betting (using mass-distribution) Start with(s, m) Betting decision (S 0,m 0 ), (S 1,m 1 ) m 0 + m 1 = m λ(s 0 ) = λ(s 1 ) = 1 2 λ(s) Sequence in S 0, next is(s 0,m 0 ) otherwise start with (S 1,m 1 ) Success: capital c = m/λ(s) rises unboundedly Decision tree descrbes betting strategy T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17
4 Betting Games Sequence-set Betting Definition of Sequence-set Betting (using mass-distribution) Start with(s, m) Betting decision (S 0,m 0 ), (S 1,m 1 ) m 0 + m 1 = m λ(s 0 ) = λ(s 1 ) = 1 2 λ(s) Sequence in S 0, next is(s 0,m 0 ) otherwise start with (S 1,m 1 ) Success: capital c = m/λ(s) rises unboundedly Decision tree descrbes betting strategy T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17
5 Betting Games Comparison with Martingale Processes Martingale Processes Function d from words to reals Equivalence relation on words d v d w if for v v, w w, l(v ) = l(w ) we have d(v ) = d(w ) Fairness condition: 2 d(v) {v:v d w} = [d(v0) + d(v1)] {v:v d w} T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17
6 Betting Games Comparison with Martingale Processes Modified Sequence-set Betting Replace λ(s 0 ) = λ(s 1 ) = 1 2 λ(s) with λ(s 0 ) + λ(s 1 ) = λ(s) Betting game equivalent to martingale processes T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17
7 Betting Games Comparison with Martingale Processes Betting Strategy from Martingale Process (S,m) (V,d), V = {v : v d w} S α V α and m = d(w)λ(v ) Find v s.t. v v, d(v ) d(v) d divides V into V 1,...,V n Make according betting decisions No such v, make no further bets T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17
8 Betting Games Comparison with Martingale Processes Martingale Process from Betting Strategy (S,m) (V,d), V = {v : v d w} S α V α and m = d(w)λ(v ) Betting decision (S 0,m 0 ), (S 1,m 1 ) Find n n > l(w), n max(l(w) : w S 0 S 1 } Set d(v ) = m 0 /λ(s 0 ) for S 0 v and d(v ) = m 1 /λ(s 1 ) for S 1 v where l(v ) = n No betting decision for (S,m) Set d(v ) = d(w) for V v T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17
9 Betting Games Comparison with Non-monotonic Betting Comparison with Non-monotonic Betting Add to req. λ(s 0 ) = λ(s 1 ) = 1 2 λ(s) req. that for some n w S 0 w(n) = 0 w S 1 w(n) = 1 Betting decision (S 0,m 0 ), (S 1,m 1 ) places a bet on bit value at position n Next iteration choses different position since previously picked positions have all 0 s or all 1 s T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17
10 Betting Games Comparison with Non-monotonic Betting Unpredictable Compressible Sequence Step1:For node (S,m) wait for a bet No betting decision, strategy fails Choose node with less mass If node small enough, compress all go to Step1 T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17
11 Algorithm that Constructs Two Betting Strategies Algorithm Outline Algorithm constructs betting decision trees for strategies A and B The inputs are some word s and masses ma, mb assigned to that prefix by A and B Calculates k from (s,ma,mb) Runs UTM to enumerate first prefixes p that have inputs shorter by k For each p adds betting decisions, nodes that contain p, p p contain only one word, same in A and B, for these start a new instance of algorithm If the set of prefixes is small, betting decisions such that either A or B double capital on that prefixes T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17
12 Algorithm that Constructs Two Betting Strategies Notation Only the leaf nodes of b.d.t. that don t contain sequences on which another instance of algorithm was started are considered For each node (a i,s,m), (b j,s,m) two additional values are used Mass reserved to ensure that no node has mass 0, me The portion of size of the so far found prefixes belonging to the node L Mass ms is used for doubling the capital on compressible prefixes, mass assigned to node in b.d.t. m = ms + me Denote indexes of considered leaf nodes of A a 1,...,a x, of B b 1,...,b y (a i,s,ms,me,l) S a i,ms a i,me a i,l a i (b j,s,ms,me,l) S bj,ms bj,me bj,l bj T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17
