2r 1. Definition (Degree Measure). Let G be a r-graph of order n and average degree d. Let S V (G). The degree measure µ(s) of S is defined by,
|
|
- Sheena Miller
- 8 years ago
- Views:
Transcription
1 Theorem Simple Containers Theorem) Let G be a simple, r-graph of average egree an of orer n Let 0 < δ < If is large enough, then there exists a collection of sets C PV G)) satisfying: i) for every inepenent set I [n], there exists C C with I C, ii) eg[c]) < δeg) for every C C, iii) C 2 βn where β = Degree Measure Definition Let G be a hypergraph For v V G) we efine v) = {e EG) : v e} Definition Degree Measure) Let G be a r-graph of orer n an average egree Let S V G) The egree measure µs) of S is efine by, µs) = n v) Note that µ is probability measure, so particularly aitive an µv G)) = The egree measure has several useful properties, which are state below v S First property tell us that µs) small implies eg[s]) small eg[s]) r v S v) = n µs) = µs)eg) r eg[s]) µs)eg) Let ea, B) enote number of eges between sets A, B V G) We have r )nµv G)\S) = r ) v / S v) r )ev G)\S, S) v S v) reg[s]) That is, So finally, r ) µs)) = r )µv \S) µs) r n eg[s]) eg[s]) n r rµs) r + ) = µs) + ) n 2) r
2 If I is an inepenent set in G From 2) we get, 0 = eg[i]) µi) + ) n r r µi) If G is -regular, inequality eg[s]) < δeg) with 2) implies: δ n = δeg) > eg[s]) µs) + ) n = r r S n + r ) n What gives us S < r + δ ) n r 2 Proof of Theorem For a proof of Theorem, we will nee following lemma Lemma Let G be a simple, r-graph of average egree an of orer n If is large enough, then there exists a collection of sets C PV G)) satisfying: i) for every inepenent set I [n], there exists C C with I C, ii) µc) < 4r 2 ) for every C C, iii) C 2 αn where α = cr 2 log Statement of the lemma is quite similar to the statement of the Theorem, conition i) is exactly the same However ii) is expresse in terms of egree measure We can suspect that it will be use to boun number of eges in G[C] using property ) of µ In iii) carinality of the container family is smaller than in the Theorem, provie sufficiently large Definition Let G be a r-graph For a given 0 j r an sets R, S V G) we efine Γ j R, S), by Γ j R, S) = { v V G) : e = {v} f g, f e EG) ) R, g j S r j )} Proof Let V = V G), E = EG) For a given 0 j r an sets R, S, T V G) we efine C j R, S, T ), by { V \Γj R, S)\T ) if µγ C j R, S, T ) = j R, S)\T ) otherwise 4r 2, Since = µv \Γ j R, S)\T )) + µγ j R, S)\T ), if C j R, S, T ) woul be a container conition ii) will be satisfie 2
3 Let u = 6r 3r 2 an q = 5ru = 5 3r 6r 2 By the efinition q is small if is large Now we will efine a family C which will be caniate for a containers family, C = {C j R, S, T ) : 0 j r, R, S, T } Then ) 3 n C r) 3 ) 7 n 2 ) 7 = 2 log 2 7/ 2)) We will now focus on the exponent of 2, log 2 7nq/ 2 log 6r ) = 7 2 log 2 = 7 5 3r = n 7 5 3r6r/ 2) 2) log 2 } {{ } cr) ) 3 )) 7 en e = 5 3r 6r 2 2 log log 2 log 2 = So C 2 αn, α = cr 2 log We will use probabilistic metho, to show that the probability that C is not satisfying conitions i),ii),iii) is smaller that For a given inepenent set I we will efine sets R, S, T, each not bigger than such that for some j, C j R, S, T ) is a container for I Fix an inepenent set I, For a subset A V with I A an for 0 j r we efine E j A) = {e E : e A, e A j} P 0): Now, let P j) be a statement: A V I A µa) + I A µa) ) A V egree measure we have E 0 A) = eg[a]) Hence the statement P 0) is true j ) 2 E j A) nuj E 0 A) n From property 2) of µa) + ) n = n r 3
4 P r): I A µa) ) E r A) nur So A = V Since I cannot A V contain any eges, 0 = E r A) nur > 0 Hence the statement P r) is false Therefore there exists 0 j r such that the statement P j) is true an P j + ) is false Fix a set A witnessing falsity of P j + ) Such set exists since µa) + j+ 2 + j Thus 2 I A µa) + j + 2 E j+a) < nuj+ Let p = 6r/u j /r ) Since u < an 0 j r, we have p = 6r r 6r r u j u = 3r = 3r u2 u = 3ru = q 5 6r 3r 2 ) 2 u = Let R I an S A\I be ranom sets, where each vertex if I an A\I respectively) is inclue inepenently with probability p By Markov s inequality an Pr R > ) E R ) Pr S > ) E S ) = I p np 5, = A\I p np 5 Now, let T = Γ j R, S) I Provie µγ j R, S)\T ) /4r 2, C j R, S, T ) is a container for I Inee, if v