Which Networks Are Least Susceptible to Cascading Failures?

Size: px
Start display at page:

Download "Which Networks Are Least Susceptible to Cascading Failures?"

Transcription

1 Which Networks Are Least Susceptible to Cascaing Failures? Larry Blume Davi Easley Jon Kleinberg Robert Kleinberg Éva Taros July 011 Abstract. The resilience of networks to various types of failures is an unercurrent in many parts of graph theory an network algorithms. In this paper we stuy the resilience of networks in the presence of cascaing failures failures that sprea from one noe to another across the network structure. One fins such cascaing processes at work in the kin of contagious failures that sprea among financial institutions uring a financial crisis, through noes of a power gri or communication network uring a wiesprea outage, or through a human population uring the outbreak of an epiemic isease. A wiely stuie moel of cascaes in networks assumes that each noe v of the network has a threshol l(v), an fails if it has at least l(v) faile neighbors. We assume that each noe selects a threshol l(v) inepenently using a probability istribution µ. Our work centers on a parameter that we call the µ-risk of a graph: the maximum failure probability of any noe in the graph, in this threshol cascae moel parameterize by threshol istribution µ. This efines a very broa class of moels; for example, the large literature on ege percolation, in which propagation happens along eges that are inclue inepenently at ranom with some probability p, takes place in a small part of the parameter space of threshol cascae moels, an one where the istribution µ is monotonically ecreasing with the threshol. In contrast we want to stuy the whole space, incluing threshol istributions with qualitatively ifferent behavior, such as those that are sharply increasing. We evelop techniques for relating ifferences in µ-risk to the structures of the unerlying graphs. This is challenging in large part because, espite the simplicity of its formulation, the threshol cascae moel has been very har to analyze for arbitrary graphs G an arbitrary threshol istributions µ. It turns out that when selecting among a set of graphs to minimize the µ-risk, the result epens quite intricately on µ. We evelop several techniques for evaluating the µ-risk of -regular graphs. For = we are able to solve the problem completely: the optimal graph is always a clique (i.e. triangle) or tree (i.e. infinite path), although which graph is better exhibits a surprising non-monotonicity as the threshol parameters vary. When > we present a technique base on power-series expansions of the failure probability that allows us to compare graphs in certain parts of the parameter space, eriving conclusions incluing the fact that as µ varies, at least three ifferent graphs are optimal among -regular graphs. In particular, the set of optimal graphs here inclues one which is neither a clique nor a tree. Dept. of Economics, Cornell University, Ithaca NY 14853; IHS, Vienna; an the Santa Fe Institute. Supporte in part by WWTF Grant Die Evolution von Normen an Konventionen in er Wirtschaft. Dept. of Economics, Cornell University, Ithaca NY Supporte in part by NSF grant CCF Dept. of Computer Science, Cornell University, Ithaca NY Supporte in part by the MacArthur Founation, a Google Research Grant, a Yahoo Research Alliance Grant, an NSF grants IIS , CCF , an IIS Dept. of Computer Science, Cornell University, Ithaca NY Supporte in part by NSF awars CCF an CCF , AFOSR grant FA , a Google Research Grant, an Alfre P. Sloan Founation Fellowship, an a Microsoft Research New Faculty Fellowship. Dept. of Computer Science, Cornell University, Ithaca NY Supporte in part by NSF grants CCF an CCF , ONR grant N , a Yahoo! Research Alliance Grant, an a Google Research Grant. 1

2 1 Introuction The resilience of networks to various types of failures is an unercurrent in many parts of graph theory an network algorithms. For example, the efinitions of cuts an expansion each capture types of robustness in the presence of worst-case ege or noe eletion, while the stuy of network reliability is base on the question of connectivity in the presence of probabilistic ege failures, among other issues. In this paper we are intereste in the resilience of networks in the presence of cascaing failures failures that sprea from one noe to another across the network structure. One fins such cascaing processes at work in the kin of contagious failures that sprea among financial institutions uring a financial crisis [1], in the breakowns that sprea through noes of a power gri or communication network uring a wiesprea outage [3], or in the course of an epiemic isease as it spreas through a human population []. To represent cascaing failures we use the following basic threshol cascae moel, which has been stuie extensively both in the context of failures an also in other settings involving social or biological contagion [6, 8, 9, 10, 11, 1, 13, 14]. 1 We are given a graph G, an each noe v chooses a threshol l(v) inepenently from a istribution µ on the natural numbers, choosing threshol l(v) = j with probability µ(j). The quantity l(v) represents the number of faile neighbors that v can withstan before v fails as well thus we can think of µ as etermining the istribution of levels of health of the noes in the population, an hence implicitly controlling the way the failure process spreas on G. To etermine the outcome of the failure process, we first eclare all noes with threshol 0 to have faile. We then repeately check whether any noe v that has not yet faile has at least l(v) faile neighbors if so, we eclare v to have faile as well, an we continue iterating. For example, Figure 1 shows the outcome of this process on two ifferent graphs G with particular choices of noe threshols. For a given noe r in G, we efine its failure probability f µ (G, r) to be the probability it fails when noe threshols l(v) are rawn inepenently from µ an then the threshol cascae moel is run with these threshols. Now we let f µ(g) = sup r V (G) f µ (G, r), namely, the maximum failure probability in G. We view f µ(g) as our measure of the resilience of G against cascaing failures that operate uner the threshol istribution µ; accoringly, we refer to f µ(g) as the µ-risk of G, an we seek graphs of low µ-risk. A Motivating Contrast: Cliques an Trees. How o ifferent network structures compare in their resilience to a cascaing failure? Because the failure probability clearly goes up as we a eges to a given noe set, we take the top-level issue of ege ensity out of consieration by posing this question over the set of all (finite or infinite) connecte -regular graphs, for a fixe choice of. We use G to enote this set of graphs, an for graphs in G we ask how they compare accoring to their µ-risk. When we consier G, we will also restrict the threshol istributions to the set of all istributions supporte on {0, 1,,..., }, a set which we enote by Γ. As a first concrete example of the kin of results to come, we consier a comparison between two basic -regular graphs; the analysis justifying this comparison will follow from the framework 1 The threshol cascae moel is also relate to the nonlinear voter moel [7], though somewhat ifferent in its specifics. Unless explicitly note otherwise, all quantification over graphs in this paper takes place over the set of connecte graphs only. This oes not come at any real loss of generality, since the µ-risk of a isconnecte graph is simply the supremum of the µ-risk in each connecte component.

3 (a) Clique (b) Tree Figure 1: The sprea of failures on two graphs accoring to the threshol cascae moel. On each graph, the threshols are rawn insie the noes, an the noes with thick borers are those that fail as a result of the process. evelope in the paper. To begin with, for conjecturing structures that prouce low µ-risk, we can raw on intuitions from the motivating omains iscusse above. A stanar notion in epiemic isease is that it is angerous to belong to a large connecte component, an this suggests the clique K +1 as a resilient network. On the other han, a principle in financial networks is that it is important to have iversity among one s neighbors in the present context, a lack of eges among one s neighbors so that shocks are uncorrelate. This suggests the infinite complete -ary tree T as a resilient network. (By way of illustration, note that if we were to continue the tree in Figure 1(b) inefinitely ownwar, we woul have the complete 3-ary tree T 3.) An intriguing point, of course, is that these two sources of intuition point in completely opposite irections. But as one consequence of the framework we evelop here (in Section 4) we will see that both intuitions are essentially correct each of K +1 or T can be better than the other, for ifferent choices of the threshol istribution. Specifically, we will show that there exist µ, ν Γ such that f µ(k +1 ) < f µ(t ) an f ν (T ) < f ν (K +1 ). In fact, this trae-off between cliques an trees shows up in instructive ways on very simply parametrize subsets of the space Γ. For example, suppose we choose a very small value ε > 0, an for a variable x we efine (µ(0), µ(1), µ()) = (ε, x, 1 ε x) with µ(j) = 0 for j >. Then when x = 1 ε, so that all threshols are either 0 or 1, a noe s failure probability is strictly increasing in the size of the component it belongs to, an so K +1 uniquely minimizes the µ-risk. At the other extreme, when x = 0, a short argument shows that K +1 uniquely optimizes the µ-risk here too. But as we prove in Section 5.1, it is possible to choose a value of x strictly between 0 an 1 ε for which T has strictly lower µ-risk than K +1. Moreover, the value of x where T has lower µ-risk accors with the financial intuition about the value of iversity: it occurs when x is very small, but significantly larger than ε, so that threshols of 1 are much more numerous than threshols of 0. In this case, failures are still rare, but if a noe u has connecte neighbors v an w, then there is a non-trivial risk that v will have threshol 0 an w will have threshol 1, at which point v s failure will ricochet off w an bring own u as well, even if u has the maximum (an most likely) threshol of. In this region of the space Γ of threshol istributions, it is safer to have no links among your neighbors, even at the expense of proucing very large connecte components. There is also an important qualitative message unerlying this contrast: the question of which graph is more resilient against cascaing failures epens sensitively on the way in which failure moves through the graph (via the mixture of threshols etermine by µ). 3

4 This contrast, an the reasons behin it, suggest that the space Γ has a rich structure when viewe in terms of the µ-risk it inuces on graphs. Inee, as we ve just seen, even monotonic trae-offs between simple parameters of µ Γ can prouce non-monotonic transitions between graphs for example, with K +1 first being better, then worse, then better again compare to T as we vary x above. Our overall plan in this paper is thus to evelop techniques for relating ifferences in µ-risk to the structures of the unerlying graphs. This is challenging in large part because, espite the simplicity of its formulation, the threshol cascae moel has been very har to analyze for arbitrary graphs G an arbitrary threshol istributions µ. Existing results have either mae the strong assumptions that either µ obeys a iminishing property (that threshol probabilities exhibit some form of monotonic ecrease in the threshol size) [10, 1] or that the unerlying graph G is a tree [8, 14], a lattice [7], or a complete graph [9, 13]. In fact, even the existing techniques evelope specifically for cliques an trees o not appear strong enough to ientify the contrast iscusse above, which emerges from our framework in Section 5.1. An for comparing graphs outsie these special cases, very few tools are available; one of our motivating goals is to evelop tools of this type. It is also worth noting that the large literature on ege percolation, in which propagation happens along eges that are inclue inepenently at ranom with some probability p, eals with a particular class of moels that when viewe in terms of threshols have the iminishing property iscusse above. This inclues the large literature on G n,p, viewe as ranom ege sets of the complete graph [5]; the authors own recent work on network formation in the presence of contagion exclusively use a moel base on this type of ege percolation [4]. The point is that for this special case, component size is the ominant effect, an so the graphs of minimum µ-risk are essentially cliques; working in this part of the space thus oes not enable one to look at trae-offs between open an close neighborhoos as in our motivating iscussion of K +1 vs. T. (As we will see, the constructions of µ Γ that favor T inee involve threshols with a sharply increasing property over part of the support set; for certain applications, this increasing property is often viewe as crucial, which accors with the intuition iscusse earlier.) Hence we nee to look beyon moels with an ege percolation structure to see things that even qualitatively resemble the phenomena we are trying to stuy. Summary of Results. The contrast between K +1 an T establishes that there is no single graph H such that H achieves the minimum µ-risk for all istributions µ Γ. It is thus natural to ask whether K +1 an T are sufficient to jointly cover the space Γ, in the sense that at least one of them is optimal at each µ Γ. More generally, we say that a (finite or infinite) set of graphs H = {H 1, H,...} G is a sufficient set for Γ if for each µ Γ, at least one member of H achieves the minimum µ-risk over all graphs in G. In this terminology, our question becomes: ( ) Does {K +1, T } form a sufficient set for Γ? One consequence of the results in the paper is a complete answer to Question ( ). We fin, in fact, that the answer to this question epens on the value of. We begin with a fairly complete analysis of µ-risk for the case of egree =, answering Question ( ) affirmatively in this case. While the set of graphs in G is clearly very simple (cycles of each length 3, an the infinite path), the behavior of µ-risk on G is still rich enough that the non-monotonic phenomenon iscusse above takes place even between K 3 an T. (Observe that 4

