On Wiretap Networks II

Size: px
Start display at page:

Download "On Wiretap Networks II"

Transcription

1 O Wiretap Networks II alim Y. El Rouayheb ECE Departmet Texas A&M Uiversity College tatio, TX Emia oljai Math. cieces Ceter Bell Labs, Alcatel-Lucet Murray ill, NJ arxiv: v1 cs.it] 4 Jul 2008 Abstract We cosider the problem of securig a multicast etwork agaist a wiretapper that ca itercept the packets o a limited umber of arbitrary etwork liks of his choice. We assume that the etwork implemets etwork codig techiques to simultaeously deliver all the packets available at the source to all the destiatios. We show how this problem ca be looked at as a etwork geeralizatio of the Ozarow-Wyer Wiretap Chael of type II. I particular, we show that etwork security ca be achieved by usig the Ozarow-Wyer approach of coset codig at the source o top of the implemeted etwork code. This way, we quickly ad trasparetly recover some of the results available i the literature o secure etwork codig for wiretapped etworks. We also derive ew bouds o the required secure code alphabet size ad a algorithm for code costructio. I. INTRODUCTION Cosider a commuicatio etwork represeted as a directed graph G = (V, E) with uit capacity edges, a iformatio source that multicasts iformatio to t receivers R 1,..., R t located at distict odes. Assume that the mi-cut value betwee the source ad each receiver ode is. We kow that a multicast rate of is possible with liear etwork codig 1], 2]. We are here cocered with multicast etworks i which there is a adversary that ca access data o a certai umber of liks of his choice, ad the goal is to maximize the multicast rate with the costrait of revealig o iformatio about the multicast data to the adversary. The problem of makig a liear etwork code iformatio theoretically secure i the presece of a wiretap adversary that ca look at a bouded umber, say µ, of etwork edges was first studied by Cai ad Yeug i 3]. They cosidered directed graphs ad demostrated the existece of a code over a alphabet with at least ( ) µ elemets which ca support a secure multicast rate of up to µ. They also showed that such codes ca be desiged i O( ( ) µ ) steps. The required edge badwidth ad the secure code desig complexity are mai drawbacks of this pioeerig work. Feldma et al. derived trade-offs betwee security, code alphabet size, ad multicaat rate of secure liear etwork codig schemes i 4], by usig ideas from secret sharig ad abstractig etwork topology. Aother approach was take by Jai i 5] who obtaied security by merely exploitig the topology of the etwork i questio. Weakly secure etwork codig (which isures that oly useless iformatio rather tha oe is revealed to the adversary) was studied by Bhattad ad Narayaa i 6], ad practical schemes are missig i this case as well. A related lie of work cosiders a more powerful adversary, oe that ca also modify the packets he observes. Modifyig a certai umber of packets i etworks which oly route iformatio simply results i their icorrect receptio, whereas modifyig the same umber of packets carryig liear combiatios of source packets ca have a more harmful effect sice it ca result i icorrect decodig of all source packets. uch attacks are i etwork codig literature kow as Byzatie modificatios, ad the Byzatie modificatio detectio i etworks implemetig radom etwork codig was studied by o et al. i 7] ad Jaggi et al. i 8]. The approach they take is to itroduce error correctio codig at the source so that the packets carry ot oly data but also some redudat iformatio derived from data which will help reduce the probability of icorrect decodig. We also fid codig at the source a atural approach to address the iformatio theoretic security of wiretap etworks. I a etwork where the mi-cut value betwee the source ad each receiver ode is ad a adversary ca access up to µ edges of his choice, we itroduce at the source a codig scheme which esures iformatio theoretic security o the Ozarow-Wyer wiretap chael type II, itroduced i 9] ad 10], where the source trasmits symbols to the receiver ad a adversary ca access ay µ of those symbols. Ozarow ad Wyer showed that the maximum umber of symbols (say k) that the source ca commuicate to the receiver securely i the iformatio theoretic sese is equal to µ. They also showed how to ecode the k source symbols ito the chael symbols for secure trasmissio. Clearly, if the chael symbols are multicast over a etwork ot performig codig (liear combiig of the symbols), the k source symbols remai secure i the presece of a adversary with access to ay µ edges. We will illustrate later that this is is ot ecessarily the case whe etwork codig is performed. owever, we will show that a etwork code that preserves security of the k source symbols (coded ito the multicast symbols i the Ozarow-Wyer maer) ca be desiged over a sufficietly large field. With the observatios made by Feldma et al. i 4], it is easy to show that our scheme is actually equivalet to the oe proposed i the pioeerig work of Cai ad Yeug i 3]. owever, with our approach, we ca quickly ad trasparetly recover some of the results available i the literature o secure etwork codig for wiretapped etworks. ice the publicatio of 3] i which the etwork code costructio is based o the work of Li et al. i 2], a umber of simpler etwork code costructio algorithms have bee proposed (see for example 11]), 12]. Computatioal complexity of etwork codig i terms of the umber of codig odes ad ways to miimize

