Two betting strategies that predict all compressible sequences

Size: px
Start display at page:

Download "Two betting strategies that predict all compressible sequences"

Transcription

1 Two betting strategies that predict all compressible sequences T. Petrović Seventh International Conference on Computability, Complexity and Randomness (CCR 2012) T. Petrović Predicting compressible sequences CCR / 17

2 Outline 1 Betting Games Definition of Sequence-set Betting Comparison with Martingale Processes Comparison with Non-monotonic Betting 2 Algorithm that Constructs Two Betting Strategies T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17

3 Betting Games Sequence-set Betting Definition of Sequence-set Betting (using mass-distribution) Start with(s, m) Betting decision (S 0,m 0 ), (S 1,m 1 ) m 0 + m 1 = m λ(s 0 ) = λ(s 1 ) = 1 2 λ(s) Sequence in S 0, next is(s 0,m 0 ) otherwise start with (S 1,m 1 ) Success: capital c = m/λ(s) rises unboundedly Decision tree descrbes betting strategy T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17

4 Betting Games Sequence-set Betting Definition of Sequence-set Betting (using mass-distribution) Start with(s, m) Betting decision (S 0,m 0 ), (S 1,m 1 ) m 0 + m 1 = m λ(s 0 ) = λ(s 1 ) = 1 2 λ(s) Sequence in S 0, next is(s 0,m 0 ) otherwise start with (S 1,m 1 ) Success: capital c = m/λ(s) rises unboundedly Decision tree descrbes betting strategy T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17

5 Betting Games Comparison with Martingale Processes Martingale Processes Function d from words to reals Equivalence relation on words d v d w if for v v, w w, l(v ) = l(w ) we have d(v ) = d(w ) Fairness condition: 2 d(v) {v:v d w} = [d(v0) + d(v1)] {v:v d w} T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17

6 Betting Games Comparison with Martingale Processes Modified Sequence-set Betting Replace λ(s 0 ) = λ(s 1 ) = 1 2 λ(s) with λ(s 0 ) + λ(s 1 ) = λ(s) Betting game equivalent to martingale processes T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17

7 Betting Games Comparison with Martingale Processes Betting Strategy from Martingale Process (S,m) (V,d), V = {v : v d w} S α V α and m = d(w)λ(v ) Find v s.t. v v, d(v ) d(v) d divides V into V 1,...,V n Make according betting decisions No such v, make no further bets T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17

8 Betting Games Comparison with Martingale Processes Martingale Process from Betting Strategy (S,m) (V,d), V = {v : v d w} S α V α and m = d(w)λ(v ) Betting decision (S 0,m 0 ), (S 1,m 1 ) Find n n > l(w), n max(l(w) : w S 0 S 1 } Set d(v ) = m 0 /λ(s 0 ) for S 0 v and d(v ) = m 1 /λ(s 1 ) for S 1 v where l(v ) = n No betting decision for (S,m) Set d(v ) = d(w) for V v T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17

9 Betting Games Comparison with Non-monotonic Betting Comparison with Non-monotonic Betting Add to req. λ(s 0 ) = λ(s 1 ) = 1 2 λ(s) req. that for some n w S 0 w(n) = 0 w S 1 w(n) = 1 Betting decision (S 0,m 0 ), (S 1,m 1 ) places a bet on bit value at position n Next iteration choses different position since previously picked positions have all 0 s or all 1 s T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17

10 Betting Games Comparison with Non-monotonic Betting Unpredictable Compressible Sequence Step1:For node (S,m) wait for a bet No betting decision, strategy fails Choose node with less mass If node small enough, compress all go to Step1 T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17

11 Algorithm that Constructs Two Betting Strategies Algorithm Outline Algorithm constructs betting decision trees for strategies A and B The inputs are some word s and masses ma, mb assigned to that prefix by A and B Calculates k from (s,ma,mb) Runs UTM to enumerate first prefixes p that have inputs shorter by k For each p adds betting decisions, nodes that contain p, p p contain only one word, same in A and B, for these start a new instance of algorithm If the set of prefixes is small, betting decisions such that either A or B double capital on that prefixes T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17

12 Algorithm that Constructs Two Betting Strategies Notation Only the leaf nodes of b.d.t. that don t contain sequences on which another instance of algorithm was started are considered For each node (a i,s,m), (b j,s,m) two additional values are used Mass reserved to ensure that no node has mass 0, me The portion of size of the so far found prefixes belonging to the node L Mass ms is used for doubling the capital on compressible prefixes, mass assigned to node in b.d.t. m = ms + me Denote indexes of considered leaf nodes of A a 1,...,a x, of B b 1,...,b y (a i,s,ms,me,l) S a i,ms a i,me a i,l a i (b j,s,ms,me,l) S bj,ms bj,me bj,l bj T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17

