2r 1. Definition (Degree Measure). Let G be a r-graph of order n and average degree d. Let S V (G). The degree measure µ(s) of S is defined by,

Size: px
Start display at page:

Download "2r 1. Definition (Degree Measure). Let G be a r-graph of order n and average degree d. Let S V (G). The degree measure µ(s) of S is defined by,"

Transcription

1 Theorem Simple Containers Theorem) Let G be a simple, r-graph of average egree an of orer n Let 0 < δ < If is large enough, then there exists a collection of sets C PV G)) satisfying: i) for every inepenent set I [n], there exists C C with I C, ii) eg[c]) < δeg) for every C C, iii) C 2 βn where β = Degree Measure Definition Let G be a hypergraph For v V G) we efine v) = {e EG) : v e} Definition Degree Measure) Let G be a r-graph of orer n an average egree Let S V G) The egree measure µs) of S is efine by, µs) = n v) Note that µ is probability measure, so particularly aitive an µv G)) = The egree measure has several useful properties, which are state below v S First property tell us that µs) small implies eg[s]) small eg[s]) r v S v) = n µs) = µs)eg) r eg[s]) µs)eg) Let ea, B) enote number of eges between sets A, B V G) We have r )nµv G)\S) = r ) v / S v) r )ev G)\S, S) v S v) reg[s]) That is, So finally, r ) µs)) = r )µv \S) µs) r n eg[s]) eg[s]) n r rµs) r + ) = µs) + ) n 2) r

2 If I is an inepenent set in G From 2) we get, 0 = eg[i]) µi) + ) n r r µi) If G is -regular, inequality eg[s]) < δeg) with 2) implies: δ n = δeg) > eg[s]) µs) + ) n = r r S n + r ) n What gives us S < r + δ ) n r 2 Proof of Theorem For a proof of Theorem, we will nee following lemma Lemma Let G be a simple, r-graph of average egree an of orer n If is large enough, then there exists a collection of sets C PV G)) satisfying: i) for every inepenent set I [n], there exists C C with I C, ii) µc) < 4r 2 ) for every C C, iii) C 2 αn where α = cr 2 log Statement of the lemma is quite similar to the statement of the Theorem, conition i) is exactly the same However ii) is expresse in terms of egree measure We can suspect that it will be use to boun number of eges in G[C] using property ) of µ In iii) carinality of the container family is smaller than in the Theorem, provie sufficiently large Definition Let G be a r-graph For a given 0 j r an sets R, S V G) we efine Γ j R, S), by Γ j R, S) = { v V G) : e = {v} f g, f e EG) ) R, g j S r j )} Proof Let V = V G), E = EG) For a given 0 j r an sets R, S, T V G) we efine C j R, S, T ), by { V \Γj R, S)\T ) if µγ C j R, S, T ) = j R, S)\T ) otherwise 4r 2, Since = µv \Γ j R, S)\T )) + µγ j R, S)\T ), if C j R, S, T ) woul be a container conition ii) will be satisfie 2

3 Let u = 6r 3r 2 an q = 5ru = 5 3r 6r 2 By the efinition q is small if is large Now we will efine a family C which will be caniate for a containers family, C = {C j R, S, T ) : 0 j r, R, S, T } Then ) 3 n C r) 3 ) 7 n 2 ) 7 = 2 log 2 7/ 2)) We will now focus on the exponent of 2, log 2 7nq/ 2 log 6r ) = 7 2 log 2 = 7 5 3r = n 7 5 3r6r/ 2) 2) log 2 } {{ } cr) ) 3 )) 7 en e = 5 3r 6r 2 2 log log 2 log 2 = So C 2 αn, α = cr 2 log We will use probabilistic metho, to show that the probability that C is not satisfying conitions i),ii),iii) is smaller that For a given inepenent set I we will efine sets R, S, T, each not bigger than such that for some j, C j R, S, T ) is a container for I Fix an inepenent set I, For a subset A V with I A an for 0 j r we efine E j A) = {e E : e A, e A j} P 0): Now, let P j) be a statement: A V I A µa) + I A µa) ) A V egree measure we have E 0 A) = eg[a]) Hence the statement P 0) is true j ) 2 E j A) nuj E 0 A) n From property 2) of µa) + ) n = n r 3

4 P r): I A µa) ) E r A) nur So A = V Since I cannot A V contain any eges, 0 = E r A) nur > 0 Hence the statement P r) is false Therefore there exists 0 j r such that the statement P j) is true an P j + ) is false Fix a set A witnessing falsity of P j + ) Such set exists since µa) + j+ 2 + j Thus 2 I A µa) + j + 2 E j+a) < nuj+ Let p = 6r/u j /r ) Since u < an 0 j r, we have p = 6r r 6r r u j u = 3r = 3r u2 u = 3ru = q 5 6r 3r 2 ) 2 u = Let R I an S A\I be ranom sets, where each vertex if I an A\I respectively) is inclue inepenently with probability p By Markov s inequality an Pr R > ) E R ) Pr S > ) E S ) = I p np 5, = A\I p np 5 Now, let T = Γ j R, S) I Provie µγ j R, S)\T ) /4r 2, C j R, S, T ) is a container for I Inee, if v I, then v / Γ j R, S)\T, by efinition of T So clearly v V \Γ j R, S)\T ) = C j R, S, T ) To complete the proof we have to show that with the aequate probabilities T > an µγ j R, S)\T ) < /4r 2 hols Let v I If v Γ j R, S) then, by efinition v T This woul happen if there exists e EG) such that e = {v} f g, f ) R j, g S r j ) Since e I = j+ we have that e E j+ A) There are j+ partitions e = {v} f g, v I, f ) I j, g A\I r j ), for each such partition, the probability that both f ) R j an g S r j ) is p r Observation Let us consier fixe R an S Let Y enote pairs v, e) such that v I an e E j+ A) with e = {v} f g, v I, f ) R j, g S r j ) Then T Y j + ) E j+ A) < j + ) nuj+ 2 nuj+ 4

