8 Algorithm for Binary Searching in Trees
|
|
- Matthew Warner
- 8 years ago
- Views:
Transcription
1 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the nput s a path-lke tree. Ths s true because t can be easly reduced to the well-solved problem of searchng a hdden marked element from a total order set U n a sorted lst L U of elements where each element U has a gven probablty of beng the marked one [PS93] (see appendx. Due to ths correspondence, an approxmate strategy for searchng n lsts gves an approxmaton (wth the same guarantee for searchng n path-lke trees. Motvated by ths observaton, the algorthm decomposes the nput tree nto specal paths, fnds decson trees for each of these paths (wth modfed weght functons and combne them nto a decson tree for the orgnal tree. In our analyss, we obtan a lower bound on the optmal soluton and an upper bound on the returned soluton n terms of the costs of the decson trees for the paths. Thus, the approxmaton guarantee of the algorthm s bascally a constant tmes the guarantee of the approxmaton used to compute the decson trees for the paths. Throughout the text, we present the executon and analyss of the algorthm over an nstance (T,w, where T s rooted at node r. Recall that for every node u T, the cumulatve weght of u s the sum of the weghts of ts descendants, namely w(t u. Moreover, recall that a heavy path Q of T s defned recursvely as follows: r belongs to Q; for every node u n Q, the non-leaf chldren of u wth greatest cumulatve weght also belongs to Q. Let Q = (q 1... q Q be a heavy path of T. We defne T q = T q T q+1, for < Q and T q Q = T q Q. In addton, we defne Tq j as the jth heavest maxmal subtree rooted at a chld of q not n Q (Fgure 8.1. Note that these defntons are slghtly dfferent from the ones presented n the prevous part of ths work. Fnally, let n denote the number of chldren of q
2 Chapter 8. Algorthm for Bnary Searchng n Trees 55 whch do not belong to Q and defne e j as the arc of T connectng the node q to the subtree T j q. q 1 T 1 T 1 1 q 3 q 5 T 3 T 1 3 T 3 T 5 T 1 5 Fgure 8.1: Example of structures T q and T j q. Now we explan the hgh level structure of the soluton returned by the algorthm. The man observaton s that we can break the task of fndng the marked node n three stages: frst fndng the node q of Q such that T q contans the marked node, then queryng the arcs {e j } j to dscover whch tree T j q contans the marked node or that the marked node s q, and fnally (f needed locate the marked node n T j q. The algorthm follows ths reasonng: t computes a decson tree for the heavy path Q, then a decson tree for queryng the arcs {e j } and recursvely computes a decson tree for each tree T j q. steps: Now we present the algorthm tself, whch conssts of the followng fve ( Fnd a heavy path Q of T and then for each q Q defne w (q = w(t q /w(t. ( Calculate a decson tree D Q for the nstance (Q,w usng the approxmaton algorthm presented n [PS93]. ( Calculate recursvely a decson tree D j for each nstance (T j q,w. (v Buld a decson tree D for each T q as follows. The leftmost path of D conssts of nodes correspondng to the arcs e 1,...,e n, wth a node u q appended at the end. In addton, for every j, D j s the rght chld of the node correspondng to e j n D (Fgure 8.. (v Construct the decson tree D for T by replacng the leaf u q of D by D, for each q Q (Fgure 8.3. It s not dffcult to check that the decson tree D computed by the algorthm s a vald decson tree for T.