5 T, the infinite -ary tree, is better known as the infinite path). We fin in fact that at each µ with 0 < µ(0) < 1, at least one of K 3 or T achieves strictly lower µ-risk than every other graph in G {K 3, T }. When >, the behavior of µ-risk on G becomes much more complicate. Here we establish that for each >, the two graphs {K +1, T } o not form a sufficient set for Γ. We o this by consiering a graph that we call the (-regular) tree of triangles, consisting essentially of a collection of isjoint triangles attache accoring to the structure of an infinite regular tree. ( is specifie precisely in Section 5., an epicte schematically for the case = 3 in Figure ). We construct a istribution µ Γ for which has strictly lower µ-risk than both K +1 an T. Intuitively, the tree of triangles interpolates between the complete neighborhoo iversification of T an the complete neighborhoo closure of K +1, an hence points towar a further structural imension to the problem of minimizing µ-risk. Despite the complex structure of µ-risk when >, we have a set of results making it possible to compare the µ-risk of certain specific graphs to the µ-risk of arbitrary graphs. In aition to the comparisons among K +1, T, an escribe above, we establish the following further results for K +1 an T. First, as note above, it is not har to show that there are istributions µ Γ for which K +1 has strictly lower µ-risk than any other G G. A much more intricate argument establishes a type of optimality property for T as well: for each graph G G, we construct a istribution µ G Γ for which T has strictly lower µ G -risk than G. This is a broa generalization of the T -vs.-k +1 comparison, in that it says that such a comparison is possible for every G G : in other wors, T is more resilient than every other connecte -regular graph at some point in Γ. Our analysis in fact establishes a strengthening of this result for T for every finite set H of connecte -regular graphs, there is a istribution µ H Γ on which T achieves strictly lower µ H -risk than each member of H. An this in turn yiels a negative answer to a more general version of Question ( ): When >, there is no two-element sufficient set of graphs for Γ. Our results for > are base on a unifying technique, motivate by the construction of the istribution µ = (ε, x, 1 ε x) use to compare K +1 an T above. The technique is base on using power series approximations to stuy the µ-risk for µ in the vicinity of particular threshol istributions; roughly speaking, it works as follows. We focus on cases in which the istribution µ concentrates almost all of its probability on a single threshol l max an the remaining probability is ivie up over values j < l max. The ranom raw of a threshol from µ in this case can be treate as a small perturbation of the fixe threshol istribution in which every noe gets threshol l max an no noes fail. A given noe s failure probability can then be expresse using a power series in the variables {µ(j) j < l max } an the power series coefficients for ifferent graphs provie enough information to compare them accoring to µ-risk when the probabilities {µ(j) j < l max } are sufficiently close to zero. The computation of the power series coefficients then reuces to a counting problem involving certain partial assignments of threshols to noes of G. In aition to their role in our analyses, we believe that small perturbations of a single fixe threshol are a very natural special case to consier for the threshol cascae moel. Specifically, let Γ h (x) Γ be the set of istributions in Γ such that µ(0) > 0, µ(j) < x for j < h, an µ(j) = 0 for j > h. (In other wors, most of the probability mass is concentrate on h, an the rest is on values below h.) Threshol istributions in Γ h (x) for small x > 0 correspon to scenarios in which all noes begin with a fixe level of health h, an then a shock to the system causes a small fraction of noes to fail, an a small fraction of others to be weakene, with positive threshols 5

6 below h. The stuy of µ-risk on Γ h (x) correspons simply to the question of which networks are most resilient to the effect of such shocks. Overall, then, we believe that the techniques evelope here suggest avenues for further progress on a set of basic questions involving the threshol cascae moel, incluing sharper comparisons of the µ-risk between ifferent graphs, an how these comparisons epen both on µ an on the unerlying graph structure. Definition of the moel In the threshol cascae moel, there is a graph G (possibly infinite) in which each noe v ranomly samples a label l(v) N. Given a labeling l of graph G, we efine a subset S V (G) to be failurestable if every noe v S has strictly fewer than l(v) neighbors in S. We efine the set of faile noes Φ (G, l) to be the intersection of all failure-stable noe sets. Given a graph G with root vertex r, an a istribution µ on noe labels, we efine the root failure probability to be the probability that r Φ (G, l) when l is ranomly sample by assigning each noe an inepenent label with istribution µ. We enote the root failure probability by f µ (G, r). It is not har to see that this efinition of Φ (G, l) is equivalent to the one we use in the introuction as state by the following lemma. Lemma.1. The set Φ (G, l) is failure-stable. It is also equal to the union of the infinite sequence of sets Φ 0 (G, l) Φ 1 (G, l) efine inuctively by specifying that Φ 0 (G, l) = {v l(v) = 0} an Φ i+1 (G, l) = {v Φ i (G, l) contains at least l(v) neighbors of v}. It is also equal to the set of all noes v V (G) such that v Φ (G 0, l) for some finite subgraph G 0 G. Proof. It is easy to see that the intersection of failure-stable sets is failure-stable, hence Φ (G, l) is failure-stable. The containment i Φ i (G, l) Φ (G, l) is obvious from the efinition of Φ i (G, l). To establish the reverse containment, it suffices to show that i Φ i (G, l) is failure-stable. This hols because any v having l(v) or more neighbors in i Φ i (G, l) must also have that same number of neighbors in Φ k (G, l) for some sufficiently large k; it then follows that v Φ k+1 (G, l). If G 0 is any finite subgraph of G an v Φ (G 0, l), then v Φ (G, l) since Φ (G 0, l) Φ (G, l). To prove the converse, we will show that the set of all v such that v Φ (G 0, l) for some finite G 0 is a failure-stable set. Inee, suppose that v has neighbors w 1,..., w l(v), each belonging to a finite ( ) subgraph G 0 (w i ) such that w i Φ (G 0 (w i ), l). Then v Φ l(v) i=1 G 0(w i ), l, as esire. 3 The case = In this section, we specialize to -regular unirecte graphs G. For any such graph, one can efine a permutation R of the vertex set such that for every v V (G), the set of neighbors of v is {R(v), R 1 (v)}. The following algorithm RootFail processes a labeling l of G an outputs fail if an only if the root vertex r belongs to Φ (G, l). The algorithm works as follows. First it inspects the label l(r): if this is not equal to 1 or, then it halts instantly an outputs fail if an only if l(r) = 0. Otherwise, fin the least i such that R i (r) 1 an the least j such that R j (r) 1. Let l + = l(r i (r)), l = l(r j (r)). If i is unefine, then set i = an l + =. Similarly, if j is unefine then set j = an l =. Now, if l(r) = 1, output fail if an only if l + = 0 or 6

7 l = 0. If l(r) =, output fail if an only if l + = 0 an l = 0. Define the length of an execution of this algorithm to be equal to i + j. (Note that if i = or j =, the algorithm RootFail will not actually halt. For this reason, an actual implementation of RootFail woul have to be more careful to inspect the vertices in interleave orer R(r), R 1 (r), R (r), R (r),... until it can prove that the root must fail. Such an implementation is not guarantee to halt, but when processing any labeling l such that r Φ (G, l) it is guarantee to halt after a finite number of steps an output fail.) The key to analyzing the root failure probability in -regular graphs is the following observation: there is a probabilistic coupling of the labelings l P of the infinite path P an the labelings l C of the n-cycle C = C n, such that for every sample point at which RootFail(P, l P ) has execution length less than n, RootFail(C, l C ) also has execution length less than n an the two executions are ientical. We now efine some events on the sample space of this coupling. For any k, let E k enote the event that RootFail(P, l P ) has execution length at least k. Let F P enote the event that r Φ (P, l P ) an let F C enote the event that r Φ (C, l C ). Since the executions of RootFail(P, l P ) an RootFail(C, l C ) are ientical on the complement of E n, we fin that Pr(F P ) Pr(F C ) = Pr(E n ) [Pr(F P E n ) Pr(F C E n )]. We now procee to compute each of the conitional probabilities on the right-han sie. Let s, t, u enote the label probabilities µ(0), µ(1), µ(), respectively. Let q = s 1 t, which is the conitional probability that the label of any noe is 0, given that its label is not 1. Then we have Pr(F P E n ) = t ( 1 (1 q) ) + u t + u t + u q. The first term on the right accounts for the case that l(r) = 1 an ( the ) secon term accounts for the case that l(r) =. After some manipulation pulling out t t+u q from the first term an ( ) u t+u q from the secon one we obtain the formula Pr(F P E n ) = q + t u ( t+u q q ). To compute Pr(F C E n ), note that when E n occurs, the root s label is either 1 or, an at most one of the remaining labels is not equal to 1. Furthermore, in any such labeling of C, the root fails if an only if one of the other n 1 noes has label 0. Thus, Pr(E n ) = (t + u)[t n 1 + (n 1)(1 t)t n ] Pr(E n F C ) = (t + u)(n 1)st n Pr(F P E n ) Pr(F C E n ) = t u t + u ( 1 (n 1)s Pr(F C E n ) = t + (n 1)(1 t) = q ( q q ) qt + t + (n 1)(1 t) [ t u ( Pr(F P ) Pr(F C ) = Pr(E n ) q q ) + t + u ) t t + (n 1)(1 t) qt t + (n 1)(1 t) On the last line, both factors are ecreasing functions of n. Consequently, when they are both positive, their prouct is a ecreasing function of n. In other wors, if an n-cycle is better than an infinite path, then an (n 1)-cycle is better still. We have thus prove the following. ]. 7

