8 Algorithm for Binary Searching in Trees

Size: px
Start display at page:

Download "8 Algorithm for Binary Searching in Trees"

Transcription

1 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the nput s a path-lke tree. Ths s true because t can be easly reduced to the well-solved problem of searchng a hdden marked element from a total order set U n a sorted lst L U of elements where each element U has a gven probablty of beng the marked one [PS93] (see appendx. Due to ths correspondence, an approxmate strategy for searchng n lsts gves an approxmaton (wth the same guarantee for searchng n path-lke trees. Motvated by ths observaton, the algorthm decomposes the nput tree nto specal paths, fnds decson trees for each of these paths (wth modfed weght functons and combne them nto a decson tree for the orgnal tree. In our analyss, we obtan a lower bound on the optmal soluton and an upper bound on the returned soluton n terms of the costs of the decson trees for the paths. Thus, the approxmaton guarantee of the algorthm s bascally a constant tmes the guarantee of the approxmaton used to compute the decson trees for the paths. Throughout the text, we present the executon and analyss of the algorthm over an nstance (T,w, where T s rooted at node r. Recall that for every node u T, the cumulatve weght of u s the sum of the weghts of ts descendants, namely w(t u. Moreover, recall that a heavy path Q of T s defned recursvely as follows: r belongs to Q; for every node u n Q, the non-leaf chldren of u wth greatest cumulatve weght also belongs to Q. Let Q = (q 1... q Q be a heavy path of T. We defne T q = T q T q+1, for < Q and T q Q = T q Q. In addton, we defne Tq j as the jth heavest maxmal subtree rooted at a chld of q not n Q (Fgure 8.1. Note that these defntons are slghtly dfferent from the ones presented n the prevous part of ths work. Fnally, let n denote the number of chldren of q

2 Chapter 8. Algorthm for Bnary Searchng n Trees 55 whch do not belong to Q and defne e j as the arc of T connectng the node q to the subtree T j q. q 1 T 1 T 1 1 q 3 q 5 T 3 T 1 3 T 3 T 5 T 1 5 Fgure 8.1: Example of structures T q and T j q. Now we explan the hgh level structure of the soluton returned by the algorthm. The man observaton s that we can break the task of fndng the marked node n three stages: frst fndng the node q of Q such that T q contans the marked node, then queryng the arcs {e j } j to dscover whch tree T j q contans the marked node or that the marked node s q, and fnally (f needed locate the marked node n T j q. The algorthm follows ths reasonng: t computes a decson tree for the heavy path Q, then a decson tree for queryng the arcs {e j } and recursvely computes a decson tree for each tree T j q. steps: Now we present the algorthm tself, whch conssts of the followng fve ( Fnd a heavy path Q of T and then for each q Q defne w (q = w(t q /w(t. ( Calculate a decson tree D Q for the nstance (Q,w usng the approxmaton algorthm presented n [PS93]. ( Calculate recursvely a decson tree D j for each nstance (T j q,w. (v Buld a decson tree D for each T q as follows. The leftmost path of D conssts of nodes correspondng to the arcs e 1,...,e n, wth a node u q appended at the end. In addton, for every j, D j s the rght chld of the node correspondng to e j n D (Fgure 8.. (v Construct the decson tree D for T by replacng the leaf u q of D by D, for each q Q (Fgure 8.3. It s not dffcult to check that the decson tree D computed by the algorthm s a vald decson tree for T.

3 Chapter 8. Algorthm for Bnary Searchng n Trees 56 (a (b u e 1 q u e D 1 e 1 e e 3 u e 3 D T 1 T T 3 u q D 3 Fgure 8.: Illustraton of Step (v of the algorthm. (a Tree T wth heavy path n bold. (b Decson tree D for T. (a (b u q1 u q u q3 u q4 D 1 D D 3 D 4 Fgure 8.3: Illustraton of Step (v of the algorthm. (a Decson tree D Q bult at Step (. (b Decson tree D constructed by replacng the leaves {u q } by the decson trees {D }. 8.1 Upper Bound As the trees {T j q } and Q form a partton of the nodes of T, we analyze the dstance of the root of D to the nodes n each of these structures separately n order to upper bound the cost of D. Frst, consder a tree T j q and let x be a node n T j q. Notcng that u x s a leaf of the tree D j, the path from r(d to u x n D must contan the node r(d j. Then, by the constructon made n Step (v, the path from r(d to u x n D has the form (r(d u e 1 u e... u e j r(d j u x. Notce that the path (r(d u e 1 n D s the same as the path (r(d u q n D Q. In addton, the path from r(d j to u x s the same n D and n D j. Employng the prevous observatons, we have that the length of the path (r(d u e 1 u e... u e j r(d j u x s: d(r(d,u x,d = d(r(d,u q,d Q + j + d(r(d j,u x,d j Now we consder a node q Q. Agan due to the constructon made n Step (v of the algorthm, t s not dffcult to see that the path from r(d to u q n D traverses the leftmost path of D, that s, ths path has the form