5 Taking expectations, by observation we obtain E T ) E Y ) < 2 nuj+ p r = 6r nuj+ 2 u j = 3run = 5 Applying Markov s inequality Pr T > ) E T ) = 5 = 5 Now we will show PrµΓ j R, S)\T ) < /4r 2 ) 5 For v A, let F j v) = {e E : v e, e E j A), e / E j+ A)} = {e : v e A, e I = j}, an D = { v A\I : F j v) } uj u) Note that I A\D Consier an ege e E j A\D) an e / E j+ A) Then e A\D an e I = j Since j < r there is v A\D)\I an v e Note that E j A\D) E j A), so e F j v) By the efinition of D an facts that v / D an v / I we have F j v) < uj u) Therefore E j A\D)\E j+ A) < A\D uj u) nuj u) By the choice of A, E j+ A) < nuj+, hence E j A\D) E j A\D)\E j+ A) + E j+ A) < < nuj u) + nuj+ = nuj However, we know that the statement P j) is true, so it has to be µa\d) < + j On the other han A was chosen such that µa) 2 + j+ 2 Hence + j 2 > µa\d) = µa) µd) + j + 2 µd), an so µd) > 2 By the efinition of D there is D I =, in particular D T = Let D = D\Γ j R, S) Then D\D = D Γ j R, S) Γ j R, S)\T So µγ j R, S)\T ) µd\d ) = µd) µd ) Now, let v D, then F j v) uj u) 2 5r uj since u is small) Each e F j v) has a partition e = f g with f I j ), g A\I r j) where v g since v / I For every ege the probability that f R an g\{v} S is p r Moreover these events are inepenent over all e F j v), because G is simple Hence 5

6 Prv D ) Pr e {v} f g, v D, f e F jv) = p r ) Fjv) exp 2 5r uj p r } {{ } =6r R j ), g = exp ) ) R = r j { 2 } < 5 0 Now, µd ) = n v D v) = n v D v)i v, where I v is an inicator of event v D Since EI v ) = Prv D ) < 0, EµD )) = v)ei v ) < µd n 0 v D Applying Markov s inequality, we get Pr µd ) > µd) ) 2EµD )) 2 µd) Therefore to Pr < 2µD) 0µD) = 5 µγ j R, S)\T ) µd) µd ) µd) > 2 4r 2 Finally, the probability that C j R, S, T ) is not the container for I is equal R > S > T > µγ j R, S)\T ) ) 4r 2 Pr R > ) + Pr S > ) + Pr R > ) + PrµΓ j R, S)\T ) 4r 2 ) 4 5 < Proof of Theorem The proof strategy is as follows We will iteratively apply lemma, starting with G If we will get a container, say C, with at least δeg) eges, we will apply the lemma to G[C], an so on to each of the new containers, until we obtain a collection of containers each with less than δeg) eges If C is a container obtaine after applying lemma to G, an eg[c]) δeg), if C stans for athe average egree of G[C], we have C = C r v C v) = C eg[c]) δeg) = δ C So we can apply lemma to G[C] with C δ, we will obtain a collection C of containers for G[C] with 6

7 i) for every inepenent set I V C), there exists C C with I C, ii) µc ) < 4r 2 for every C C, iii) C 2 α n where α = cr C 2 log C Let I IG) an I C, it is equivalent to I IG[C]) Hence every inepenent set containe in C will be also containe in some member C of C Now, by ) we have eg[c ]) µc )eg[c]) µc )µc)eg) 4r 2 )2 eg) One can see that each application of the lemma ecreases the fraction of eges by /4r 2 Note that new containers are smaller concerning the number of eges, they o not necessarily have much less vertices Let m be the number of levels of iteration From above observation we ant to have /4r 2 ) m < δ Note that /4r 2 ) m < δ m log So we nee at most m = log δ log 4r 2 4r 2 ) ) < log δ m > log δ log 4r 2 ) + < c log δ levels of iteration, where c > 0 is some positive constant By iterative applications of the lemma the fraction of eges in each container ecreases, however the carinality of our family of containers can grow rapily We must assure that it will be not bigger than 2 βn, as state in Theorem Let α max enote maximum over all applications Then α max = cr) max 2 2 log max < cr) log δ m Since max = δ a, for some 0 a m We want to show m α max < β Let /δ < log, we have m α max β < m cr) δ m = cr)m δ m < cr)c log δ 2 log = 2 ) c δ ) 2) log < 2 log δ < cr)c log log log ) c 2 log log < C log ) C2 log log Hence, m α max < β for sufficiently large ) C3 0 ) 2) log < ) 2) log < 7