3 Chapter 8. Algorthm for Bnary Searchng n Trees 56 (a (b u e 1 q u e D 1 e 1 e e 3 u e 3 D T 1 T T 3 u q D 3 Fgure 8.: Illustraton of Step (v of the algorthm. (a Tree T wth heavy path n bold. (b Decson tree D for T. (a (b u q1 u q u q3 u q4 D 1 D D 3 D 4 Fgure 8.3: Illustraton of Step (v of the algorthm. (a Decson tree D Q bult at Step (. (b Decson tree D constructed by replacng the leaves {u q } by the decson trees {D }. 8.1 Upper Bound As the trees {T j q } and Q form a partton of the nodes of T, we analyze the dstance of the root of D to the nodes n each of these structures separately n order to upper bound the cost of D. Frst, consder a tree T j q and let x be a node n T j q. Notcng that u x s a leaf of the tree D j, the path from r(d to u x n D must contan the node r(d j. Then, by the constructon made n Step (v, the path from r(d to u x n D has the form (r(d u e 1 u e... u e j r(d j u x. Notce that the path (r(d u e 1 n D s the same as the path (r(d u q n D Q. In addton, the path from r(d j to u x s the same n D and n D j. Employng the prevous observatons, we have that the length of the path (r(d u e 1 u e... u e j r(d j u x s: d(r(d,u x,d = d(r(d,u q,d Q + j + d(r(d j,u x,d j Now we consder a node q Q. Agan due to the constructon made n Step (v of the algorthm, t s not dffcult to see that the path from r(d to u q n D traverses the leftmost path of D, that s, ths path has the form
4 Chapter 8. Algorthm for Bnary Searchng n Trees 57 (r(d u e 1 u e... u n e u q. Because the path (r(d u e 1 n D s the same as the path (r(d u q n D Q, t follows that the length of the path from the root of D to u q s d(r(d,u q,d Q + n. of D: Weghtng the dstance to reach nodes n {T j q } and n Q, we fnd the cost cost(d,w = d(r(d,u q,d Q w(tq j + j w(tq j q Q j q Q j + d(r(d j,u x,d j w(x q Q j x Tq j + d(r(d,u q,d Q w(q + n w(q q Q q Q = d(r(d,u q,d Q w(t q + j w(tq j q Q q Q j + cost(d j,w + n w(q q Q j q Q = w(t d(r(d,u q,d Q w (q + j w(tq j q Q q Q j + cost(d j,w + n w(q q Q j q Q = w(t cost(d Q,w + j w(tq j q Q j + cost(d j,w + n w(q (1 q Q j q Q Now all we need s to upper bound the frst term of the rght-hand sde of prevous equalty. Notce that cost(d Q,w s exactly the cost of the approxmaton computed at Step ( of the algorthm. As mentoned prevously, we can use the algorthm of [PS93] n ths step to fnd a decson tree D Q wth cost at most H({w (q }+. Substtutng ths bound on equalty (1 and observng that w(t H({w (q } = H({w(T q }, we conclude the upper bound: cost(d,w H({w(T q } + w(t + j w(tq j q Q j + cost(d j,w + n w(q ( q Q j q Q
5 Chapter 8. Algorthm for Bnary Searchng n Trees Entropy Lower Bound In ths secton we present a lower bound on the cost of an optmal decson tree for (T,w. Hence, let D be a mnmum cost decson tree for (T,w, and let r be the root of D. Consder a tree Tq j and let x be a node n Tq j. By defnton, the representatve of Tq j n D (the node u(tq j s an ancestor of the node u x n D. Notce that the representatve of Tq j s a node n D that corresponds to some arc (,j of Tq j (that s u(tq j = u (,j and that (,j s also an arc of T q. Therefore, the defnton of representatve agan mples that u(tq j s a descendant of u(t j q. Combnng the prevous observatons, we have that the path n D from r to u x has the form (r u(t q u(tq j u x. Now consder a node q Q; agan by the defnton of representatve, the path from r to u q can be wrtten as (r u(t q u q. Addng the weghted paths for nodes n {Tq j } and n Q, we can wrte the cost of D as: OPT(T,w = d(r,u(t q w(t q + d(u(t q,u(tq j w(tq j q q + q j x T j q d(u(t j q,u x w(x + q d(u(t q,u q w(q (3 j Now we lower bound each term of the last equaton. The dea to analyze the frst term s the followng: t can be seen as the cost of the decson tree D under a cost functon where the representatve of T q, for every, has weght w(t q and all other nodes have weght zero. Snce D s a bnary tree, we can use Shannon s Codng Theorem to guarantee that the frst term of (3 s lower bounded by H({w(T q }/c for some constant c. Then we have the followng lemma, whch s proved more formally n the appendx: Lemma 14 q Q d(r,u(t