4 Chapter 8. Algorthm for Bnary Searchng n Trees 57 (r(d u e 1 u e... u n e u q. Because the path (r(d u e 1 n D s the same as the path (r(d u q n D Q, t follows that the length of the path from the root of D to u q s d(r(d,u q,d Q + n. of D: Weghtng the dstance to reach nodes n {T j q } and n Q, we fnd the cost cost(d,w = d(r(d,u q,d Q w(tq j + j w(tq j q Q j q Q j + d(r(d j,u x,d j w(x q Q j x Tq j + d(r(d,u q,d Q w(q + n w(q q Q q Q = d(r(d,u q,d Q w(t q + j w(tq j q Q q Q j + cost(d j,w + n w(q q Q j q Q = w(t d(r(d,u q,d Q w (q + j w(tq j q Q q Q j + cost(d j,w + n w(q q Q j q Q = w(t cost(d Q,w + j w(tq j q Q j + cost(d j,w + n w(q (1 q Q j q Q Now all we need s to upper bound the frst term of the rght-hand sde of prevous equalty. Notce that cost(d Q,w s exactly the cost of the approxmaton computed at Step ( of the algorthm. As mentoned prevously, we can use the algorthm of [PS93] n ths step to fnd a decson tree D Q wth cost at most H({w (q }+. Substtutng ths bound on equalty (1 and observng that w(t H({w (q } = H({w(T q }, we conclude the upper bound: cost(d,w H({w(T q } + w(t + j w(tq j q Q j + cost(d j,w + n w(q ( q Q j q Q

5 Chapter 8. Algorthm for Bnary Searchng n Trees Entropy Lower Bound In ths secton we present a lower bound on the cost of an optmal decson tree for (T,w. Hence, let D be a mnmum cost decson tree for (T,w, and let r be the root of D. Consder a tree Tq j and let x be a node n Tq j. By defnton, the representatve of Tq j n D (the node u(tq j s an ancestor of the node u x n D. Notce that the representatve of Tq j s a node n D that corresponds to some arc (,j of Tq j (that s u(tq j = u (,j and that (,j s also an arc of T q. Therefore, the defnton of representatve agan mples that u(tq j s a descendant of u(t j q. Combnng the prevous observatons, we have that the path n D from r to u x has the form (r u(t q u(tq j u x. Now consder a node q Q; agan by the defnton of representatve, the path from r to u q can be wrtten as (r u(t q u q. Addng the weghted paths for nodes n {Tq j } and n Q, we can wrte the cost of D as: OPT(T,w = d(r,u(t q w(t q + d(u(t q,u(tq j w(tq j q q + q j x T j q d(u(t j q,u x w(x + q d(u(t q,u q w(q (3 j Now we lower bound each term of the last equaton. The dea to analyze the frst term s the followng: t can be seen as the cost of the decson tree D under a cost functon where the representatve of T q, for every, has weght w(t q and all other nodes have weght zero. Snce D s a bnary tree, we can use Shannon s Codng Theorem to guarantee that the frst term of (3 s lower bounded by H({w(T q }/c for some constant c. Then we have the followng lemma, whch s proved more formally n the appendx: Lemma 14 q Q d(r,u(t q,d w(t q H({w(T q }/ log 3 w(t Now we bound the second term of (3. Fx a node q Q; consder two dfferent trees T j q and T j q such that d(r,u(t j q = d(r,u(t j q. We clam that u(t j q and u(t j q are sblngs n D. Because ther dstances to r are the same, u(t j q cannot be a nether a descendant nor an ancestor of u(t j q. Therefore, they have a common ancestor, say u (v,z, and one of these node s n the rght subtree of u (v,z and the other n the left subtree of u (v,z. It s not dffcult to see that u (v,z can only correspond to ether (q,j or (q,j. Wthout loss of generalty suppose the latter; then the rght chld of u (v,z corresponds to an