8 Theorem 3.1. For each µ Γ, at least one of the 3-cycle or the infinite path has minimum µ-risk over all graphs in G. 4 Computing Failure Probabilities Via Power Series When >, the metho of the preceing section oes not appear to be applicable. In effect, since the breath-first search of such a graph buils a tree which, at any stage of the search, may have more than two leaves (in fact, an unboune number of them) there are many more opportunities for correlation as ifferent leaves of the tree are iscovere to refer to the same noe of G. For this reason, an analysis along the lines of Section 3 seems hopeless. Instea we specialize to cases in which the istribution µ concentrates almost all of its probability on a single label l max an the remaining probability is ivie up over labels j < l max. We then express the µ-risk as a power series in the probabilities {µ(j) j < l max }, which allows us to compare ifferent graphs accoring to their low-egree power series coefficients. 4.1 Definitions We now present the efinitions that we nee, followe by a escription of the power series for the root failure probability an its convergence properties. Throughout this section, we will illustrate the efinition on a very simple graph: a 3-noe path, with the root r place at the mile noe, an we let v an w be the two other (leaf) noes of the path. Throughout this section an the following ones, we will assume that labels take values in the set {0,..., l max } for some fixe positive integer l max. For purposes of our example, we assume that l max, where most of the probability is concentrate, is equal to : µ(0) = s an µ(1) = t are small positive numbers, an µ() = 1 s t is close to 1. We will compute failure probabilities by working with partial noe labelings λ, in which labels are assigne to only some of the noes, i.e., a partial function λ from V (G) to {0,..., l max }. Its omain of efinition, Dom(λ), is the set of all v V (G) such that λ(v) is efine; when Dom(λ) = V (G) we refer to λ as a full labeling or simply a labeling. We say that a partial labeling λ is an explanation of root failure (ERF) if the root fails in every full labeling of G that agrees with λ on Dom(λ). We say that λ is a minimal explanation of root failure (MERF) if it is an ERF, an every proper sublabeling of λ is not an ERF. Note that Dom(λ) is a finite set whenever λ is a MERF, by Lemma.1. Thus, on the three-noe path with r in the mile, there are four MERFs: (a) assigning 0 to r; (b) assigning 1 to r an 0 to v; (c) assigning 1 to r an 0 to w; an () assigning 0 to v an w. We can think of partial labelings as events in the full sample space of labelings, an (a)-() are thus four events that cover the event that r fails. Hence the probability r fails is boune above by the sum of the probabilities of these four events, which is s + st + s. To get the precise failure probability of r, we nee to incorporate inclusion-exclusion terms arising from overlaps in these four MERFs. In our example, there are two istinct labelings that correspon to such overlaps: (i) assigning 0 to all three noes: this arises when events (a) an () both occur, so it contributes s 3 to the probability. (ii) assigning 1 to r an 0 to both v an w: this arises when any two out of (b), (c), an () occur, an also when all three occur. By the inclusion-exclusion formula, this contributes 8

9 3s t + s t = s t to the probability, with the first term coming from two-way overlaps an the secon term coming from the three-way overlap. Putting all this together, we get the root failure probability for the small example: s + st + s s 3 s t. MERFS give rise to such overlaps when they are compatible. We sat that two partial labelings λ 1, λ are compatible if λ 1 (v) = λ (v) for every v Dom(λ 1 ) Dom(λ ). The union of two compatible partial labelings λ 1, λ is the unique partial function λ such that {(v, λ(v)) v Dom(λ)} = {(v, λ 1 (v)) v Dom(λ 1 )} {(v, λ(v)) v Dom(λ )}. For notational reasons, it will be convenient to make the union operation into a binary operation that is efine for any pair of partial labelings, not only for compatible pairs. To o so, we efine the set Λ to be a set consisting of all partial labelings, together with one special element enote that is interprete to be incompatible with every element of Λ, incluing itself. We exten the union operation to a binary operation on Λ by specifying that λ 1 λ = when λ 1 an λ are incompatible. For a partial labeling λ, we efine E(λ) to be the set of all full labelings that exten λ; note that E( ) =, an that for every two partial labelings λ 1, λ we have the relation E(λ 1 ) E(λ ) = E(λ 1 λ ). For the inclusion-exclusion formula, we ll nee to think about finite unions of MERFs which we ll call UMERFs. For graph G with root vertex r, we will enote the set of all MERFs by M(G, r) an the set of all UMERFs by U(G, r). We will sometimes abbreviate these to M, U when the ientity of the graph an root vertex are obvious from context. We can now escribe the plan for arbitrary graphs, incluing infinite ones, when µ(j) = s j are small numbers for j < l max, an µ(l max ) = 1 l max 1 j=0 s j. We first show that when l max > /, for any vector of natural numbers i = (i 0, i 1,..., i lmax 1), there are only finitely many MERFs that assign i k noes a label of k, for k = 0,..., l max 1. Moreover, we can write the root s failure probability as a multivariate power series of the form i a is i 0 0 s i 1 1 s i lmax 1 l max 1, an this power series has a positive raius of convergence. We use this to compare failure probabilities in ifferent graphs by enumerating a finite set of terms in the power series until we ientify a ifference between them. 4. A power series for computing the root failure probability We make the set of all labelings l into a probability space by eclaring the labels {l(v) v V (G)} to be inepenent ranom variables with common istribution µ. The measurable sets in this probability space are the σ-fiel generate by the sets E(λ), where λ ranges over all partial labelings of G. By Lemma.1, whenever the root fails there is a MERF that explains the failure, i.e. the event r Φ (G, l) is the union of the events E(λ) for λ M. Since M is a countable set, we can choose an arbitrary one-to-one corresponence m : N M. Then ( ) ( n ) Pr(r Φ (G, l)) = Pr E(m(i)) = lim Pr E(m(i)). (1) n i=1 Each of the probabilities on the right-han sie can be expane using the inclusion-exclusion i=1 9

10 formula: ( n ) n Pr E(m(i)) = ( 1) k+1 Pr (E(m(i 1 )) E(m(i k ))) i=1 = k=1 n ( 1) k+1 1 i 1 < <i k n k=1 1 i 1 < <i k n Pr (E(m(i 1 ) m(i k ))). () The right-han sie of () is easy to evaluate: using variables s i (i = 0,..., l max ) to enote the values s i = µ(i), the probability of the event E(λ) for any partial labeling is given by Pr(E(λ)) = v Dom(λ) s λ(v) = sλ, (3) where this is taken as the efinition of s λ. Combining () an (3), an regrouping the terms we get the following lemma. Lemma 4.1. ( n ) Pr E(m(i)) = i=1 λ U n ( 1) k+1 a k,n λ s λ. (4) Here, a k,n λ for a UMERF λ an integers 1 k n, is efine to be the number of istinct k-tuples (i 1,..., i k ) such that 1 i 1 < < i k n an λ = m(i 1 ) m(i k ). 4.3 Convergence of the power series To take the limit as n an obtain a well-efine power series, it is necessary to have a finiteness theorem that justifies that the coefficient of s λ eventually stabilizes as n grows. In fact, in orer for the power series to have positive raius of convergence the coefficients must grow no faster than exponentially. Proving such bouns requires bouning the number of UMERFs of a given size. In general this is not possible: for some graphs an some settings of the parameter l max, the number of UMERFs of a specifie size is not even finite. As a simple example, consier an infinite path an l max = 1; there are infinitely many MERFs λ consisting of a single noe labele with 0. This example generalizes to any positive even egree : the graph G is forme from an infinite sequence of inepenent sets of size /, with every two consecutive such inepenent sets being joine by a complete bipartite graph. When l max = /, there are infinitely many MERFs obtaine by taking one of the inepenent sets in the sequence an labeling all of its noes with 0. Each of these MERFs λ has i(λ) = (/, 0,..., 0). The remainer of this section is evote to specifying some sufficient conitions uner which the right-han sie of Equation (4) can be rewritten as a power series with positive raius of convergence. For any partial labeling λ, we efine its size λ = Dom(λ) to be the number of noes it labels. We begin by ientifying some sufficient conitions uner which we can assert that for every partial labeling λ, the number of noes that are guarantee to fail in every labeling extening λ is at most O( λ ). Lemma 4.. Suppose we are given a graph G, a efault threshol l max, an a partial labeling λ. Let λ be the full labeling that extens λ by assigning label l max to each noe not labele by λ, an let F = Φ ( G, λ ). k=1 10

11 1. If G is -regular an < l max then F ( + 1) λ.. Suppose that for every noe v of G, every connecte component of G \ {v} contains strictly fewer than l max neighbors of v. Then F < λ. Proof. Arrange the elements of F into a sequence v 1, v,... such that each of the sets Φ i ( G, λ ) is an initial segment of the sequence. Thus, each v F has at least λ(v) neighbors that precee it in the sequence. We can think of the sequence v 1, v,... as specifying a possible orer in which the noes of F faile in an execution of the threshol cascae moel. To prove both parts of the lemma we will efine a potential function that maps vertex sets to non-negative integers, then evaluate the potential function on each initial segment of the sequence, an consier how the value of the potential function changes every time a new noe fails (i.e., is ae to the initial segment). We will use two ifferent potential functions corresponing to the two parts. For Part 1 efine ϕ(s), for any vertex set S, to be the number of eges of G having one enpoint in S an the other in its complement. Each time a new noe v k fails, it increases the value of ϕ by at most since it has only neighbors. Furthermore, if v k Dom(λ) then v k has at least l max neighbors that precee it in the sequence an at most l max that succee it. Thus, the net change in ϕ is boune above by ( l max ) l max, which is at most 1 by our assumption that < l max. The potential function ϕ thus starts at 0, increases by at most λ over the whole sequence of failures, an is never negative; hence there can be at most λ steps of the sequence when it strictly ecreases, an therefore at most λ noes in F \ Dom(λ). Consequently F ( + 1) λ. For Part, we instea use the potential function ψ(s) efine as the number of connecte components in the inuce subgraph G[S]. Each time a new noe v k fails, it increases ψ by at most 1. Now consier how ψ changes when a noe w Dom(λ) fails. Since λ(w) = l max, we know that w has at least l max neighbors that precee it in the sequence. By our assumption on the structure of G, at least two of these neighbors belong to ifferent connecte components of G \ {w}. These components merge together when w fails, causing ψ to ecrease by at least 1. Since the initial value of ψ is 0 an its final value is strictly positive, an it increases by at most 1 in each step, we know that the number of steps in which ψ increases must be greater than the number of steps in which it ecreases. Hence, F \ Dom(λ) < λ, implying F < λ as claime. The next lemma provies a simple metho for bouning the number of UMERFs of size z by an exponential function of z. Lemma 4.3. Suppose, for a given graph G an efault threshol l max, that there exists a constant c such that every partial labeling λ satisfies Φ ( G, λ ) c λ. Then for every z, the number of UMERFs of size z is at most ( + 1) 3cz. In particular, this upper boun is at most ( + 1) 3(+1)z whenever one of the sufficient conitions in Lemma 4. hols. Proof. Let λ be a partial labeling an let F = Φ ( G, λ ). If λ is a MERF, then F inuces a connecte subset of G, since otherwise we coul remove the labels provie by λ in any component of G[F ] not containing the root r an arrive at a proper sublabeling of λ that is also an ERF. This implies that if λ is a UMERF, the set G[F ] must also be connecte, since it is the union of a finite set of connecte graphs all containing a common noe r. We can escribe any such F uniquely by specifying the sequence of ege labels (each inexe from 1 to ) that are taken in the F steps of a epth-first search traversal of G[F ] starting from r. Hence there are at most F c λ such sets. As each UMERF of size λ is uniquely associate with such a set F together with a labeling 11