I, then v / Γ j R, S)\T, by efinition of T So clearly v V \Γ j R, S)\T ) = C j R, S, T ) To complete the proof we have to show that with the aequate probabilities T > an µγ j R, S)\T ) < /4r 2 hols Let v I If v Γ j R, S) then, by efinition v T This woul happen if there exists e EG) such that e = {v} f g, f ) R j, g S r j ) Since e I = j+ we have that e E j+ A) There are j+ partitions e = {v} f g, v I, f ) I j, g A\I r j ), for each such partition, the probability that both f ) R j an g S r j ) is p r Observation Let us consier fixe R an S Let Y enote pairs v, e) such that v I an e E j+ A) with e = {v} f g, v I, f ) R j, g S r j ) Then T Y j + ) E j+ A) < j + ) nuj+ 2 nuj+ 4
5 Taking expectations, by observation we obtain E T ) E Y ) < 2 nuj+ p r = 6r nuj+ 2 u j = 3run = 5 Applying Markov s inequality Pr T > ) E T ) = 5 = 5 Now we will show PrµΓ j R, S)\T ) < /4r 2 ) 5 For v A, let F j v) = {e E : v e, e E j A), e / E j+ A)} = {e : v e A, e I = j}, an D = { v A\I : F j v) } uj u) Note that I A\D Consier an ege e E j A\D) an e / E j+ A) Then e A\D an e I = j Since j < r there is v A\D)\I an v e Note that E j A\D) E j A), so e F j v) By the efinition of D an facts that v / D an v / I we have F j v) < uj u) Therefore E j A\D)\E j+ A) < A\D uj u) nuj u) By the choice of A, E j+ A) < nuj+, hence E j A\D) E j A\D)\E j+ A) + E j+ A) < < nuj u) + nuj+ = nuj However, we know that the statement P j) is true, so it has to be µa\d) < + j On the other han A was chosen such that µa) 2 + j+ 2 Hence + j 2 > µa\d) = µa) µd) + j + 2 µd), an so µd) > 2 By the efinition of D there is D I =, in particular D T = Let D = D\Γ j R, S) Then D\D = D Γ j R, S) Γ j R, S)\T So µγ j R, S)\T ) µd\d ) = µd) µd ) Now, let v D, then F j v) uj u) 2 5r uj since u is small) Each e F j v) has a partition e = f g with f I j ), g A\I r j) where v g since v / I For every ege the probability that f R an g\{v} S is p r Moreover these events are inepenent over all e F j v), because G is simple Hence 5
6 Prv D ) Pr e {v} f g, v D, f e F jv) = p r ) Fjv) exp 2 5r uj p r } {{ } =6r R j ), g = exp ) ) R = r j { 2 } < 5 0 Now, µd ) = n v D v) = n v D v)i v, where I v is an inicator of event v D Since EI v ) = Prv D ) < 0, EµD )) = v)ei v ) < µd n 0 v D Applying Markov s inequality, we get Pr µd ) > µd) ) 2EµD )) 2 µd) Therefore to Pr < 2µD) 0µD) = 5 µγ j R, S)\T ) µd) µd ) µd) > 2 4r 2 Finally, the probability that C j R, S, T ) is not the container for I is equal R > S > T > µγ j R, S)\T ) ) 4r 2 Pr R > ) + Pr S > ) + Pr R > ) + PrµΓ j R, S)\T ) 4r 2 ) 4 5 < Proof of Theorem The proof strategy is as follows We will iteratively apply lemma, starting with G If we will get a container, say C, with at least δeg) eges, we will apply the lemma to G[C], an so on to each of the new containers, until we obtain a collection of containers each with less than δeg) eges If C is a container obtaine after applying lemma to G, an eg[c]) δeg), if C stans for athe average egree of G[C], we have C = C r v C v) = C eg[c]) δeg) = δ C So we can apply lemma to G[C] with C δ, we will obtain a collection C of containers for G[C] with 6
7 i) for every inepenent set I V C), there exists C C with I C, ii) µc ) < 4r 2 for every C C, iii) C 2 α n where α = cr C 2 log C Let I IG) an I C, it is equivalent to I IG[C]) Hence every inepenent set containe in C will be also containe in some member C of C Now, by ) we have eg[c ]) µc )eg[c]) µc )µc)eg) 4r 2 )2 eg) One can see that each application of the lemma ecreases the fraction of eges by /4r 2 Note that new containers are smaller concerning the number of eges, they o not necessarily have much less vertices Let m be the number of levels of iteration From above observation we ant to have /4r 2 ) m < δ Note that /4r 2 ) m < δ m log So we nee at most m = log δ log 4r 2 4r 2 ) ) < log δ m > log δ log 4r 2 ) + < c log δ levels of iteration, where c > 0 is some positive constant By iterative applications of the lemma the fraction of eges in each container ecreases, however the carinality of our family of containers can grow rapily We must assure that it will be not bigger than 2 βn, as state in Theorem Let α max enote maximum over all applications Then α max = cr) max 2 2 log max < cr) log δ m Since max = δ a, for some 0 a m We want to show m α max < β Let /δ < log, we have m α max β < m cr) δ m = cr)m δ m < cr)c log δ 2 log = 2 ) c δ ) 2) log < 2 log δ < cr)c log log log ) c 2 log log < C log ) C2 log log Hence, m α max < β for sufficiently large ) C3 0 ) 2) log < ) 2) log < 7