13 Algorithm that Constructs Two Betting Strategies Initialization The input for the algorithm instance is (s,ma,mb) Set mass used for doubling the capital m = min(ma, mb)/2 Set for A S a 1 = {s}, ms a 1 = m, me a 1 = ma m, L a 1 = 0 for B S b1 = {s}, ms b1 = m, me b1 = mb m, L b1 = 0 The capital for compressible prefixes will be c = 4(ma + mb)/λ(s) set k such that 2 k < m 2 (1 cs)/2λ(s)c 2 (1 + cs) 2 The cs is some constant 0 < cs < 1, in all iterations S a i S bj = {} or λ(s)λ(s a i S bj ) is between (1 ± cs)(λ(s a i ) + L a i )(λ(s bj ) + L bj ) The construction of b.d.t. starts by running the algorithm for (ε,1,1) T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17

14 Algorithm that Constructs Two Betting Strategies Preparation Step Find next p, S a i S bj p {} If for all a i,b j S a i S bj p = {} or S a i S bj \ p = {} skip rest For nodes a i,b j make n betting decisions, 2 n new leaf nodes a ig,b jh Evenly distribute mass and L Extend words not in intersection by n, distribute them ammong leaf nodes Extend words in intersection and distribute them to have S a ig S bjh p = {} or S a ig S bjh \ p = {} If λ(s a i S bj ) = r(λ(s a i ) + L a i )(λ(s bj ) + L bj ) then λ(s a ig S bjh ) = r(λ(s a ig ) + L a ig )(λ(s bjh ) + L bjh ) T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17

15 Algorithm that Constructs Two Betting Strategies Preparation Step Find next p, S a i S bj p {} If for all a i,b j S a i S bj p = {} or S a i S bj \ p = {} skip rest For nodes a i,b j make n betting decisions, 2 n new leaf nodes a ig,b jh Evenly distribute mass and L Extend words not in intersection by n, distribute them ammong leaf nodes Extend words in intersection and distribute them to have S a ig S bjh p = {} or S a ig S bjh \ p = {} If λ(s a i S bj ) = r(λ(s a i ) + L a i )(λ(s bj ) + L bj ) then λ(s a ig S bjh ) = r(λ(s a ig ) + L a ig )(λ(s bjh ) + L bjh ) T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17

16 Algorithm that Constructs Two Betting Strategies Mass Assignment Step Pick S ai Sbj, S ai Sbj \ p = {}, assign mass d ai, dbj from ms ai, msbj d ai + dbj = cλ (S ai Sbj ) If (ms ai cλ (S ai Sbj ))/(λ (S ai ) + Lai ) msbj /(λ (Sbj ) + Lbj ) then dbj = 0 If (msbj cλ (S ai Sbj ))/(λ (Sbj ) + Lbj ) ms ai /(λ (S ai ) + Lai ) then d ai = 0 otherwise find (ms ai d ai )/(λ (S ai ) + Lai ) = (msbj dbj )/(λ (Sbj ) + Lbj ) T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17

17 Algorithm that Constructs Two Betting Strategies Betting Decisions Step Add the size of all words of a node that are extensions of p to L For nodes that contain words p 0 s.t. p p 0 add betting decisions: Leaf nodes with extensions of p contain only one word, assign mass from previous step, start another instance of the algorithm Distribute words unrelated to p ammong remaining leaf nodes. Distribute L and the remainder of mass evenly ammong the remaining leaf nodes. For the remaining nodes we have S ai Sbj = {} or λ (s)λ (S ai Sbj ) between (1 ± cs)(λ (S ai ) + Lai )(λ (Sbj ) + Lbj ) T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17

18 Algorithm that Constructs Two Betting Strategies Proof Sketch ms a i = ms a i ms a i f = λ(s) m msa i /(λ(s a i ) + L a i ) f = λ(s) m ms a i /(λ(s a i ) + L a i ) ms a i = m λ(s) (f f )(λ(s a i ) + L a i ) ms a i cλ(s a i S bj ) λ(s a i S bj ) is close to 1 λ(s) (λ(s a i ) + L a i )(λ(s bj ) + L bj ) g = λ(s) m ms b j /(λ(s bj ) + L bj ) cl bj (1 g) m λ(s) (λ(s b j ) + L bj ) Assume that g f L bj const.m 2 (1 f )(f f ) z 2 l(p i ) const.m 2 /2 2 k i=1 T. Petrović (tomeepx@gmail.com) Predicting compressible sequences CCR / 17

19 Appendix References M. Li, P. Vitanyi An Introduction to Kolmogorov Complexity and Its Applications, second edition Springer, J.M.Hitchcock, J.H. Lutz Why Computational Complexity Requires Stricter Martingales Theory of Computing Systems, W. Merkle, N. Mihailović, T.A. Slaman Some results on effective randomness Theory of Computing Systems, T. Petrović Predicting compressible sequences CCR / 17

The Goldberg Rao Algorithm for the Maximum Flow Problem

The Goldberg Rao Algorithm for the Maximum Flow Problem The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }

More information

A single minimal complement for the c.e. degrees

A single minimal complement for the c.e. degrees A single minimal complement for the c.e. degrees Andrew Lewis Leeds University, April 2002 Abstract We show that there exists a single minimal (Turing) degree b < 0 s.t. for all c.e. degrees 0 < a < 0,

More information

Solutions to Homework 6

Solutions to Homework 6 Solutions to Homework 6 Debasish Das EECS Department, Northwestern University ddas@northwestern.edu 1 Problem 5.24 We want to find light spanning trees with certain special properties. Given is one example