13 Algorithm that Constructs Two Betting Strategies Initialization The input for the algorithm instance is (s,ma,mb) Set mass used for doubling the capital m = min(ma, mb)/2 Set for A S a 1 = {s}, ms a 1 = m, me a 1 = ma m, L a 1 = 0 for B S b1 = {s}, ms b1 = m, me b1 = mb m, L b1 = 0 The capital for compressible prefixes will be c = 4(ma + mb)/λ(s) set k such that 2 k < m 2 (1 cs)/2λ(s)c 2 (1 + cs) 2 The cs is some constant 0 < cs < 1, in all iterations S a i S bj = {} or λ(s)λ(s a i S bj ) is between (1 ± cs)(λ(s a i ) + L a i )(λ(s bj ) + L bj ) The construction of b.d.t. starts by running the algorithm for (ε,1,1) T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17
14 Algorithm that Constructs Two Betting Strategies Preparation Step Find next p, S a i S bj p {} If for all a i,b j S a i S bj p = {} or S a i S bj \ p = {} skip rest For nodes a i,b j make n betting decisions, 2 n new leaf nodes a ig,b jh Evenly distribute mass and L Extend words not in intersection by n, distribute them ammong leaf nodes Extend words in intersection and distribute them to have S a ig S bjh p = {} or S a ig S bjh \ p = {} If λ(s a i S bj ) = r(λ(s a i ) + L a i )(λ(s bj ) + L bj ) then λ(s a ig S bjh ) = r(λ(s a ig ) + L a ig )(λ(s bjh ) + L bjh ) T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17
15 Algorithm that Constructs Two Betting Strategies Preparation Step Find next p, S a i S bj p {} If for all a i,b j S a i S bj p = {} or S a i S bj \ p = {} skip rest For nodes a i,b j make n betting decisions, 2 n new leaf nodes a ig,b jh Evenly distribute mass and L Extend words not in intersection by n, distribute them ammong leaf nodes Extend words in intersection and distribute them to have S a ig S bjh p = {} or S a ig S bjh \ p = {} If λ(s a i S bj ) = r(λ(s a i ) + L a i )(λ(s bj ) + L bj ) then λ(s a ig S bjh ) = r(λ(s a ig ) + L a ig )(λ(s bjh ) + L bjh ) T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17
16 Algorithm that Constructs Two Betting Strategies Mass Assignment Step Pick S ai Sbj, S ai Sbj \ p = {}, assign mass d ai, dbj from ms ai, msbj d ai + dbj = cλ (S ai Sbj ) If (ms ai cλ (S ai Sbj ))/(λ (S ai ) + Lai ) msbj /(λ (Sbj ) + Lbj ) then dbj = 0 If (msbj cλ (S ai Sbj ))/(λ (Sbj ) + Lbj ) ms ai /(λ (S ai ) + Lai ) then d ai = 0 otherwise find (ms ai d ai )/(λ (S ai ) + Lai ) = (msbj dbj )/(λ (Sbj ) + Lbj ) T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17
17 Algorithm that Constructs Two Betting Strategies Betting Decisions Step Add the size of all words of a node that are extensions of p to L For nodes that contain words p 0 s.t. p p 0 add betting decisions: Leaf nodes with extensions of p contain only one word, assign mass from previous step, start another instance of the algorithm Distribute words unrelated to p ammong remaining leaf nodes. Distribute L and the remainder of mass evenly ammong the remaining leaf nodes. For the remaining nodes we have S ai Sbj = {} or λ (s)λ (S ai Sbj ) between (1 ± cs)(λ (S ai ) + Lai )(λ (Sbj ) + Lbj ) T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17
18 Algorithm that Constructs Two Betting Strategies Proof Sketch ms a i = ms a i ms a i f = λ(s) m msa i /(λ(s a i ) + L a i ) f = λ(s) m ms a i /(λ(s a i ) + L a i ) ms a i = m λ(s) (f f )(λ(s a i ) + L a i ) ms a i cλ(s a i S bj ) λ(s a i S bj ) is close to 1 λ(s) (λ(s a i ) + L a i )(λ(s bj ) + L bj ) g = λ(s) m ms b j /(λ(s bj ) + L bj ) cl bj (1 g) m λ(s) (λ(s b j ) + L bj ) Assume that g f L bj const.m 2 (1 f )(f f ) z 2 l(p i ) const.m 2 /2 2 k i=1 T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17
19 Appendix References M. Li, P. Vitanyi An Introduction to Kolmogorov Complexity and Its Applications, second edition Springer, J.M.Hitchcock, J.H. Lutz Why Computational Complexity Requires Stricter Martingales Theory of Computing Systems, W. Merkle, N. Mihailović, T.A. Slaman Some results on effective randomness Theory of Computing Systems, T. Petrović Predicting compressible sequences CCR / 17
The Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