8 3 List chromatic number Theorem Let G be a simple -regular r-graph Then, as, χ L G) + o)) log 2 log r Note: Originally 202), χ L G) + o) 4r log log Proof First, since G is simple, -regular, r-graph, we can apply Theorem to G Then we have a collection C of containers of size not greater than 2 βn Moreover, since G is -regular, for every container C we have C < /r + δ/r)n where 0 < δ < Let c = δ)/r, k = / 2), with this values we can apply C-compability theorem theorem 2 from 200) to a family C We obtain collection of lists L, each of size l, which are not C-compatible, where as k, l +o)) log k log/c) Hence, log k χ L G) + o)) log/c) Since δ was arbitrary log / 2) = + o)) logr/ δ)) = + o) log 2 log r 8
A Generalization of Sauer s Lemma to Classes of Large-Margin Functions
A Generalization of Sauer s Lemma to Classes of Large-Margin Functions Joel Ratsaby University College Lonon Gower Street, Lonon WC1E 6BT, Unite Kingom J.Ratsaby@cs.ucl.ac.uk, WWW home page: http://www.cs.ucl.ac.uk/staff/j.ratsaby/
More informationMASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS Contents 1. Moment generating functions 2. Sum of a ranom number of ranom variables 3. Transforms
More informationFactoring Dickson polynomials over finite fields
Factoring Dickson polynomials over finite fiels Manjul Bhargava Department of Mathematics, Princeton University. Princeton NJ 08544 manjul@math.princeton.eu Michael Zieve Department of Mathematics, University
More informationTriangle deletion. Ernie Croot. February 3, 2010
Triangle deletion Ernie Croot February 3, 2010 1 Introduction The purpose of this note is to give an intuitive outline of the triangle deletion theorem of Ruzsa and Szemerédi, which says that if G = (V,
More informationMSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION
MAXIMUM-LIKELIHOOD ESTIMATION The General Theory of M-L Estimation In orer to erive an M-L estimator, we are boun to make an assumption about the functional form of the istribution which generates the
More informationOn Adaboost and Optimal Betting Strategies
On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore
More informationSensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm
Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sewoong Oh an Anrea Montanari Electrical Engineering an Statistics Department Stanfor University, Stanfor,
More information8.1 Min Degree Spanning Tree
CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree
More informationMath 230.01, Fall 2012: HW 1 Solutions
Math 3., Fall : HW Solutions Problem (p.9 #). Suppose a wor is picke at ranom from this sentence. Fin: a) the chance the wor has at least letters; SOLUTION: All wors are equally likely to be chosen. The
More informationWeb Appendices of Selling to Overcon dent Consumers
Web Appenices of Selling to Overcon ent Consumers Michael D. Grubb A Option Pricing Intuition This appenix provies aitional intuition base on option pricing for the result in Proposition 2. Consier the
More information1 Approximating Set Cover
CS 05: Algorithms (Grad) Feb 2-24, 2005 Approximating Set Cover. Definition An Instance (X, F ) of the set-covering problem consists of a finite set X and a family F of subset of X, such that every elemennt
More informationParameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany
Parameterize Algorithms for -Hitting Set: the Weighte Case Henning Fernau Trierer Forschungsberichte; Trier: Technical Reports Informatik / Mathematik No. 08-6, July 2008 Univ. Trier, FB 4 Abteilung Informatik
More informationBV has the bounded approximation property
The Journal of Geometric Analysis volume 15 (2005), number 1, pp. 1-7 [version, April 14, 2005] BV has the boune approximation property G. Alberti, M. Csörnyei, A. Pe lczyński, D. Preiss Abstract: We prove
More informationFirewall Design: Consistency, Completeness, and Compactness
C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,