More information

Linear Risk Management and Optimal Selection of a Limited Number

Linear Risk Management and Optimal Selection of a Limited Number How to build a probability-free casino Adam Chalcraft CCR La Jolla dachalc@ccrwest.org Chris Freiling Cal State San Bernardino cfreilin@csusb.edu Randall Dougherty CCR La Jolla rdough@ccrwest.org Jason

More information

LOOKING FOR A GOOD TIME TO BET

LOOKING FOR A GOOD TIME TO BET LOOKING FOR A GOOD TIME TO BET LAURENT SERLET Abstract. Suppose that the cards of a well shuffled deck of cards are turned up one after another. At any time-but once only- you may bet that the next card

More information

Single machine models: Maximum Lateness -12- Approximation ratio for EDD for problem 1 r j,d j < 0 L max. structure of a schedule Q...

Single machine models: Maximum Lateness -12- Approximation ratio for EDD for problem 1 r j,d j < 0 L max. structure of a schedule Q... Lecture 4 Scheduling 1 Single machine models: Maximum Lateness -12- Approximation ratio for EDD for problem 1 r j,d j < 0 L max structure of a schedule 0 Q 1100 11 00 11 000 111 0 0 1 1 00 11 00 11 00

More information

Kolmogorov Complexity and the Incompressibility Method

Kolmogorov Complexity and the Incompressibility Method Kolmogorov Complexity and the Incompressibility Method Holger Arnold 1. Introduction. What makes one object more complex than another? Kolmogorov complexity, or program-size complexity, provides one of

More information

Roots of equation fx are the values of x which satisfy the above expression. Also referred to as the zeros of an equation

Roots of equation fx are the values of x which satisfy the above expression. Also referred to as the zeros of an equation LECTURE 20 SOLVING FOR ROOTS OF NONLINEAR EQUATIONS Consider the equation f = 0 Roots of equation f are the values of which satisfy the above epression. Also referred to as the zeros of an equation f()

More information

ON THE AUTOREDUCIBILITY OF RANDOM SEQUENCES

ON THE AUTOREDUCIBILITY OF RANDOM SEQUENCES SIAM J. COMPUT. Vol. 32, No. 6, pp. 1542 1569 c 2003 Society for Industrial and Applied Mathematics ON THE AUTOREDUCIBILITY OF RANDOM SEQUENCES TODD EBERT, WOLFGANG MERKLE, AND HERIBERT VOLLMER Abstract.

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

15-381: Artificial Intelligence. Probabilistic Reasoning and Inference

15-381: Artificial Intelligence. Probabilistic Reasoning and Inference 5-38: Artificial Intelligence robabilistic Reasoning and Inference Advantages of probabilistic reasoning Appropriate for complex, uncertain, environments - Will it rain tomorrow? Applies naturally to many

More information

FIND ALL LONGER AND SHORTER BOUNDARY DURATION VECTORS UNDER PROJECT TIME AND BUDGET CONSTRAINTS

FIND ALL LONGER AND SHORTER BOUNDARY DURATION VECTORS UNDER PROJECT TIME AND BUDGET CONSTRAINTS Journal of the Operations Research Society of Japan Vol. 45, No. 3, September 2002 2002 The Operations Research Society of Japan FIND ALL LONGER AND SHORTER BOUNDARY DURATION VECTORS UNDER PROJECT TIME

More information

EXTRACTING INFORMATION IS HARD: A TURING DEGREE OF NON-INTEGRAL EFFECTIVE HAUSDORFF DIMENSION

EXTRACTING INFORMATION IS HARD: A TURING DEGREE OF NON-INTEGRAL EFFECTIVE HAUSDORFF DIMENSION EXTRACTING INFORMATION IS HARD: A TURING DEGREE OF NON-INTEGRAL EFFECTIVE HAUSDORFF DIMENSION JOSEPH S. MILLER Abstract. We construct a 0 2 infinite binary sequence with effective Hausdorff dimension 1/2

More information

A Catalogue of the Steiner Triple Systems of Order 19

A Catalogue of the Steiner Triple Systems of Order 19 A Catalogue of the Steiner Triple Systems of Order 19 Petteri Kaski 1, Patric R. J. Östergård 2, Olli Pottonen 2, and Lasse Kiviluoto 3 1 Helsinki Institute for Information Technology HIIT University of

More information

COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS

COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS Alexander Burstein Department of Mathematics Howard University Washington, DC 259, USA aburstein@howard.edu Sergey Kitaev Mathematics

More information

PROCESS AND TRUTH-TABLE CHARACTERISATIONS OF RANDOMNESS

PROCESS AND TRUTH-TABLE CHARACTERISATIONS OF RANDOMNESS PROCESS AND TRUTH-TABLE CHARACTERISATIONS OF RANDOMNESS ADAM R. DAY Abstract. This paper uses quick process machines to provide characterisations of computable randomness, Schnorr randomness and weak randomness.