2 it have also bee studied sice the 12], 13], 14]. We will use these results to derive ew bouds o the required secure code alphabet size ad a algorithm for code costructio. This paper is orgaized as follows: I ec. II, we briefly review the Ozarow-Wyer wiretap chael type II problem. I ec. III, we itroduce the etwork geeralizatio of this problem. I ec. IV, we preset a algorithm for secure etwork code desig ad discuss the required code alphabet size. I ec. V, we highlight some coectios of this work with the previous work o secure etwork codig ad more recet work o etwork error correctio. II. WIRETAP CANNEL II We first cosider a poit-to-poit sceario i which the source ca trasmit symbols to the receiver ad a adversary ca access ay µ of those symbols 9], 10]. For this case, we kow that the maximum umber of symbols that the source ca commuicate to the receiver securely i the iformatio theoretic sese is equal to µ. The problem is mathematically formulated as follows. Let = (s 1, s 2,..., s k ) be the radom variable associated with the k iformatio symbols that the source wishes to sed securely, Y = (y 1, y 2,..., y ) the radom variable associated with the symbols that are trasmitted through the oiseless chael betwee the source ad the receiver, ad Z = (z 1, z 2,...,z µ ) the radom variable associated with the wiretapped bits of Y. Whe k µ, there exists a ecodig scheme that maps ito Y so that the ucertaity about is ot reduced by the kowledge of Z ad is completely determied (decodable) by the complete kowledge of Y, that is, ( Z) = () ad ( Y ) = 0. (1) For = 2, k = 1, µ = 1, such a codig scheme ca be orgaized as follows. If the source bit equals 0, the either 00 or 11 is trasmitted through the chael with equal probability. imilarly, if the source bit equals 1, the either 01 or 10 is trasmitted through the chael with equal probability. source bit s 1 : 0 1 codeword y 1 y 2 chose at radom from: {00, 11} {01, 10} It is easy to see that kowledge of either y 1 or y 2 does ot reduce the ucertaity about s 1, whereas the kowledge of both y 1 ad y 2 is sufficiet to completely determie s 1, amely, s 1 = y 1 + y 2. I geeral, k = µ symbols ca be trasmitted securely by a codig scheme based o a, k] liear MD code C F q. I this scheme, the ecoder is a probabilistic device which operates o the space F q, where q is a large eough prime power, partitioed ito q k cosets of C. The k iformatio symbols are take as the sydrome which specifies a coset, ad the trasmitted word is chose uiformly at radom from the specified coset. The decoder recovers the iformatio symbols by simply computig the sydrome of the received word. Because of the properties of MD codes, kowledge ay µ = k or fewer symbols will leave ucertaity of the k iformatio symbols uchaged. The code used i the above example is the 2, 1] repetitio with the parity check matrix = 1 1 ]. (2) III. WIRETAP NETWORK II We ow cosider agai a acyclic multicast etwork G = (V, E) with uit capacity edges, a iformatio source, t receivers, ad the value of the micut to each receiver equal to. The goal is to maximize the multicast rate with the costrait of revealig o iformatio about the multicast data to the adversary that ca access data o ay µ liks. We assume that the adversary kows the implemeted etwork code, i.e. all the coefficiets of the liear combiatios that determie the packets o each edge. Moreover, the adversary is aware of ay shared radomess betwee the source ad the destiatios. The last assumptio rules out the use of traditioal key cryptography to achieve security. We kow that a multicast rate of is possible with liear etwork codig 1], 2]. It is iterestig to ask whether, usig the same etwork code, the source ca multicast k µ symbols securely if it first applies a secure wiretap chael code (as described above) mappig k ito symbols. Naturally, this would be a solutio if a multicast rate of ca be achieved just by routig. Cosider this approach for the butterfly etwork show i Fig. 1 where we have = 2, k = 1, µ = 1. If the source applies the codig scheme described i the previous sectio ad the usual etwork code as i Fig. 1-a, the adversary will be able to immediately lear the source bit if he taps ito ay of the edges BE, EF, ED. Therefore, a etwork code ca brake dow a secure wiretap chael code. owever, if the etwork code is chaged so that ode B combies its iputs over e.g., F 3 ad the BE codig vector is 1 α ] where α is a primitive elemet of F 3 (as i Fig. 1-b), the wiretap chael code remais secure, that is, the adversary caot gai ay iformatio by accessig ay sigle lik i the etwork. Note that the wiretap chael code based o the MD code with = 1 1 ] remais secure with ay etwork code whose BE codig vector is liearly idepedet of 1 1 ]. We will ext show that the source ca multicast k µ symbols securely if it first applies a secure wiretap chael code based o a MD code with a k parity check matrix if the etwork code is such that o liear combiatio of µ = k or fewer codig vectors belogs to the space spaed by the rows of. Let W E deote the set of W = µ edges the wiretapper chooses to observe, ad Z W = (z 1, z 2,..., z µ ) the radom variable associated with the packets carried by the edges i W. Let C W deote the matrix whose rows are the codig vectors associated with the observed edges i W. As i the case of wiretap chael, = (s 1, s 2,...,s k ) deotes the radom variable associated with the k iformatio symbols that the source wishes to sed securely, ad Y = (y 1, y 2,...,y ) the radom variable associated the wiretap chael code symbols. The symbols of Y will be multicast through the etwork by usig liear etwork codig. Cosider (, Y, Z W ) with the security requiremet ( Z W ) = () for all W E: ( Z W ) +(Y Z W ) = (Y Z W ) + ( Y Z W ) } {{ } } {{ } =() =0 (Y Z W ) = (Y Z W ) () 0 rak(c W ) k

3 µ. That is, a b A A WTC II ecoder B s 1 WTC II ecoder B x 1 x 1 + x 2 x 2 D E x 1 + x 2 x 1 + x 2 s 1 x 1 x 1 + αx 2 x 2 E x 1 + αx 2 x 1 + αx 2 R 1 D F R 2 Fig. 1. igle-edge wiretap butterfly etwork with a) isecure etwork code ad b) secure etwork code. ice there is a choice of edges such that rak(c W ) = µ, the maximum rate for secure trasmissio is bouded as k µ. If the boud is achieved with equality, we have (Y Z W ) = 0 ad cosequetly, the system of equatios = Zw] Y CW] has to have uique solutio for all W for which rak(c W ) = C F C rak = for all C CW] W s.t. rak(c W ) = µ. (3) This aalysis essetially proves the followig result: Theorem 1: Let G = (V, E) be a acyclic multicast etwork with uit capacity edges, a iformatio source ad the micut value to each receiver equal to. A wiretap code at the source based o a MD code with a k parity check matrix ad a etwork code such that o liear combiatio of µ = k or fewer codig vectors belogs to the space spaed by the rows of make the etwork iformatio theoretically secure agaist a wiretap adversary who ca observe at most µ k edges. Ay adversary able to observe more tha k edges will have ucertaity about the source smaller tha k. The above aalysis shows that the maximum throughput ca be achieved by applyig a wiretap chael code at the source ad the desigig the etwork code while respectig certai costraits. The decodig of secure source symbols is the merely matrix multiplicatio of the decoded multicast symbols Y. The method gives us a better isight of how much iformatio the adversary gets if he ca access more edges tha the code is desiged for. It also gives us a isight o how to simply desig secure etwork codes i some cases over much smaller alphabets the curretly deemed ecessary. Both claims are illustrated i the example below. IV. NETWORK CODE DEIGN ALPABET IZE The approach described previously i the literature for fidig a secure multicast etwork code cosisted of decouplig the problem of desigig a multicast etwork code ad makig it secure by usig some code o top of it. Feldma et al. showed i 4] that there exist etworks where the above costructio might require a quite large field size. We ivestigate here a differet costructio that, as was hited i the coclusio of 4], exploits the topology of the etwork. This is accomplished by icorporatig the security costraits i the Liear Iformatio Flow (LIF) algorithm of 11] that costructs liear multicast etwork codes i polyomial time i the umber of edges i the graph. The result is a better lower boud o the sufficiet field size. owever, the modified LIF algorithm does ot have polyomial time complexity. We start by givig a brief high level overview of the LIF algorithm of 11]. The iputs of the algorithm are the etwork, the source ode, the t destiatio odes ad the umber of packets that eed to be multicast to all the destiatios. Assumig the mi-cut betwee the source ad ay destiatio is at least, the algorithm outputs a liear etwork code that guaraties the delivery of the packets to all the destiatios. The algorithm starts by 1) fidig t flows F 1, F 2,...,F t of value each, from the source to to each destiatio ad 2) settig t matrices B Fj (oe for each receiver) equal to I The, it goes over the etwork edges, visitig each oe i topological order. I each iteratio, the algorithm fids a suitable local ecodig vector for the visited edge, ad updates the t matrices B Fj, each formed by the global ecodig vectors of the last visited edges i the flow F j. The algorithm maitais the ivariat that the matrices B Fj remai ivertible