More informationA single minimal complement for the c.e. degrees
A single minimal complement for the c.e. degrees Andrew Lewis Leeds University, April 2002 Abstract We show that there exists a single minimal (Turing) degree b < 0 s.t. for all c.e. degrees 0 < a < 0,
More informationSolutions to Homework 6
Solutions to Homework 6 Debasish Das EECS Department, Northwestern University ddas@northwestern.edu 1 Problem 5.24 We want to find light spanning trees with certain special properties. Given is one example
More informationLinear Risk Management and Optimal Selection of a Limited Number
How to build a probability-free casino Adam Chalcraft CCR La Jolla dachalc@ccrwest.org Chris Freiling Cal State San Bernardino cfreilin@csusb.edu Randall Dougherty CCR La Jolla rdough@ccrwest.org Jason
More informationLOOKING FOR A GOOD TIME TO BET
LOOKING FOR A GOOD TIME TO BET LAURENT SERLET Abstract. Suppose that the cards of a well shuffled deck of cards are turned up one after another. At any time-but once only- you may bet that the next card
More informationSingle machine models: Maximum Lateness -12- Approximation ratio for EDD for problem 1 r j,d j < 0 L max. structure of a schedule Q...
Lecture 4 Scheduling 1 Single machine models: Maximum Lateness -12- Approximation ratio for EDD for problem 1 r j,d j < 0 L max structure of a schedule 0 Q 1100 11 00 11 000 111 0 0 1 1 00 11 00 11 00
More informationKolmogorov Complexity and the Incompressibility Method
Kolmogorov Complexity and the Incompressibility Method Holger Arnold 1. Introduction. What makes one object more complex than another? Kolmogorov complexity, or program-size complexity, provides one of
More informationRoots of equation fx are the values of x which satisfy the above expression. Also referred to as the zeros of an equation
LECTURE 20 SOLVING FOR ROOTS OF NONLINEAR EQUATIONS Consider the equation f = 0 Roots of equation f are the values of which satisfy the above epression. Also referred to as the zeros of an equation f()
More informationON THE AUTOREDUCIBILITY OF RANDOM SEQUENCES
SIAM J. COMPUT. Vol. 32, No. 6, pp. 1542 1569 c 2003 Society for Industrial and Applied Mathematics ON THE AUTOREDUCIBILITY OF RANDOM SEQUENCES TODD EBERT, WOLFGANG MERKLE, AND HERIBERT VOLLMER Abstract.
More informationNetwork (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,
More information15-381: Artificial Intelligence. Probabilistic Reasoning and Inference
5-38: Artificial Intelligence robabilistic Reasoning and Inference Advantages of probabilistic reasoning Appropriate for complex, uncertain, environments - Will it rain tomorrow? Applies naturally to many
More informationFIND ALL LONGER AND SHORTER BOUNDARY DURATION VECTORS UNDER PROJECT TIME AND BUDGET CONSTRAINTS
Journal of the Operations Research Society of Japan Vol. 45, No. 3, September 2002 2002 The Operations Research Society of Japan FIND ALL LONGER AND SHORTER BOUNDARY DURATION VECTORS UNDER PROJECT TIME
More informationEXTRACTING INFORMATION IS HARD: A TURING DEGREE OF NON-INTEGRAL EFFECTIVE HAUSDORFF DIMENSION
EXTRACTING INFORMATION IS HARD: A TURING DEGREE OF NON-INTEGRAL EFFECTIVE HAUSDORFF DIMENSION JOSEPH S. MILLER Abstract. We construct a 0 2 infinite binary sequence with effective Hausdorff dimension 1/2
More informationA Catalogue of the Steiner Triple Systems of Order 19
A Catalogue of the Steiner Triple Systems of Order 19 Petteri Kaski 1, Patric R. J. Östergård 2, Olli Pottonen 2, and Lasse Kiviluoto 3 1 Helsinki Institute for Information Technology HIIT University of
More informationCOUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS
COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS Alexander Burstein Department of Mathematics Howard University Washington, DC 259, USA aburstein@howard.edu Sergey Kitaev Mathematics
More informationPROCESS AND TRUTH-TABLE CHARACTERISATIONS OF RANDOMNESS
PROCESS AND TRUTH-TABLE CHARACTERISATIONS OF RANDOMNESS ADAM R. DAY Abstract. This paper uses quick process machines to provide characterisations of computable randomness, Schnorr randomness and weak randomness.