12 of its noes, we obtain an upper boun of cz (1 + l max ) cz on the number of UMERFs of size z. The lemma follows because 1 + l max + 1. Assume for the remainer of this section that G an l max satisfy one of the two sufficient conitions in Lemma 4.; thus, the hypothesis of Lemma 4.3 hols with c = + 1. The conclusion of Lemma 4.3 is alreay enough for us to be able to express the series on the right-han sie of Equation (4) via a more useful inexing. First, for any UMERF λ, let i(λ) enote the vector of natural numbers i = (i 0, i 1,..., i lmax ) such that λ assigns exactly i k noes a label of k. The corresponing event E(λ) has probability s λ = s i 0 0 s i 1 1 s i lmax l max, a quantity we will abbreviate as s i. For any vector of natural numbers i = (i 0, i 1,..., i lmax ), let i = l max k=0 i k; the number of UMERFs λ with i(λ) = i is boune by the expression in Lemma 4.3, with z = i an c = + 1. Moreover, any MERF λ that appears in a union of MERFs forming λ must have a vector i(λ ) that is coorinate-wise ominate by i(λ), an hence Lemma 4.3 implies that only a finite set of MERFs can appear in unions that form λ. It follows that the sequence of coefficients a k,n λ eventually stabilizes as n that is, for every λ, k there is an integer a k λ an a threshol n 0 such that a k,n λ = a k λ for all n n 0. Thus we can group together all UMERFs λ with i(λ) = i an write ( ) Pr E(m(i)) a i s i, (5) i=1 = i λ U i(λ)=i k ( 1) k+1 a k λ si = i where the right-han sie shoul be taken as the efinition of a i, an the grouping by i in the sum on the right-han sie is justifie by the fact that in the preceing triple summation, the sums over λ an k range over finite sets. If we can show that a i epens only exponentially on i, this will establish that the power series has a positive raius of convergence. We observe that if the thir summation weren t present in Equation (5), an instea we only were summing over k = 1 (corresponing to MERFs), then such an exponential upper boun woul follow irectly from Lemma 4.3. It follows that to show an exponential upper boun on a i, it is sufficient, for each fixe UMERF λ with i(λ) = i, to show that k ( 1)k+1 a k λ is boune above by an exponential function of i. To o this, we consier the (potentially very large) set of all MERFs λ 1,..., λ m that can appear in a union forming λ. Let Dom(λ) = D, with D = n, an Dom(λ j ) = D j. For each subset of k of these MERFs whose union equals D, we get a term ( 1) k+1 in the sum we are bouning. We woul like to show that the absolute sum of all these terms is boune above by an exponential function of n, but since there coul be many more than this many terms in the sum, we nee an argument that actually exploits the cancellation among terms of the form ( 1) k+1, rather than naïvely treating each as potentially having the same sign. The upper boun we nee follows from our next lemma. Lemma 4.4. Let D be an n-element set, an let D 1,..., D m be (not necessarily istinct) subsets of D. Let C be the collection of all subsets J {1,..., m} for which j J D j = D. Then ( 1) J n. (The crucial point is that the right-han sie is inepenent of m.) J C 1

13 Proof. We prove this by inuction on n, with the case of n = 1 being easy. For n > 1, choose any element x D an let D = D x. We efine C 0 to be the collection of all J {1,..., m} for which j J D j D. an C 1 to be the collection of all J {1,..., m} for which j J D j = D. Now, by the inuction hypothesis applie to the sets D an {D j x : j = 1,,..., m}, we have J C 0 ( 1) J n 1. By the inuction hypothesis applie to the sets D an {D j : x D j }, we have J C 1 ( 1) J n 1. Finally, C 1 C 0 an J C if an only if J C 0 C 1, so we have J C ( 1) J = J C 0 ( 1) J J C 1 ( 1) J, from which it follows that J C ( 1) J n. Putting these bouns together, we see that a i is boune above by an exponential function of i, an hence: Theorem 4.5. If < l max, the power series in Equation (5) has a positive raius of convergence. The power series also has a positive raius of convergence if for every noe v, every connecte component of G \ {v} contains strictly fewer than l max neighbors of v. 5 Comparing Cliques, Trees, an Trees of Triangles 5.1 Comparing T to K +1 In the introuction, we note that it is easy to ientify two istinct settings of the parameters for µ for which K +1 has uniquely optimal µ-risk among connecte -regular graphs. First, when l max = 1, the probability the root fails is monotonic in the size of the connecte component that contains it, an K +1 uniquely minimizes this for connecte -regular graphs. But K +1 is also uniquely optimal for larger values of l max, when µ assigns every label to be either 0 or l max. Inee, in this case, the only way the root can fail in K +1 is if at least l max of its neighbors fail. This event also causes the root to fail in any connecte -regular graph G, but when G K +1 there are other positive-probability events that also cause the root to fail, so again K +1 is uniquely optimal. As a first application of our power-series technique, we now show that there are parameter settings for which T has lower root failure probability than K +1. For this comparison, we consier µ such that l max =, an label 0 has probability s, while label 1 has probability t, where s an t are small quantities that will be efine precisely later. Observe that when l max =, T satisfies the hypothesis of Lemma 4., Part, an hence its power series has a positive raius of convergence. The power series for K +1 is actually a polynomial in s an t, since K +1 is a finite graph, so its raius of convergence is infinite. Let us work out some of the low-egree terms for T an for K +1. For T, the coefficient on the term s is 1, corresponing to the MERF in which the root gets labele 0. The coefficient on the term st is, corresponing to MERFs in which the root gets labele 1 an any one of the root s neighbors gets labele 0. There are no inclusion-exclusion corrections contributing to either of these coefficients. For K +1, the coefficient on the term s is 1, as in T, corresponing to the root getting labele 0. However, the coefficient on the term st is : there are MERFs in which the root gets labele 1 an any one of the root s neighbors gets labele 0; there are also ( 1) more MERFs in which one neighbor of the root gets labele 0 an another gets labele 1. Now, suppose we set s = t 3. Then the power series for the root failure probability in T is t 3 + t 4 + O(t 5 ), whereas the power series for the root failure probability in K 4 is t 3 + t 4 + O(t 5 ). 13

14 Figure : The tree of triangles for = 3. The O(t 5 ) estimate of the error term is vali insie the power series raius of convergence. Hence, for t sufficiently small an s = t 3, we fin that f µ(t ) < f µ(k +1 ). We have thus shown Theorem 5.1. For each 3, there exists a µ Γ for which T has strictly lower µ-risk than K Comparing to K +1 an T We now show that when >, the graphs {K +1, T } o not form a sufficient set for Γ. We o this by establishing the following theorem. Theorem 5.. For each 3, there exists a µ Γ for which the -regular tree of triangles has strictly lower µ-risk than either T or K +1. The -regular tree of triangles is a graph consisting of a collection of isjoint triangles connecte accoring to the structure of T 3 6 : it is the graph obtaine by starting from T 3 6 an replacing each noe u (with neighbors v 1,..., v 3 6 in T 3 6 ) by three noes {u 1, u, u 3 }. These three noes u 1, u, u 3 are mutually connecte into a triangle, an u i is also connecte to one noe in each of the triangles that replaces v j, for j = (i 1)( ) + 1,..., i( ). We raw a small portion of s repeating structure, in the case = 3, in Figure. We construct the istribution µ in Theorem 5. from a small perturbation of the fixe threshol l max = 3. To analyze the root failure probability in in this case, we first observe that its power series has a positive raius of convergence for all 3, since satisfies the hypothesis of Lemma 4., Part. (A connecte component of \ {v} can contain at most neighbors of v.) Thus, we can compare the root failure probabilities in, K +1, an T by comparing low-egree terms in their power series, as we i when we compare K +1 with T in Section 5.1. Because the calculations are somewhat lengthy, we present them in Appenix A rather than in the main text. 6 Comparing T to an arbitrary -regular graph In Section 5.1 we compare f µ(t ) with f µ(k +1 ), for 3, when µ is a small perturbation of l max = that is, when (µ(0), µ(1), µ()) = (s, t, 1 s t). We saw that the tree has strictly 14

15 lower µ-risk than the clique when t is sufficiently small an s is sufficiently small relative to t. Generalizing this, the same power-series technique can be use to show that for any connecte -regular graph other than T, one can fin a setting of s, t > 0 such that f µ(t ) < f µ(g). This will establish the following theorem, the proof of which is the main focus of the present section. Theorem 6.1. For each 3 an each graph G G, there exists a µ G Γ for which T has strictly lower µ G -risk than G. Most of the proof applies to all values of 3. At the en of the analysis, we separately hanle the cases of = 3 an > 3. Focusing on = 3 first allows us to use the conition that < l max = 4 an hence ensure that the root failure probability in the graph G has a power series expansion with a positive raius of convergence. After analyzing the case of = 3, we exten the proof to > 3; this still epens on evaluating power series coefficients but requires some new techniques to hanle the potential non-convergence of the power series for G. But to begin with, we allow 3 to be arbitrary. Since G is a connecte graph that is not a tree, it has finite girth L. Let r be a noe of G that belongs to an L-cycle, an let r be an arbitrary noe of T = T. Applying the results of Section 4, we will be bouning the probabilities f µ (G, r) an f µ (T, r ) using sums of monomials s λ inexe by UMERFs λ. Any such monomial s λ = s i t j has i 1: all MERFs have at least one threshol-zero noe, since otherwise the faile set is empty. We will be setting s = t L 1, so that all the monomials whose magnitue is greater than t L 1 are of the form st j (0 j L ). Focusing, therefore, on UMERFs λ having i(λ) = (1, j), we will establish the facts summarize in the following lemma. Lemma 6.. Let G be any -regular graph of girth L. (1) If λ is any UMERF in G such that i(λ) = (1, j), where 0 j L, then λ is a MERF. () When 0 j < L, there is a one-to-one corresponence between MERFs λ such that i(λ) = (1, j) in G an in T = T. (3) When j = L, G has strictly more MERFs with i(λ) = (1, j) than oes T. Proof. Let λ be a UMERF such that i(λ) = (1, j), 0 j L, an let v be the unique noe in Dom(λ) such that l(v) = 0. If we exten λ to a labeling l by assigning threshol to every noe not in Dom(λ), then the faile set Φ (G, l) is, by Lemma.1, the union of an increasing sequence of sets Φ 0 (G, l) Φ 1 (G, l). Each of these inuces a connecte subgraph containing v, since the initial set Φ 0 (G, l) is the singleton {v}, an a noe belonging to Φ i (G, l) must have at least one neighbor in Φ i 1 (G, l). Now consier the smallest i (if any) such that Φ i (G, l) contains a noe w Dom(λ). As l(w) =, the noe w must have two neighbors x, y Φ i 1 (G, l). Combining the eges (w, x), (w, y) with a path from x to y in Φ i 1 (G, l) we obtain a cycle in G whose vertex set belongs to {w} Dom(λ), a set of carinality j +. When j < L, this contraicts our assumption that G has girth L, an thus we may conclue that Φ (G, l) = Dom(λ). In this case, the inuce subgraph on Dom(λ) is a tree containing v an r, an in fact it must be a path connecting v to r. (Any threshol-1 noes in Dom(λ) lying outsie this path cannot belong to any MERF, contraicting our assumption that λ is a UMERF.) It follows that λ is a MERF, an that the number of such MERFs, for a specifie value of j, is equal to the number of j-hop simple paths in G terminating at r. Our assumption that G is -regular, 15