q,d w(t q H({w(T q }/ log 3 w(t Now we bound the second term of (3. Fx a node q Q; consder two dfferent trees T j q and T j q such that d(r,u(t j q = d(r,u(t j q. We clam that u(t j q and u(t j q are sblngs n D. Because ther dstances to r are the same, u(t j q cannot be a nether a descendant nor an ancestor of u(t j q. Therefore, they have a common ancestor, say u (v,z, and one of these node s n the rght subtree of u (v,z and the other n the left subtree of u (v,z. It s not dffcult to see that u (v,z can only correspond to ether (q,j or (q,j. Wthout loss of generalty suppose the latter; then the rght chld of u (v,z corresponds to an
6 Chapter 8. Algorthm for Bnary Searchng n Trees 59 arc/node of T j q, and therefore u(t j q must be ths chld. Due to ther dstance to r, t follows that u(t j q must be the other chld of u (v,z. As a consequence, we have that for any level l of D, there are at most two representatves of the trees T j q located at l. Ths together wth the fact that T j q s the jth heavest tree rooted at a chld of q guarantees that n j=1 d(u(t q,u(t j q w(t j q n j=1 n j=1 (j 1/ w(t j q ( j 3 w(tq j (4 and the last nequalty gves a bound for the second term of (3. Drectly employng Lemma 13, we can lower bound the thrd term of (3 by q,j OPT(T j q,w. Fnally, for the fourth term we fx q and note that the path n D connectng u(t q to u q must contan the nodes correspondng to arcs e 1,...,e n (otherwse when traversng D and reachng u q we would not have enough knowledge to nfer that q s the marked node, contradctng the valdty of D. Applyng ths reasonng for each q, we conclude that last term of (3 s lower bounded by q n w(q. Therefore, applyng the prevous dscusson to lower bound the terms of (3 we obtan that: OPT(T,w H({w(T q } c 5w(T + q,j j w(t j q + q,j OPT(T j q,w + q n w(q (5 8.3 Alternatve Lower Bounds As n the case of the k-hotlnk Assgnment Problem presented n prevous sectons, when the value of the entropy H({w(T q } s large enough, t domnates the term 5w(T/ n nequalty (5 and leads to a suffcently strong lower bound. However, when ths entropy assumes a small value we need to adopt a dfferent strategy to devse an effectve bound. Frst alternatve lower bound. In order to reduce the addtve factor that appears n (5, we use almost the same dervaton that leads from (3 to (5; however, we smply lower bounded the frst summaton of (3 by zero.
7 Chapter 8. Algorthm for Bnary Searchng n Trees 60 Ths gves: OPT(T,w 3w(T + q,j j w(t j q + q,j OPT(T j q,w + q Q n w(q (6 Second alternatve lower bound. Now we devse a lower bound wthout an addtve factor; however t also does not contan the mportant term q Q n w(q. Consder a tree Tq j and a node v Tq j. By the defnton of representatve, u(tq j s an ancestor of u v n D, thus d(r,u v,d = d(r,u(t j q,d + d(u(t j q,u v,d. Because the trees {T j q } and Q form a partton of nodes of T, the cost OPT(T,w can be wrtten as: OPT(T,w = d(r,u(tq j w(tq j + d(r,u q w(q + d(u(tq j,u v w(v q,j q Q q,j v Tq j Frst, as the trees {T j q Q } are sngle nodes and hence do not contan any arcs, {u(t j q Q } and {u q } cannot be the root of D. Therefore, at most one dstance d(r,u(t j q (and wth q q Q of the frst two summatons of the prevous nequalty can be equal to zero, and all others must have value of at least one. But the constructon of the heavy path guarantees that for q q Q the weght of each of the trees {T j q } s at most w(t/. As a consequence, the frst two summatons of the nequalty can be lower bounded by w(t/. Combnng ths fact wth a lower bound for the last summaton provded by Lemma 13 (wth T = T j q we have: OPT(T,w w(t + q,j OPT(T j q,w (7 8.4 Approxmaton Guarantee We proceed by nducton over the number of nodes of T, where the base case s the trval one when T has only one node. Notce that because each tree Tq j s properly contaned n T, the nductve hypothess asserts that D j s an approxmate decson tree for Tq j, namely cost(d j,w αopt(t q j,w for some constant α. The analyss needs to be carred out n two dfferent cases dependng on the value of the entropy (henceforth we use H as a shorthand for H({w(T q }.