More informationDepartment of Mathematical Sciences, University of Copenhagen. Kandidat projekt i matematik. Jens Jakob Kjær. Golod Complexes
F A C U L T Y O F S C I E N C E U N I V E R S I T Y O F C O P E N H A G E N Department of Mathematical Sciences, University of Copenhagen Kaniat projekt i matematik Jens Jakob Kjær Golo Complexes Avisor:
More informationLecture 22: November 10
CS271 Randomness & Computation Fall 2011 Lecture 22: November 10 Lecturer: Alistair Sinclair Based on scribe notes by Rafael Frongillo Disclaimer: These notes have not been subjected to the usual scrutiny
More informationWeb Appendices to Selling to Overcon dent Consumers
Web Appenices to Selling to Overcon ent Consumers Michael D. Grubb MIT Sloan School of Management Cambrige, MA 02142 mgrubbmit.eu www.mit.eu/~mgrubb May 2, 2008 B Option Pricing Intuition This appenix
More informationα α λ α = = λ λ α ψ = = α α α λ λ ψ α = + β = > θ θ β > β β θ θ θ β θ β γ θ β = γ θ > β > γ θ β γ = θ β = θ β = θ β = β θ = β β θ = = = β β θ = + α α α α α = = λ λ λ λ λ λ λ = λ λ α α α α λ ψ + α =
More informationWhich Networks Are Least Susceptible to Cascading Failures?
Which Networks Are Least Susceptible to Cascaing Failures? Larry Blume Davi Easley Jon Kleinberg Robert Kleinberg Éva Taros July 011 Abstract. The resilience of networks to various types of failures is
More informationRisk Management for Derivatives
Risk Management or Derivatives he Greeks are coming the Greeks are coming! Managing risk is important to a large number o iniviuals an institutions he most unamental aspect o business is a process where
More informationOptimal Energy Commitments with Storage and Intermittent Supply
Submitte to Operations Research manuscript OPRE-2009-09-406 Optimal Energy Commitments with Storage an Intermittent Supply Jae Ho Kim Department of Electrical Engineering, Princeton University, Princeton,
More informationTools for parsimonious edge-colouring of graphs with maximum degree three. J.L. Fouquet and J.M. Vanherpe. Rapport n o RR-2010-10
Tools for parsimonious edge-colouring of graphs with maximum degree three J.L. Fouquet and J.M. Vanherpe LIFO, Université d Orléans Rapport n o RR-2010-10 Tools for parsimonious edge-colouring of graphs
More informationHow To Find Out How To Calculate Volume Of A Sphere
Contents High-Dimensional Space. Properties of High-Dimensional Space..................... 4. The High-Dimensional Sphere......................... 5.. The Sphere an the Cube in Higher Dimensions...........
More informationCoalitional Game Theoretic Approach for Cooperative Transmission in Vehicular Networks
Coalitional Game Theoretic Approach for Cooperative Transmission in Vehicular Networks arxiv:.795v [cs.gt] 8 Feb Tian Zhang, Wei Chen, Zhu Han, an Zhigang Cao State Key Laboratory on Microwave an Digital
More informationAlgorithm Design and Analysis
Algorithm Design and Analysis LECTURE 27 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/6/2011 S. Raskhodnikova;
More informationHYPOTHESIS TESTING: POWER OF THE TEST
HYPOTHESIS TESTING: POWER OF THE TEST The first 6 steps of the 9-step test of hypothesis are called "the test". These steps are not dependent on the observed data values. When planning a research project,
More informationThe Quick Calculus Tutorial
The Quick Calculus Tutorial This text is a quick introuction into Calculus ieas an techniques. It is esigne to help you if you take the Calculus base course Physics 211 at the same time with Calculus I,
More information4. Expanding dynamical systems
4.1. Metric definition. 4. Expanding dynamical systems Definition 4.1. Let X be a compact metric space. A map f : X X is said to be expanding if there exist ɛ > 0 and L > 1 such that d(f(x), f(y)) Ld(x,
More informationHere the units used are radians and sin x = sin(x radians). Recall that sin x and cos x are defined and continuous everywhere and
Lecture 9 : Derivatives of Trigonometric Functions (Please review Trigonometry uner Algebra/Precalculus Review on the class webpage.) In this section we will look at the erivatives of the trigonometric
More informationEvery tree contains a large induced subgraph with all degrees odd
Every tree contains a large induced subgraph with all degrees odd A.J. Radcliffe Carnegie Mellon University, Pittsburgh, PA A.D. Scott Department of Pure Mathematics and Mathematical Statistics University