More information

Find-The-Number. 1 Find-The-Number With Comps

Find-The-Number. 1 Find-The-Number With Comps Find-The-Number 1 Find-The-Number With Comps Consider the following two-person game, which we call Find-The-Number with Comps. Player A (for answerer) has a number x between 1 and 1000. Player Q (for questioner)

More information

Gambling and Data Compression

Gambling and Data Compression Gambling and Data Compression Gambling. Horse Race Definition The wealth relative S(X) = b(x)o(x) is the factor by which the gambler s wealth grows if horse X wins the race, where b(x) is the fraction

More information

Binary Coded Web Access Pattern Tree in Education Domain

Binary Coded Web Access Pattern Tree in Education Domain Binary Coded Web Access Pattern Tree in Education Domain C. Gomathi P.G. Department of Computer Science Kongu Arts and Science College Erode-638-107, Tamil Nadu, India E-mail: kc.gomathi@gmail.com M. Moorthi

More information

Duplicating and its Applications in Batch Scheduling

Duplicating and its Applications in Batch Scheduling Duplicating and its Applications in Batch Scheduling Yuzhong Zhang 1 Chunsong Bai 1 Shouyang Wang 2 1 College of Operations Research and Management Sciences Qufu Normal University, Shandong 276826, China

More information

On the shape of binary trees

On the shape of binary trees On the shape of binary trees Mireille Bousquet-Mélou, CNRS, LaBRI, Bordeaux ArXiv math.co/050266 ArXiv math.pr/0500322 (with Svante Janson) http://www.labri.fr/ bousquet A complete binary tree n internal

More information

On the Unique Games Conjecture

On the Unique Games Conjecture On the Unique Games Conjecture Antonios Angelakis National Technical University of Athens June 16, 2015 Antonios Angelakis (NTUA) Theory of Computation June 16, 2015 1 / 20 Overview 1 Introduction 2 Preliminary

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 7, July 23 ISSN: 2277 28X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Greedy Algorithm:

More information

THE SECURITY AND PRIVACY ISSUES OF RFID SYSTEM

THE SECURITY AND PRIVACY ISSUES OF RFID SYSTEM THE SECURITY AND PRIVACY ISSUES OF RFID SYSTEM Iuon Chang Lin Department of Management Information Systems, National Chung Hsing University, Taiwan, Department of Photonics and Communication Engineering,

More information

arxiv:1112.0829v1 [math.pr] 5 Dec 2011

arxiv:1112.0829v1 [math.pr] 5 Dec 2011 How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman Thomas P. Hayes arxiv:1112.0829v1 [math.pr] 5 Dec 2011 Abstract Consider a gambling game in which we are allowed to repeatedly

More information

Basics of Counting. The product rule. Product rule example. 22C:19, Chapter 6 Hantao Zhang. Sample question. Total is 18 * 325 = 5850

Basics of Counting. The product rule. Product rule example. 22C:19, Chapter 6 Hantao Zhang. Sample question. Total is 18 * 325 = 5850 Basics of Counting 22C:19, Chapter 6 Hantao Zhang 1 The product rule Also called the multiplication rule If there are n 1 ways to do task 1, and n 2 ways to do task 2 Then there are n 1 n 2 ways to do

More information

Introduction to Scheduling Theory

Introduction to Scheduling Theory Introduction to Scheduling Theory Arnaud Legrand Laboratoire Informatique et Distribution IMAG CNRS, France arnaud.legrand@imag.fr November 8, 2004 1/ 26 Outline 1 Task graphs from outer space 2 Scheduling

More information

The Online Set Cover Problem

The Online Set Cover Problem The Online Set Cover Problem Noga Alon Baruch Awerbuch Yossi Azar Niv Buchbinder Joseph Seffi Naor ABSTRACT Let X = {, 2,..., n} be a ground set of n elements, and let S be a family of subsets of X, S

More information

Clustering UE 141 Spring 2013

Clustering UE 141 Spring 2013 Clustering UE 141 Spring 013 Jing Gao SUNY Buffalo 1 Definition of Clustering Finding groups of obects such that the obects in a group will be similar (or related) to one another and different from (or

More information

Experimental Comparison of Set Intersection Algorithms for Inverted Indexing

Experimental Comparison of Set Intersection Algorithms for Inverted Indexing ITAT 213 Proceedings, CEUR Workshop Proceedings Vol. 13, pp. 58 64 http://ceur-ws.org/vol-13, Series ISSN 1613-73, c 213 V. Boža Experimental Comparison of Set Intersection Algorithms for Inverted Indexing

More information

Scheduling Shop Scheduling. Tim Nieberg

Scheduling Shop Scheduling. Tim Nieberg Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations

More information

Set operations and Venn Diagrams. COPYRIGHT 2006 by LAVON B. PAGE

Set operations and Venn Diagrams. COPYRIGHT 2006 by LAVON B. PAGE Set operations and Venn Diagrams Set operations and Venn diagrams! = { x x " and x " } This is the intersection of and. # = { x x " or x " } This is the union of and. n element of! belongs to both and,

More information

Week 5: Expected value and Betting systems

Week 5: Expected value and Betting systems Week 5: Expected value and Betting systems Random variable A random variable represents a measurement in a random experiment. We usually denote random variable with capital letter X, Y,. If S is the sample