8 Chapter 8. Algorthm for Bnary Searchng n Trees 61 Case 1: H/ log 3 3w(T. Applyng ths bound to nequalty (5 we have: OPT(T,w H 6 log 3 + q,j j w(tq j + OPT(Tq j,w + n w(q (8 q,j q Employng the entropy hypothess to the frst term of nequalty ( and usng the nductve hypothess we have: cost(d,w H(3 log log 3 + q,j ( j w(t j q + q,j αopt(t j q,w + q n w(q Settng α (3 log 3+ t follows from the prevous nequalty and from nequalty (8 that cost(d, w αopt(t, w. Case : H/ log 3 3w(T. Applyng the entropy hypothess and the nductve hypothess to nequalty ( we have: cost(d,w (3 log 3 + w(t + q,j ( j w(t j q + q,j αopt(t j q,w + q n w(q Addng (α 1 tmes nequalty (7 to nequalty (6 we have: αopt(t,w (α 4w(T + q,j j w(tq j + q,j αopt(d j,w + q n w(q Settng α (3 log we have that cost(t,w αopt(t,w. Therefore, the nductve step holds for both cases when α (3 log Effcent Implementaton Notce that durng the presentaton and analyss of the algorthm, we have assumed that the trees {Tq j } are ordered by ther weghts. However, n order to actually mplement Step (v of the algorthm, one needs to sort these trees. As a heavy path decomposton can be computed n lnear tme [DL06], t s easy to see that all steps of the steps of the algorthm, besdes ths sortng at Step (v, can be mplemented n lnear tme. Hence, we resort to an approxmate sortng to provde a lnear tme mplementaton for the algorthm. Fx a node q n Q. Wthout loss of generalty, we assume there are more than three trees {Tq j } (that s n > 3, otherwse one could sort them n constant tme. In order to smplfy the analyss, we use w j = w(tq j and W = max j {w j }. Then we have the sequence WQ = (w 1,w,...,w n, whch s non-decreasng by the defnton of the trees {Tq j }. Now we partton WQ
9 Chapter 8. Algorthm for Bnary Searchng n Trees 6 nto blocks wth smlar weghts: for 1 j < n, the j-block contans all elements of WQ wth weghts n the nterval (W/ j,w/ j 1 ] and the n - block contans all elements of WQ wth weghts n [0,W/ n 1 ]. Due to ts order, WQ s the concatenaton of these blocks. Defnng s j as the ndex n WQ of the frst element of the j-block 1, we have that the for j < n the j- block s the sequence (w sj,w sj +1,...,w sj+1 1 and the n -block s the sequence (w sn,w sn +1,...,w n. f WQ Now we say that WQ s an approxmate sortng of the weghts {w j } contans frst all elements 1-block of WQ, then all elements of the -block of WQ and so on. The sequence WQ can be thought as a permutaton of W Q where only elements on the same j-block can be permuted. Defnng WQ = (w σ(1,w σ(,...,w σ(n, t follows that the subsequence (w σ(sj,w σ(sj +1,...,w σ(sj+1 contans the same elements as the j-block of WQ. As there are only n n blocks, we can fnd an approxmate sortng n lnear tme usng a bucketng strategy. We clam that n j=1 j w σ(j 3 n j=1 j w j. For every 1 j < n, t follows from the defnton of j-block and the relatonshp between the elements of WQ and the blocks of WQ that: k=s j k w k W j k=s j k = 1 W j 1 k=s j In addton, because for every k s n k 1 k=s j k w σ(k (9 we have w σ(k W/ n, the sum n k=s n k w σ(k can be upper bounded by n (W/ n. Therefore, for n > 3 ths term can be upper bounded by W. Combnng wth the fact that n k=1 k w k W we have that n k=s n k w σ(k n k=1 k w k. Usng the prevous nequalty together wth nequalty (9, we have: n k=1 k w σ(k = n 1 j=1 n 1 j=1 k=s j k w σ(k + n k=s n k w σ(j n n k w k + k w k 3 k w k k=s j k=1 k=1 Now suppose that nstead of usng an exact sortng our algorthm uses an approxmate sortng of the trees {T j q }, by means of permutatons σ q. It s easy to see that the only mpact ths modfcaton has to the upper bound of the algorthm occurs n the second term of the rght-hand sde of nequalty (, wth j j w(t q j beng replaced by j j w(t σq (j q. Then the prevous 1 In order to avod a heaver notaton, we assume that each j-block s nonempty.
10 Chapter 8. Algorthm for Bnary Searchng n Trees 63 argument mples that ths approxmate sortng ntroduces a multplcatve factor of three n second term of ( and t s straght forward to check ths does not alter the guarantee of the algorthm. Theorem 6 There s a lnear tme algorthm whch provdes a constant factor approxmaton for the problem of bnary searchng n trees.
Recurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationLuby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
More information1 Example 1: Axis-aligned rectangles
COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton
More information8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by
6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng
More informationBERNSTEIN POLYNOMIALS
On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More informationSupport Vector Machines
Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.