4 after each iteratio. Thus, whe it termiates, each destiatio will get liear combiatio of the origial packets that form a full rak system. Thus each destiatio ca solve for these packets by ivertig the correspodig system. A importat result of the previous algorithm, is that a field of size at least t (the umber of destiatios) is always sufficiet for fidig the desired etwork code. As show i 11, Lemma 8], this follows from the fact that a field of size larger or equal to t is actually sufficiet for satisfyig the coditio that the t matrices B Fj are always ivertible. We modify the LIF algorithm so it outputs a secure etwork code i the followig way. We fix the k parity check matrix. WLOG, we assume that the µ packets observed by the wiretapper are liearly idepedet, i.e. rak C W = µ. We deote by e i the edge visited at the i-th iteratio of the LIF algorithm, ad by P i the set of the edges that have bee processed by the ed of it. The, we exted the set of ivariats to make sure that the ] ecodig vectors are chose so the matrices M W = are also ivertible; which by C w Theorem 1 achieves the security coditio. More precisely, usig the same techiques as the origial LIF algorithm, we make sure that by the ed of the ith iteratio, the matrices B Fj ad the matrices M Wi are ivertible; where W i = {e i } W ad W is a subset of P i of order µ 1 = k 1. The total umber of the matrices that eed to be kept ivertible i this modified versio of the LIF algorithm is at most ( ) 1 µ 1 + t (which correspods to the last iteratio). Thus, similarly as i 11, Lemma 8], we obtai the followig improved boud o the alphabet size for secure multicast: Theorem 2: Let G = (V, E) be a acyclic etwork with uit capacity edges, a iformatio source, ad the micut value to each of the t receivers equal to. A secure mulitcast at rate k i the presece of a wiretapper who ca observe at most µ k edges is always possible over the alphabet F q of size ( ) 1 q > + t. (4) µ 1 Boud (4) ca be further improved by realizig as was first doe i 12] that ot all edges i the etwork carry differet liear combiatio of source symbols. Lagberg et al. showed i 13, Thm. 5] that the problem of fidig multicast etwork codes for a etwork G ca be reduced to solvig the same problem for a special equivalet etwork Ĝ with same parameters ad t, which has the properties that all odes except the source ad the destiatios have total degree 3 ad at most 3 t 2 of its odes have i-degree 2. These odes are called ecodig odes, whereas the other oes are called forwardig odes sice the packets carried by their outgoig edges are just copies of the oes available at their sigle icomig edge. Give a etwork code for Ĝ, a oe for G ca be foud efficietly over the same field. Ad, the set of global ecodig vectors of the edges of G would be a subset of the oe of Ĝ. Goig back the security problem over a etwork G, oe ca try to fid a secure etwork code for the equivalet etwork Ĝ, ad the use the procedure described i 13] ad 14] to costruct a etwork code for G which will also be secure. Now cosider the problem of fidig secure etwork codes for Ĝ. This problem will ot chage if the wiretapper is ot allowed to wiretap the forwardig edges. Therefore, the set of edges that the wiretapper might have access to cosists of the ecodig edges ad the edges outgoig from the source, ad is of order 3 t 2 +δ, where δ is the out-degree of the source. Now, applyig Theorem 2 o Ĝ ad takig ito cosideratio the restrictio o the edges that ca be potetially wiretapped, we obtai the followig boud o the sufficiet field size which is idepedet of the size of the etwork. Corollary 1: For the trasmissio sceario of Thm. 2, a secure mulitcast etwork code always exists over the alphabet F q of size ( k 3 t 2 ) + δ q > + t. (5) µ 1 For etworks with two sources, we ca completely settle the questio o the required alphabet size for a secure etwork code. Note that the adversary has to be limited to observig at most oe edge of his choice. Based o the work of Fragouli ad oljai i 12], the codig problem for these etworks is equivalet to a vertex colorig problem of some specially desiged graphs, where the colors are actually the poits o the projective lie PG(1, q): 0 1], 1 0], ad 1 α i ] for 0 i q 2, (6) where α is a primitive elemet of F q. Clearly, ay etwork with two sources ad arbitrary umber of receives ca be securely coded by reducig the set of available colors i (6) by removig poit (color) 1 1] ad applyig a wiretap code based o the matrix = 1 1] as i the example above. Alphabet size sufficiet to securely code all etwork with two sources also follows from 12]: Theorem 3: For ay cofiguratio with two sources t receivers, the code alphabet F q of size 2t 7/4 + 1/2 + 1 is sufficiet for a secure etwork code. There exist cofiguratios for which it is ecessary. The wiretap approach to etwork security also provides the exact alphabet size ad secure code for a class of etworks kow as combiatio etworks ad are illustrated i Fig. 2. There are ( M ) receiver odes. Note that each odes of the R 1 Fig. 2. M Combiatio B(, M) etwork. R ( M h) secod layer are observed by a receiver. It is easy to see that a M + k, ] Reed olomo code ca be used, amely, the