More informationSingle machine parallel batch scheduling with unbounded capacity
Workshop on Combinatorics and Graph Theory 21th, April, 2006 Nankai University Single machine parallel batch scheduling with unbounded capacity Yuan Jinjiang Department of mathematics, Zhengzhou University
More informationTHE NUMBER OF GRAPHS AND A RANDOM GRAPH WITH A GIVEN DEGREE SEQUENCE. Alexander Barvinok
THE NUMBER OF GRAPHS AND A RANDOM GRAPH WITH A GIVEN DEGREE SEQUENCE Alexer Barvinok Papers are available at http://www.math.lsa.umich.edu/ barvinok/papers.html This is a joint work with J.A. Hartigan
More informationTHREE DIMENSIONAL GEOMETRY
Chapter 8 THREE DIMENSIONAL GEOMETRY 8.1 Introduction In this chapter we present a vector algebra approach to three dimensional geometry. The aim is to present standard properties of lines and planes,
More informationMinimizing the Number of Machines in a Unit-Time Scheduling Problem
Minimizing the Number of Machines in a Unit-Time Scheduling Problem Svetlana A. Kravchenko 1 United Institute of Informatics Problems, Surganova St. 6, 220012 Minsk, Belarus kravch@newman.bas-net.by Frank
More informationJON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT
OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,
More informationCURRENCY OPTION PRICING II
Jones Grauate School Rice University Masa Watanabe INTERNATIONAL FINANCE MGMT 657 Calibrating the Binomial Tree to Volatility Black-Scholes Moel for Currency Options Properties of the BS Moel Option Sensitivity
More informationDifferential Privacy for Graphs and Social Networks. Sofya Raskhodnikova Penn State University, on sabba1cal at BU for 2013-2014 privacy year
Differential Privacy for Graphs an Social Networks Sofya Raskhonikova Penn State University, on sabba1cal at BU for 2013-2014 privacy year 1 Publishing information about graphs Many types of ata can be
More information(k 1)! e (m 1)/N v(k). (k 1)!
m N 1/N k v : N R m k 1 k B(k 1, m 1; 1/N) = ( ) ( m 1 1 k 1 N ) k 1 ( ) m k N 1. N m N (m 1)/N P ((m 1)/N; k 1) = 1 (k 1)! m EV (m) = k=1 1 (k 1)! ( ) k 1 m 1 e (m 1)/N. N ( ) k 1 m 1 e (m 1)/N v(k).
More informationMannheim curves in the three-dimensional sphere
Mannheim curves in the three-imensional sphere anju Kahraman, Mehmet Öner Manisa Celal Bayar University, Faculty of Arts an Sciences, Mathematics Department, Muraiye Campus, 5, Muraiye, Manisa, urkey.
More informationModern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem
More informationA Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements
International Journal of nowlege an Systems Science, 3(), -7, January-March 0 A lame-ase Approach to Generating Proposals for Hanling Inconsistency in Software Requirements eian Mu, Peking University,
More information1 The Line vs Point Test
6.875 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Low Degree Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz Having seen a probabilistic verifier for linearity
More informationThe mean-field computation in a supermarket model with server multiple vacations
DOI.7/s66-3-7-5 The mean-fiel computation in a supermaret moel with server multiple vacations Quan-Lin Li Guirong Dai John C. S. Lui Yang Wang Receive: November / Accepte: 8 October 3 SpringerScienceBusinessMeiaNewYor3
More informationApplied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
More informationMINIMUM VERTEX DEGREE CONDITIONS FOR LOOSE HAMILTON CYCLES IN 3-UNIFORM HYPERGRAPHS., where
MINIMUM VERTEX DEGREE CONDITIONS FOR LOOSE HAMILTON CYCLES IN -UNIFORM HYPERGRAPHS ENNO BUSS, HIỆP HÀN, AND MATHIAS SCHACHT Abstract. We investigate minimum vertex degree conditions for -uniform hypergraphs
More informationCS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010
CS 598CSC: Combinatorial Optimization Lecture date: /4/010 Instructor: Chandra Chekuri Scribe: David Morrison Gomory-Hu Trees (The work in this section closely follows [3]) Let G = (V, E) be an undirected
More informationGENERATING LOW-DEGREE 2-SPANNERS
SIAM J. COMPUT. c 1998 Society for Industrial and Applied Mathematics Vol. 27, No. 5, pp. 1438 1456, October 1998 013 GENERATING LOW-DEGREE 2-SPANNERS GUY KORTSARZ AND DAVID PELEG Abstract. A k-spanner