More information+ + + - - This circuit than can be reduced to a planar circuit
MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationThe Greedy Method. Introduction. 0/1 Knapsack Problem
The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton
More informationLogistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification
Lecture 4: More classfers and classes C4B Machne Learnng Hlary 20 A. Zsserman Logstc regresson Loss functons revsted Adaboost Loss functons revsted Optmzaton Multple class classfcaton Logstc Regresson
More informationHow To Calculate The Accountng Perod Of Nequalty
Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.
More informationINSTITUT FÜR INFORMATIK
INSTITUT FÜR INFORMATIK Schedulng jobs on unform processors revsted Klaus Jansen Chrstna Robene Bercht Nr. 1109 November 2011 ISSN 2192-6247 CHRISTIAN-ALBRECHTS-UNIVERSITÄT ZU KIEL Insttut für Informat
More informationWhat is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
More informationProject Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
More informationSection 5.3 Annuities, Future Value, and Sinking Funds
Secton 5.3 Annutes, Future Value, and Snkng Funds Ordnary Annutes A sequence of equal payments made at equal perods of tme s called an annuty. The tme between payments s the payment perod, and the tme
More informationv a 1 b 1 i, a 2 b 2 i,..., a n b n i.
SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are
More informationExtending Probabilistic Dynamic Epistemic Logic
Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set
More informationGeneral Auction Mechanism for Search Advertising
General Aucton Mechansm for Search Advertsng Gagan Aggarwal S. Muthukrshnan Dávd Pál Martn Pál Keywords game theory, onlne auctons, stable matchngs ABSTRACT Internet search advertsng s often sold by an
More informationLinear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits
Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.
More informationWe are now ready to answer the question: What are the possible cardinalities for finite fields?
Chapter 3 Fnte felds We have seen, n the prevous chapters, some examples of fnte felds. For example, the resdue class rng Z/pZ (when p s a prme) forms a feld wth p elements whch may be dentfed wth the
More informationJ. Parallel Distrib. Comput.
J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n
More informationGeneralizing the degree sequence problem
Mddlebury College March 2009 Arzona State Unversty Dscrete Mathematcs Semnar The degree sequence problem Problem: Gven an nteger sequence d = (d 1,...,d n ) determne f there exsts a graph G wth d as ts
More informationn + d + q = 24 and.05n +.1d +.25q = 2 { n + d + q = 24 (3) n + 2d + 5q = 40 (2)
MATH 16T Exam 1 : Part I (In-Class) Solutons 1. (0 pts) A pggy bank contans 4 cons, all of whch are nckels (5 ), dmes (10 ) or quarters (5 ). The pggy bank also contans a con of each denomnaton. The total
More informationPSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationTHE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek
HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo
More informationwhere the coordinates are related to those in the old frame as follows.
Chapter 2 - Cartesan Vectors and Tensors: Ther Algebra Defnton of a vector Examples of vectors Scalar multplcaton Addton of vectors coplanar vectors Unt vectors A bass of non-coplanar vectors Scalar product
More informationTHE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES
The goal: to measure (determne) an unknown quantty x (the value of a RV X) Realsaton: n results: y 1, y 2,..., y j,..., y n, (the measured values of Y 1, Y 2,..., Y j,..., Y n ) every result s encumbered
More informationForecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
More informationSection 5.4 Annuities, Present Value, and Amortization
Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today
More informationEnergies of Network Nastsemble
Supplementary materal: Assessng the relevance of node features for network structure Gnestra Bancon, 1 Paolo Pn,, 3 and Matteo Marsl 1 1 The Abdus Salam Internatonal Center for Theoretcal Physcs, Strada
More informationEmbedding lattices in the Kleene degrees
F U N D A M E N T A MATHEMATICAE 62 (999) Embeddng lattces n the Kleene degrees by Hsato M u r a k (Nagoya) Abstract. Under ZFC+CH, we prove that some lattces whose cardnaltes do not exceed ℵ can be embedded
More informationFormulating & Solving Integer Problems Chapter 11 289
Formulatng & Solvng Integer Problems Chapter 11 289 The Optonal Stop TSP If we drop the requrement that every stop must be vsted, we then get the optonal stop TSP. Ths mght correspond to a ob sequencng