More informationFind-The-Number. 1 Find-The-Number With Comps
Find-The-Number 1 Find-The-Number With Comps Consider the following two-person game, which we call Find-The-Number with Comps. Player A (for answerer) has a number x between 1 and 1000. Player Q (for questioner)
More informationGambling and Data Compression
Gambling and Data Compression Gambling. Horse Race Definition The wealth relative S(X) = b(x)o(x) is the factor by which the gambler s wealth grows if horse X wins the race, where b(x) is the fraction
More informationBinary Coded Web Access Pattern Tree in Education Domain
Binary Coded Web Access Pattern Tree in Education Domain C. Gomathi P.G. Department of Computer Science Kongu Arts and Science College Erode-638-107, Tamil Nadu, India E-mail: kc.gomathi@gmail.com M. Moorthi
More informationDuplicating and its Applications in Batch Scheduling
Duplicating and its Applications in Batch Scheduling Yuzhong Zhang 1 Chunsong Bai 1 Shouyang Wang 2 1 College of Operations Research and Management Sciences Qufu Normal University, Shandong 276826, China
More informationOn the shape of binary trees
On the shape of binary trees Mireille Bousquet-Mélou, CNRS, LaBRI, Bordeaux ArXiv math.co/050266 ArXiv math.pr/0500322 (with Svante Janson) http://www.labri.fr/ bousquet A complete binary tree n internal
More informationOn the Unique Games Conjecture
On the Unique Games Conjecture Antonios Angelakis National Technical University of Athens June 16, 2015 Antonios Angelakis (NTUA) Theory of Computation June 16, 2015 1 / 20 Overview 1 Introduction 2 Preliminary
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 7, July 23 ISSN: 2277 28X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Greedy Algorithm:
More informationTHE SECURITY AND PRIVACY ISSUES OF RFID SYSTEM
THE SECURITY AND PRIVACY ISSUES OF RFID SYSTEM Iuon Chang Lin Department of Management Information Systems, National Chung Hsing University, Taiwan, Department of Photonics and Communication Engineering,
More informationarxiv:1112.0829v1 [math.pr] 5 Dec 2011
How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman Thomas P. Hayes arxiv:1112.0829v1 [math.pr] 5 Dec 2011 Abstract Consider a gambling game in which we are allowed to repeatedly
More informationBasics of Counting. The product rule. Product rule example. 22C:19, Chapter 6 Hantao Zhang. Sample question. Total is 18 * 325 = 5850
Basics of Counting 22C:19, Chapter 6 Hantao Zhang 1 The product rule Also called the multiplication rule If there are n 1 ways to do task 1, and n 2 ways to do task 2 Then there are n 1 n 2 ways to do
More informationIntroduction to Scheduling Theory
Introduction to Scheduling Theory Arnaud Legrand Laboratoire Informatique et Distribution IMAG CNRS, France arnaud.legrand@imag.fr November 8, 2004 1/ 26 Outline 1 Task graphs from outer space 2 Scheduling
More informationThe Online Set Cover Problem
The Online Set Cover Problem Noga Alon Baruch Awerbuch Yossi Azar Niv Buchbinder Joseph Seffi Naor ABSTRACT Let X = {, 2,..., n} be a ground set of n elements, and let S be a family of subsets of X, S
More informationClustering UE 141 Spring 2013
Clustering UE 141 Spring 013 Jing Gao SUNY Buffalo 1 Definition of Clustering Finding groups of obects such that the obects in a group will be similar (or related) to one another and different from (or
More informationExperimental Comparison of Set Intersection Algorithms for Inverted Indexing
ITAT 213 Proceedings, CEUR Workshop Proceedings Vol. 13, pp. 58 64 http://ceur-ws.org/vol-13, Series ISSN 1613-73, c 213 V. Boža Experimental Comparison of Set Intersection Algorithms for Inverted Indexing
More informationScheduling Shop Scheduling. Tim Nieberg
Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations
More informationSet operations and Venn Diagrams. COPYRIGHT 2006 by LAVON B. PAGE
Set operations and Venn Diagrams Set operations and Venn diagrams! = { x x " and x " } This is the intersection of and. # = { x x " or x " } This is the union of and. n element of! belongs to both and,
More informationWeek 5: Expected value and Betting systems
Week 5: Expected value and Betting systems Random variable A random variable represents a measurement in a random experiment. We usually denote random variable with capital letter X, Y,. If S is the sample
More informationOn the k-path cover problem for cacti
On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China zeminjin@eyou.com, x.li@eyou.com Abstract In this paper we