6 Chapter 8. Algorthm for Bnary Searchng n Trees 59 arc/node of T j q, and therefore u(t j q must be ths chld. Due to ther dstance to r, t follows that u(t j q must be the other chld of u (v,z. As a consequence, we have that for any level l of D, there are at most two representatves of the trees T j q located at l. Ths together wth the fact that T j q s the jth heavest tree rooted at a chld of q guarantees that n j=1 d(u(t q,u(t j q w(t j q n j=1 n j=1 (j 1/ w(t j q ( j 3 w(tq j (4 and the last nequalty gves a bound for the second term of (3. Drectly employng Lemma 13, we can lower bound the thrd term of (3 by q,j OPT(T j q,w. Fnally, for the fourth term we fx q and note that the path n D connectng u(t q to u q must contan the nodes correspondng to arcs e 1,...,e n (otherwse when traversng D and reachng u q we would not have enough knowledge to nfer that q s the marked node, contradctng the valdty of D. Applyng ths reasonng for each q, we conclude that last term of (3 s lower bounded by q n w(q. Therefore, applyng the prevous dscusson to lower bound the terms of (3 we obtan that: OPT(T,w H({w(T q } c 5w(T + q,j j w(t j q + q,j OPT(T j q,w + q n w(q (5 8.3 Alternatve Lower Bounds As n the case of the k-hotlnk Assgnment Problem presented n prevous sectons, when the value of the entropy H({w(T q } s large enough, t domnates the term 5w(T/ n nequalty (5 and leads to a suffcently strong lower bound. However, when ths entropy assumes a small value we need to adopt a dfferent strategy to devse an effectve bound. Frst alternatve lower bound. In order to reduce the addtve factor that appears n (5, we use almost the same dervaton that leads from (3 to (5; however, we smply lower bounded the frst summaton of (3 by zero.

7 Chapter 8. Algorthm for Bnary Searchng n Trees 60 Ths gves: OPT(T,w 3w(T + q,j j w(t j q + q,j OPT(T j q,w + q Q n w(q (6 Second alternatve lower bound. Now we devse a lower bound wthout an addtve factor; however t also does not contan the mportant term q Q n w(q. Consder a tree Tq j and a node v Tq j. By the defnton of representatve, u(tq j s an ancestor of u v n D, thus d(r,u v,d = d(r,u(t j q,d + d(u(t j q,u v,d. Because the trees {T j q } and Q form a partton of nodes of T, the cost OPT(T,w can be wrtten as: OPT(T,w = d(r,u(tq j w(tq j + d(r,u q w(q + d(u(tq j,u v w(v q,j q Q q,j v Tq j Frst, as the trees {T j q Q } are sngle nodes and hence do not contan any arcs, {u(t j q Q } and {u q } cannot be the root of D. Therefore, at most one dstance d(r,u(t j q (and wth q q Q of the frst two summatons of the prevous nequalty can be equal to zero, and all others must have value of at least one. But the constructon of the heavy path guarantees that for q q Q the weght of each of the trees {T j q } s at most w(t/. As a consequence, the frst two summatons of the nequalty can be lower bounded by w(t/. Combnng ths fact wth a lower bound for the last summaton provded by Lemma 13 (wth T = T j q we have: OPT(T,w w(t + q,j OPT(T j q,w (7 8.4 Approxmaton Guarantee We proceed by nducton over the number of nodes of T, where the base case s the trval one when T has only one node. Notce that because each tree Tq j s properly contaned n T, the nductve hypothess asserts that D j s an approxmate decson tree for Tq j, namely cost(d j,w αopt(t q j,w for some constant α. The analyss needs to be carred out n two dfferent cases dependng on the value of the entropy (henceforth we use H as a shorthand for H({w(T q }.

8 Chapter 8. Algorthm for Bnary Searchng n Trees 61 Case 1: H/ log 3 3w(T. Applyng ths bound to nequalty (5 we have: OPT(T,w H 6 log 3 + q,j j w(tq j + OPT(Tq j,w + n w(q (8 q,j q Employng the entropy hypothess to the frst term of nequalty ( and usng the nductve hypothess we have: cost(d,w H(3 log log 3 + q,j ( j w(t j q + q,j αopt(t j q,w + q n w(q Settng α (3 log 3+ t follows from the prevous nequalty and from nequalty (8 that cost(d, w αopt(t, w. Case : H/ log 3 3w(T. Applyng the entropy hypothess and the nductve hypothess to nequalty ( we have: cost(d,w (3 log 3 + w(t + q,j ( j w(t j q + q,j αopt(t j q,w + q n w(q Addng (α 1 tmes nequalty (7 to nequalty (6 we have: αopt(t,w (α 4w(T + q,j j w(tq j + q,j αopt(d j,w + q n w(q Settng α (3 log we have that cost(t,w αopt(t,w. Therefore, the nductve step holds for both cases when α (3 log Effcent Implementaton Notce that durng the presentaton and analyss of the algorthm, we have assumed that the trees {Tq j } are ordered by ther weghts. However, n order to actually mplement Step (v of the algorthm, one needs to sort these trees. As a heavy path decomposton can be computed n lnear tme [DL06], t s easy to see that all steps of the steps of the algorthm, besdes ths sortng at Step (v, can be mplemented n lnear tme. Hence, we resort to an approxmate sortng to provde a lnear tme mplementaton for the algorthm. Fx a node q n Q. Wthout loss of generalty, we assume there are more than three trees {Tq j } (that s n > 3, otherwse one could sort them n constant tme. In order to smplfy the analyss, we use w j = w(tq j and W = max j {w j }. Then we have the sequence WQ = (w 1,w,...,w n, whch s non-decreasng by the defnton of the trees {Tq j }. Now we partton WQ