More information

On the k-path cover problem for cacti

On the k-path cover problem for cacti On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China zeminjin@eyou.com, x.li@eyou.com Abstract In this paper we

More information

2. FINDING A SOLUTION

2. FINDING A SOLUTION The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS

More information

Merkle Hash Trees for Distributed Audit Logs

Merkle Hash Trees for Distributed Audit Logs Merkle Hash Trees for Distributed Audit Logs Subject proposed by Karthikeyan Bhargavan Karthikeyan.Bhargavan@inria.fr April 7, 2015 Modern distributed systems spread their databases across a large number

More information

Lempel-Ziv Coding Adaptive Dictionary Compression Algorithm

Lempel-Ziv Coding Adaptive Dictionary Compression Algorithm Lempel-Ziv Coding Adaptive Dictionary Compression Algorithm 1. LZ77:Sliding Window Lempel-Ziv Algorithm [gzip, pkzip] Encode a string by finding the longest match anywhere within a window of past symbols

More information

IT:101 Cisco Networking Academy I Subnetting

IT:101 Cisco Networking Academy I Subnetting IT:101 Cisco Networking Academy I Subnetting The IPv4 address is 32 bits long and it is written in the form of dotted decimal notation. IP address in binary format: 11000000.00000001.00000001.00000020

More information

2016 EARLY INVESTIGATOR GRANT APPLICATION TITLE PAGE

2016 EARLY INVESTIGATOR GRANT APPLICATION TITLE PAGE TITLE PAGE Principal Investigator, Degree: Division: Address: City/State/Zip/Country: Phone: Email: Institution Address: City/State/Zip/Country: Phone: Email: Title of Proposed Project: Amount of Funding

More information

San Fermín: Aggregating Large Data Sets using a Binomial Swap Forest

San Fermín: Aggregating Large Data Sets using a Binomial Swap Forest San Fermín: Aggregating Large Data Sets using a Binomial Swap Forest Justin Cappos and John H. Hartman Department of Computer Science, University of Arizona Abstract San Fermín is a system for aggregating

More information

Class Notes CS 3137. 1 Creating and Using a Huffman Code. Ref: Weiss, page 433

Class Notes CS 3137. 1 Creating and Using a Huffman Code. Ref: Weiss, page 433 Class Notes CS 3137 1 Creating and Using a Huffman Code. Ref: Weiss, page 433 1. FIXED LENGTH CODES: Codes are used to transmit characters over data links. You are probably aware of the ASCII code, a fixed-length

More information

24. The Branch and Bound Method

24. The Branch and Bound Method 24. The Branch and Bound Method It has serious practical consequences if it is known that a combinatorial problem is NP-complete. Then one can conclude according to the present state of science that no

More information

How To Find An Optimal Search Protocol For An Oblivious Cell

How To Find An Optimal Search Protocol For An Oblivious Cell The Conference Call Search Problem in Wireless Networks Leah Epstein 1, and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. lea@math.haifa.ac.il 2 Department of Statistics,

More information

Artificial Intelligence Beating Human Opponents in Poker

Artificial Intelligence Beating Human Opponents in Poker Artificial Intelligence Beating Human Opponents in Poker Stephen Bozak University of Rochester Independent Research Project May 8, 26 Abstract In the popular Poker game, Texas Hold Em, there are never

More information

Cost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation:

Cost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation: CSE341T 08/31/2015 Lecture 3 Cost Model: Work, Span and Parallelism In this lecture, we will look at how one analyze a parallel program written using Cilk Plus. When we analyze the cost of an algorithm

More information

10CS35: Data Structures Using C

10CS35: Data Structures Using C CS35: Data Structures Using C QUESTION BANK REVIEW OF STRUCTURES AND POINTERS, INTRODUCTION TO SPECIAL FEATURES OF C OBJECTIVE: Learn : Usage of structures, unions - a conventional tool for handling a

More information

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding

More information

The Domain Name System (DNS)

The Domain Name System (DNS) The Domain Name System (DNS) Each Internet host is assigned a host name and an IP address Host names are structured character strings, e.g., www.cs.iastate.edu IP addresses are 32 bit integers, e.g., 129.186.3.6

More information

EMBEDDING COUNTABLE PARTIAL ORDERINGS IN THE DEGREES

EMBEDDING COUNTABLE PARTIAL ORDERINGS IN THE DEGREES EMBEDDING COUNTABLE PARTIAL ORDERINGS IN THE ENUMERATION DEGREES AND THE ω-enumeration DEGREES MARIYA I. SOSKOVA AND IVAN N. SOSKOV 1. Introduction One of the most basic measures of the complexity of a

More information

A Non-Linear Schema Theorem for Genetic Algorithms

A Non-Linear Schema Theorem for Genetic Algorithms A Non-Linear Schema Theorem for Genetic Algorithms William A Greene Computer Science Department University of New Orleans New Orleans, LA 70148 bill@csunoedu 504-280-6755 Abstract We generalize Holland

More information

Lecture 2: Universality

Lecture 2: Universality CS 710: Complexity Theory 1/21/2010 Lecture 2: Universality Instructor: Dieter van Melkebeek Scribe: Tyson Williams In this lecture, we introduce the notion of a universal machine, develop efficient universal

More information

Lecture 5 - CPA security, Pseudorandom functions

Lecture 5 - CPA security, Pseudorandom functions Lecture 5 - CPA security, Pseudorandom functions Boaz Barak October 2, 2007 Reading Pages 82 93 and 221 225 of KL (sections 3.5, 3.6.1, 3.6.2 and 6.5). See also Goldreich (Vol I) for proof of PRF construction.