8 3 List chromatic number Theorem Let G be a simple -regular r-graph Then, as, χ L G) + o)) log 2 log r Note: Originally 202), χ L G) + o) 4r log log Proof First, since G is simple, -regular, r-graph, we can apply Theorem to G Then we have a collection C of containers of size not greater than 2 βn Moreover, since G is -regular, for every container C we have C < /r + δ/r)n where 0 < δ < Let c = δ)/r, k = / 2), with this values we can apply C-compability theorem theorem 2 from 200) to a family C We obtain collection of lists L, each of size l, which are not C-compatible, where as k, l +o)) log k log/c) Hence, log k χ L G) + o)) log/c) Since δ was arbitrary log / 2) = + o)) logr/ δ)) = + o) log 2 log r 8

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions A Generalization of Sauer s Lemma to Classes of Large-Margin Functions Joel Ratsaby University College Lonon Gower Street, Lonon WC1E 6BT, Unite Kingom J.Ratsaby@cs.ucl.ac.uk, WWW home page: http://www.cs.ucl.ac.uk/staff/j.ratsaby/

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS Contents 1. Moment generating functions 2. Sum of a ranom number of ranom variables 3. Transforms

More information

Factoring Dickson polynomials over finite fields

Factoring Dickson polynomials over finite fields Factoring Dickson polynomials over finite fiels Manjul Bhargava Department of Mathematics, Princeton University. Princeton NJ 08544 manjul@math.princeton.eu Michael Zieve Department of Mathematics, University

More information

Triangle deletion. Ernie Croot. February 3, 2010

Triangle deletion. Ernie Croot. February 3, 2010 Triangle deletion Ernie Croot February 3, 2010 1 Introduction The purpose of this note is to give an intuitive outline of the triangle deletion theorem of Ruzsa and Szemerédi, which says that if G = (V,

More information

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION MAXIMUM-LIKELIHOOD ESTIMATION The General Theory of M-L Estimation In orer to erive an M-L estimator, we are boun to make an assumption about the functional form of the istribution which generates the

More information

On Adaboost and Optimal Betting Strategies

On Adaboost and Optimal Betting Strategies On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore

More information

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sewoong Oh an Anrea Montanari Electrical Engineering an Statistics Department Stanfor University, Stanfor,

More information

8.1 Min Degree Spanning Tree

8.1 Min Degree Spanning Tree CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree

More information

Math 230.01, Fall 2012: HW 1 Solutions

Math 230.01, Fall 2012: HW 1 Solutions Math 3., Fall : HW Solutions Problem (p.9 #). Suppose a wor is picke at ranom from this sentence. Fin: a) the chance the wor has at least letters; SOLUTION: All wors are equally likely to be chosen. The

More information

Web Appendices of Selling to Overcon dent Consumers

Web Appendices of Selling to Overcon dent Consumers Web Appenices of Selling to Overcon ent Consumers Michael D. Grubb A Option Pricing Intuition This appenix provies aitional intuition base on option pricing for the result in Proposition 2. Consier the

More information

1 Approximating Set Cover

1 Approximating Set Cover CS 05: Algorithms (Grad) Feb 2-24, 2005 Approximating Set Cover. Definition An Instance (X, F ) of the set-covering problem consists of a finite set X and a family F of subset of X, such that every elemennt

More information

Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany

Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany Parameterize Algorithms for -Hitting Set: the Weighte Case Henning Fernau Trierer Forschungsberichte; Trier: Technical Reports Informatik / Mathematik No. 08-6, July 2008 Univ. Trier, FB 4 Abteilung Informatik

More information

BV has the bounded approximation property

BV has the bounded approximation property The Journal of Geometric Analysis volume 15 (2005), number 1, pp. 1-7 [version, April 14, 2005] BV has the boune approximation property G. Alberti, M. Csörnyei, A. Pe lczyński, D. Preiss Abstract: We prove

More information

Firewall Design: Consistency, Completeness, and Compactness

Firewall Design: Consistency, Completeness, and Compactness C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,

More information

Department of Mathematical Sciences, University of Copenhagen. Kandidat projekt i matematik. Jens Jakob Kjær. Golod Complexes

Department of Mathematical Sciences, University of Copenhagen. Kandidat projekt i matematik. Jens Jakob Kjær. Golod Complexes F A C U L T Y O F S C I E N C E U N I V E R S I T Y O F C O P E N H A G E N Department of Mathematical Sciences, University of Copenhagen Kaniat projekt i matematik Jens Jakob Kjær Golo Complexes Avisor:

More information

Lecture 22: November 10

Lecture 22: November 10 CS271 Randomness & Computation Fall 2011 Lecture 22: November 10 Lecturer: Alistair Sinclair Based on scribe notes by Rafael Frongillo Disclaimer: These notes have not been subjected to the usual scrutiny

More information

Web Appendices to Selling to Overcon dent Consumers

Web Appendices to Selling to Overcon dent Consumers Web Appenices to Selling to Overcon ent Consumers Michael D. Grubb MIT Sloan School of Management Cambrige, MA 02142 mgrubbmit.eu www.mit.eu/~mgrubb May 2, 2008 B Option Pricing Intuition This appenix

More information

α α λ α = = λ λ α ψ = = α α α λ λ ψ α = + β = > θ θ β > β β θ θ θ β θ β γ θ β = γ θ > β > γ θ β γ = θ β = θ β = θ β = β θ = β β θ = = = β β θ = + α α α α α = = λ λ λ λ λ λ λ = λ λ α α α α λ ψ + α =

More information

Which Networks Are Least Susceptible to Cascading Failures?