More informationPrivate Approximation of Clustering and Vertex Cover
Private Approximation of Clustering and Vertex Cover Amos Beimel, Renen Hallak, and Kobbi Nissim Department of Computer Science, Ben-Gurion University of the Negev Abstract. Private approximation of search
More informationLecture L25-3D Rigid Body Kinematics
J. Peraire, S. Winall 16.07 Dynamics Fall 2008 Version 2.0 Lecture L25-3D Rigi Boy Kinematics In this lecture, we consier the motion of a 3D rigi boy. We shall see that in the general three-imensional
More informationA REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE. 1. Introduction and Preliminaries
Acta Math. Univ. Comenianae Vol. LXVI, 2(1997), pp. 285 291 285 A REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE E. T. BASKORO, M. MILLER and J. ŠIRÁŇ Abstract. It is well known that Moore digraphs do
More informationeach college c i C has a capacity q i - the maximum number of students it will admit
n colleges in a set C, m applicants in a set A, where m is much larger than n. each college c i C has a capacity q i - the maximum number of students it will admit each college c i has a strict order i
More informationA Comparison of Performance Measures for Online Algorithms
A Comparison of Performance Measures for Online Algorithms Joan Boyar 1, Sany Irani 2, an Kim S. Larsen 1 1 Department of Mathematics an Computer Science, University of Southern Denmark, Campusvej 55,
More informationModelling and Resolving Software Dependencies
June 15, 2005 Abstract Many Linux istributions an other moern operating systems feature the explicit eclaration of (often complex) epenency relationships between the pieces of software
More informationRisk Adjustment for Poker Players
Risk Ajustment for Poker Players William Chin DePaul University, Chicago, Illinois Marc Ingenoso Conger Asset Management LLC, Chicago, Illinois September, 2006 Introuction In this article we consier risk
More informationGame Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments
2012 IEEE Wireless Communications an Networking Conference: Services, Applications, an Business Game Theoretic Moeling of Cooperation among Service Proviers in Mobile Clou Computing Environments Dusit
More information10.2 Systems of Linear Equations: Matrices
SECTION 0.2 Systems of Linear Equations: Matrices 7 0.2 Systems of Linear Equations: Matrices OBJECTIVES Write the Augmente Matrix of a System of Linear Equations 2 Write the System from the Augmente Matrix
More informationn k=1 k=0 1/k! = e. Example 6.4. The series 1/k 2 converges in R. Indeed, if s n = n then k=1 1/k, then s 2n s n = 1 n + 1 +...
6 Series We call a normed space (X, ) a Banach space provided that every Cauchy sequence (x n ) in X converges. For example, R with the norm = is an example of Banach space. Now let (x n ) be a sequence
More informationBargaining Solutions in a Social Network
Bargaining Solutions in a Social Network Tanmoy Chakraborty and Michael Kearns Department of Computer and Information Science University of Pennsylvania Abstract. We study the concept of bargaining solutions,
More informationData Center Power System Reliability Beyond the 9 s: A Practical Approach
Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical
More informationAnswers to the Practice Problems for Test 2
Answers to the Practice Problems for Test 2 Davi Murphy. Fin f (x) if it is known that x [f(2x)] = x2. By the chain rule, x [f(2x)] = f (2x) 2, so 2f (2x) = x 2. Hence f (2x) = x 2 /2, but the lefthan
More informationLocal periods and binary partial words: An algorithm
Local periods and binary partial words: An algorithm F. Blanchet-Sadri and Ajay Chriscoe Department of Mathematical Sciences University of North Carolina P.O. Box 26170 Greensboro, NC 27402 6170, USA E-mail:
More informationFairness in Routing and Load Balancing
Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria
More informationPacific Journal of Mathematics
Pacific Journal of Mathematics GLOBAL EXISTENCE AND DECREASING PROPERTY OF BOUNDARY VALUES OF SOLUTIONS TO PARABOLIC EQUATIONS WITH NONLOCAL BOUNDARY CONDITIONS Sangwon Seo Volume 193 No. 1 March 2000
More informationGame Chromatic Index of Graphs with Given Restrictions on Degrees