5 first k rows its parity check matrix ca be used for the cosset code ad the rest as the codig vectors of the M edges goig out of the source. V. CONNECTION WIT OTER CEME A umber of coectios betwee secure etwork codig with the cocurret work o etwork error correctio ca be observed 15], 16], 17]. We here describe the relatioship betwee the proposed scheme ad previously kow costructios. Cai ad Yeug were first to study the desig of secure etwork codes for multicast demads 3]. They showed that, i the settig described above, a secure etwork code ca be foud for ay k µ. Their costructio is equivalet to the followig scheme: 1) Geerate a vector R = (r 1, r 2,..., r µ ) T choosig its compoets uiformly at radom over F q, 2) Form vector X by cocateatig the µ radom symbols R to the k source symbols : X = = (s 1,...,s k, r 1,...,r µ ) T R 3) Chose a ivertible matrix over F q ad a liear code multicast (LCM) 2] to esure the security coditio (1). (It is show i 3, Thm. 1] that such LCM ad T ca be foud provided that q > ( ) µ.) 4) Compute Y = TX ad multicast Y to all the destiatios by usig the costructed code. Feldma et al. cosidered also the same problem i 4]. Adoptig the same approach of 3], they showed that i order for the code to be secure, the matrix T should satisfy certai coditios (4, Thm. 6]), that we restate here for coveiece: I the above trasmissio scheme, the security coditio (1) holds if ad oly if ay set of vectors cosistig of 1) at most µ liearly idepedet global edge codig vectors ad/or 2) ay umber of vectors from the first k rows of T 1 is liearly idepedet. They also showed that if oe sacrifices i the umber of iformatio packets, that is, take k < µ, the oe ca fid secure etwork codes over fields of size much smaller tha the very large boud q > ( ) µ. We will ow show that our approach based o codig for the wiretap chael at the source is equivalet to the above stated scheme 3] with the coditios of 4]. Claim 1: Let T ad C be a matrix ad a correspodig secure etwork code satisfyig the above coditios. et = T where T is the k matrix formed by takig the first k rows of T 1. The ad C satisfy the coditio of Thm. 1. Proof: Cosider the secure multicast scheme of 3] as preseted above. For a give iformatio vector F k q, let B() be the set of all possible vectors Y F q that could be multicast through the etwork uder this scheme. More precisely, B() = { Y F q Y = TX, X = R, R F k q The, for all Y B(), we have T Y = T T =. T Therefore, ay Y B() also belogs to the coset of the }. space spaed by the rows of T whose sydrome is equal to. Moreover, sice T is ivertible, B() = 2 k implyig that set B() is exactly that coset. The coditios of 4] as stated above directly traslate ito (3), the remaiig coditio of Thm. 1. VI. CONCLUION We cosidered the problem of securig a multicast etwork implemetig etwork codig agaist a wiretapper capable of observig a limited umber of liks of his choice, as defied iitially by Cai ad Yeug. We showed that the problem ca be formulated as a geeralizatio of the wiretap chael of type II (which was itroduced ad studied by Ozarow ad Wyer), ad decomposed ito two sub-problems: the first oe of desigig a secure wiretap chael code ad the secod of desigig a etwork code satisfyig some additioal costraits. We proved there is o pealty to pay by adoptig this separatio, which we fid i may ways illumiative. ACKNOWLEDGMENT The authors would like to thak A. pritso for useful discussios about this work ad C. N. Georghiades for his cotiued support. REFERENCE 1] R. Ahlswede, N. Cai, -Y. R. Li, ad R. W. Yeug, Network iformatio flow, IEEE Tras. Iform. Theory, pp , Jul ] -Y. R. Li, R. W. Yeug, ad N. Cai, Liear etwork codig, IEEE Tras. Iform. Theory, vol. 49, pp , Feb ] N. Cai ad R. W. Yeug, ecure etwork codig, i Proc IEEE Iterat. ymp. Iform. Th. (IIT 02), Ju ] J. Feldma, T. Malki, C. tei, ad R. A. ervedio, O the capacity of secure etwork codig, i Proc. 42d Aual Allerto Coferece o Commu., Cotrol, ad Comput., ] K. Jai, ecurity based o etwork topology agaist the wiretappig attack, IEEE Wireless Commuicatios, pp , Feb ] K. Bhattad ad K. R. Narayaa, Weakly secure etwork codig, i Proc. First Workshop o Network Codig, Theory, ad Applicatios (NetCod 05), Apr ] T. o, B. Leog, R. Koetter, M. Medard, M. Effros, ad D. Karger, Byzatie modificatio detectio i multicast etworks usig radomized etwork codig, i Proc IEEE Iterat. ymp. Iform. Th. (IIT 04), Ju ]. Jaggi, M. Lagberg,. Katti, T. o, D. Katabi, ad M. Medard, Resiliet etwork codig i the presece of byzatie adversaries, ] L.. Ozarow ad A. D. Wyer, The wire-tap chael II, Bell yst. Tech. Jour., vol. 63, pp , ], Wire-tap chael II, i Proc. of the EUROCRYPT 84 workshop o Advaces i cryptology: theory ad applicatio of cryptographic techiques. New York, NY, UA: priger-verlag New York, Ic., 1985, pp ]. Jaggi, P. aders, P. Chou, M. Effros,. Eger, K. Jai, ad L. Tolhuize, Polyomial time algorithms for multicast etwork code costructio, IEEE Tras. Iform. Theory, pp , Ju ] C. Fragouli ad E. oljai, Iformatio flow decompositio for etwork codig, IEEE Tras. Iform. Theory, pp , Mar ] M. Lagberg, A. pritso, ad J. Bruck, Network codig: A computatioal perspective, IEEE Tras. Iform. Theory, pp , Ju ], The ecodig complexity of etwork codig, submitted for publicatio. 15] Z. Zhag, Network error correctio codig i packetized etworks, i Proc IEEE It. Iform. Theory Workshop (ITW 06), Chegdu, Chia, Oct ]. Yag ad R. W. Yeug, Characterizatios of etwork error correctio/detectio ad erasure correctio, i Proc. Third Workshop o Network Codig, Theory, ad Applicatios (NetCod 07), a Diego, CA, Ja ] R. Matsumoto, Costructio algorithm for etwork error-correctig codes attaiig the sigleto boud, Olie]. Available:

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

Department of Computer Science, University of Otago

Department of Computer Science, University of Otago Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

Secure Network Coding for Wiretap Networks of Type II

Secure Network Coding for Wiretap Networks of Type II 1 Secure Network Coding for Wiretap Networks of Type II Salim El Rouayheb, Emina Soljanin, Alex Sprintson Abstract We consider the problem of securing a multicast network against a wiretapper that can

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

Lecture 2: Karger s Min Cut Algorithm

Lecture 2: Karger s Min Cut Algorithm priceto uiv. F 3 cos 5: Advaced Algorithm Desig Lecture : Karger s Mi Cut Algorithm Lecturer: Sajeev Arora Scribe:Sajeev Today s topic is simple but gorgeous: Karger s mi cut algorithm ad its extesio.

More information

5 Boolean Decision Trees (February 11)

5 Boolean Decision Trees (February 11) 5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected

More information

A probabilistic proof of a binomial identity

A probabilistic proof of a binomial identity A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria

More information

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return EVALUATING ALTERNATIVE CAPITAL INVESTMENT PROGRAMS By Ke D. Duft, Extesio Ecoomist I the March 98 issue of this publicatio we reviewed the procedure by which a capital ivestmet project was assessed. The

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13 EECS 70 Discrete Mathematics ad Probability Theory Sprig 2014 Aat Sahai Note 13 Itroductio At this poit, we have see eough examples that it is worth just takig stock of our model of probability ad may

More information

Interference Alignment and the Generalized Degrees of Freedom of the X Channel

Interference Alignment and the Generalized Degrees of Freedom of the X Channel Iterferece Aligmet ad the Geeralized Degrees of Freedom of the X Chael Chiachi Huag, Viveck R. Cadambe, Syed A. Jafar Electrical Egieerig ad Computer Sciece Uiversity of Califoria Irvie Irvie, Califoria,

More information

. P. 4.3 Basic feasible solutions and vertices of polyhedra. x 1. x 2

. P. 4.3 Basic feasible solutions and vertices of polyhedra. x 1. x 2 4. Basic feasible solutios ad vertices of polyhedra Due to the fudametal theorem of Liear Programmig, to solve ay LP it suffices to cosider the vertices (fiitely may) of the polyhedro P of the feasible

More information

Capacity of Wireless Networks with Heterogeneous Traffic

Capacity of Wireless Networks with Heterogeneous Traffic Capacity of Wireless Networks with Heterogeeous Traffic Migyue Ji, Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer Egieerig Uiversity of Califoria, Sata

More information

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

MARTINGALES AND A BASIC APPLICATION

MARTINGALES AND A BASIC APPLICATION MARTINGALES AND A BASIC APPLICATION TURNER SMITH Abstract. This paper will develop the measure-theoretic approach to probability i order to preset the defiitio of martigales. From there we will apply this

More information

Hypergeometric Distributions

Hypergeometric Distributions 7.4 Hypergeometric Distributios Whe choosig the startig lie-up for a game, a coach obviously has to choose a differet player for each positio. Similarly, whe a uio elects delegates for a covetio or you

More information

Irreducible polynomials with consecutive zero coefficients

Irreducible polynomials with consecutive zero coefficients Irreducible polyomials with cosecutive zero coefficiets Theodoulos Garefalakis Departmet of Mathematics, Uiversity of Crete, 71409 Heraklio, Greece Abstract Let q be a prime power. We cosider the problem

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. This documet was writte ad copyrighted by Paul Dawkis. Use of this documet ad its olie versio is govered by the Terms ad Coditios of Use located at http://tutorial.math.lamar.edu/terms.asp. The olie versio

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please

More information

Chapter 7 Methods of Finding Estimators

Chapter 7 Methods of Finding Estimators Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of

More information

On the Capacity of Hybrid Wireless Networks

On the Capacity of Hybrid Wireless Networks O the Capacity of Hybrid ireless Networks Beyua Liu,ZheLiu +,DoTowsley Departmet of Computer Sciece Uiversity of Massachusetts Amherst, MA 0002 + IBM T.J. atso Research Ceter P.O. Box 704 Yorktow Heights,

More information

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio

More information

CS103X: Discrete Structures Homework 4 Solutions

CS103X: Discrete Structures Homework 4 Solutions CS103X: Discrete Structures Homewor 4 Solutios Due February 22, 2008 Exercise 1 10 poits. Silico Valley questios: a How may possible six-figure salaries i whole dollar amouts are there that cotai at least

More information

Chapter 5 O A Cojecture Of Erdíos Proceedigs NCUR VIII è1994è, Vol II, pp 794í798 Jeærey F Gold Departmet of Mathematics, Departmet of Physics Uiversity of Utah Do H Tucker Departmet of Mathematics Uiversity

More information

Overview on S-Box Design Principles

Overview on S-Box Design Principles Overview o S-Box Desig Priciples Debdeep Mukhopadhyay Assistat Professor Departmet of Computer Sciece ad Egieerig Idia Istitute of Techology Kharagpur INDIA -721302 What is a S-Box? S-Boxes are Boolea

More information

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

CHAPTER 3 DIGITAL CODING OF SIGNALS

CHAPTER 3 DIGITAL CODING OF SIGNALS CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity

More information

Floating Codes for Joint Information Storage in Write Asymmetric Memories

Floating Codes for Joint Information Storage in Write Asymmetric Memories Floatig Codes for Joit Iformatio Storage i Write Asymmetric Memories Axiao (Adrew Jiag Computer Sciece Departmet Texas A&M Uiversity College Statio, TX 77843-311 ajiag@cs.tamu.edu Vaske Bohossia Electrical