Which Networks Are Least Susceptible to Cascading Failures? Which Networks Are Least Susceptible to Cascaing Failures? Larry Blume Davi Easley Jon Kleinberg Robert Kleinberg Éva Taros July 011 Abstract. The resilience of networks to various types of failures is

More information

Risk Management for Derivatives

Risk Management for Derivatives Risk Management or Derivatives he Greeks are coming the Greeks are coming! Managing risk is important to a large number o iniviuals an institutions he most unamental aspect o business is a process where

More information

Optimal Energy Commitments with Storage and Intermittent Supply

Optimal Energy Commitments with Storage and Intermittent Supply Submitte to Operations Research manuscript OPRE-2009-09-406 Optimal Energy Commitments with Storage an Intermittent Supply Jae Ho Kim Department of Electrical Engineering, Princeton University, Princeton,

More information

Tools for parsimonious edge-colouring of graphs with maximum degree three. J.L. Fouquet and J.M. Vanherpe. Rapport n o RR-2010-10

Tools for parsimonious edge-colouring of graphs with maximum degree three. J.L. Fouquet and J.M. Vanherpe. Rapport n o RR-2010-10 Tools for parsimonious edge-colouring of graphs with maximum degree three J.L. Fouquet and J.M. Vanherpe LIFO, Université d Orléans Rapport n o RR-2010-10 Tools for parsimonious edge-colouring of graphs

More information

How To Find Out How To Calculate Volume Of A Sphere

How To Find Out How To Calculate Volume Of A Sphere Contents High-Dimensional Space. Properties of High-Dimensional Space..................... 4. The High-Dimensional Sphere......................... 5.. The Sphere an the Cube in Higher Dimensions...........

More information

Coalitional Game Theoretic Approach for Cooperative Transmission in Vehicular Networks

Coalitional Game Theoretic Approach for Cooperative Transmission in Vehicular Networks Coalitional Game Theoretic Approach for Cooperative Transmission in Vehicular Networks arxiv:.795v [cs.gt] 8 Feb Tian Zhang, Wei Chen, Zhu Han, an Zhigang Cao State Key Laboratory on Microwave an Digital

More information

Algorithm Design and Analysis

Algorithm Design and Analysis Algorithm Design and Analysis LECTURE 27 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/6/2011 S. Raskhodnikova;

More information

HYPOTHESIS TESTING: POWER OF THE TEST

HYPOTHESIS TESTING: POWER OF THE TEST HYPOTHESIS TESTING: POWER OF THE TEST The first 6 steps of the 9-step test of hypothesis are called "the test". These steps are not dependent on the observed data values. When planning a research project,

More information

The Quick Calculus Tutorial

The Quick Calculus Tutorial The Quick Calculus Tutorial This text is a quick introuction into Calculus ieas an techniques. It is esigne to help you if you take the Calculus base course Physics 211 at the same time with Calculus I,

More information

4. Expanding dynamical systems

4. Expanding dynamical systems 4.1. Metric definition. 4. Expanding dynamical systems Definition 4.1. Let X be a compact metric space. A map f : X X is said to be expanding if there exist ɛ > 0 and L > 1 such that d(f(x), f(y)) Ld(x,

More information

Here the units used are radians and sin x = sin(x radians). Recall that sin x and cos x are defined and continuous everywhere and

Here the units used are radians and sin x = sin(x radians). Recall that sin x and cos x are defined and continuous everywhere and Lecture 9 : Derivatives of Trigonometric Functions (Please review Trigonometry uner Algebra/Precalculus Review on the class webpage.) In this section we will look at the erivatives of the trigonometric

More information

Every tree contains a large induced subgraph with all degrees odd

Every tree contains a large induced subgraph with all degrees odd Every tree contains a large induced subgraph with all degrees odd A.J. Radcliffe Carnegie Mellon University, Pittsburgh, PA A.D. Scott Department of Pure Mathematics and Mathematical Statistics University

More information

Single machine parallel batch scheduling with unbounded capacity

Single machine parallel batch scheduling with unbounded capacity Workshop on Combinatorics and Graph Theory 21th, April, 2006 Nankai University Single machine parallel batch scheduling with unbounded capacity Yuan Jinjiang Department of mathematics, Zhengzhou University

More information

THE NUMBER OF GRAPHS AND A RANDOM GRAPH WITH A GIVEN DEGREE SEQUENCE. Alexander Barvinok

THE NUMBER OF GRAPHS AND A RANDOM GRAPH WITH A GIVEN DEGREE SEQUENCE. Alexander Barvinok THE NUMBER OF GRAPHS AND A RANDOM GRAPH WITH A GIVEN DEGREE SEQUENCE Alexer Barvinok Papers are available at http://www.math.lsa.umich.edu/ barvinok/papers.html This is a joint work with J.A. Hartigan

More information

THREE DIMENSIONAL GEOMETRY

THREE DIMENSIONAL GEOMETRY Chapter 8 THREE DIMENSIONAL GEOMETRY 8.1 Introduction In this chapter we present a vector algebra approach to three dimensional geometry. The aim is to present standard properties of lines and planes,