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More informationSimple Interest Loans (Section 5.1) :
Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part
More informationMultiplication Algorithms for Radix-2 RN-Codings and Two s Complement Numbers
Multplcaton Algorthms for Radx- RN-Codngs and Two s Complement Numbers Jean-Luc Beuchat Projet Arénare, LIP, ENS Lyon 46, Allée d Itale F 69364 Lyon Cedex 07 jean-luc.beuchat@ens-lyon.fr Jean-Mchel Muller
More informationHow Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence
1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh
More informationThe OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
More informationHow To Know The Components Of Mean Squared Error Of Herarchcal Estmator S
S C H E D A E I N F O R M A T I C A E VOLUME 0 0 On Mean Squared Error of Herarchcal Estmator Stans law Brodowsk Faculty of Physcs, Astronomy, and Appled Computer Scence, Jagellonan Unversty, Reymonta
More informationCalculation of Sampling Weights
Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample
More informationPeriod and Deadline Selection for Schedulability in Real-Time Systems
Perod and Deadlne Selecton for Schedulablty n Real-Tme Systems Thdapat Chantem, Xaofeng Wang, M.D. Lemmon, and X. Sharon Hu Department of Computer Scence and Engneerng, Department of Electrcal Engneerng
More informationPAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
More informationLevel Annuities with Payments Less Frequent than Each Interest Period
Level Annutes wth Payments Less Frequent than Each Interest Perod 1 Annuty-mmedate 2 Annuty-due Level Annutes wth Payments Less Frequent than Each Interest Perod 1 Annuty-mmedate 2 Annuty-due Symoblc approach
More informationTo Fill or not to Fill: The Gas Station Problem
To Fll or not to Fll: The Gas Staton Problem Samr Khuller Azarakhsh Malekan Julán Mestre Abstract In ths paper we study several routng problems that generalze shortest paths and the Travelng Salesman Problem.
More informationEfficient Project Portfolio as a tool for Enterprise Risk Management
Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse
More informationInstitute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
More informationNPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6
PAR TESTS If a WEIGHT varable s specfed, t s used to replcate a case as many tmes as ndcated by the weght value rounded to the nearest nteger. If the workspace requrements are exceeded and samplng has
More informationProduction. 2. Y is closed A set is closed if it contains its boundary. We need this for the solution existence in the profit maximization problem.
Producer Theory Producton ASSUMPTION 2.1 Propertes of the Producton Set The producton set Y satsfes the followng propertes 1. Y s non-empty If Y s empty, we have nothng to talk about 2. Y s closed A set
More informationFrom Selective to Full Security: Semi-Generic Transformations in the Standard Model
An extended abstract of ths work appears n the proceedngs of PKC 2012 From Selectve to Full Securty: Sem-Generc Transformatons n the Standard Model Mchel Abdalla 1 Daro Fore 2 Vadm Lyubashevsky 1 1 Département
More informationNON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia
To appear n Journal o Appled Probablty June 2007 O-COSTAT SUM RED-AD-BLACK GAMES WITH BET-DEPEDET WI PROBABILITY FUCTIO LAURA POTIGGIA, Unversty o the Scences n Phladelpha Abstract In ths paper we nvestgate
More informationData Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
More informationEnabling P2P One-view Multi-party Video Conferencing
Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P
More informationUsing Series to Analyze Financial Situations: Present Value
2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated
More informationA generalized hierarchical fair service curve algorithm for high network utilization and link-sharing
Computer Networks 43 (2003) 669 694 www.elsever.com/locate/comnet A generalzed herarchcal far servce curve algorthm for hgh network utlzaton and lnk-sharng Khyun Pyun *, Junehwa Song, Heung-Kyu Lee Department
More informationEqulbra Exst and Trade S effcent proportionally
On Compettve Nonlnear Prcng Andrea Attar Thomas Marott Franços Salané February 27, 2013 Abstract A buyer of a dvsble good faces several dentcal sellers. The buyer s preferences are her prvate nformaton,
More informationL10: Linear discriminants analysis
L0: Lnear dscrmnants analyss Lnear dscrmnant analyss, two classes Lnear dscrmnant analyss, C classes LDA vs. PCA Lmtatons of LDA Varants of LDA Other dmensonalty reducton methods CSCE 666 Pattern Analyss