More information2. FINDING A SOLUTION
The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS
More informationMerkle Hash Trees for Distributed Audit Logs
Merkle Hash Trees for Distributed Audit Logs Subject proposed by Karthikeyan Bhargavan Karthikeyan.Bhargavan@inria.fr April 7, 2015 Modern distributed systems spread their databases across a large number
More informationLempel-Ziv Coding Adaptive Dictionary Compression Algorithm
Lempel-Ziv Coding Adaptive Dictionary Compression Algorithm 1. LZ77:Sliding Window Lempel-Ziv Algorithm [gzip, pkzip] Encode a string by finding the longest match anywhere within a window of past symbols
More informationIT:101 Cisco Networking Academy I Subnetting
IT:101 Cisco Networking Academy I Subnetting The IPv4 address is 32 bits long and it is written in the form of dotted decimal notation. IP address in binary format: 11000000.00000001.00000001.00000020
More information2016 EARLY INVESTIGATOR GRANT APPLICATION TITLE PAGE
TITLE PAGE Principal Investigator, Degree: Division: Address: City/State/Zip/Country: Phone: Email: Institution Address: City/State/Zip/Country: Phone: Email: Title of Proposed Project: Amount of Funding
More informationSan Fermín: Aggregating Large Data Sets using a Binomial Swap Forest
San Fermín: Aggregating Large Data Sets using a Binomial Swap Forest Justin Cappos and John H. Hartman Department of Computer Science, University of Arizona Abstract San Fermín is a system for aggregating
More informationClass Notes CS 3137. 1 Creating and Using a Huffman Code. Ref: Weiss, page 433
Class Notes CS 3137 1 Creating and Using a Huffman Code. Ref: Weiss, page 433 1. FIXED LENGTH CODES: Codes are used to transmit characters over data links. You are probably aware of the ASCII code, a fixed-length
More information24. The Branch and Bound Method
24. The Branch and Bound Method It has serious practical consequences if it is known that a combinatorial problem is NP-complete. Then one can conclude according to the present state of science that no
More informationHow To Find An Optimal Search Protocol For An Oblivious Cell
The Conference Call Search Problem in Wireless Networks Leah Epstein 1, and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. lea@math.haifa.ac.il 2 Department of Statistics,
More informationArtificial Intelligence Beating Human Opponents in Poker
Artificial Intelligence Beating Human Opponents in Poker Stephen Bozak University of Rochester Independent Research Project May 8, 26 Abstract In the popular Poker game, Texas Hold Em, there are never
More informationCost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation:
CSE341T 08/31/2015 Lecture 3 Cost Model: Work, Span and Parallelism In this lecture, we will look at how one analyze a parallel program written using Cilk Plus. When we analyze the cost of an algorithm
More information10CS35: Data Structures Using C
CS35: Data Structures Using C QUESTION BANK REVIEW OF STRUCTURES AND POINTERS, INTRODUCTION TO SPECIAL FEATURES OF C OBJECTIVE: Learn : Usage of structures, unions - a conventional tool for handling a
More informationInformation Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding
More informationThe Domain Name System (DNS)
The Domain Name System (DNS) Each Internet host is assigned a host name and an IP address Host names are structured character strings, e.g., www.cs.iastate.edu IP addresses are 32 bit integers, e.g., 129.186.3.6
More informationEMBEDDING COUNTABLE PARTIAL ORDERINGS IN THE DEGREES
EMBEDDING COUNTABLE PARTIAL ORDERINGS IN THE ENUMERATION DEGREES AND THE ω-enumeration DEGREES MARIYA I. SOSKOVA AND IVAN N. SOSKOV 1. Introduction One of the most basic measures of the complexity of a
More informationA Non-Linear Schema Theorem for Genetic Algorithms
A Non-Linear Schema Theorem for Genetic Algorithms William A Greene Computer Science Department University of New Orleans New Orleans, LA 70148 bill@csunoedu 504-280-6755 Abstract We generalize Holland
More informationLecture 2: Universality
CS 710: Complexity Theory 1/21/2010 Lecture 2: Universality Instructor: Dieter van Melkebeek Scribe: Tyson Williams In this lecture, we introduce the notion of a universal machine, develop efficient universal
More informationLecture 5 - CPA security, Pseudorandom functions
Lecture 5 - CPA security, Pseudorandom functions Boaz Barak October 2, 2007 Reading Pages 82 93 and 221 225 of KL (sections 3.5, 3.6.1, 3.6.2 and 6.5). See also Goldreich (Vol I) for proof of PRF construction.
More informationEchidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Abdun Mahmood, Christopher Leckie, Parampalli Udaya Department of Computer Science and Software Engineering University of
More informationNotes from Week 1: Algorithms for sequential prediction
CS 683 Learning, Games, and Electronic Markets Spring 2007 Notes from Week 1: Algorithms for sequential prediction Instructor: Robert Kleinberg 22-26 Jan 2007 1 Introduction In this course we will be looking
More informationClass notes Program Analysis course given by Prof. Mooly Sagiv Computer Science Department, Tel Aviv University second lecture 8/3/2007
Constant Propagation Class notes Program Analysis course given by Prof. Mooly Sagiv Computer Science Department, Tel Aviv University second lecture 8/3/2007 Osnat Minz and Mati Shomrat Introduction This
More informationA Network Flow Approach in Cloud Computing
1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges
More informationConnecting Transformational Geometry and Transformations of Functions
Connecting Transformational Geometr and Transformations of Functions Introductor Statements and Assumptions Isometries are rigid transformations that preserve distance and angles and therefore shapes.
More informationE S T A D O D O C E A R Á P R E F E I T U R A M U N I C I P A L D E C R U Z C Â M A R A M U N I C I P A L D E C R U Z
C O N C U R S O P Ú B L I C O E D I T A L N º 0 0 1 / 2 0 1 2 D i s p õ e s o b r e C o n c u r s o P ú b l i c o p a r a p r o v i m e n t o c a r g o s e v a g a s d a P r e f e i t u r a M u n i c i
More informationFairness in Routing and Load Balancing
Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria
More informationTHE SEARCH FOR NATURAL DEFINABILITY IN THE TURING DEGREES
THE SEARCH FOR NATURAL DEFINABILITY IN THE TURING DEGREES ANDREW E.M. LEWIS 1. Introduction This will be a course on the Turing degrees. We shall assume very little background knowledge: familiarity with
More informationP R E F E I T U R A M U N I C I P A L D E J A R D I M
D E P A R T A M E N T O D E C O M P R A S E L I C I T A O A U T O R I Z A O P A R A R E A L I Z A O D E C E R T A M E L I C I T A T с R I O M O D A L I D A D E P R E G O P R E S E N C I A L N 034/ 2 0
More informationDecision Theory. 36.1 Rational prospecting
36 Decision Theory Decision theory is trivial, apart from computational details (just like playing chess!). You have a choice of various actions, a. The world may be in one of many states x; which one
More informationInformation Models, Data Models, and YANG. IETF 86, Orlando, 2013-03-14
Information Models, Data Models, and YANG Jürgen Schönwälder IETF 86, Orlando, 2013-03-14 1 / 12 Information Models (RFC 3444) Information Models are used to model managed objects at a conceptual level,
More information1 Approximating Set Cover
CS 05: Algorithms (Grad) Feb 2-24, 2005 Approximating Set Cover. Definition An Instance (X, F ) of the set-covering problem consists of a finite set X and a family F of subset of X, such that every elemennt
More informationHydrodynamic Limits of Randomized Load Balancing Networks
Hydrodynamic Limits of Randomized Load Balancing Networks Kavita Ramanan and Mohammadreza Aghajani Brown University Stochastic Networks and Stochastic Geometry a conference in honour of François Baccelli
More informationMinimizing the Number of Machines in a Unit-Time Scheduling Problem
Minimizing the Number of Machines in a Unit-Time Scheduling Problem Svetlana A. Kravchenko 1 United Institute of Informatics Problems, Surganova St. 6, 220012 Minsk, Belarus kravch@newman.bas-net.by Frank
More informationSARTRE: System Overview
SARTRE: System Overview A Case-Based Agent for Two-Player Texas Hold em Jonathan Rubin and Ian Watson Department of Computer Science University of Auckland, New Zealand jrub001@aucklanduni.ac.nz, ian@cs.auckland.ac.nz
More informationPolarization codes and the rate of polarization
Polarization codes and the rate of polarization Erdal Arıkan, Emre Telatar Bilkent U., EPFL Sept 10, 2008 Channel Polarization Given a binary input DMC W, i.i.d. uniformly distributed inputs (X 1,...,
More informationObject Oriented Programming. Risk Management
Section V: Object Oriented Programming Risk Management In theory, there is no difference between theory and practice. But, in practice, there is. - Jan van de Snepscheut 427 Chapter 21: Unified Modeling
More informationProfessional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008
Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report
More informationBinary Trees and Huffman Encoding Binary Search Trees
Binary Trees and Huffman Encoding Binary Search Trees Computer Science E119 Harvard Extension School Fall 2012 David G. Sullivan, Ph.D. Motivation: Maintaining a Sorted Collection of Data A data dictionary
More informationissuitableforexecutiononasynchronous,tightly-coupledparallelmachine,suchasasuper-scalaror 1Introduction
UniversityofCalifornia,Berkeley email:aiken@cs.berkeley.edu ComputerScienceDivision Berkeley,CA94720-1776 AlexanderAiken Resource-ConstrainedSoftwarePipelining DepartmentofInformationandComputerScience
More information9th Max-Planck Advanced Course on the Foundations of Computer Science (ADFOCS) Primal-Dual Algorithms for Online Optimization: Lecture 1
9th Max-Planck Advanced Course on the Foundations of Computer Science (ADFOCS) Primal-Dual Algorithms for Online Optimization: Lecture 1 Seffi Naor Computer Science Dept. Technion Haifa, Israel Introduction
More informationInformation, Entropy, and Coding
Chapter 8 Information, Entropy, and Coding 8. The Need for Data Compression To motivate the material in this chapter, we first consider various data sources and some estimates for the amount of data associated
More informationAPPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID.
APPENDIX B IP Subnetting IP Addressing Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. IP Classes An IP address is
More informationOptions pricing in discrete systems
UNIVERZA V LJUBLJANI, FAKULTETA ZA MATEMATIKO IN FIZIKO Options pricing in discrete systems Seminar II Mentor: prof. Dr. Mihael Perman Author: Gorazd Gotovac //2008 Abstract This paper is a basic introduction
More informationLecture 13: Martingales
Lecture 13: Martingales 1. Definition of a Martingale 1.1 Filtrations 1.2 Definition of a martingale and its basic properties 1.3 Sums of independent random variables and related models 1.4 Products of
More informationThe Structure of Galois Algebras
The Structure of Galois Algebras George Szeto Department of Mathematics, Bradley University Peoria, Illinois 61625 { U.S.A. Email: szeto@hilltop.bradley.edu and Lianyong Xue Department of Mathematics,
More informationDigital Signatures. What are Signature Schemes?
Digital Signatures Debdeep Mukhopadhyay IIT Kharagpur What are Signature Schemes? Provides message integrity in the public key setting Counter-parts of the message authentication schemes in the public
More informationcomp4620/8620: Advanced Topics in AI Foundations of Artificial Intelligence
comp4620/8620: Advanced Topics in AI Foundations of Artificial Intelligence Marcus Hutter Australian National University Canberra, ACT, 0200, Australia http://www.hutter1.net/ ANU Foundations of Artificial
More informationReinforcement Learning
Reinforcement Learning LU 2 - Markov Decision Problems and Dynamic Programming Dr. Martin Lauer AG Maschinelles Lernen und Natürlichsprachliche Systeme Albert-Ludwigs-Universität Freiburg martin.lauer@kit.edu
More informationMASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES Contents 1. Random variables and measurable functions 2. Cumulative distribution functions 3. Discrete
More informationRN-Codings: New Insights and Some Applications
RN-Codings: New Insights and Some Applications Abstract During any composite computation there is a constant need for rounding intermediate results before they can participate in further processing. Recently
More informationMulti-layer Structure of Data Center Based on Steiner Triple System
Journal of Computational Information Systems 9: 11 (2013) 4371 4378 Available at http://www.jofcis.com Multi-layer Structure of Data Center Based on Steiner Triple System Jianfei ZHANG 1, Zhiyi FANG 1,
More informationWeek 4: Gambler s ruin and bold play
Week 4: Gambler s ruin and bold play Random walk and Gambler s ruin. Imagine a walker moving along a line. At every unit of time, he makes a step left or right of exactly one of unit. So we can think that
More informationStateful Inspection Firewall Session Table Processing
International Journal of Information Technology, Vol. 11 No. 2 Xin Li, ZhenZhou Ji, and MingZeng Hu School of Computer Science and Technology Harbin Institute of Technology 92 West Da Zhi St. Harbin, China
More informationColegio del mundo IB. Programa Diploma REPASO 2. 1. The mass m kg of a radio-active substance at time t hours is given by. m = 4e 0.2t.