9 Chapter 8. Algorthm for Bnary Searchng n Trees 6 nto blocks wth smlar weghts: for 1 j < n, the j-block contans all elements of WQ wth weghts n the nterval (W/ j,w/ j 1 ] and the n - block contans all elements of WQ wth weghts n [0,W/ n 1 ]. Due to ts order, WQ s the concatenaton of these blocks. Defnng s j as the ndex n WQ of the frst element of the j-block 1, we have that the for j < n the j- block s the sequence (w sj,w sj +1,...,w sj+1 1 and the n -block s the sequence (w sn,w sn +1,...,w n. f WQ Now we say that WQ s an approxmate sortng of the weghts {w j } contans frst all elements 1-block of WQ, then all elements of the -block of WQ and so on. The sequence WQ can be thought as a permutaton of W Q where only elements on the same j-block can be permuted. Defnng WQ = (w σ(1,w σ(,...,w σ(n, t follows that the subsequence (w σ(sj,w σ(sj +1,...,w σ(sj+1 contans the same elements as the j-block of WQ. As there are only n n blocks, we can fnd an approxmate sortng n lnear tme usng a bucketng strategy. We clam that n j=1 j w σ(j 3 n j=1 j w j. For every 1 j < n, t follows from the defnton of j-block and the relatonshp between the elements of WQ and the blocks of WQ that: k=s j k w k W j k=s j k = 1 W j 1 k=s j In addton, because for every k s n k 1 k=s j k w σ(k (9 we have w σ(k W/ n, the sum n k=s n k w σ(k can be upper bounded by n (W/ n. Therefore, for n > 3 ths term can be upper bounded by W. Combnng wth the fact that n k=1 k w k W we have that n k=s n k w σ(k n k=1 k w k. Usng the prevous nequalty together wth nequalty (9, we have: n k=1 k w σ(k = n 1 j=1 n 1 j=1 k=s j k w σ(k + n k=s n k w σ(j n n k w k + k w k 3 k w k k=s j k=1 k=1 Now suppose that nstead of usng an exact sortng our algorthm uses an approxmate sortng of the trees {T j q }, by means of permutatons σ q. It s easy to see that the only mpact ths modfcaton has to the upper bound of the algorthm occurs n the second term of the rght-hand sde of nequalty (, wth j j w(t q j beng replaced by j j w(t σq (j q. Then the prevous 1 In order to avod a heaver notaton, we assume that each j-block s nonempty.

10 Chapter 8. Algorthm for Bnary Searchng n Trees 63 argument mples that ths approxmate sortng ntroduces a multplcatve factor of three n second term of ( and t s straght forward to check ths does not alter the guarantee of the algorthm. Theorem 6 There s a lnear tme algorthm whch provdes a constant factor approxmaton for the problem of bnary searchng n trees.

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

+ + + - - This circuit than can be reduced to a planar circuit

+ + + - - This circuit than can be reduced to a planar circuit MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification Lecture 4: More classfers and classes C4B Machne Learnng Hlary 20 A. Zsserman Logstc regresson Loss functons revsted Adaboost Loss functons revsted Optmzaton Multple class classfcaton Logstc Regresson

More information

How To Calculate The Accountng Perod Of Nequalty

How To Calculate The Accountng Perod Of Nequalty Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.

More information

INSTITUT FÜR INFORMATIK

INSTITUT FÜR INFORMATIK INSTITUT FÜR INFORMATIK Schedulng jobs on unform processors revsted Klaus Jansen Chrstna Robene Bercht Nr. 1109 November 2011 ISSN 2192-6247 CHRISTIAN-ALBRECHTS-UNIVERSITÄT ZU KIEL Insttut für Informat

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Section 5.3 Annuities, Future Value, and Sinking Funds

Section 5.3 Annuities, Future Value, and Sinking Funds Secton 5.3 Annutes, Future Value, and Snkng Funds Ordnary Annutes A sequence of equal payments made at equal perods of tme s called an annuty. The tme between payments s the payment perod, and the tme

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

General Auction Mechanism for Search Advertising

General Auction Mechanism for Search Advertising General Aucton Mechansm for Search Advertsng Gagan Aggarwal S. Muthukrshnan Dávd Pál Martn Pál Keywords game theory, onlne auctons, stable matchngs ABSTRACT Internet search advertsng s often sold by an

More information

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.