16 with girth greater than j +, implies that every non-backtracking walk of j hops terminating at r is a simple path, an that the vertex sets of all these simple paths are istinct. Consequently, in both G an T the number of MERFs λ such that i(λ) = (1, j) is equal to the number of j-hop non-backtracking walks in a -regular graph, i.e. ( 1) j 1. When j = L, the set Φ (G, λ) inuces either a tree (in which case, by the same reasoning as before, it must be a j-hop path from v to r) or an L-cycle containing a single noe w such that l(w) =, a single noe v with l(v) = 0, an all other noes having label 1. In the latter case, our assumption that every noe in Dom(λ) belongs to a MERF implies either that w = r, or that v, w, r occur consecutively on the cycle C an that C \ {w} is a j-hop path from v to r. Finally, it is easy to see that in all of these cases, λ is a MERF. We have thus shown that every UMERF in G with i(λ) = (1, L ) is a MERF, an that the number of these MERFs is at least ( 1) L 3 + L 1. Here, ( 1) L 3 counts the number of (L )-hop paths terminating at the root which is also the coefficient of st L in the power series for T an L 1 counts the number of ways of labeling C \ {r} with a single 0 an L 1 s. Proof of Theorem 6.1, = 3 case. As < l max, the power series for f µ (G, r) an f µ (T, r ) converge for sufficiently small s an t. Thus the ifference f µ (G, r) f µ (T, r ), may be expresse as i=(i,j) (ag ij at ij )si t j where a G ij an at ij are the power series coefficients in (5) for G an T, respectively. Grouping the terms into those with Li + j L an those with Li + j L 1, we fin that the first set of terms inclues only pairs (i, j) such that i = 1, 0 j L, an by Lemma 6., (a G ij a T ij)s i t j = (a G 1,L a T 1,L )st L (L 1)t L. (6) Li+j L Recall, from Lemmas 4.3 an 4.4, that the number of UMERFs λ such that i(λ) = (i, j) is boune above by ( + 1) 3(+1)(i+j) an that the coefficient k ( 1)k+1 a k λ for each of them is boune by i+j in absolute value. Thus, (a G ij a T ij)s i t j Li+j L 1 i+j+1 ( + 1) 3(+1)(i+j) t Li+j k=l 1 Li+j=k < k k+1 ( + 1) 3(+1)k t k < k=l 1 k=l 1 [4( + 1) 3(+1) t] k = ( 4( + 1) 3(+1) ) L 1 t L 1 1 4( + 1) 3(+1), t where the last line is justifie as long as the enominator is strictly positive. By choosing t sufficiently small, we can ensure not only that the enominator is strictly positive but that the quantity on the last line is less than t L. Then, the positive (L 1)t L contribution from the low-egree terms in the power series more than offsets the possibly negative contribution from the high-egree terms, an this proves that f µ (G, r) > f µ (T, r ), as claime. Proof of Theorem 6.1, > 3 case. When comparing the infinite -regular tree T against another connecte -regular graph G when l max, a tricky issue arises because the power series for G nee not converge. Recall, however, that the power series for T still converges. Thus, to 16

17 compute the root failure probablity f µ (T, r ) we will continue to use the full power series, an we will continue to enote it by i,j at ij si t j. To estimate f µ (G, r) we must aopt a ifferent approach. Specifically, we number MERFs m(1), m(),... in orer of increasing Li + j, where (i, j) = i(m). Instea of taking the union of the entire countable sequence of events E(m(k)) (k = 1,,...) we truncate this sequence at the highest value of n such that i(m(n)) = (i, j) with Li + j L. We boun f µ (G, r) from below by Pr ( n i=1 E(m(i))) an evaluate this probability using (4). Denote the resulting polynomial by i,j ag ij si t j. Note that it is a polynomial, not a power series, since we are taking a union of only finitely many events, each escribe by a MERF. With this revise interpretation of the coefficients a G ij, the boun in Equation (6) is once again justifie by Lemma 6.. To boun the remainer term Li+j L 1 (ag ij at ij )si t j from above, we use (a G ij a T ij)s i t j a G ijs i t j + a T ijs i t j (7) Li+j L 1 Li+j L 1 Li+j L 1 an eal with each term on the right-han sie separately. The secon term, involving power series coefficients of T, is ealt with exactly as before, yieling an upper boun of orer O(t L 1 ) for that term as t 0. The first term is a polynomial in s an t, not a power series. Upon substituting s = t L, it becomes a univariate polynomial in t, in which each monomial has an exponent of L 1 or higher. No matter how large the coefficients of this polynomial may be, they are finite, an so as t 0 the absolute value of the polynomial is O(t L 1 ). Thus, the right-han sie of (7) is O(t L 1 ) as t 0, an as before the proof finishes by observing that for small enough t this error term cannot possibly offset the positive (L 1)t L contribution from the low-egree terms. The conclusion is that ( n ) Pr E(m(i)) f µ (T, r ) (L 1)t L O(t L 1 ) G i=1 as t 0. Recalling that f µ (G, r) Pr G ( n i=1 E(m(i))), we conclue that the failure probability of r in G excees the failure probability of r in T. 6.1 A Connection to Sufficient Sets A strengthening of Theorem 6.1 has a consequence for sufficient sets, as we now iscuss. (Recall that a set of graphs H G is a sufficient set for Γ if for each µ Γ, at least one member of H achieves the minimum µ-risk over all graphs in G.) We first escribe the relevant strengthening of the theorem. Notice that the proof of Theorem 6.1 in fact shows something stronger than was claime. If we have any finite set of graphs H G, none of which is T, then we can efine L to be the maximum girth of any graph in H. Using this value of L, we can efine a istribution µ just as before, an the analysis in the proof of Theorem 6.1 then irectly establishes the following. Theorem 6.3. For every finite set H of connecte -regular graphs, there is a istribution µ H Γ for which T achieves strictly lower µ H -risk than each member of H. In other wors, rather than simply being more resilient than any single other graph G at some point in Γ, the tree T is in fact simultaneously more resilient than any finite set of other graphs at some point in Γ. 17

18 From this stronger form of the result, we obtain the following immeiate consequence. Theorem 6.4. When 3, there is no sufficient set of size for Γ. Proof. If there were such a set H G of size, then it woul have to contain K +1, since K +1 uniquely minimizes the µ-risk for some istributions µ Γ. The other graph in H can t be T, since by Theorem 5. there are µ for which has strictly lower µ-risk than both K +1 an T. But if the other graph in H were some G T, then by Theorem 6.3 we coul fin a µ for which T has lower µ-risk than both K +1 an G, an so this is not possible either. References [1] Franklin Allen an Douglas M. Gale. Financial contagion. Journal of Political Economy, 108(1):1 33, February 000. [] Roy M. Anerson an Robert M. May. Infectious Diseases of Humans. Oxfor University Press, 199. [3] Chalee Asavathiratham, Sanip Roy, Bernar Lesieutre, an George Verghese. The influence moel. IEEE Control Systems Magazine, 1(6):5 64, December 001. [4] Larry Blume, Davi Easley, Jon Kleinberg, Robert Kleinberg, an Éva Taros. Network formation in the presence of contagious risk. In Proc. 1th ACM Conference on Electronic Commerce, 011. [5] Bela Bollobás. Ranom Graphs. Cambrige University Press, secon eition, 001. [6] Damon Centola an Michael Macy. Complex contagions an the weakness of long ties. American Journal of Sociology, 113:70 734, 007. [7] J. T. Cox an Richar Durrett. Nonlinear voter moels. In Richar Durrett an Harry Kesten, eitors, Ranom Walks, Brownian Motion, an Interacting Particle Systems, pages Birkhauser, [8] Peter Dos an Duncan Watts. Universal behavior in a generalize moel of contagion. Physical Review Letters, 9(18701), 004. [9] Mark Granovetter. Threshol moels of collective behavior. American Journal of Sociology, 83: , [10] Davi Kempe, Jon Kleinberg, an Éva Taros. Maximizing the sprea of influence in a social network. In Proc. 9th ACM SIGKDD International Conference on Knowlege Discovery an Data Mining, pages , 003. [11] Stephen Morris. Contagion. Review of Economic Stuies, 67:57 78, 000. [1] Elchanan Mossel an Sebastien Roch. On the submoularity of influence in social networks. In Proc. 39th ACM Symposium on Theory of Computing, 007. [13] Thomas Schelling. Micromotives an Macrobehavior. Norton, [14] Duncan J. Watts. A simple moel of global cascaes on ranom networks. Proc. Natl. Aca. Sci. USA, 99(9): , April

19 A Power-Series Computations Comparing to K +1 an T In this appenix, we provie the etails of the power-series computations that establish a istribution µ Γ for which the -regular tree of triangles has strictly lower µ-risk than both K +1 an T. To fin a choice of parameters for which has lower root failure probability than either T or K +1, we consier istributions µ for which we have (µ(0), µ(1), µ(), µ(3)) = (s, t, u, 1 s t u) for small s, t, an u, an µ(j) = 0 for j > 3. This is a small perturbation of a efault threshol of l max = 3. Recall that in this case, Theorem 4.5 justifies using a power series for the root failure probability in both T an ; the use of a power series for K +1 is justifie because K +1 is a finite graph, hence its power series is really a polynomial. We can procee by comparing the monomials associate with these three graphs. It will turn out to be sufficient to go up to monomials of total egree at most 3 in orer to ientify choices for s, t, an u efining our istribution µ. We work out the coefficients on all monomials of total egree up to 3, as follows. We o this tersely, listing the MERFs an UMERFs that account for each. We also omit terms without a factor of s, since every MERF an UMERF must assign at least one label of 0. For K +1 : 1s: The root gets label 0. 0s : No MERF or UMERF can assign only two labels of 0, since no thir noe will fail. st: The root gets label 1 an one neighbor gets label 0. 0su: No MERF or UMERF can assign just one 0 an one, since the noe with label will not fail. ( 3) s 3 : There is a MERF for each 3-tuple of neighbors who are assigne labels of 0. ( ) ( 3)s t: There are ( ) ( ) MERFs contributing to this term: in each, two of the root s neighbors are labele 0, an a thir is labele 1. There are also ( ) UMERFs contributing to this term: in each, two neighbors of the root are labele 0 an the root is labele 1. Each of these UMERFs can be written as the union of two MERFs (the root labele 1 an a neighbor labele 0), so each contributes 1. Thus the total is ( ) ( 3). ( ) ( 1)s u: There are ( ) MERFs where the root gets labele an two neighbors are labele 0; there are ( ) ( ) more MERFs where two neighbors of the root are labele 0 an a thir is labele. ( ) ( )st : Two neighbors of the root get label 1 an a thir gets label 0. 0su : A single 0 cannot cause any noes of label to fail. ( 1) stu: There are ( 1) MERFs where the root has label, one neighbor has label 0, an another has label 1. There are ( 1)( ) more MERFs where the three of the neighbors have labels 0, 1, an in some orer. For T, the terms of total egree up to, as well as the s 3 an su terms, are the same as for K +1, an by the same arguments. For the other egree-3 terms: 19