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

Systems Design Project: Indoor Location of Wireless Devices

Systems Design Project: Indoor Location of Wireless Devices Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: bcm1@cec.wustl.edu Supervised

More information

THE ABRACADABRA PROBLEM

THE ABRACADABRA PROBLEM THE ABRACADABRA PROBLEM FRANCESCO CARAVENNA Abstract. We preset a detailed solutio of Exercise E0.6 i [Wil9]: i a radom sequece of letters, draw idepedetly ad uiformly from the Eglish alphabet, the expected

More information

Convexity, Inequalities, and Norms

Convexity, Inequalities, and Norms Covexity, Iequalities, ad Norms Covex Fuctios You are probably familiar with the otio of cocavity of fuctios. Give a twicedifferetiable fuctio ϕ: R R, We say that ϕ is covex (or cocave up) if ϕ (x) 0 for

More information

CME 302: NUMERICAL LINEAR ALGEBRA FALL 2005/06 LECTURE 8

CME 302: NUMERICAL LINEAR ALGEBRA FALL 2005/06 LECTURE 8 CME 30: NUMERICAL LINEAR ALGEBRA FALL 005/06 LECTURE 8 GENE H GOLUB 1 Positive Defiite Matrices A matrix A is positive defiite if x Ax > 0 for all ozero x A positive defiite matrix has real ad positive

More information

Lecture 4: Cauchy sequences, Bolzano-Weierstrass, and the Squeeze theorem

Lecture 4: Cauchy sequences, Bolzano-Weierstrass, and the Squeeze theorem Lecture 4: Cauchy sequeces, Bolzao-Weierstrass, ad the Squeeze theorem The purpose of this lecture is more modest tha the previous oes. It is to state certai coditios uder which we are guarateed that limits

More information

Asymptotic Growth of Functions

Asymptotic Growth of Functions CMPS Itroductio to Aalysis of Algorithms Fall 3 Asymptotic Growth of Fuctios We itroduce several types of asymptotic otatio which are used to compare the performace ad efficiecy of algorithms As we ll

More information

CS103A Handout 23 Winter 2002 February 22, 2002 Solving Recurrence Relations

CS103A Handout 23 Winter 2002 February 22, 2002 Solving Recurrence Relations CS3A Hadout 3 Witer 00 February, 00 Solvig Recurrece Relatios Itroductio A wide variety of recurrece problems occur i models. Some of these recurrece relatios ca be solved usig iteratio or some other ad

More information

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design A Combied Cotiuous/Biary Geetic Algorithm for Microstrip Atea Desig Rady L. Haupt The Pesylvaia State Uiversity Applied Research Laboratory P. O. Box 30 State College, PA 16804-0030 haupt@ieee.org Abstract:

More information

Notes on exponential generating functions and structures.

Notes on exponential generating functions and structures. Notes o expoetial geeratig fuctios ad structures. 1. The cocept of a structure. Cosider the followig coutig problems: (1) to fid for each the umber of partitios of a -elemet set, (2) to fid for each the

More information

Properties of MLE: consistency, asymptotic normality. Fisher information.

Properties of MLE: consistency, asymptotic normality. Fisher information. Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout

More information

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity

More information

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5 Sectio 13 Kolmogorov-Smirov test. Suppose that we have a i.i.d. sample X 1,..., X with some ukow distributio P ad we would like to test the hypothesis that P is equal to a particular distributio P 0, i.e.

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

Example 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here).

Example 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here). BEGINNING ALGEBRA Roots ad Radicals (revised summer, 00 Olso) Packet to Supplemet the Curret Textbook - Part Review of Square Roots & Irratioals (This portio ca be ay time before Part ad should mostly

More information

Lecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009)

Lecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009) 18.409 A Algorithmist s Toolkit October 27, 2009 Lecture 13 Lecturer: Joatha Keler Scribe: Joatha Pies (2009) 1 Outlie Last time, we proved the Bru-Mikowski iequality for boxes. Today we ll go over the

More information

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable Week 3 Coditioal probabilities, Bayes formula, WEEK 3 page 1 Expected value of a radom variable We recall our discussio of 5 card poker hads. Example 13 : a) What is the probability of evet A that a 5

More information

The Power of Free Branching in a General Model of Backtracking and Dynamic Programming Algorithms

The Power of Free Branching in a General Model of Backtracking and Dynamic Programming Algorithms The Power of Free Brachig i a Geeral Model of Backtrackig ad Dyamic Programmig Algorithms SASHKA DAVIS IDA/Ceter for Computig Scieces Bowie, MD sashka.davis@gmail.com RUSSELL IMPAGLIAZZO Dept. of Computer

More information

Chatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand ocpky@hotmail.com

Chatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand ocpky@hotmail.com SOLVING THE OIL DELIVERY TRUCKS ROUTING PROBLEM WITH MODIFY MULTI-TRAVELING SALESMAN PROBLEM APPROACH CASE STUDY: THE SME'S OIL LOGISTIC COMPANY IN BANGKOK THAILAND Chatpu Khamyat Departmet of Idustrial

More information

Firewall Modules and Modular Firewalls

Firewall Modules and Modular Firewalls Firewall Modules ad Modular Firewalls H. B. Acharya Uiversity of Texas at Austi acharya@cs.utexas.edu Aditya Joshi Uiversity of Texas at Austi adityaj@cs.utexas.edu M. G. Gouda Natioal Sciece Foudatio

More information

THE REGRESSION MODEL IN MATRIX FORM. For simple linear regression, meaning one predictor, the model is. for i = 1, 2, 3,, n

THE REGRESSION MODEL IN MATRIX FORM. For simple linear regression, meaning one predictor, the model is. for i = 1, 2, 3,, n We will cosider the liear regressio model i matrix form. For simple liear regressio, meaig oe predictor, the model is i = + x i + ε i for i =,,,, This model icludes the assumptio that the ε i s are a sample

More information

1 Correlation and Regression Analysis

1 Correlation and Regression Analysis 1 Correlatio ad Regressio Aalysis I this sectio we will be ivestigatig the relatioship betwee two cotiuous variable, such as height ad weight, the cocetratio of a ijected drug ad heart rate, or the cosumptio

More information

Domain 1 - Describe Cisco VoIP Implementations

Domain 1 - Describe Cisco VoIP Implementations Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.