More information

Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis

Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Abdun Mahmood, Christopher Leckie, Parampalli Udaya Department of Computer Science and Software Engineering University of

More information

Notes from Week 1: Algorithms for sequential prediction

Notes from Week 1: Algorithms for sequential prediction CS 683 Learning, Games, and Electronic Markets Spring 2007 Notes from Week 1: Algorithms for sequential prediction Instructor: Robert Kleinberg 22-26 Jan 2007 1 Introduction In this course we will be looking

More information

Class notes Program Analysis course given by Prof. Mooly Sagiv Computer Science Department, Tel Aviv University second lecture 8/3/2007

Class notes Program Analysis course given by Prof. Mooly Sagiv Computer Science Department, Tel Aviv University second lecture 8/3/2007 Constant Propagation Class notes Program Analysis course given by Prof. Mooly Sagiv Computer Science Department, Tel Aviv University second lecture 8/3/2007 Osnat Minz and Mati Shomrat Introduction This

More information

A Network Flow Approach in Cloud Computing

A Network Flow Approach in Cloud Computing 1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges

More information

Connecting Transformational Geometry and Transformations of Functions

Connecting Transformational Geometry and Transformations of Functions Connecting Transformational Geometr and Transformations of Functions Introductor Statements and Assumptions Isometries are rigid transformations that preserve distance and angles and therefore shapes.

More information

E S T A D O D O C E A R Á P R E F E I T U R A M U N I C I P A L D E C R U Z C Â M A R A M U N I C I P A L D E C R U Z

E S T A D O D O C E A R Á P R E F E I T U R A M U N I C I P A L D E C R U Z C Â M A R A M U N I C I P A L D E C R U Z C O N C U R S O P Ú B L I C O E D I T A L N º 0 0 1 / 2 0 1 2 D i s p õ e s o b r e C o n c u r s o P ú b l i c o p a r a p r o v i m e n t o c a r g o s e v a g a s d a P r e f e i t u r a M u n i c i

More information

Fairness in Routing and Load Balancing

Fairness in Routing and Load Balancing Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria

More information

THE SEARCH FOR NATURAL DEFINABILITY IN THE TURING DEGREES

THE SEARCH FOR NATURAL DEFINABILITY IN THE TURING DEGREES THE SEARCH FOR NATURAL DEFINABILITY IN THE TURING DEGREES ANDREW E.M. LEWIS 1. Introduction This will be a course on the Turing degrees. We shall assume very little background knowledge: familiarity with

More information

P R E F E I T U R A M U N I C I P A L D E J A R D I M

P R E F E I T U R A M U N I C I P A L D E J A R D I M D E P A R T A M E N T O D E C O M P R A S E L I C I T A O A U T O R I Z A O P A R A R E A L I Z A O D E C E R T A M E L I C I T A T с R I O M O D A L I D A D E P R E G O P R E S E N C I A L N 034/ 2 0

More information

Decision Theory. 36.1 Rational prospecting

Decision Theory. 36.1 Rational prospecting 36 Decision Theory Decision theory is trivial, apart from computational details (just like playing chess!). You have a choice of various actions, a. The world may be in one of many states x; which one

More information

Information Models, Data Models, and YANG. IETF 86, Orlando, 2013-03-14

Information Models, Data Models, and YANG. IETF 86, Orlando, 2013-03-14 Information Models, Data Models, and YANG Jürgen Schönwälder IETF 86, Orlando, 2013-03-14 1 / 12 Information Models (RFC 3444) Information Models are used to model managed objects at a conceptual level,

More information

1 Approximating Set Cover

1 Approximating Set Cover CS 05: Algorithms (Grad) Feb 2-24, 2005 Approximating Set Cover. Definition An Instance (X, F ) of the set-covering problem consists of a finite set X and a family F of subset of X, such that every elemennt

More information

Hydrodynamic Limits of Randomized Load Balancing Networks

Hydrodynamic Limits of Randomized Load Balancing Networks Hydrodynamic Limits of Randomized Load Balancing Networks Kavita Ramanan and Mohammadreza Aghajani Brown University Stochastic Networks and Stochastic Geometry a conference in honour of François Baccelli

More information

Minimizing the Number of Machines in a Unit-Time Scheduling Problem

Minimizing the Number of Machines in a Unit-Time Scheduling Problem Minimizing the Number of Machines in a Unit-Time Scheduling Problem Svetlana A. Kravchenko 1 United Institute of Informatics Problems, Surganova St. 6, 220012 Minsk, Belarus kravch@newman.bas-net.by Frank