20 ( ) s t: The ( ) ( ) MERFs from K+1 for this term are not present in T, but the ( ) UMERFs each contributing 1 are. ( ) s u: There are ( ) MERFs where the root gets labele an two neighbors are labele 0. (The other ( ) ( ) MERFs from K+1, where two neighbors of the root are labele 0 an a thir is labele, are not present here.) ( 1)st : A granchil of the root gets label 0, an the parent of this chil together with the root get label 1. 0stu: There is no MERF or UMERF that assigns labels of 0, 1, an to three noes. For, we think of the root r as having neighbor set Z = {v 0, v 1, v,..., v 1 }, where the only ege among the noes in Z is between v 0 an v 1. We will refer to neighbors of Z that o not belong to the set Z {r} as epth-two neighbors. Again the terms of total egree up to, as well as the s 3 an su terms, are the same as for K +1, an by the same arguments. For the other egree-3 terms: (( ) ( ) )s t: There are ( ) UMERFs each contributing 1 as in K+1 an T, an there are also ( ) MERFs in which one of v 0 or v 1 is labele 0, the other is labele 1, an a neighbor of the root in Z {v 0, v 1 } is labele 0. ( ) s u: We get the ( ) MERFs that were present in T, but not the aitional ( ) ( ) that were present in K +1. ( + 1)( )st : There are ( )( 1) MERFs where the root an a noe w Z {v 0, v 1 } are labele 1, an one of w s epth-two neighbors is labele 0. There are ( ) more MERFs where, for i {0, 1}, the root an v i are labele 1, an one of v i s epth-two neighbors is labele 0. stu: The root is labele, one of v 0 or v 1 is labele 1, an the other is labele 0. For one of these graphs G, let f G (s, t, u) enote the root failure probability, an let g G (s, t, u) enote the sum of all terms in the power series of total egree 4 an higher. Then we have [( ) ( ( ))] [( ) ( )] f K+1 (s, t, u) f (s, t, u) = ( 3) ( ) s t + ( 1) s u [( ) ] + ( ) ( + 1)( ) st + [ ( 1) ] stu +(g K+1 (s, t, u) g (s, t, u)) [( ) ] [( ) ] = ( )s t + ( ) s u [( ) ] + ( + 1) ( )st + [ ( 1) ] stu +(g K+1 (s, t, u) g (s, t, u)) 0

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions A Generalization of Sauer s Lemma to Classes of Large-Margin Functions Joel Ratsaby University College Lonon Gower Street, Lonon WC1E 6BT, Unite Kingom J.Ratsaby@cs.ucl.ac.uk, WWW home page: http://www.cs.ucl.ac.uk/staff/j.ratsaby/

More information

Factoring Dickson polynomials over finite fields

Factoring Dickson polynomials over finite fields Factoring Dickson polynomials over finite fiels Manjul Bhargava Department of Mathematics, Princeton University. Princeton NJ 08544 manjul@math.princeton.eu Michael Zieve Department of Mathematics, University

More information

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION MAXIMUM-LIKELIHOOD ESTIMATION The General Theory of M-L Estimation In orer to erive an M-L estimator, we are boun to make an assumption about the functional form of the istribution which generates the

More information

Firewall Design: Consistency, Completeness, and Compactness

Firewall Design: Consistency, Completeness, and Compactness C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,

More information

Math 230.01, Fall 2012: HW 1 Solutions

Math 230.01, Fall 2012: HW 1 Solutions Math 3., Fall : HW Solutions Problem (p.9 #). Suppose a wor is picke at ranom from this sentence. Fin: a) the chance the wor has at least letters; SOLUTION: All wors are equally likely to be chosen. The

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS Contents 1. Moment generating functions 2. Sum of a ranom number of ranom variables 3. Transforms

More information

Web Appendices to Selling to Overcon dent Consumers

Web Appendices to Selling to Overcon dent Consumers Web Appenices to Selling to Overcon ent Consumers Michael D. Grubb MIT Sloan School of Management Cambrige, MA 02142 mgrubbmit.eu www.mit.eu/~mgrubb May 2, 2008 B Option Pricing Intuition This appenix

More information

Answers to the Practice Problems for Test 2

Answers to the Practice Problems for Test 2 Answers to the Practice Problems for Test 2 Davi Murphy. Fin f (x) if it is known that x [f(2x)] = x2. By the chain rule, x [f(2x)] = f (2x) 2, so 2f (2x) = x 2. Hence f (2x) = x 2 /2, but the lefthan

More information

Web Appendices of Selling to Overcon dent Consumers

Web Appendices of Selling to Overcon dent Consumers Web Appenices of Selling to Overcon ent Consumers Michael D. Grubb A Option Pricing Intuition This appenix provies aitional intuition base on option pricing for the result in Proposition 2. Consier the

More information

Modelling and Resolving Software Dependencies

Modelling and Resolving Software Dependencies June 15, 2005 Abstract Many Linux istributions an other moern operating systems feature the explicit eclaration of (often complex) epenency relationships between the pieces of software

More information

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations This page may be remove to conceal the ientities of the authors An intertemporal moel of the real exchange rate, stock market, an international ebt ynamics: policy simulations Saziye Gazioglu an W. Davi

More information

2r 1. Definition (Degree Measure). Let G be a r-graph of order n and average degree d. Let S V (G). The degree measure µ(s) of S is defined by,

2r 1. Definition (Degree Measure). Let G be a r-graph of order n and average degree d. Let S V (G). The degree measure µ(s) of S is defined by, Theorem Simple Containers Theorem) Let G be a simple, r-graph of average egree an of orer n Let 0 < δ < If is large enough, then there exists a collection of sets C PV G)) satisfying: i) for every inepenent

More information

A Comparison of Performance Measures for Online Algorithms

A Comparison of Performance Measures for Online Algorithms A Comparison of Performance Measures for Online Algorithms Joan Boyar 1, Sany Irani 2, an Kim S. Larsen 1 1 Department of Mathematics an Computer Science, University of Southern Denmark, Campusvej 55,

More information

Ch 10. Arithmetic Average Options and Asian Opitons

Ch 10. Arithmetic Average Options and Asian Opitons Ch 10. Arithmetic Average Options an Asian Opitons I. Asian Option an the Analytic Pricing Formula II. Binomial Tree Moel to Price Average Options III. Combination of Arithmetic Average an Reset Options

More information

Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany

Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany Parameterize Algorithms for -Hitting Set: the Weighte Case Henning Fernau Trierer Forschungsberichte; Trier: Technical Reports Informatik / Mathematik No. 08-6, July 2008 Univ. Trier, FB 4 Abteilung Informatik

More information

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines EUROGRAPHICS 2000 / M. Gross an F.R.A. Hopgoo Volume 19, (2000), Number 3 (Guest Eitors) Unsteay Flow Visualization by Animating Evenly-Space Bruno Jobar an Wilfri Lefer Université u Littoral Côte Opale,

More information

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,

More information

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues Minimum-Energy Broacast in All-Wireless Networks: NP-Completeness an Distribution Issues Mario Čagal LCA-EPFL CH-05 Lausanne Switzerlan mario.cagal@epfl.ch Jean-Pierre Hubaux LCA-EPFL CH-05 Lausanne Switzerlan

More information

10.2 Systems of Linear Equations: Matrices

10.2 Systems of Linear Equations: Matrices SECTION 0.2 Systems of Linear Equations: Matrices 7 0.2 Systems of Linear Equations: Matrices OBJECTIVES Write the Augmente Matrix of a System of Linear Equations 2 Write the System from the Augmente Matrix

More information

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market RATIO MATHEMATICA 25 (2013), 29 46 ISSN:1592-7415 Optimal Control Policy of a Prouction an Inventory System for multi-prouct in Segmente Market Kuleep Chauhary, Yogener Singh, P. C. Jha Department of Operational

More information

UNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH

UNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH UNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH OLIVIER BERNARDI AND ÉRIC FUSY Abstract. This article presents unifie bijective constructions for planar maps, with control on the face egrees

More information

Lecture L25-3D Rigid Body Kinematics

Lecture L25-3D Rigid Body Kinematics J. Peraire, S. Winall 16.07 Dynamics Fall 2008 Version 2.0 Lecture L25-3D Rigi Boy Kinematics In this lecture, we consier the motion of a 3D rigi boy. We shall see that in the general three-imensional

More information

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5 Binomial Moel Hull, Chapter 11 + ections 17.1 an 17.2 Aitional reference: John Cox an Mark Rubinstein, Options Markets, Chapter 5 1. One-Perio Binomial Moel Creating synthetic options (replicating options)

More information

Inverse Trig Functions

Inverse Trig Functions Inverse Trig Functions c A Math Support Center Capsule February, 009 Introuction Just as trig functions arise in many applications, so o the inverse trig functions. What may be most surprising is that

More information

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sewoong Oh an Anrea Montanari Electrical Engineering an Statistics Department Stanfor University, Stanfor,

More information

The one-year non-life insurance risk

The one-year non-life insurance risk The one-year non-life insurance risk Ohlsson, Esbjörn & Lauzeningks, Jan Abstract With few exceptions, the literature on non-life insurance reserve risk has been evote to the ultimo risk, the risk in the

More information

Sensitivity Analysis of Non-linear Performance with Probability Distortion

Sensitivity Analysis of Non-linear Performance with Probability Distortion Preprints of the 19th Worl Congress The International Feeration of Automatic Control Cape Town, South Africa. August 24-29, 214 Sensitivity Analysis of Non-linear Performance with Probability Distortion

More information

Digital barrier option contract with exponential random time

Digital barrier option contract with exponential random time IMA Journal of Applie Mathematics Avance Access publishe June 9, IMA Journal of Applie Mathematics ) Page of 9 oi:.93/imamat/hxs3 Digital barrier option contract with exponential ranom time Doobae Jun

More information

On Adaboost and Optimal Betting Strategies

On Adaboost and Optimal Betting Strategies On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore

More information

Mathematics Review for Economists

Mathematics Review for Economists Mathematics Review for Economists by John E. Floy University of Toronto May 9, 2013 This ocument presents a review of very basic mathematics for use by stuents who plan to stuy economics in grauate school

More information

How To Find Out How To Calculate Volume Of A Sphere

How To Find Out How To Calculate Volume Of A Sphere Contents High-Dimensional Space. Properties of High-Dimensional Space..................... 4. The High-Dimensional Sphere......................... 5.. The Sphere an the Cube in Higher Dimensions...........

More information

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014 Consumer Referrals Maria Arbatskaya an Hieo Konishi October 28, 2014 Abstract In many inustries, rms rewar their customers for making referrals. We analyze the optimal policy mix of price, avertising intensity,

More information

Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks

Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks Low-Complexity an Distribute Energy inimization in ulti-hop Wireless Networks Longbi Lin, Xiaojun Lin, an Ness B. Shroff Center for Wireless Systems an Applications (CWSA) School of Electrical an Computer

More information

Reading: Ryden chs. 3 & 4, Shu chs. 15 & 16. For the enthusiasts, Shu chs. 13 & 14.