More informationSngle Snk Buy at Bulk Problem and the Access Network
A Constant Factor Approxmaton for the Sngle Snk Edge Installaton Problem Sudpto Guha Adam Meyerson Kamesh Munagala Abstract We present the frst constant approxmaton to the sngle snk buy-at-bulk network
More informationAvailability-Based Path Selection and Network Vulnerability Assessment
Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationLogistic Regression. Steve Kroon
Logstc Regresson Steve Kroon Course notes sectons: 24.3-24.4 Dsclamer: these notes do not explctly ndcate whether values are vectors or scalars, but expects the reader to dscern ths from the context. Scenaro
More informationStatistical Methods to Develop Rating Models
Statstcal Methods to Develop Ratng Models [Evelyn Hayden and Danel Porath, Österrechsche Natonalbank and Unversty of Appled Scences at Manz] Source: The Basel II Rsk Parameters Estmaton, Valdaton, and
More informationIn our example i = r/12 =.0825/12 At the end of the first month after your payment is received your amount in the account, the balance, is
Payout annutes: Start wth P dollars, e.g., P = 100, 000. Over a 30 year perod you receve equal payments of A dollars at the end of each month. The amount of money left n the account, the balance, earns
More informationThe Geometry of Online Packing Linear Programs
The Geometry of Onlne Packng Lnear Programs Marco Molnaro R. Rav Abstract We consder packng lnear programs wth m rows where all constrant coeffcents are n the unt nterval. In the onlne model, we know the
More informationForecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems
More informationDesign of Output Codes for Fast Covering Learning using Basic Decomposition Techniques
Journal of Computer Scence (7): 565-57, 6 ISSN 59-66 6 Scence Publcatons Desgn of Output Codes for Fast Coverng Learnng usng Basc Decomposton Technques Aruna Twar and Narendra S. Chaudhar, Faculty of Computer
More informationRealistic Image Synthesis
Realstc Image Synthess - Combned Samplng and Path Tracng - Phlpp Slusallek Karol Myszkowsk Vncent Pegoraro Overvew: Today Combned Samplng (Multple Importance Samplng) Renderng and Measurng Equaton Random
More informationPower-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts
Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)
More informationAn efficient constraint handling methodology for multi-objective evolutionary algorithms
Rev. Fac. Ing. Unv. Antoqua N. 49. pp. 141-150. Septembre, 009 An effcent constrant handlng methodology for mult-objectve evolutonary algorthms Una metodología efcente para manejo de restrccones en algortmos
More informationAn Overview of Financial Mathematics
An Overvew of Fnancal Mathematcs Wllam Benedct McCartney July 2012 Abstract Ths document s meant to be a quck ntroducton to nterest theory. It s wrtten specfcally for actuaral students preparng to take
More informationStochastic Bandits with Side Observations on Networks
Stochastc Bandts wth Sde Observatons on Networks Swapna Buccapatnam, Atlla Erylmaz Department of ECE The Oho State Unversty Columbus, OH - 430 buccapat@eceosuedu, erylmaz@osuedu Ness B Shroff Departments
More informationDescriptive Models. Cluster Analysis. Example. General Applications of Clustering. Examples of Clustering Applications
CMSC828G Prncples of Data Mnng Lecture #9 Today s Readng: HMS, chapter 9 Today s Lecture: Descrptve Modelng Clusterng Algorthms Descrptve Models model presents the man features of the data, a global summary
More informationCausal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting
Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of
More informationAddendum to: Importing Skill-Biased Technology
Addendum to: Importng Skll-Based Technology Arel Bursten UCLA and NBER Javer Cravno UCLA August 202 Jonathan Vogel Columba and NBER Abstract Ths Addendum derves the results dscussed n secton 3.3 of our
More information1. Measuring association using correlation and regression
How to measure assocaton I: Correlaton. 1. Measurng assocaton usng correlaton and regresson We often would lke to know how one varable, such as a mother's weght, s related to another varable, such as a
More informationAN EFFECTIVE MATRIX GEOMETRIC MEAN SATISFYING THE ANDO LI MATHIAS PROPERTIES
MATHEMATICS OF COMPUTATION Volume, Number, Pages S 5-578(XX)- AN EFFECTIVE MATRIX GEOMETRIC MEAN SATISFYING THE ANDO LI MATHIAS PROPERTIES DARIO A. BINI, BEATRICE MEINI AND FEDERICO POLONI Abstract. We
More informationCalculating the high frequency transmission line parameters of power cables
< ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,
More informationPRACTICE 1: MUTUAL FUNDS EVALUATION USING MATLAB.