More information

SARTRE: System Overview

SARTRE: System Overview SARTRE: System Overview A Case-Based Agent for Two-Player Texas Hold em Jonathan Rubin and Ian Watson Department of Computer Science University of Auckland, New Zealand jrub001@aucklanduni.ac.nz, ian@cs.auckland.ac.nz

More information

Polarization codes and the rate of polarization

Polarization codes and the rate of polarization Polarization codes and the rate of polarization Erdal Arıkan, Emre Telatar Bilkent U., EPFL Sept 10, 2008 Channel Polarization Given a binary input DMC W, i.i.d. uniformly distributed inputs (X 1,...,

More information

Object Oriented Programming. Risk Management

Object Oriented Programming. Risk Management Section V: Object Oriented Programming Risk Management In theory, there is no difference between theory and practice. But, in practice, there is. - Jan van de Snepscheut 427 Chapter 21: Unified Modeling

More information

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008 Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report

More information

Binary Trees and Huffman Encoding Binary Search Trees

Binary Trees and Huffman Encoding Binary Search Trees Binary Trees and Huffman Encoding Binary Search Trees Computer Science E119 Harvard Extension School Fall 2012 David G. Sullivan, Ph.D. Motivation: Maintaining a Sorted Collection of Data A data dictionary

More information

issuitableforexecutiononasynchronous,tightly-coupledparallelmachine,suchasasuper-scalaror 1Introduction

issuitableforexecutiononasynchronous,tightly-coupledparallelmachine,suchasasuper-scalaror 1Introduction UniversityofCalifornia,Berkeley email:aiken@cs.berkeley.edu ComputerScienceDivision Berkeley,CA94720-1776 AlexanderAiken Resource-ConstrainedSoftwarePipelining DepartmentofInformationandComputerScience

More information

9th Max-Planck Advanced Course on the Foundations of Computer Science (ADFOCS) Primal-Dual Algorithms for Online Optimization: Lecture 1

9th Max-Planck Advanced Course on the Foundations of Computer Science (ADFOCS) Primal-Dual Algorithms for Online Optimization: Lecture 1 9th Max-Planck Advanced Course on the Foundations of Computer Science (ADFOCS) Primal-Dual Algorithms for Online Optimization: Lecture 1 Seffi Naor Computer Science Dept. Technion Haifa, Israel Introduction

More information

Information, Entropy, and Coding

Information, Entropy, and Coding Chapter 8 Information, Entropy, and Coding 8. The Need for Data Compression To motivate the material in this chapter, we first consider various data sources and some estimates for the amount of data associated

More information

APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID.

APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. APPENDIX B IP Subnetting IP Addressing Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. IP Classes An IP address is

More information

Options pricing in discrete systems

Options pricing in discrete systems UNIVERZA V LJUBLJANI, FAKULTETA ZA MATEMATIKO IN FIZIKO Options pricing in discrete systems Seminar II Mentor: prof. Dr. Mihael Perman Author: Gorazd Gotovac //2008 Abstract This paper is a basic introduction

More information

Lecture 13: Martingales

Lecture 13: Martingales Lecture 13: Martingales 1. Definition of a Martingale 1.1 Filtrations 1.2 Definition of a martingale and its basic properties 1.3 Sums of independent random variables and related models 1.4 Products of

More information

The Structure of Galois Algebras

The Structure of Galois Algebras The Structure of Galois Algebras George Szeto Department of Mathematics, Bradley University Peoria, Illinois 61625 { U.S.A. Email: szeto@hilltop.bradley.edu and Lianyong Xue Department of Mathematics,

More information

Digital Signatures. What are Signature Schemes?

Digital Signatures. What are Signature Schemes? Digital Signatures Debdeep Mukhopadhyay IIT Kharagpur What are Signature Schemes? Provides message integrity in the public key setting Counter-parts of the message authentication schemes in the public

More information

comp4620/8620: Advanced Topics in AI Foundations of Artificial Intelligence

comp4620/8620: Advanced Topics in AI Foundations of Artificial Intelligence comp4620/8620: Advanced Topics in AI Foundations of Artificial Intelligence Marcus Hutter Australian National University Canberra, ACT, 0200, Australia http://www.hutter1.net/ ANU Foundations of Artificial

More information

Reinforcement Learning

Reinforcement Learning Reinforcement Learning LU 2 - Markov Decision Problems and Dynamic Programming Dr. Martin Lauer AG Maschinelles Lernen und Natürlichsprachliche Systeme Albert-Ludwigs-Universität Freiburg martin.lauer@kit.edu

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES Contents 1. Random variables and measurable functions 2. Cumulative distribution functions 3. Discrete

More information

RN-Codings: New Insights and Some Applications

RN-Codings: New Insights and Some Applications RN-Codings: New Insights and Some Applications Abstract During any composite computation there is a constant need for rounding intermediate results before they can participate in further processing. Recently

More information

Multi-layer Structure of Data Center Based on Steiner Triple System

Multi-layer Structure of Data Center Based on Steiner Triple System Journal of Computational Information Systems 9: 11 (2013) 4371 4378 Available at http://www.jofcis.com Multi-layer Structure of Data Center Based on Steiner Triple System Jianfei ZHANG 1, Zhiyi FANG 1,

More information

Week 4: Gambler s ruin and bold play

Week 4: Gambler s ruin and bold play Week 4: Gambler s ruin and bold play Random walk and Gambler s ruin. Imagine a walker moving along a line. At every unit of time, he makes a step left or right of exactly one of unit. So we can think that

More information

Stateful Inspection Firewall Session Table Processing

Stateful Inspection Firewall Session Table Processing International Journal of Information Technology, Vol. 11 No. 2 Xin Li, ZhenZhou Ji, and MingZeng Hu School of Computer Science and Technology Harbin Institute of Technology 92 West Da Zhi St. Harbin, China

More information

Colegio del mundo IB. Programa Diploma REPASO 2. 1. The mass m kg of a radio-active substance at time t hours is given by. m = 4e 0.2t.