More information

We are now ready to answer the question: What are the possible cardinalities for finite fields?

We are now ready to answer the question: What are the possible cardinalities for finite fields? Chapter 3 Fnte felds We have seen, n the prevous chapters, some examples of fnte felds. For example, the resdue class rng Z/pZ (when p s a prme) forms a feld wth p elements whch may be dentfed wth the

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

Generalizing the degree sequence problem

Generalizing the degree sequence problem Mddlebury College March 2009 Arzona State Unversty Dscrete Mathematcs Semnar The degree sequence problem Problem: Gven an nteger sequence d = (d 1,...,d n ) determne f there exsts a graph G wth d as ts

More information

n + d + q = 24 and.05n +.1d +.25q = 2 { n + d + q = 24 (3) n + 2d + 5q = 40 (2)

n + d + q = 24 and.05n +.1d +.25q = 2 { n + d + q = 24 (3) n + 2d + 5q = 40 (2) MATH 16T Exam 1 : Part I (In-Class) Solutons 1. (0 pts) A pggy bank contans 4 cons, all of whch are nckels (5 ), dmes (10 ) or quarters (5 ). The pggy bank also contans a con of each denomnaton. The total

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

where the coordinates are related to those in the old frame as follows.

where the coordinates are related to those in the old frame as follows. Chapter 2 - Cartesan Vectors and Tensors: Ther Algebra Defnton of a vector Examples of vectors Scalar multplcaton Addton of vectors coplanar vectors Unt vectors A bass of non-coplanar vectors Scalar product

More information

THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES

THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES The goal: to measure (determne) an unknown quantty x (the value of a RV X) Realsaton: n results: y 1, y 2,..., y j,..., y n, (the measured values of Y 1, Y 2,..., Y j,..., Y n ) every result s encumbered

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Section 5.4 Annuities, Present Value, and Amortization

Section 5.4 Annuities, Present Value, and Amortization Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today

More information

Energies of Network Nastsemble

Energies of Network Nastsemble Supplementary materal: Assessng the relevance of node features for network structure Gnestra Bancon, 1 Paolo Pn,, 3 and Matteo Marsl 1 1 The Abdus Salam Internatonal Center for Theoretcal Physcs, Strada

More information

Embedding lattices in the Kleene degrees

Embedding lattices in the Kleene degrees F U N D A M E N T A MATHEMATICAE 62 (999) Embeddng lattces n the Kleene degrees by Hsato M u r a k (Nagoya) Abstract. Under ZFC+CH, we prove that some lattces whose cardnaltes do not exceed ℵ can be embedded

More information

Formulating & Solving Integer Problems Chapter 11 289

Formulating & Solving Integer Problems Chapter 11 289 Formulatng & Solvng Integer Problems Chapter 11 289 The Optonal Stop TSP If we drop the requrement that every stop must be vsted, we then get the optonal stop TSP. Ths mght correspond to a ob sequencng

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Simple Interest Loans (Section 5.1) :

Simple Interest Loans (Section 5.1) : Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part

More information

Multiplication Algorithms for Radix-2 RN-Codings and Two s Complement Numbers

Multiplication Algorithms for Radix-2 RN-Codings and Two s Complement Numbers Multplcaton Algorthms for Radx- RN-Codngs and Two s Complement Numbers Jean-Luc Beuchat Projet Arénare, LIP, ENS Lyon 46, Allée d Itale F 69364 Lyon Cedex 07 jean-luc.beuchat@ens-lyon.fr Jean-Mchel Muller

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

How To Know The Components Of Mean Squared Error Of Herarchcal Estmator S

How To Know The Components Of Mean Squared Error Of Herarchcal Estmator S S C H E D A E I N F O R M A T I C A E VOLUME 0 0 On Mean Squared Error of Herarchcal Estmator Stans law Brodowsk Faculty of Physcs, Astronomy, and Appled Computer Scence, Jagellonan Unversty, Reymonta

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Period and Deadline Selection for Schedulability in Real-Time Systems

Period and Deadline Selection for Schedulability in Real-Time Systems Perod and Deadlne Selecton for Schedulablty n Real-Tme Systems Thdapat Chantem, Xaofeng Wang, M.D. Lemmon, and X. Sharon Hu Department of Computer Scence and Engneerng, Department of Electrcal Engneerng