PRACTICE 1: MUTUAL FUNDS EVALUATION USING MATLAB. INDEX 1. Load data usng the Edtor wndow and m-fle 2. Learnng to save results from the Edtor wndow. 3. Computng the Sharpe Rato 4. Obtanng the Treynor Rato
More informationPKIS: practical keyword index search on cloud datacenter
Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A
More informationJoint Scheduling of Processing and Shuffle Phases in MapReduce Systems
Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent
More informationFINANCIAL MATHEMATICS. A Practical Guide for Actuaries. and other Business Professionals
FINANCIAL MATHEMATICS A Practcal Gude for Actuares and other Busness Professonals Second Edton CHRIS RUCKMAN, FSA, MAAA JOE FRANCIS, FSA, MAAA, CFA Study Notes Prepared by Kevn Shand, FSA, FCIA Assstant
More informationActivity Scheduling for Cost-Time Investment Optimization in Project Management
PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng
More information1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)
6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes
More informationTraffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,
More informationAn Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services
An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao
More informationDo Hidden Variables. Improve Quantum Mechanics?
Radboud Unverstet Njmegen Do Hdden Varables Improve Quantum Mechancs? Bachelor Thess Author: Denns Hendrkx Begeleder: Prof. dr. Klaas Landsman Abstract Snce the dawn of quantum mechancs physcst have contemplated
More informationBusiness Process Improvement using Multi-objective Optimisation K. Vergidis 1, A. Tiwari 1 and B. Majeed 2
Busness Process Improvement usng Mult-objectve Optmsaton K. Vergds 1, A. Twar 1 and B. Majeed 2 1 Manufacturng Department, School of Industral and Manufacturng Scence, Cranfeld Unversty, Cranfeld, MK43
More informationOptimal resource capacity management for stochastic networks
Submtted for publcaton. Optmal resource capacty management for stochastc networks A.B. Deker H. Mlton Stewart School of ISyE, Georga Insttute of Technology, Atlanta, GA 30332, ton.deker@sye.gatech.edu
More informationCHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
More informationSolution: Let i = 10% and d = 5%. By definition, the respective forces of interest on funds A and B are. i 1 + it. S A (t) = d (1 dt) 2 1. = d 1 dt.
Chapter 9 Revew problems 9.1 Interest rate measurement Example 9.1. Fund A accumulates at a smple nterest rate of 10%. Fund B accumulates at a smple dscount rate of 5%. Fnd the pont n tme at whch the forces
More informationReal-Time Process Scheduling
Real-Tme Process Schedulng ktw@cse.ntu.edu.tw (Real-Tme and Embedded Systems Laboratory) Independent Process Schedulng Processes share nothng but CPU Papers for dscussons: C.L. Lu and James. W. Layland,
More informationResearch Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization
Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy
More informationA Probabilistic Theory of Coherence
A Probablstc Theory of Coherence BRANDEN FITELSON. The Coherence Measure C Let E be a set of n propostons E,..., E n. We seek a probablstc measure C(E) of the degree of coherence of E. Intutvely, we want
More informationStability, observer design and control of networks using Lyapunov methods
Stablty, observer desgn and control of networks usng Lyapunov methods von Lars Naujok Dssertaton zur Erlangung des Grades enes Doktors der Naturwssenschaften - Dr. rer. nat. - Vorgelegt m Fachberech 3
More informationImplementation of Deutsch's Algorithm Using Mathcad
Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"
More informationMining Multiple Large Data Sources
The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of
More informationStaff Paper. Farm Savings Accounts: Examining Income Variability, Eligibility, and Benefits. Brent Gloy, Eddy LaDue, and Charles Cuykendall
SP 2005-02 August 2005 Staff Paper Department of Appled Economcs and Management Cornell Unversty, Ithaca, New York 14853-7801 USA Farm Savngs Accounts: Examnng Income Varablty, Elgblty, and Benefts Brent
More informationMinimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
More informationLearning Permutations with Exponential Weights
Journal of Machne Learnng Research 2009 (10) 1705-1736 Submtted 9/08; Publshed 7/09 Learnng Permutatons wth Exponental Weghts Davd P. Helmbold Manfred K. Warmuth Computer Scence Department Unversty of
More informationPricing Multi-Asset Cross Currency Options
CIRJE-F-844 Prcng Mult-Asset Cross Currency Optons Kenchro Shraya Graduate School of Economcs, Unversty of Tokyo Akhko Takahash Unversty of Tokyo March 212; Revsed n September, October and November 212
More information