More information

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length Joural o Satisfiability, Boolea Modelig ad Computatio 1 2005) 49-60 A Faster Clause-Shorteig Algorithm for SAT with No Restrictio o Clause Legth Evgey Datsi Alexader Wolpert Departmet of Computer Sciece

More information

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks The Fudametal Capacity-Delay Tradeoff i Large Mobile Ad Hoc Networks Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West Lafayette, IN 47907, U.S.A. {lix, shroff}@ec.purdue.edu

More information

Designing Incentives for Online Question and Answer Forums

Designing Incentives for Online Question and Answer Forums Desigig Icetives for Olie Questio ad Aswer Forums Shaili Jai School of Egieerig ad Applied Scieces Harvard Uiversity Cambridge, MA 0238 USA shailij@eecs.harvard.edu Yilig Che School of Egieerig ad Applied

More information

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature. Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.

More information

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY Optimize your Network I the Courier, Express ad Parcel market ADDING CREDIBILITY Meetig today s challeges ad tomorrow s demads Aswers to your key etwork challeges ORTEC kows the highly competitive Courier,

More information

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL.

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL. Auities Uder Radom Rates of Iterest II By Abraham Zas Techio I.I.T. Haifa ISRAEL ad Haifa Uiversity Haifa ISRAEL Departmet of Mathematics, Techio - Israel Istitute of Techology, 3000, Haifa, Israel I memory

More information

Lecture 3. denote the orthogonal complement of S k. Then. 1 x S k. n. 2 x T Ax = ( ) λ x. with x = 1, we have. i = λ k x 2 = λ k.

Lecture 3. denote the orthogonal complement of S k. Then. 1 x S k. n. 2 x T Ax = ( ) λ x. with x = 1, we have. i = λ k x 2 = λ k. 18.409 A Algorithmist s Toolkit September 17, 009 Lecture 3 Lecturer: Joatha Keler Scribe: Adre Wibisoo 1 Outlie Today s lecture covers three mai parts: Courat-Fischer formula ad Rayleigh quotiets The

More information

Major Coefficients Recovery: a Compressed Data Gathering Scheme for Wireless Sensor Network

Major Coefficients Recovery: a Compressed Data Gathering Scheme for Wireless Sensor Network This full text paper was peer reviewed at the directio of IEEE Commuicatios Society subject matter experts for publicatio i the IEEE Globecom proceedigs. Major Coefficiets Recovery: a Compressed Data Gatherig

More information

7.1 Finding Rational Solutions of Polynomial Equations

7.1 Finding Rational Solutions of Polynomial Equations 4 Locker LESSON 7. Fidig Ratioal Solutios of Polyomial Equatios Name Class Date 7. Fidig Ratioal Solutios of Polyomial Equatios Essetial Questio: How do you fid the ratioal roots of a polyomial equatio?

More information

Sequences and Series

Sequences and Series CHAPTER 9 Sequeces ad Series 9.. Covergece: Defiitio ad Examples Sequeces The purpose of this chapter is to itroduce a particular way of geeratig algorithms for fidig the values of fuctios defied by their

More information

Class Meeting # 16: The Fourier Transform on R n

Class Meeting # 16: The Fourier Transform on R n MATH 18.152 COUSE NOTES - CLASS MEETING # 16 18.152 Itroductio to PDEs, Fall 2011 Professor: Jared Speck Class Meetig # 16: The Fourier Trasform o 1. Itroductio to the Fourier Trasform Earlier i the course,

More information

Universal coding for classes of sources

Universal coding for classes of sources Coexios module: m46228 Uiversal codig for classes of sources Dever Greee This work is produced by The Coexios Project ad licesed uder the Creative Commos Attributio Licese We have discussed several parametric

More information

Chapter 5: Inner Product Spaces

Chapter 5: Inner Product Spaces Chapter 5: Ier Product Spaces Chapter 5: Ier Product Spaces SECION A Itroductio to Ier Product Spaces By the ed of this sectio you will be able to uderstad what is meat by a ier product space give examples

More information

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights Ceter, Spread, ad Shape i Iferece: Claims, Caveats, ad Isights Dr. Nacy Pfeig (Uiversity of Pittsburgh) AMATYC November 2008 Prelimiary Activities 1. I would like to produce a iterval estimate for the

More information

Maximum Likelihood Estimators.

Maximum Likelihood Estimators. Lecture 2 Maximum Likelihood Estimators. Matlab example. As a motivatio, let us look at oe Matlab example. Let us geerate a radom sample of size 00 from beta distributio Beta(5, 2). We will lear the defiitio

More information

The Stable Marriage Problem

The Stable Marriage Problem The Stable Marriage Problem William Hut Lae Departmet of Computer Sciece ad Electrical Egieerig, West Virgiia Uiversity, Morgatow, WV William.Hut@mail.wvu.edu 1 Itroductio Imagie you are a matchmaker,

More information

THE ARITHMETIC OF INTEGERS. - multiplication, exponentiation, division, addition, and subtraction

THE ARITHMETIC OF INTEGERS. - multiplication, exponentiation, division, addition, and subtraction THE ARITHMETIC OF INTEGERS - multiplicatio, expoetiatio, divisio, additio, ad subtractio What to do ad what ot to do. THE INTEGERS Recall that a iteger is oe of the whole umbers, which may be either positive,

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

NEW HIGH PERFORMANCE COMPUTATIONAL METHODS FOR MORTGAGES AND ANNUITIES. Yuri Shestopaloff,

NEW HIGH PERFORMANCE COMPUTATIONAL METHODS FOR MORTGAGES AND ANNUITIES. Yuri Shestopaloff, NEW HIGH PERFORMNCE COMPUTTIONL METHODS FOR MORTGGES ND NNUITIES Yuri Shestopaloff, Geerally, mortgage ad auity equatios do ot have aalytical solutios for ukow iterest rate, which has to be foud usig umerical