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Level Annuities with Payments Less Frequent than Each Interest Period

Level Annuities with Payments Less Frequent than Each Interest Period Level Annutes wth Payments Less Frequent than Each Interest Perod 1 Annuty-mmedate 2 Annuty-due Level Annutes wth Payments Less Frequent than Each Interest Perod 1 Annuty-mmedate 2 Annuty-due Symoblc approach

More information

To Fill or not to Fill: The Gas Station Problem

To Fill or not to Fill: The Gas Station Problem To Fll or not to Fll: The Gas Staton Problem Samr Khuller Azarakhsh Malekan Julán Mestre Abstract In ths paper we study several routng problems that generalze shortest paths and the Travelng Salesman Problem.

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6 PAR TESTS If a WEIGHT varable s specfed, t s used to replcate a case as many tmes as ndcated by the weght value rounded to the nearest nteger. If the workspace requrements are exceeded and samplng has

More information

Production. 2. Y is closed A set is closed if it contains its boundary. We need this for the solution existence in the profit maximization problem.

Production. 2. Y is closed A set is closed if it contains its boundary. We need this for the solution existence in the profit maximization problem. Producer Theory Producton ASSUMPTION 2.1 Propertes of the Producton Set The producton set Y satsfes the followng propertes 1. Y s non-empty If Y s empty, we have nothng to talk about 2. Y s closed A set

More information

From Selective to Full Security: Semi-Generic Transformations in the Standard Model

From Selective to Full Security: Semi-Generic Transformations in the Standard Model An extended abstract of ths work appears n the proceedngs of PKC 2012 From Selectve to Full Securty: Sem-Generc Transformatons n the Standard Model Mchel Abdalla 1 Daro Fore 2 Vadm Lyubashevsky 1 1 Département

More information

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia To appear n Journal o Appled Probablty June 2007 O-COSTAT SUM RED-AD-BLACK GAMES WITH BET-DEPEDET WI PROBABILITY FUCTIO LAURA POTIGGIA, Unversty o the Scences n Phladelpha Abstract In ths paper we nvestgate

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

Using Series to Analyze Financial Situations: Present Value

Using Series to Analyze Financial Situations: Present Value 2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated

More information

A generalized hierarchical fair service curve algorithm for high network utilization and link-sharing

A generalized hierarchical fair service curve algorithm for high network utilization and link-sharing Computer Networks 43 (2003) 669 694 www.elsever.com/locate/comnet A generalzed herarchcal far servce curve algorthm for hgh network utlzaton and lnk-sharng Khyun Pyun *, Junehwa Song, Heung-Kyu Lee Department

More information

Equlbra Exst and Trade S effcent proportionally

Equlbra Exst and Trade S effcent proportionally On Compettve Nonlnear Prcng Andrea Attar Thomas Marott Franços Salané February 27, 2013 Abstract A buyer of a dvsble good faces several dentcal sellers. The buyer s preferences are her prvate nformaton,

More information

L10: Linear discriminants analysis

L10: Linear discriminants analysis L0: Lnear dscrmnants analyss Lnear dscrmnant analyss, two classes Lnear dscrmnant analyss, C classes LDA vs. PCA Lmtatons of LDA Varants of LDA Other dmensonalty reducton methods CSCE 666 Pattern Analyss

More information

Sngle Snk Buy at Bulk Problem and the Access Network

Sngle Snk Buy at Bulk Problem and the Access Network A Constant Factor Approxmaton for the Sngle Snk Edge Installaton Problem Sudpto Guha Adam Meyerson Kamesh Munagala Abstract We present the frst constant approxmaton to the sngle snk buy-at-bulk network

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Logistic Regression. Steve Kroon

Logistic Regression. Steve Kroon Logstc Regresson Steve Kroon Course notes sectons: 24.3-24.4 Dsclamer: these notes do not explctly ndcate whether values are vectors or scalars, but expects the reader to dscern ths from the context. Scenaro

More information

Statistical Methods to Develop Rating Models

Statistical Methods to Develop Rating Models Statstcal Methods to Develop Ratng Models [Evelyn Hayden and Danel Porath, Österrechsche Natonalbank and Unversty of Appled Scences at Manz] Source: The Basel II Rsk Parameters Estmaton, Valdaton, and

More information

In our example i = r/12 =.0825/12 At the end of the first month after your payment is received your amount in the account, the balance, is

In our example i = r/12 =.0825/12 At the end of the first month after your payment is received your amount in the account, the balance, is Payout annutes: Start wth P dollars, e.g., P = 100, 000. Over a 30 year perod you receve equal payments of A dollars at the end of each month. The amount of money left n the account, the balance, earns