More information

Minimizing the Number of Machines in a Unit-Time Scheduling Problem

Minimizing the Number of Machines in a Unit-Time Scheduling Problem Minimizing the Number of Machines in a Unit-Time Scheduling Problem Svetlana A. Kravchenko 1 United Institute of Informatics Problems, Surganova St. 6, 220012 Minsk, Belarus kravch@newman.bas-net.by Frank

More information

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,

More information

CURRENCY OPTION PRICING II

CURRENCY OPTION PRICING II Jones Grauate School Rice University Masa Watanabe INTERNATIONAL FINANCE MGMT 657 Calibrating the Binomial Tree to Volatility Black-Scholes Moel for Currency Options Properties of the BS Moel Option Sensitivity

More information

Differential Privacy for Graphs and Social Networks. Sofya Raskhodnikova Penn State University, on sabba1cal at BU for 2013-2014 privacy year

Differential Privacy for Graphs and Social Networks. Sofya Raskhodnikova Penn State University, on sabba1cal at BU for 2013-2014 privacy year Differential Privacy for Graphs an Social Networks Sofya Raskhonikova Penn State University, on sabba1cal at BU for 2013-2014 privacy year 1 Publishing information about graphs Many types of ata can be

More information

(k 1)! e (m 1)/N v(k). (k 1)!

(k 1)! e (m 1)/N v(k). (k 1)! m N 1/N k v : N R m k 1 k B(k 1, m 1; 1/N) = ( ) ( m 1 1 k 1 N ) k 1 ( ) m k N 1. N m N (m 1)/N P ((m 1)/N; k 1) = 1 (k 1)! m EV (m) = k=1 1 (k 1)! ( ) k 1 m 1 e (m 1)/N. N ( ) k 1 m 1 e (m 1)/N v(k).

More information

Mannheim curves in the three-dimensional sphere

Mannheim curves in the three-dimensional sphere Mannheim curves in the three-imensional sphere anju Kahraman, Mehmet Öner Manisa Celal Bayar University, Faculty of Arts an Sciences, Mathematics Department, Muraiye Campus, 5, Muraiye, Manisa, urkey.

More information

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem

More information

A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements

A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements International Journal of nowlege an Systems Science, 3(), -7, January-March 0 A lame-ase Approach to Generating Proposals for Hanling Inconsistency in Software Requirements eian Mu, Peking University,

More information

1 The Line vs Point Test

1 The Line vs Point Test 6.875 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Low Degree Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz Having seen a probabilistic verifier for linearity

More information

The mean-field computation in a supermarket model with server multiple vacations

The mean-field computation in a supermarket model with server multiple vacations DOI.7/s66-3-7-5 The mean-fiel computation in a supermaret moel with server multiple vacations Quan-Lin Li Guirong Dai John C. S. Lui Yang Wang Receive: November / Accepte: 8 October 3 SpringerScienceBusinessMeiaNewYor3

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

MINIMUM VERTEX DEGREE CONDITIONS FOR LOOSE HAMILTON CYCLES IN 3-UNIFORM HYPERGRAPHS., where

MINIMUM VERTEX DEGREE CONDITIONS FOR LOOSE HAMILTON CYCLES IN 3-UNIFORM HYPERGRAPHS., where MINIMUM VERTEX DEGREE CONDITIONS FOR LOOSE HAMILTON CYCLES IN -UNIFORM HYPERGRAPHS ENNO BUSS, HIỆP HÀN, AND MATHIAS SCHACHT Abstract. We investigate minimum vertex degree conditions for -uniform hypergraphs

More information

CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010

CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010 CS 598CSC: Combinatorial Optimization Lecture date: /4/010 Instructor: Chandra Chekuri Scribe: David Morrison Gomory-Hu Trees (The work in this section closely follows [3]) Let G = (V, E) be an undirected

More information

GENERATING LOW-DEGREE 2-SPANNERS

GENERATING LOW-DEGREE 2-SPANNERS SIAM J. COMPUT. c 1998 Society for Industrial and Applied Mathematics Vol. 27, No. 5, pp. 1438 1456, October 1998 013 GENERATING LOW-DEGREE 2-SPANNERS GUY KORTSARZ AND DAVID PELEG Abstract. A k-spanner

More information

Private Approximation of Clustering and Vertex Cover

Private Approximation of Clustering and Vertex Cover Private Approximation of Clustering and Vertex Cover Amos Beimel, Renen Hallak, and Kobbi Nissim Department of Computer Science, Ben-Gurion University of the Negev Abstract. Private approximation of search

More information

Lecture L25-3D Rigid Body Kinematics

Lecture L25-3D Rigid Body Kinematics J. Peraire, S. Winall 16.07 Dynamics Fall 2008 Version 2.0 Lecture L25-3D Rigi Boy Kinematics In this lecture, we consier the motion of a 3D rigi boy. We shall see that in the general three-imensional

More information

A REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE. 1. Introduction and Preliminaries

A REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE. 1. Introduction and Preliminaries Acta Math. Univ. Comenianae Vol. LXVI, 2(1997), pp. 285 291 285 A REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE E. T. BASKORO, M. MILLER and J. ŠIRÁŇ Abstract. It is well known that Moore digraphs do

More information

each college c i C has a capacity q i - the maximum number of students it will admit

each college c i C has a capacity q i - the maximum number of students it will admit n colleges in a set C, m applicants in a set A, where m is much larger than n. each college c i C has a capacity q i - the maximum number of students it will admit each college c i has a strict order i