Colegio del mundo IB. Programa Diploma REPASO 2. 1. The mass m kg of a radio-active substance at time t hours is given by. m = 4e 0.2t. REPASO. The mass m kg of a radio-active substance at time t hours is given b m = 4e 0.t. Write down the initial mass. The mass is reduced to.5 kg. How long does this take?. The function f is given b f()

More information

Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 10

Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 10 CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 10 Introduction to Discrete Probability Probability theory has its origins in gambling analyzing card games, dice,

More information

Reinforcement Learning

Reinforcement Learning Reinforcement Learning LU 2 - Markov Decision Problems and Dynamic Programming Dr. Joschka Bödecker AG Maschinelles Lernen und Natürlichsprachliche Systeme Albert-Ludwigs-Universität Freiburg jboedeck@informatik.uni-freiburg.de

More information

Wald s Identity. by Jeffery Hein. Dartmouth College, Math 100

Wald s Identity. by Jeffery Hein. Dartmouth College, Math 100 Wald s Identity by Jeffery Hein Dartmouth College, Math 100 1. Introduction Given random variables X 1, X 2, X 3,... with common finite mean and a stopping rule τ which may depend upon the given sequence,

More information

Lecture 13: Factoring Integers

Lecture 13: Factoring Integers CS 880: Quantum Information Processing 0/4/0 Lecture 3: Factoring Integers Instructor: Dieter van Melkebeek Scribe: Mark Wellons In this lecture, we review order finding and use this to develop a method

More information

MAC Sublayer. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

MAC Sublayer. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross MAC Sublayer Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross Collision-Free Protocols v N Stations v Each programmed with a unique address: 0-(N-1). v Propagation

More information

Mining Social Network Graphs

Mining Social Network Graphs Mining Social Network Graphs Debapriyo Majumdar Data Mining Fall 2014 Indian Statistical Institute Kolkata November 13, 17, 2014 Social Network No introduc+on required Really? We s7ll need to understand

More information

So, how do you pronounce. Jilles Vreeken. Okay, now we can talk. So, what kind of data? binary. * multi-relational

So, how do you pronounce. Jilles Vreeken. Okay, now we can talk. So, what kind of data? binary. * multi-relational Simply Mining Data Jilles Vreeken So, how do you pronounce Exploratory Data Analysis Jilles Vreeken Jilles Yill less Vreeken Fray can 17 August 2015 Okay, now we can talk. 17 August 2015 The goal So, what

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

VEHICLE ROUTING AND SCHEDULING PROBLEMS: A CASE STUDY OF FOOD DISTRIBUTION IN GREATER BANGKOK. Kuladej Panapinun and Peerayuth Charnsethikul.

VEHICLE ROUTING AND SCHEDULING PROBLEMS: A CASE STUDY OF FOOD DISTRIBUTION IN GREATER BANGKOK. Kuladej Panapinun and Peerayuth Charnsethikul. 1 VEHICLE ROUTING AND SCHEDULING PROBLEMS: A CASE STUDY OF FOOD DISTRIBUTION IN GREATER BANGKOK By Kuladej Panapinun and Peerayuth Charnsethikul Abstract Vehicle routing problem (VRP) and its extension

More information

1 Introduction. Dr. T. Srinivas Department of Mathematics Kakatiya University Warangal 506009, AP, INDIA tsrinivasku@gmail.com

1 Introduction. Dr. T. Srinivas Department of Mathematics Kakatiya University Warangal 506009, AP, INDIA tsrinivasku@gmail.com A New Allgoriitthm for Miiniimum Costt Liinkiing M. Sreenivas Alluri Institute of Management Sciences Hanamkonda 506001, AP, INDIA allurimaster@gmail.com Dr. T. Srinivas Department of Mathematics Kakatiya

More information

Less naive Bayes spam detection

Less naive Bayes spam detection Less naive Bayes spam detection Hongming Yang Eindhoven University of Technology Dept. EE, Rm PT 3.27, P.O.Box 53, 5600MB Eindhoven The Netherlands. E-mail:h.m.yang@tue.nl also CoSiNe Connectivity Systems

More information

Stationary random graphs on Z with prescribed iid degrees and finite mean connections

Stationary random graphs on Z with prescribed iid degrees and finite mean connections Stationary random graphs on Z with prescribed iid degrees and finite mean connections Maria Deijfen Johan Jonasson February 2006 Abstract Let F be a probability distribution with support on the non-negative

More information