Reading: Ryden chs. 3 & 4, Shu chs. 15 & 16. For the enthusiasts, Shu chs. 13 & 14. 7 Shocks Reaing: Ryen chs 3 & 4, Shu chs 5 & 6 For the enthusiasts, Shu chs 3 & 4 A goo article for further reaing: Shull & Draine, The physics of interstellar shock waves, in Interstellar processes; Proceeings

More information

Data Center Power System Reliability Beyond the 9 s: A Practical Approach

Data Center Power System Reliability Beyond the 9 s: A Practical Approach Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical

More information

Introduction to Integration Part 1: Anti-Differentiation

Introduction to Integration Part 1: Anti-Differentiation Mathematics Learning Centre Introuction to Integration Part : Anti-Differentiation Mary Barnes c 999 University of Syney Contents For Reference. Table of erivatives......2 New notation.... 2 Introuction

More information

Di usion on Social Networks. Current Version: June 6, 2006 Appeared in: Économie Publique, Numéro 16, pp 3-16, 2005/1.

Di usion on Social Networks. Current Version: June 6, 2006 Appeared in: Économie Publique, Numéro 16, pp 3-16, 2005/1. Di usion on Social Networks Matthew O. Jackson y Caltech Leeat Yariv z Caltech Current Version: June 6, 2006 Appeare in: Économie Publique, Numéro 16, pp 3-16, 2005/1. Abstract. We analyze a moel of i

More information

Calculating Viscous Flow: Velocity Profiles in Rivers and Pipes

Calculating Viscous Flow: Velocity Profiles in Rivers and Pipes previous inex next Calculating Viscous Flow: Velocity Profiles in Rivers an Pipes Michael Fowler, UVa 9/8/1 Introuction In this lecture, we ll erive the velocity istribution for two examples of laminar

More information

A New Evaluation Measure for Information Retrieval Systems

A New Evaluation Measure for Information Retrieval Systems A New Evaluation Measure for Information Retrieval Systems Martin Mehlitz martin.mehlitz@ai-labor.e Christian Bauckhage Deutsche Telekom Laboratories christian.bauckhage@telekom.e Jérôme Kunegis jerome.kunegis@ai-labor.e

More information

Dynamic Network Security Deployment Under Partial Information

Dynamic Network Security Deployment Under Partial Information Dynamic Network Security Deployment Uner Partial nformation nvite Paper) George Theoorakopoulos EPFL Lausanne, Switzerlan Email: george.theoorakopoulos @ epfl.ch John S. Baras University of Marylan College

More information

Fairness in Routing and Load Balancing

Fairness in Routing and Load Balancing Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria

More information

A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements

A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements International Journal of nowlege an Systems Science, 3(), -7, January-March 0 A lame-ase Approach to Generating Proposals for Hanling Inconsistency in Software Requirements eian Mu, Peking University,

More information

Pythagorean Triples Over Gaussian Integers

Pythagorean Triples Over Gaussian Integers International Journal of Algebra, Vol. 6, 01, no., 55-64 Pythagorean Triples Over Gaussian Integers Cheranoot Somboonkulavui 1 Department of Mathematics, Faculty of Science Chulalongkorn University Bangkok

More information

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection Towars a Framework for Enterprise Frameworks Comparison an Selection Saber Aballah Faculty of Computers an Information, Cairo University Saber_aballah@hotmail.com Abstract A number of Enterprise Frameworks

More information

Section 3.3. Differentiation of Polynomials and Rational Functions. Difference Equations to Differential Equations

Section 3.3. Differentiation of Polynomials and Rational Functions. Difference Equations to Differential Equations Difference Equations to Differential Equations Section 3.3 Differentiation of Polynomials an Rational Functions In tis section we begin te task of iscovering rules for ifferentiating various classes of

More information

Cross-Over Analysis Using T-Tests

Cross-Over Analysis Using T-Tests Chapter 35 Cross-Over Analysis Using -ests Introuction his proceure analyzes ata from a two-treatment, two-perio (x) cross-over esign. he response is assume to be a continuous ranom variable that follows

More information

Here the units used are radians and sin x = sin(x radians). Recall that sin x and cos x are defined and continuous everywhere and

Here the units used are radians and sin x = sin(x radians). Recall that sin x and cos x are defined and continuous everywhere and Lecture 9 : Derivatives of Trigonometric Functions (Please review Trigonometry uner Algebra/Precalculus Review on the class webpage.) In this section we will look at the erivatives of the trigonometric

More information

Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition

Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition Mathematical Moels of Therapeutical Actions Relate to Tumour an Immune System Competition Elena De Angelis (1 an Pierre-Emmanuel Jabin (2 (1 Dipartimento i Matematica, Politecnico i Torino Corso Duca egli

More information

Risk Management for Derivatives

Risk Management for Derivatives Risk Management or Derivatives he Greeks are coming the Greeks are coming! Managing risk is important to a large number o iniviuals an institutions he most unamental aspect o business is a process where

More information

Department of Mathematical Sciences, University of Copenhagen. Kandidat projekt i matematik. Jens Jakob Kjær. Golod Complexes

Department of Mathematical Sciences, University of Copenhagen. Kandidat projekt i matematik. Jens Jakob Kjær. Golod Complexes F A C U L T Y O F S C I E N C E U N I V E R S I T Y O F C O P E N H A G E N Department of Mathematical Sciences, University of Copenhagen Kaniat projekt i matematik Jens Jakob Kjær Golo Complexes Avisor:

More information

Optimal Energy Commitments with Storage and Intermittent Supply

Optimal Energy Commitments with Storage and Intermittent Supply Submitte to Operations Research manuscript OPRE-2009-09-406 Optimal Energy Commitments with Storage an Intermittent Supply Jae Ho Kim Department of Electrical Engineering, Princeton University, Princeton,

More information

IPA Derivatives for Make-to-Stock Production-Inventory Systems With Lost Sales

IPA Derivatives for Make-to-Stock Production-Inventory Systems With Lost Sales IPA Derivatives for Make-to-Stock Prouction-Inventory Systems With Lost Sales Yao Zhao Benjamin Melame Rutgers University Rutgers Business School Newark an New Brunswick Department of MSIS 94 Rockafeller

More information

Measures of distance between samples: Euclidean

Measures of distance between samples: Euclidean 4- Chapter 4 Measures of istance between samples: Eucliean We will be talking a lot about istances in this book. The concept of istance between two samples or between two variables is funamental in multivariate

More information

Patch Complexity, Finite Pixel Correlations and Optimal Denoising

Patch Complexity, Finite Pixel Correlations and Optimal Denoising Patch Complexity, Finite Pixel Correlations an Optimal Denoising Anat Levin Boaz Naler Freo Duran William T. Freeman Weizmann Institute MIT CSAIL Abstract. Image restoration tasks are ill-pose problems,

More information

State of Louisiana Office of Information Technology. Change Management Plan

State of Louisiana Office of Information Technology. Change Management Plan State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change

More information

15.2. First-Order Linear Differential Equations. First-Order Linear Differential Equations Bernoulli Equations Applications

15.2. First-Order Linear Differential Equations. First-Order Linear Differential Equations Bernoulli Equations Applications 00 CHAPTER 5 Differential Equations SECTION 5. First-Orer Linear Differential Equations First-Orer Linear Differential Equations Bernoulli Equations Applications First-Orer Linear Differential Equations

More information

Notes on tangents to parabolas

Notes on tangents to parabolas Notes on tangents to parabolas (These are notes for a talk I gave on 2007 March 30.) The point of this talk is not to publicize new results. The most recent material in it is the concept of Bézier curves,

More information

BV has the bounded approximation property

BV has the bounded approximation property The Journal of Geometric Analysis volume 15 (2005), number 1, pp. 1-7 [version, April 14, 2005] BV has the boune approximation property G. Alberti, M. Csörnyei, A. Pe lczyński, D. Preiss Abstract: We prove

More information

Safety Stock or Excess Capacity: Trade-offs under Supply Risk

Safety Stock or Excess Capacity: Trade-offs under Supply Risk Safety Stock or Excess Capacity: Trae-offs uner Supply Risk Aahaar Chaturvei Victor Martínez-e-Albéniz IESE Business School, University of Navarra Av. Pearson, 08034 Barcelona, Spain achaturvei@iese.eu

More information

A New Pricing Model for Competitive Telecommunications Services Using Congestion Discounts

A New Pricing Model for Competitive Telecommunications Services Using Congestion Discounts A New Pricing Moel for Competitive Telecommunications Services Using Congestion Discounts N. Keon an G. Ananalingam Department of Systems Engineering University of Pennsylvania Philaelphia, PA 19104-6315

More information

A Data Placement Strategy in Scientific Cloud Workflows

A Data Placement Strategy in Scientific Cloud Workflows A Data Placement Strategy in Scientific Clou Workflows Dong Yuan, Yun Yang, Xiao Liu, Jinjun Chen Faculty of Information an Communication Technologies, Swinburne University of Technology Hawthorn, Melbourne,

More information

The Quick Calculus Tutorial

The Quick Calculus Tutorial The Quick Calculus Tutorial This text is a quick introuction into Calculus ieas an techniques. It is esigne to help you if you take the Calculus base course Physics 211 at the same time with Calculus I,

More information

Differentiability of Exponential Functions

Differentiability of Exponential Functions Differentiability of Exponential Functions Philip M. Anselone an John W. Lee Philip Anselone (panselone@actionnet.net) receive his Ph.D. from Oregon State in 1957. After a few years at Johns Hopkins an

More information

f(x) = a x, h(5) = ( 1) 5 1 = 2 2 1

f(x) = a x, h(5) = ( 1) 5 1 = 2 2 1 Exponential Functions an their Derivatives Exponential functions are functions of the form f(x) = a x, where a is a positive constant referre to as the base. The functions f(x) = x, g(x) = e x, an h(x)

More information

Exponential time algorithms for graph coloring

Exponential time algorithms for graph coloring Exponential time algorithms for graph coloring Uriel Feige Lecture notes, March 14, 2011 1 Introduction Let [n] denote the set {1,..., k}. A k-labeling of vertices of a graph G(V, E) is a function V [k].