More information

A Comparison of Performance Measures for Online Algorithms

A Comparison of Performance Measures for Online Algorithms A Comparison of Performance Measures for Online Algorithms Joan Boyar 1, Sany Irani 2, an Kim S. Larsen 1 1 Department of Mathematics an Computer Science, University of Southern Denmark, Campusvej 55,

More information

Modelling and Resolving Software Dependencies

Modelling and Resolving Software Dependencies June 15, 2005 Abstract Many Linux istributions an other moern operating systems feature the explicit eclaration of (often complex) epenency relationships between the pieces of software

More information

Risk Adjustment for Poker Players

Risk Adjustment for Poker Players Risk Ajustment for Poker Players William Chin DePaul University, Chicago, Illinois Marc Ingenoso Conger Asset Management LLC, Chicago, Illinois September, 2006 Introuction In this article we consier risk

More information

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments 2012 IEEE Wireless Communications an Networking Conference: Services, Applications, an Business Game Theoretic Moeling of Cooperation among Service Proviers in Mobile Clou Computing Environments Dusit

More information

10.2 Systems of Linear Equations: Matrices

10.2 Systems of Linear Equations: Matrices SECTION 0.2 Systems of Linear Equations: Matrices 7 0.2 Systems of Linear Equations: Matrices OBJECTIVES Write the Augmente Matrix of a System of Linear Equations 2 Write the System from the Augmente Matrix

More information

n k=1 k=0 1/k! = e. Example 6.4. The series 1/k 2 converges in R. Indeed, if s n = n then k=1 1/k, then s 2n s n = 1 n + 1 +...

n k=1 k=0 1/k! = e. Example 6.4. The series 1/k 2 converges in R. Indeed, if s n = n then k=1 1/k, then s 2n s n = 1 n + 1 +... 6 Series We call a normed space (X, ) a Banach space provided that every Cauchy sequence (x n ) in X converges. For example, R with the norm = is an example of Banach space. Now let (x n ) be a sequence

More information

Bargaining Solutions in a Social Network

Bargaining Solutions in a Social Network Bargaining Solutions in a Social Network Tanmoy Chakraborty and Michael Kearns Department of Computer and Information Science University of Pennsylvania Abstract. We study the concept of bargaining solutions,

More information

Data Center Power System Reliability Beyond the 9 s: A Practical Approach

Data Center Power System Reliability Beyond the 9 s: A Practical Approach Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical

More information

Answers to the Practice Problems for Test 2

Answers to the Practice Problems for Test 2 Answers to the Practice Problems for Test 2 Davi Murphy. Fin f (x) if it is known that x [f(2x)] = x2. By the chain rule, x [f(2x)] = f (2x) 2, so 2f (2x) = x 2. Hence f (2x) = x 2 /2, but the lefthan

More information

Local periods and binary partial words: An algorithm

Local periods and binary partial words: An algorithm Local periods and binary partial words: An algorithm F. Blanchet-Sadri and Ajay Chriscoe Department of Mathematical Sciences University of North Carolina P.O. Box 26170 Greensboro, NC 27402 6170, USA E-mail:

More information

Fairness in Routing and Load Balancing

Fairness in Routing and Load Balancing Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria

More information

Pacific Journal of Mathematics

Pacific Journal of Mathematics Pacific Journal of Mathematics GLOBAL EXISTENCE AND DECREASING PROPERTY OF BOUNDARY VALUES OF SOLUTIONS TO PARABOLIC EQUATIONS WITH NONLOCAL BOUNDARY CONDITIONS Sangwon Seo Volume 193 No. 1 March 2000

More information

Game Chromatic Index of Graphs with Given Restrictions on Degrees

Game Chromatic Index of Graphs with Given Restrictions on Degrees Game Chromatic Index of Graphs with Given Restrictions on Degrees Andrew Beveridge Department of Mathematics and Computer Science Macalester College St. Paul, MN 55105 Tom Bohman, Alan Frieze, and Oleg

More information

On General Laws of Complex Networks

On General Laws of Complex Networks On Genera Laws of Compex etwors Wenjun Xiao, Limin Peng, an ehrooz Parhami 3 Schoo of Software Engineering, South China University of Technoogy, Guangzhou 5064, P.R. China wjxiao@scut.eu.cn Department

More information

The degree, size and chromatic index of a uniform hypergraph

The degree, size and chromatic index of a uniform hypergraph The degree, size and chromatic index of a uniform hypergraph Noga Alon Jeong Han Kim Abstract Let H be a k-uniform hypergraph in which no two edges share more than t common vertices, and let D denote the

More information

Improved Algorithms for Data Migration

Improved Algorithms for Data Migration Improved Algorithms for Data Migration Samir Khuller 1, Yoo-Ah Kim, and Azarakhsh Malekian 1 Department of Computer Science, University of Maryland, College Park, MD 20742. Research supported by NSF Award

More information

Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition

Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition Mathematical Moels of Therapeutical Actions Relate to Tumour an Immune System Competition Elena De Angelis (1 an Pierre-Emmanuel Jabin (2 (1 Dipartimento i Matematica, Politecnico i Torino Corso Duca egli

More information

A Practical Scheme for Wireless Network Operation

A Practical Scheme for Wireless Network Operation A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving

More information

UNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH

UNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH UNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH OLIVIER BERNARDI AND ÉRIC FUSY Abstract. This article presents unifie bijective constructions for planar maps, with control on the face egrees

More information

MINIMUM VERTEX DEGREE THRESHOLD FOR LOOSE HAMILTON CYCLES IN 3-UNIFORM HYPERGRAPHS

MINIMUM VERTEX DEGREE THRESHOLD FOR LOOSE HAMILTON CYCLES IN 3-UNIFORM HYPERGRAPHS MINIMUM VERTEX DEGREE THRESHOLD FOR LOOSE HAMILTON CYCLES IN 3-UNIFORM HYPERGRAPHS JIE HAN AND YI ZHAO Abstract. We show that for sufficiently large n, every 3-unifor hypergraph on n vertices with iniu

More information

Fluid Pressure and Fluid Force

Fluid Pressure and Fluid Force 0_0707.q //0 : PM Page 07 SECTION 7.7 Section 7.7 Flui Pressure an Flui Force 07 Flui Pressure an Flui Force Fin flui pressure an flui force. Flui Pressure an Flui Force Swimmers know that the eeper an

More information

SCORE SETS IN ORIENTED GRAPHS

SCORE SETS IN ORIENTED GRAPHS Applicable Analysis and Discrete Mathematics, 2 (2008), 107 113. Available electronically at http://pefmath.etf.bg.ac.yu SCORE SETS IN ORIENTED GRAPHS S. Pirzada, T. A. Naikoo The score of a vertex v in

More information

INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS

INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS STEVEN P. LALLEY AND ANDREW NOBEL Abstract. It is shown that there are no consistent decision rules for the hypothesis testing problem

More information

Sensitivity Analysis of Non-linear Performance with Probability Distortion

Sensitivity Analysis of Non-linear Performance with Probability Distortion Preprints of the 19th Worl Congress The International Feeration of Automatic Control Cape Town, South Africa. August 24-29, 214 Sensitivity Analysis of Non-linear Performance with Probability Distortion

More information

Coupled best proximity point theorems for proximally g-meir-keelertypemappings in partially ordered metric spaces

Coupled best proximity point theorems for proximally g-meir-keelertypemappings in partially ordered metric spaces Abkar et al. Fixe Point Theory an Applications 2015) 2015:107 DOI 10.1186/s13663-015-0355-9 R E S E A R C H Open Access Couple best proximity point theorems for proximally g-meir-keelertypemappings in

More information

SEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS. Nickolay Khadzhiivanov, Nedyalko Nenov

SEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS. Nickolay Khadzhiivanov, Nedyalko Nenov Serdica Math. J. 30 (2004), 95 102 SEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS Nickolay Khadzhiivanov, Nedyalko Nenov Communicated by V. Drensky Abstract. Let Γ(M) where M V (G) be the set of all vertices

More information

The wave equation is an important tool to study the relation between spectral theory and geometry on manifolds. Let U R n be an open set and let

The wave equation is an important tool to study the relation between spectral theory and geometry on manifolds. Let U R n be an open set and let 1. The wave equation The wave equation is an important tool to stuy the relation between spectral theory an geometry on manifols. Let U R n be an open set an let = n j=1 be the Eucliean Laplace operator.

More information

Degree Hypergroupoids Associated with Hypergraphs

Degree Hypergroupoids Associated with Hypergraphs Filomat 8:1 (014), 119 19 DOI 10.98/FIL1401119F Published by Faculty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Degree Hypergroupoids Associated

More information

y or f (x) to determine their nature.

y or f (x) to determine their nature. Level C5 of challenge: D C5 Fining stationar points of cubic functions functions Mathematical goals Starting points Materials require Time neee To enable learners to: fin the stationar points of a cubic

More information

The Ergodic Theorem and randomness

The Ergodic Theorem and randomness The Ergodic Theorem and randomness Peter Gács Department of Computer Science Boston University March 19, 2008 Peter Gács (Boston University) Ergodic theorem March 19, 2008 1 / 27 Introduction Introduction

More information

Weighted Sum Coloring in Batch Scheduling of Conflicting Jobs

Weighted Sum Coloring in Batch Scheduling of Conflicting Jobs Weighted Sum Coloring in Batch Scheduling of Conflicting Jobs Leah Epstein Magnús M. Halldórsson Asaf Levin Hadas Shachnai Abstract Motivated by applications in batch scheduling of jobs in manufacturing

More information

Exponential Functions: Differentiation and Integration. The Natural Exponential Function

Exponential Functions: Differentiation and Integration. The Natural Exponential Function 46_54.q //4 :59 PM Page 5 5 CHAPTER 5 Logarithmic, Eponential, an Other Transcenental Functions Section 5.4 f () = e f() = ln The inverse function of the natural logarithmic function is the natural eponential

More information

QUASIRANDOM LOAD BALANCING

QUASIRANDOM LOAD BALANCING SIAM J. COMPUT. Vol. 41, No. 4, pp. 747 771 c 01 Society for Inustrial an Applie Mathematics QUASIRANDOM LOAD BALANCING TOBIAS FRIEDRICH, MARTIN GAIRING, AND THOMAS SAUERWALD Abstract. We propose a simple