Game Chromatic Index of Graphs with Given Restrictions on Degrees Andrew Beveridge Department of Mathematics and Computer Science Macalester College St. Paul, MN 55105 Tom Bohman, Alan Frieze, and Oleg
More informationOn General Laws of Complex Networks
On Genera Laws of Compex etwors Wenjun Xiao, Limin Peng, an ehrooz Parhami 3 Schoo of Software Engineering, South China University of Technoogy, Guangzhou 5064, P.R. China wjxiao@scut.eu.cn Department
More informationThe degree, size and chromatic index of a uniform hypergraph
The degree, size and chromatic index of a uniform hypergraph Noga Alon Jeong Han Kim Abstract Let H be a k-uniform hypergraph in which no two edges share more than t common vertices, and let D denote the
More informationImproved Algorithms for Data Migration
Improved Algorithms for Data Migration Samir Khuller 1, Yoo-Ah Kim, and Azarakhsh Malekian 1 Department of Computer Science, University of Maryland, College Park, MD 20742. Research supported by NSF Award
More informationMathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition
Mathematical Moels of Therapeutical Actions Relate to Tumour an Immune System Competition Elena De Angelis (1 an Pierre-Emmanuel Jabin (2 (1 Dipartimento i Matematica, Politecnico i Torino Corso Duca egli
More informationA Practical Scheme for Wireless Network Operation
A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving
More informationUNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH
UNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH OLIVIER BERNARDI AND ÉRIC FUSY Abstract. This article presents unifie bijective constructions for planar maps, with control on the face egrees
More informationMINIMUM VERTEX DEGREE THRESHOLD FOR LOOSE HAMILTON CYCLES IN 3-UNIFORM HYPERGRAPHS
MINIMUM VERTEX DEGREE THRESHOLD FOR LOOSE HAMILTON CYCLES IN 3-UNIFORM HYPERGRAPHS JIE HAN AND YI ZHAO Abstract. We show that for sufficiently large n, every 3-unifor hypergraph on n vertices with iniu
More informationFluid Pressure and Fluid Force
0_0707.q //0 : PM Page 07 SECTION 7.7 Section 7.7 Flui Pressure an Flui Force 07 Flui Pressure an Flui Force Fin flui pressure an flui force. Flui Pressure an Flui Force Swimmers know that the eeper an
More informationSCORE SETS IN ORIENTED GRAPHS
Applicable Analysis and Discrete Mathematics, 2 (2008), 107 113. Available electronically at http://pefmath.etf.bg.ac.yu SCORE SETS IN ORIENTED GRAPHS S. Pirzada, T. A. Naikoo The score of a vertex v in
More informationINDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS STEVEN P. LALLEY AND ANDREW NOBEL Abstract. It is shown that there are no consistent decision rules for the hypothesis testing problem
More informationSensitivity Analysis of Non-linear Performance with Probability Distortion
Preprints of the 19th Worl Congress The International Feeration of Automatic Control Cape Town, South Africa. August 24-29, 214 Sensitivity Analysis of Non-linear Performance with Probability Distortion
More informationCoupled best proximity point theorems for proximally g-meir-keelertypemappings in partially ordered metric spaces
Abkar et al. Fixe Point Theory an Applications 2015) 2015:107 DOI 10.1186/s13663-015-0355-9 R E S E A R C H Open Access Couple best proximity point theorems for proximally g-meir-keelertypemappings in
More informationSEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS. Nickolay Khadzhiivanov, Nedyalko Nenov
Serdica Math. J. 30 (2004), 95 102 SEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS Nickolay Khadzhiivanov, Nedyalko Nenov Communicated by V. Drensky Abstract. Let Γ(M) where M V (G) be the set of all vertices
More informationThe wave equation is an important tool to study the relation between spectral theory and geometry on manifolds. Let U R n be an open set and let
1. The wave equation The wave equation is an important tool to stuy the relation between spectral theory an geometry on manifols. Let U R n be an open set an let = n j=1 be the Eucliean Laplace operator.
More informationDegree Hypergroupoids Associated with Hypergraphs
Filomat 8:1 (014), 119 19 DOI 10.98/FIL1401119F Published by Faculty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Degree Hypergroupoids Associated
More informationy or f (x) to determine their nature.