More information

The Geometry of Online Packing Linear Programs

The Geometry of Online Packing Linear Programs The Geometry of Onlne Packng Lnear Programs Marco Molnaro R. Rav Abstract We consder packng lnear programs wth m rows where all constrant coeffcents are n the unt nterval. In the onlne model, we know the

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

Design of Output Codes for Fast Covering Learning using Basic Decomposition Techniques

Design of Output Codes for Fast Covering Learning using Basic Decomposition Techniques Journal of Computer Scence (7): 565-57, 6 ISSN 59-66 6 Scence Publcatons Desgn of Output Codes for Fast Coverng Learnng usng Basc Decomposton Technques Aruna Twar and Narendra S. Chaudhar, Faculty of Computer

More information

Realistic Image Synthesis

Realistic Image Synthesis Realstc Image Synthess - Combned Samplng and Path Tracng - Phlpp Slusallek Karol Myszkowsk Vncent Pegoraro Overvew: Today Combned Samplng (Multple Importance Samplng) Renderng and Measurng Equaton Random

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

An efficient constraint handling methodology for multi-objective evolutionary algorithms

An efficient constraint handling methodology for multi-objective evolutionary algorithms Rev. Fac. Ing. Unv. Antoqua N. 49. pp. 141-150. Septembre, 009 An effcent constrant handlng methodology for mult-objectve evolutonary algorthms Una metodología efcente para manejo de restrccones en algortmos

More information

An Overview of Financial Mathematics

An Overview of Financial Mathematics An Overvew of Fnancal Mathematcs Wllam Benedct McCartney July 2012 Abstract Ths document s meant to be a quck ntroducton to nterest theory. It s wrtten specfcally for actuaral students preparng to take

More information

Stochastic Bandits with Side Observations on Networks

Stochastic Bandits with Side Observations on Networks Stochastc Bandts wth Sde Observatons on Networks Swapna Buccapatnam, Atlla Erylmaz Department of ECE The Oho State Unversty Columbus, OH - 430 buccapat@eceosuedu, erylmaz@osuedu Ness B Shroff Departments

More information

Descriptive Models. Cluster Analysis. Example. General Applications of Clustering. Examples of Clustering Applications

Descriptive Models. Cluster Analysis. Example. General Applications of Clustering. Examples of Clustering Applications CMSC828G Prncples of Data Mnng Lecture #9 Today s Readng: HMS, chapter 9 Today s Lecture: Descrptve Modelng Clusterng Algorthms Descrptve Models model presents the man features of the data, a global summary

More information

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of

More information

Addendum to: Importing Skill-Biased Technology

Addendum to: Importing Skill-Biased Technology Addendum to: Importng Skll-Based Technology Arel Bursten UCLA and NBER Javer Cravno UCLA August 202 Jonathan Vogel Columba and NBER Abstract Ths Addendum derves the results dscussed n secton 3.3 of our

More information

1. Measuring association using correlation and regression

1. Measuring association using correlation and regression How to measure assocaton I: Correlaton. 1. Measurng assocaton usng correlaton and regresson We often would lke to know how one varable, such as a mother's weght, s related to another varable, such as a

More information

AN EFFECTIVE MATRIX GEOMETRIC MEAN SATISFYING THE ANDO LI MATHIAS PROPERTIES

AN EFFECTIVE MATRIX GEOMETRIC MEAN SATISFYING THE ANDO LI MATHIAS PROPERTIES MATHEMATICS OF COMPUTATION Volume, Number, Pages S 5-578(XX)- AN EFFECTIVE MATRIX GEOMETRIC MEAN SATISFYING THE ANDO LI MATHIAS PROPERTIES DARIO A. BINI, BEATRICE MEINI AND FEDERICO POLONI Abstract. We

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

PRACTICE 1: MUTUAL FUNDS EVALUATION USING MATLAB.

PRACTICE 1: MUTUAL FUNDS EVALUATION USING MATLAB. PRACTICE 1: MUTUAL FUNDS EVALUATION USING MATLAB. INDEX 1. Load data usng the Edtor wndow and m-fle 2. Learnng to save results from the Edtor wndow. 3. Computng the Sharpe Rato 4. Obtanng the Treynor Rato

More information

PKIS: practical keyword index search on cloud datacenter

PKIS: practical keyword index search on cloud datacenter Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A

More information

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent

More information

FINANCIAL MATHEMATICS. A Practical Guide for Actuaries. and other Business Professionals

FINANCIAL MATHEMATICS. A Practical Guide for Actuaries. and other Business Professionals FINANCIAL MATHEMATICS A Practcal Gude for Actuares and other Busness Professonals Second Edton CHRIS RUCKMAN, FSA, MAAA JOE FRANCIS, FSA, MAAA, CFA Study Notes Prepared by Kevn Shand, FSA, FCIA Assstant

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

Do Hidden Variables. Improve Quantum Mechanics?