More information

FACTORING IN THE HYPERELLIPTIC TORELLI GROUP

FACTORING IN THE HYPERELLIPTIC TORELLI GROUP FACTORING IN THE HYPERELLIPTIC TORELLI GROUP TARA E. BRENDLE AND DAN MARGALIT Abstract. The hyperelliptic Torelli group is the subgroup of the mapping class group consisting of elements that act trivially

More information

Powers of Two in Generalized Fibonacci Sequences

Powers of Two in Generalized Fibonacci Sequences Revista Colombiana de Matemáticas Volumen 462012)1, páginas 67-79 Powers of Two in Generalized Fibonacci Sequences Potencias de dos en sucesiones generalizadas de Fibonacci Jhon J. Bravo 1,a,B, Florian

More information

ACTSC 331 Note : Life Contingency

ACTSC 331 Note : Life Contingency ACTSC 331 Note : Life Contingency Johnew Zhang December 3, 212 Contents 1 Review 3 1.1 Survival Moel.................................. 3 1.2 Insurance..................................... 3 1.3 Annuities

More information

Approximating Minimum Bounded Degree Spanning Trees to within One of Optimal

Approximating Minimum Bounded Degree Spanning Trees to within One of Optimal Approximating Minimum Bounded Degree Spanning Trees to within One of Optimal ABSTACT Mohit Singh Tepper School of Business Carnegie Mellon University Pittsburgh, PA USA mohits@andrew.cmu.edu In the MINIMUM

More information

Safety Stock or Excess Capacity: Trade-offs under Supply Risk

Safety Stock or Excess Capacity: Trade-offs under Supply Risk Safety Stock or Excess Capacity: Trae-offs uner Supply Risk Aahaar Chaturvei Victor Martínez-e-Albéniz IESE Business School, University of Navarra Av. Pearson, 08034 Barcelona, Spain achaturvei@iese.eu

More information

Lecture 4: BK inequality 27th August and 6th September, 2007

Lecture 4: BK inequality 27th August and 6th September, 2007 CSL866: Percolation and Random Graphs IIT Delhi Amitabha Bagchi Scribe: Arindam Pal Lecture 4: BK inequality 27th August and 6th September, 2007 4. Preliminaries The FKG inequality allows us to lower bound

More information

Differentiability of Exponential Functions

Differentiability of Exponential Functions Differentiability of Exponential Functions Philip M. Anselone an John W. Lee Philip Anselone (panselone@actionnet.net) receive his Ph.D. from Oregon State in 1957. After a few years at Johns Hopkins an

More information

6.2 Permutations continued

6.2 Permutations continued 6.2 Permutations continued Theorem A permutation on a finite set A is either a cycle or can be expressed as a product (composition of disjoint cycles. Proof is by (strong induction on the number, r, of

More information

Embedding nearly-spanning bounded degree trees

Embedding nearly-spanning bounded degree trees Embedding nearly-spanning bounded degree trees Noga Alon Michael Krivelevich Benny Sudakov Abstract We derive a sufficient condition for a sparse graph G on n vertices to contain a copy of a tree T of

More information

Pythagorean Triples Over Gaussian Integers

Pythagorean Triples Over Gaussian Integers International Journal of Algebra, Vol. 6, 01, no., 55-64 Pythagorean Triples Over Gaussian Integers Cheranoot Somboonkulavui 1 Department of Mathematics, Faculty of Science Chulalongkorn University Bangkok

More information

The one-year non-life insurance risk

The one-year non-life insurance risk The one-year non-life insurance risk Ohlsson, Esbjörn & Lauzeningks, Jan Abstract With few exceptions, the literature on non-life insurance reserve risk has been evote to the ultimo risk, the risk in the

More information

Linear Algebra. A vector space (over R) is an ordered quadruple. such that V is a set; 0 V ; and the following eight axioms hold:

Linear Algebra. A vector space (over R) is an ordered quadruple. such that V is a set; 0 V ; and the following eight axioms hold: Linear Algebra A vector space (over R) is an ordered quadruple (V, 0, α, µ) such that V is a set; 0 V ; and the following eight axioms hold: α : V V V and µ : R V V ; (i) α(α(u, v), w) = α(u, α(v, w)),

More information

1 Formulating The Low Degree Testing Problem

1 Formulating The Low Degree Testing Problem 6.895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Linearity Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz In the last lecture, we proved a weak PCP Theorem,

More information

Weighted Sum Coloring in Batch Scheduling of Conflicting Jobs

Weighted Sum Coloring in Batch Scheduling of Conflicting Jobs Weighted Sum Coloring in Batch Scheduling of Conflicting Jobs Leah Epstein Magnús M. Halldórsson Asaf Levin Hadas Shachnai Abstract Motivated by applications in batch scheduling of jobs in manufacturing

More information

Welcome to... Problem Analysis and Complexity Theory 716.054, 3 VU

Welcome to... Problem Analysis and Complexity Theory 716.054, 3 VU Welcome to... Problem Analysis and Complexity Theory 716.054, 3 VU Birgit Vogtenhuber Institute for Software Technology email: bvogt@ist.tugraz.at office hour: Tuesday 10:30 11:30 slides: http://www.ist.tugraz.at/pact.html

More information

On-line secret sharing

On-line secret sharing On-line secret sharing László Csirmaz Gábor Tardos Abstract In a perfect secret sharing scheme the dealer distributes shares to participants so that qualified subsets can recover the secret, while unqualified

More information