Level C5 of challenge: D C5 Fining stationar points of cubic functions functions Mathematical goals Starting points Materials require Time neee To enable learners to: fin the stationar points of a cubic
More informationThe Ergodic Theorem and randomness
The Ergodic Theorem and randomness Peter Gács Department of Computer Science Boston University March 19, 2008 Peter Gács (Boston University) Ergodic theorem March 19, 2008 1 / 27 Introduction Introduction
More informationWeighted Sum Coloring in Batch Scheduling of Conflicting Jobs
Weighted Sum Coloring in Batch Scheduling of Conflicting Jobs Leah Epstein Magnús M. Halldórsson Asaf Levin Hadas Shachnai Abstract Motivated by applications in batch scheduling of jobs in manufacturing
More informationExponential Functions: Differentiation and Integration. The Natural Exponential Function
46_54.q //4 :59 PM Page 5 5 CHAPTER 5 Logarithmic, Eponential, an Other Transcenental Functions Section 5.4 f () = e f() = ln The inverse function of the natural logarithmic function is the natural eponential
More informationQUASIRANDOM LOAD BALANCING
SIAM J. COMPUT. Vol. 41, No. 4, pp. 747 771 c 01 Society for Inustrial an Applie Mathematics QUASIRANDOM LOAD BALANCING TOBIAS FRIEDRICH, MARTIN GAIRING, AND THOMAS SAUERWALD Abstract. We propose a simple
More informationFACTORING IN THE HYPERELLIPTIC TORELLI GROUP
FACTORING IN THE HYPERELLIPTIC TORELLI GROUP TARA E. BRENDLE AND DAN MARGALIT Abstract. The hyperelliptic Torelli group is the subgroup of the mapping class group consisting of elements that act trivially
More informationPowers of Two in Generalized Fibonacci Sequences
Revista Colombiana de Matemáticas Volumen 462012)1, páginas 67-79 Powers of Two in Generalized Fibonacci Sequences Potencias de dos en sucesiones generalizadas de Fibonacci Jhon J. Bravo 1,a,B, Florian
More informationACTSC 331 Note : Life Contingency
ACTSC 331 Note : Life Contingency Johnew Zhang December 3, 212 Contents 1 Review 3 1.1 Survival Moel.................................. 3 1.2 Insurance..................................... 3 1.3 Annuities
More informationApproximating Minimum Bounded Degree Spanning Trees to within One of Optimal
Approximating Minimum Bounded Degree Spanning Trees to within One of Optimal ABSTACT Mohit Singh Tepper School of Business Carnegie Mellon University Pittsburgh, PA USA mohits@andrew.cmu.edu In the MINIMUM
More informationSafety Stock or Excess Capacity: Trade-offs under Supply Risk
Safety Stock or Excess Capacity: Trae-offs uner Supply Risk Aahaar Chaturvei Victor Martínez-e-Albéniz IESE Business School, University of Navarra Av. Pearson, 08034 Barcelona, Spain achaturvei@iese.eu
More informationLecture 4: BK inequality 27th August and 6th September, 2007
CSL866: Percolation and Random Graphs IIT Delhi Amitabha Bagchi Scribe: Arindam Pal Lecture 4: BK inequality 27th August and 6th September, 2007 4. Preliminaries The FKG inequality allows us to lower bound
More informationDifferentiability of Exponential Functions
Differentiability of Exponential Functions Philip M. Anselone an John W. Lee Philip Anselone (panselone@actionnet.net) receive his Ph.D. from Oregon State in 1957. After a few years at Johns Hopkins an
More information6.2 Permutations continued
6.2 Permutations continued Theorem A permutation on a finite set A is either a cycle or can be expressed as a product (composition of disjoint cycles. Proof is by (strong induction on the number, r, of
More informationEmbedding nearly-spanning bounded degree trees
Embedding nearly-spanning bounded degree trees Noga Alon Michael Krivelevich Benny Sudakov Abstract We derive a sufficient condition for a sparse graph G on n vertices to contain a copy of a tree T of
More informationPythagorean Triples Over Gaussian Integers
International Journal of Algebra, Vol. 6, 01, no., 55-64 Pythagorean Triples Over Gaussian Integers Cheranoot Somboonkulavui 1 Department of Mathematics, Faculty of Science Chulalongkorn University Bangkok
More informationThe one-year non-life insurance risk
The one-year non-life insurance risk Ohlsson, Esbjörn & Lauzeningks, Jan Abstract With few exceptions, the literature on non-life insurance reserve risk has been evote to the ultimo risk, the risk in the
More informationLinear Algebra. A vector space (over R) is an ordered quadruple. such that V is a set; 0 V ; and the following eight axioms hold:
Linear Algebra A vector space (over R) is an ordered quadruple (V, 0, α, µ) such that V is a set; 0 V ; and the following eight axioms hold: α : V V V and µ : R V V ; (i) α(α(u, v), w) = α(u, α(v, w)),
More information1 Formulating The Low Degree Testing Problem
6.895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Linearity Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz In the last lecture, we proved a weak PCP Theorem,
More informationWeighted Sum Coloring in Batch Scheduling of Conflicting Jobs
Weighted Sum Coloring in Batch Scheduling of Conflicting Jobs Leah Epstein Magnús M. Halldórsson Asaf Levin Hadas Shachnai Abstract Motivated by applications in batch scheduling of jobs in manufacturing
More informationWelcome to... Problem Analysis and Complexity Theory 716.054, 3 VU
Welcome to... Problem Analysis and Complexity Theory 716.054, 3 VU Birgit Vogtenhuber Institute for Software Technology email: bvogt@ist.tugraz.at office hour: Tuesday 10:30 11:30 slides: http://www.ist.tugraz.at/pact.html
More informationOn-line secret sharing
On-line secret sharing László Csirmaz Gábor Tardos Abstract In a perfect secret sharing scheme the dealer distributes shares to participants so that qualified subsets can recover the secret, while unqualified
More information