Do Hidden Variables. Improve Quantum Mechanics? Radboud Unverstet Njmegen Do Hdden Varables Improve Quantum Mechancs? Bachelor Thess Author: Denns Hendrkx Begeleder: Prof. dr. Klaas Landsman Abstract Snce the dawn of quantum mechancs physcst have contemplated

More information

Business Process Improvement using Multi-objective Optimisation K. Vergidis 1, A. Tiwari 1 and B. Majeed 2

Business Process Improvement using Multi-objective Optimisation K. Vergidis 1, A. Tiwari 1 and B. Majeed 2 Busness Process Improvement usng Mult-objectve Optmsaton K. Vergds 1, A. Twar 1 and B. Majeed 2 1 Manufacturng Department, School of Industral and Manufacturng Scence, Cranfeld Unversty, Cranfeld, MK43

More information

Optimal resource capacity management for stochastic networks

Optimal resource capacity management for stochastic networks Submtted for publcaton. Optmal resource capacty management for stochastc networks A.B. Deker H. Mlton Stewart School of ISyE, Georga Insttute of Technology, Atlanta, GA 30332, ton.deker@sye.gatech.edu

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Solution: Let i = 10% and d = 5%. By definition, the respective forces of interest on funds A and B are. i 1 + it. S A (t) = d (1 dt) 2 1. = d 1 dt.

Solution: Let i = 10% and d = 5%. By definition, the respective forces of interest on funds A and B are. i 1 + it. S A (t) = d (1 dt) 2 1. = d 1 dt. Chapter 9 Revew problems 9.1 Interest rate measurement Example 9.1. Fund A accumulates at a smple nterest rate of 10%. Fund B accumulates at a smple dscount rate of 5%. Fnd the pont n tme at whch the forces

More information

Real-Time Process Scheduling

Real-Time Process Scheduling Real-Tme Process Schedulng ktw@cse.ntu.edu.tw (Real-Tme and Embedded Systems Laboratory) Independent Process Schedulng Processes share nothng but CPU Papers for dscussons: C.L. Lu and James. W. Layland,

More information

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy

More information

A Probabilistic Theory of Coherence

A Probabilistic Theory of Coherence A Probablstc Theory of Coherence BRANDEN FITELSON. The Coherence Measure C Let E be a set of n propostons E,..., E n. We seek a probablstc measure C(E) of the degree of coherence of E. Intutvely, we want

More information

Stability, observer design and control of networks using Lyapunov methods

Stability, observer design and control of networks using Lyapunov methods Stablty, observer desgn and control of networks usng Lyapunov methods von Lars Naujok Dssertaton zur Erlangung des Grades enes Doktors der Naturwssenschaften - Dr. rer. nat. - Vorgelegt m Fachberech 3

More information

Implementation of Deutsch's Algorithm Using Mathcad

Implementation of Deutsch's Algorithm Using Mathcad Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"

More information

Mining Multiple Large Data Sources

Mining Multiple Large Data Sources The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of

More information

Staff Paper. Farm Savings Accounts: Examining Income Variability, Eligibility, and Benefits. Brent Gloy, Eddy LaDue, and Charles Cuykendall

Staff Paper. Farm Savings Accounts: Examining Income Variability, Eligibility, and Benefits. Brent Gloy, Eddy LaDue, and Charles Cuykendall SP 2005-02 August 2005 Staff Paper Department of Appled Economcs and Management Cornell Unversty, Ithaca, New York 14853-7801 USA Farm Savngs Accounts: Examnng Income Varablty, Elgblty, and Benefts Brent

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Learning Permutations with Exponential Weights

Learning Permutations with Exponential Weights Journal of Machne Learnng Research 2009 (10) 1705-1736 Submtted 9/08; Publshed 7/09 Learnng Permutatons wth Exponental Weghts Davd P. Helmbold Manfred K. Warmuth Computer Scence Department Unversty of

More information

Pricing Multi-Asset Cross Currency Options

Pricing Multi-Asset Cross Currency Options CIRJE-F-844 Prcng Mult-Asset Cross Currency Optons Kenchro Shraya Graduate School of Economcs, Unversty of Tokyo Akhko Takahash Unversty of Tokyo March 212; Revsed n September, October and November 212

More information