More information

A single minimal complement for the c.e. degrees

A single minimal complement for the c.e. degrees A single minimal complement for the c.e. degrees Andrew Lewis Leeds University, April 2002 Abstract We show that there exists a single minimal (Turing) degree b < 0 s.t. for all c.e. degrees 0 < a < 0,

More information

The influence of anti-viral drug therapy on the evolution of HIV-1 pathogens

The influence of anti-viral drug therapy on the evolution of HIV-1 pathogens DIMACS Series in Discrete Mathematics an Theoretical Computer Science Volume 7, 26 The influence of anti-viral rug therapy on the evolution of HIV- pathogens Zhilan Feng an Libin Rong Abstract. An age-structure

More information

ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 12, June 2014

ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 12, June 2014 ISSN: 77-754 ISO 900:008 Certifie International Journal of Engineering an Innovative echnology (IJEI) Volume, Issue, June 04 Manufacturing process with isruption uner Quaratic Deman for Deteriorating Inventory

More information

An example of a computable

An example of a computable An example of a computable absolutely normal number Verónica Becher Santiago Figueira Abstract The first example of an absolutely normal number was given by Sierpinski in 96, twenty years before the concept

More information

The wave equation is an important tool to study the relation between spectral theory and geometry on manifolds. Let U R n be an open set and let

The wave equation is an important tool to study the relation between spectral theory and geometry on manifolds. Let U R n be an open set and let 1. The wave equation The wave equation is an important tool to stuy the relation between spectral theory an geometry on manifols. Let U R n be an open set an let = n j=1 be the Eucliean Laplace operator.

More information

Given three vectors A, B, andc. We list three products with formula (A B) C = B(A C) A(B C); A (B C) =B(A C) C(A B);

Given three vectors A, B, andc. We list three products with formula (A B) C = B(A C) A(B C); A (B C) =B(A C) C(A B); 1.1.4. Prouct of three vectors. Given three vectors A, B, anc. We list three proucts with formula (A B) C = B(A C) A(B C); A (B C) =B(A C) C(A B); a 1 a 2 a 3 (A B) C = b 1 b 2 b 3 c 1 c 2 c 3 where the

More information

The mean-field computation in a supermarket model with server multiple vacations

The mean-field computation in a supermarket model with server multiple vacations DOI.7/s66-3-7-5 The mean-fiel computation in a supermaret moel with server multiple vacations Quan-Lin Li Guirong Dai John C. S. Lui Yang Wang Receive: November / Accepte: 8 October 3 SpringerScienceBusinessMeiaNewYor3

More information

Mandate-Based Health Reform and the Labor Market: Evidence from the Massachusetts Reform

Mandate-Based Health Reform and the Labor Market: Evidence from the Massachusetts Reform Manate-Base Health Reform an the Labor Market: Evience from the Massachusetts Reform Jonathan T. Kolsta Wharton School, University of Pennsylvania an NBER Amana E. Kowalski Department of Economics, Yale

More information

Net Neutrality, Network Capacity, and Innovation at the Edges

Net Neutrality, Network Capacity, and Innovation at the Edges Net Neutrality, Network Capacity, an Innovation at the Eges Jay Pil Choi Doh-Shin Jeon Byung-Cheol Kim May 22, 2015 Abstract We stuy how net neutrality regulations affect a high-banwith content provier(cp)

More information

Definition of the spin current: The angular spin current and its physical consequences

Definition of the spin current: The angular spin current and its physical consequences Definition of the spin current: The angular spin current an its physical consequences Qing-feng Sun 1, * an X. C. Xie 2,3 1 Beijing National Lab for Conense Matter Physics an Institute of Physics, Chinese

More information

Option Pricing for Inventory Management and Control

Option Pricing for Inventory Management and Control Option Pricing for Inventory Management an Control Bryant Angelos, McKay Heasley, an Jeffrey Humpherys Abstract We explore the use of option contracts as a means of managing an controlling inventories

More information

COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction

COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH ZACHARY ABEL 1. Introduction In this survey we discuss properties of the Higman-Sims graph, which has 100 vertices, 1100 edges, and is 22 regular. In fact

More information

Modeling and Predicting Popularity Dynamics via Reinforced Poisson Processes

Modeling and Predicting Popularity Dynamics via Reinforced Poisson Processes Proceeings of the Twenty-Eighth AAAI Conference on Artificial Intelligence Moeling an Preicting Popularity Dynamics via Reinforce Poisson Processes Huawei Shen 1, Dashun Wang 2, Chaoming Song 3, Albert-László

More information

Exponential Functions: Differentiation and Integration. The Natural Exponential Function

Exponential Functions: Differentiation and Integration. The Natural Exponential Function 46_54.q //4 :59 PM Page 5 5 CHAPTER 5 Logarithmic, Eponential, an Other Transcenental Functions Section 5.4 f () = e f() = ln The inverse function of the natural logarithmic function is the natural eponential

More information

Answer: (a) Since we cannot repeat men on the committee, and the order we select them in does not matter, ( )

Answer: (a) Since we cannot repeat men on the committee, and the order we select them in does not matter, ( ) 1. (Chapter 1 supplementary, problem 7): There are 12 men at a dance. (a) In how many ways can eight of them be selected to form a cleanup crew? (b) How many ways are there to pair off eight women at the

More information

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law Detecting Possibly Frauulent or Error-Prone Survey Data Using Benfor s Law Davi Swanson, Moon Jung Cho, John Eltinge U.S. Bureau of Labor Statistics 2 Massachusetts Ave., NE, Room 3650, Washington, DC

More information

The most common model to support workforce management of telephone call centers is

The most common model to support workforce management of telephone call centers is Designing a Call Center with Impatient Customers O. Garnett A. Manelbaum M. Reiman Davison Faculty of Inustrial Engineering an Management, Technion, Haifa 32000, Israel Davison Faculty of Inustrial Engineering

More information

Lagrangian and Hamiltonian Mechanics

Lagrangian and Hamiltonian Mechanics Lagrangian an Hamiltonian Mechanics D.G. Simpson, Ph.D. Department of Physical Sciences an Engineering Prince George s Community College December 5, 007 Introuction In this course we have been stuying

More information

Search Advertising Based Promotion Strategies for Online Retailers

Search Advertising Based Promotion Strategies for Online Retailers Search Avertising Base Promotion Strategies for Online Retailers Amit Mehra The Inian School of Business yeraba, Inia Amit Mehra@isb.eu ABSTRACT Web site aresses of small on line retailers are often unknown

More information

An Introduction to Event-triggered and Self-triggered Control

An Introduction to Event-triggered and Self-triggered Control An Introuction to Event-triggere an Self-triggere Control W.P.M.H. Heemels K.H. Johansson P. Tabuaa Abstract Recent evelopments in computer an communication technologies have le to a new type of large-scale

More information

11 CHAPTER 11: FOOTINGS

11 CHAPTER 11: FOOTINGS CHAPTER ELEVEN FOOTINGS 1 11 CHAPTER 11: FOOTINGS 11.1 Introuction Footings are structural elements that transmit column or wall loas to the unerlying soil below the structure. Footings are esigne to transmit

More information

136 CHAPTER 4. INDUCTION, GRAPHS AND TREES

136 CHAPTER 4. INDUCTION, GRAPHS AND TREES 136 TER 4. INDUCTION, GRHS ND TREES 4.3 Graphs In this chapter we introduce a fundamental structural idea of discrete mathematics, that of a graph. Many situations in the applications of discrete mathematics

More information

Some Polynomial Theorems. John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 rkennedy@ix.netcom.

Some Polynomial Theorems. John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 rkennedy@ix.netcom. Some Polynomial Theorems by John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 rkennedy@ix.netcom.com This paper contains a collection of 31 theorems, lemmas,

More information

Optimal Control Of Production Inventory Systems With Deteriorating Items And Dynamic Costs

Optimal Control Of Production Inventory Systems With Deteriorating Items And Dynamic Costs Applie Mathematics E-Notes, 8(2008), 194-202 c ISSN 1607-2510 Available free at mirror sites of http://www.math.nthu.eu.tw/ amen/ Optimal Control Of Prouction Inventory Systems With Deteriorating Items

More information

Minimizing Makespan in Flow Shop Scheduling Using a Network Approach

Minimizing Makespan in Flow Shop Scheduling Using a Network Approach Minimizing Makespan in Flow Shop Scheuling Using a Network Approach Amin Sahraeian Department of Inustrial Engineering, Payame Noor University, Asaluyeh, Iran 1 Introuction Prouction systems can be ivie

More information

Stock Market Value Prediction Using Neural Networks

Stock Market Value Prediction Using Neural Networks Stock Market Value Preiction Using Neural Networks Mahi Pakaman Naeini IT & Computer Engineering Department Islamic Aza University Paran Branch e-mail: m.pakaman@ece.ut.ac.ir Hamireza Taremian Engineering

More information

Algebra Unpacked Content For the new Common Core standards that will be effective in all North Carolina schools in the 2012-13 school year.

Algebra Unpacked Content For the new Common Core standards that will be effective in all North Carolina schools in the 2012-13 school year. This document is designed to help North Carolina educators teach the Common Core (Standard Course of Study). NCDPI staff are continually updating and improving these tools to better serve teachers. Algebra

More information

How To Segmentate An Insurance Customer In An Insurance Business

How To Segmentate An Insurance Customer In An Insurance Business International Journal of Database Theory an Application, pp.25-36 http://x.oi.org/10.14257/ijta.2014.7.1.03 A Case Stuy of Applying SOM in Market Segmentation of Automobile Insurance Customers Vahi Golmah

More information

Interference Mitigation Techniques for Spectral Capacity Enhancement in GSM Networks

Interference Mitigation Techniques for Spectral Capacity Enhancement in GSM Networks I.J. Wireless an Microwave Technologies, 04,, 0-49 Publishe Online January 04 in MECS(http://www.mecs-press.net) OI: 0.585/ijwmt.04.0.03 Available online at http://www.mecs-press.net/ijwmt Interference

More information

Product Differentiation for Software-as-a-Service Providers

Product Differentiation for Software-as-a-Service Providers University of Augsburg Prof. Dr. Hans Ulrich Buhl Research Center Finance & Information Management Department of Information Systems Engineering & Financial Management Discussion Paper WI-99 Prouct Differentiation

More information

CALCULATION INSTRUCTIONS

CALCULATION INSTRUCTIONS Energy Saving Guarantee Contract ppenix 8 CLCULTION INSTRUCTIONS Calculation Instructions for the Determination of the Energy Costs aseline, the nnual mounts of Savings an the Remuneration 1 asics ll prices

More information

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND art I. robobabilystic Moels Computer Moelling an New echnologies 27 Vol. No. 2-3 ransport an elecommunication Institute omonosova iga V-9 atvia MOEING OF WO AEGIE IN INVENOY CONO YEM WIH ANOM EA IME AN

More information

X On Bitcoin and Red Balloons

X On Bitcoin and Red Balloons X On Bitcoin an Re Balloons Moshe Babaioff, Microsoft Research, Silicon Valley. moshe@microsoft.com Shahar Dobzinski, Department of Computer Science, Cornell University. shahar@cs.cornell.eu Sigal Oren,

More information

Optimizing Multiple Stock Trading Rules using Genetic Algorithms

Optimizing Multiple Stock Trading Rules using Genetic Algorithms Optimizing Multiple Stock Traing Rules using Genetic Algorithms Ariano Simões, Rui Neves, Nuno Horta Instituto as Telecomunicações, Instituto Superior Técnico Av. Rovisco Pais, 040-00 Lisboa, Portugal.

More information

Two-Sided Matching Theory

Two-Sided Matching Theory Two-Sided Matching Theory M. Utku Ünver Boston College Introduction to the Theory of Two-Sided Matching To see which results are robust, we will look at some increasingly general models. Even before we

More information