More information

3. Greatest Common Divisor - Least Common Multiple

3. Greatest Common Divisor - Least Common Multiple 3 Greatest Commo Divisor - Least Commo Multiple Defiitio 31: The greatest commo divisor of two atural umbers a ad b is the largest atural umber c which divides both a ad b We deote the greatest commo gcd

More information

Lecture 4: Cheeger s Inequality

Lecture 4: Cheeger s Inequality Spectral Graph Theory ad Applicatios WS 0/0 Lecture 4: Cheeger s Iequality Lecturer: Thomas Sauerwald & He Su Statemet of Cheeger s Iequality I this lecture we assume for simplicity that G is a d-regular

More information

Building Blocks Problem Related to Harmonic Series

Building Blocks Problem Related to Harmonic Series TMME, vol3, o, p.76 Buildig Blocks Problem Related to Harmoic Series Yutaka Nishiyama Osaka Uiversity of Ecoomics, Japa Abstract: I this discussio I give a eplaatio of the divergece ad covergece of ifiite

More information

Professional Networking

Professional Networking Professioal Networkig 1. Lear from people who ve bee where you are. Oe of your best resources for etworkig is alumi from your school. They ve take the classes you have take, they have bee o the job market

More information

Estimating Probability Distributions by Observing Betting Practices

Estimating Probability Distributions by Observing Betting Practices 5th Iteratioal Symposium o Imprecise Probability: Theories ad Applicatios, Prague, Czech Republic, 007 Estimatig Probability Distributios by Observig Bettig Practices Dr C Lych Natioal Uiversity of Irelad,

More information

Permutations, the Parity Theorem, and Determinants

Permutations, the Parity Theorem, and Determinants 1 Permutatios, the Parity Theorem, ad Determiats Joh A. Guber Departmet of Electrical ad Computer Egieerig Uiversity of Wiscosi Madiso Cotets 1 What is a Permutatio 1 2 Cycles 2 2.1 Traspositios 4 3 Orbits

More information

Trackless online algorithms for the server problem

Trackless online algorithms for the server problem Iformatio Processig Letters 74 (2000) 73 79 Trackless olie algorithms for the server problem Wolfgag W. Bei,LawreceL.Larmore 1 Departmet of Computer Sciece, Uiversity of Nevada, Las Vegas, NV 89154, USA

More information

Research Article Sign Data Derivative Recovery

Research Article Sign Data Derivative Recovery Iteratioal Scholarly Research Network ISRN Applied Mathematics Volume 0, Article ID 63070, 7 pages doi:0.540/0/63070 Research Article Sig Data Derivative Recovery L. M. Housto, G. A. Glass, ad A. D. Dymikov

More information

Perfect Packing Theorems and the Average-Case Behavior of Optimal and Online Bin Packing

Perfect Packing Theorems and the Average-Case Behavior of Optimal and Online Bin Packing SIAM REVIEW Vol. 44, No. 1, pp. 95 108 c 2002 Society for Idustrial ad Applied Mathematics Perfect Packig Theorems ad the Average-Case Behavior of Optimal ad Olie Bi Packig E. G. Coffma, Jr. C. Courcoubetis

More information

Towards Provably-Secure Scalable Anonymous Broadcast

Towards Provably-Secure Scalable Anonymous Broadcast Towards Provably-Secure Scalable Aoymous Broadcast Mahdi Zamai Uiversity of New Mexico Albuquerque, NM zamai@cs.um.edu Abstract We devise a scalable ad provably-secure protocol for fully-aoymous broadcast

More information

1. MATHEMATICAL INDUCTION

1. MATHEMATICAL INDUCTION 1. MATHEMATICAL INDUCTION EXAMPLE 1: Prove that for ay iteger 1. Proof: 1 + 2 + 3 +... + ( + 1 2 (1.1 STEP 1: For 1 (1.1 is true, sice 1 1(1 + 1. 2 STEP 2: Suppose (1.1 is true for some k 1, that is 1

More information

LECTURE 13: Cross-validation

LECTURE 13: Cross-validation LECTURE 3: Cross-validatio Resampli methods Cross Validatio Bootstrap Bias ad variace estimatio with the Bootstrap Three-way data partitioi Itroductio to Patter Aalysis Ricardo Gutierrez-Osua Texas A&M

More information

ODBC. Getting Started With Sage Timberline Office ODBC

ODBC. Getting Started With Sage Timberline Office ODBC ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.

More information

Multiplexers and Demultiplexers

Multiplexers and Demultiplexers I this lesso, you will lear about: Multiplexers ad Demultiplexers 1. Multiplexers 2. Combiatioal circuit implemetatio with multiplexers 3. Demultiplexers 4. Some examples Multiplexer A Multiplexer (see

More information

5 Interconnection Networks

5 Interconnection Networks 5 Itercoectio Networks 5. INTRODUCTION Networkig strategy was origially employed i the 950's by the telephoe idustry as a meas of reducig the time required for a call to go through. Similarly, the computer

More information

Amendments to employer debt Regulations

Amendments to employer debt Regulations March 2008 Pesios Legal Alert Amedmets to employer debt Regulatios The Govermet has at last issued Regulatios which will amed the law as to employer debts uder s75 Pesios Act 1995. The amedig Regulatios

More information

Determining the sample size

Determining the sample size Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors

More information

How To Solve The Homewor Problem Beautifully

How To Solve The Homewor Problem Beautifully Egieerig 33 eautiful Homewor et 3 of 7 Kuszmar roblem.5.5 large departmet store sells sport shirts i three sizes small, medium, ad large, three patters plaid, prit, ad stripe, ad two sleeve legths log

More information

Engineering Data Management

Engineering Data Management BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package

More information

MTO-MTS Production Systems in Supply Chains

MTO-MTS Production Systems in Supply Chains NSF GRANT #0092854 NSF PROGRAM NAME: MES/OR MTO-MTS Productio Systems i Supply Chais Philip M. Kamisky Uiversity of Califoria, Berkeley Our Kaya Uiversity of Califoria, Berkeley Abstract: Icreasig cost

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis Ruig Time ( 3.) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information