REPASO. The mass m kg of a radio-active substance at time t hours is given b m = 4e 0.t. Write down the initial mass. The mass is reduced to.5 kg. How long does this take?. The function f is given b f()
More informationDiscrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 10
CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 10 Introduction to Discrete Probability Probability theory has its origins in gambling analyzing card games, dice,
More informationReinforcement Learning
Reinforcement Learning LU 2 - Markov Decision Problems and Dynamic Programming Dr. Joschka Bödecker AG Maschinelles Lernen und Natürlichsprachliche Systeme Albert-Ludwigs-Universität Freiburg jboedeck@informatik.uni-freiburg.de
More informationWald s Identity. by Jeffery Hein. Dartmouth College, Math 100
Wald s Identity by Jeffery Hein Dartmouth College, Math 100 1. Introduction Given random variables X 1, X 2, X 3,... with common finite mean and a stopping rule τ which may depend upon the given sequence,
More informationLecture 13: Factoring Integers
CS 880: Quantum Information Processing 0/4/0 Lecture 3: Factoring Integers Instructor: Dieter van Melkebeek Scribe: Mark Wellons In this lecture, we review order finding and use this to develop a method
More informationMAC Sublayer. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross
MAC Sublayer Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross Collision-Free Protocols v N Stations v Each programmed with a unique address: 0-(N-1). v Propagation
More informationMining Social Network Graphs
Mining Social Network Graphs Debapriyo Majumdar Data Mining Fall 2014 Indian Statistical Institute Kolkata November 13, 17, 2014 Social Network No introduc+on required Really? We s7ll need to understand
More informationSo, how do you pronounce. Jilles Vreeken. Okay, now we can talk. So, what kind of data? binary. * multi-relational
Simply Mining Data Jilles Vreeken So, how do you pronounce Exploratory Data Analysis Jilles Vreeken Jilles Yill less Vreeken Fray can 17 August 2015 Okay, now we can talk. 17 August 2015 The goal So, what
More informationApproximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
More informationVEHICLE ROUTING AND SCHEDULING PROBLEMS: A CASE STUDY OF FOOD DISTRIBUTION IN GREATER BANGKOK. Kuladej Panapinun and Peerayuth Charnsethikul.
1 VEHICLE ROUTING AND SCHEDULING PROBLEMS: A CASE STUDY OF FOOD DISTRIBUTION IN GREATER BANGKOK By Kuladej Panapinun and Peerayuth Charnsethikul Abstract Vehicle routing problem (VRP) and its extension
More information1 Introduction. Dr. T. Srinivas Department of Mathematics Kakatiya University Warangal 506009, AP, INDIA tsrinivasku@gmail.com
A New Allgoriitthm for Miiniimum Costt Liinkiing M. Sreenivas Alluri Institute of Management Sciences Hanamkonda 506001, AP, INDIA allurimaster@gmail.com Dr. T. Srinivas Department of Mathematics Kakatiya
More informationLess naive Bayes spam detection
Less naive Bayes spam detection Hongming Yang Eindhoven University of Technology Dept. EE, Rm PT 3.27, P.O.Box 53, 5600MB Eindhoven The Netherlands. E-mail:h.m.yang@tue.nl also CoSiNe Connectivity Systems
More informationStationary random graphs on Z with prescribed iid degrees and finite mean connections
Stationary random graphs on Z with prescribed iid degrees and finite mean connections Maria Deijfen Johan Jonasson February 2006 Abstract Let F be a probability distribution with support on the non-negative
More information