MATROIDS AND MYSQL WHAT TO DO
|
|
|
- Hubert Boyd
- 10 years ago
- Views:
Transcription
1 WHAT TO DO WITH BIG DATA SETS? Gordon Royle School of Mathematics & Statistics University of Western Australia La Vacquerie-et-Saint-Martin-de-Castries
2 AUSTRALIA
3 PERTH
4 37ACCMCC 37TH AUSTRALASIAN CONFERENCE ON COMBINATORIAL MATHEMATICS AND COMBINATORIAL COMPUTING FEATURED SPEAKERS Matt DeVos Primo z Poto cnik Graham Farr Dana Randall Bill Martin Tamás Szőnyi Dillon Mayhew Nick Wormald UWA, Perth, December 9th 14th, 2013
5 COMBINATORIAL CATALOGUES There is a long history of combinatorial mathematicians constructing lists, catalogues or census [sic] of combinatorial objects, such as groups, graphs, designs and geometries. Some of this work substantially predates electronic computers: GA Miller s work in the late 1800s on substitution groups The 1930s Foster Census of cubic symmetric graphs but it really exploded from the 1960s onwards.
6 USING CATALOGUES Although catalogues can only contain information about the very smallest objects of any given class, this is often useful. In addition to the examples and/or counterexamples directly contained in a catalogue, small case information can be crucial to the development and proof of theoretical results. Small cases can identify interesting cases for a problem
7 USING CATALOGUES Although catalogues can only contain information about the very smallest objects of any given class, this is often useful. In addition to the examples and/or counterexamples directly contained in a catalogue, small case information can be crucial to the development and proof of theoretical results. Small cases can identify interesting cases for a problem Small cases can reveal the emergence of patterns
8 USING CATALOGUES Although catalogues can only contain information about the very smallest objects of any given class, this is often useful. In addition to the examples and/or counterexamples directly contained in a catalogue, small case information can be crucial to the development and proof of theoretical results. Small cases can identify interesting cases for a problem Small cases can reveal the emergence of patterns Small cases can obscure the emergence of patterns
9 GENERAL MATROIDS Higgs (1966) 26 simple matroids of size 6 and 101 simple matroids of size 7.
10 GENERAL MATROIDS Higgs (1966) 26 simple matroids of size 6 and 101 simple matroids of size 7. Blackburn, Crapo & Higgs (1973) 950 simple matroids of size 8.
11 GENERAL MATROIDS Higgs (1966) 26 simple matroids of size 6 and 101 simple matroids of size 7. Blackburn, Crapo & Higgs (1973) 950 simple matroids of size 8. Mayhew & Royle (2009) matroids of size 9.
12 GENERAL MATROIDS Higgs (1966) 26 simple matroids of size 6 and 101 simple matroids of size 7. Blackburn, Crapo & Higgs (1973) 950 simple matroids of size 8. Mayhew & Royle (2009) matroids of size 9. Östergård (2010) sparse paving matroids of size 10 and rank 5 At least for the next few years, doing anything other than counting the 10-element matroids is well out of reach. By comparison, group theorists have lists of all groups up to about order 2000.
13 REPRESENTABLE MATROIDS The classes of binary or ternary matroids etc. are much smaller, and so catalogues can pushed further. Catalogues of all matroids of small enough size, rank Catalogues of minor-closed classes for slightly larger sizes Then the question arises: What is the best way to store, use and provide access to these catalogues?
14 BINARY AND TERNARY MATROIDS For binary and ternary matroids, additional useful properties hold: There is a 1-1 correspondence between simple matroids of rank at most d and subsets of points of the projective space PG(d 1, q). Two matroids are isomorphic if and only if the corresponding subsets of points are equivalent under the action of the group PGL(d, q) of linear transformations of the projective space. Therefore, if we let Γ be the point-hyperplane incidence graph of PG(d 1, q), one technique is to use an orderly algorithm to construct subsets of the point-vertices of Γ that are inequivalent under Aut(Γ).
15 AN ORDERLY ALGORITHM An orderly algorithm is a construction algorithm that generates objects uniquely up to isomorphism. Assume that L k contains one representative from each orbit on k-subsets of point-type vertices of Γ. For each X L k do the following: Compute orbits of Aut(Γ) X For each point-type orbit representative x Form X = X {x} Compute canonically labelled graph with X distinguished If x is in the same orbit as the point with lowest canonical label, then accept X else reject Then all the accepted (k + 1)-subsets form L k+1.
16 WHY DOES THIS WORK? This works because of two key facts: The recipe canonically label and remove lowest numbered element defines a unique (up to isomorphism) deconstruction path for any binary matroid. The accept/reject rule for the orderly algorithm ensures that the construction goes in reverse along this path. Adding just one orbit representative guarantees that every matroid is generated only once from its successor on the path.
17 NUMBERS OF BINARY MATROIDS r = 3 r = 4 r = 5 r = 6 r = 7 r = 8 e = e = e = e = e = e = e = e = e = e = e =
18 BINARY MATROIDS OF RANK AT MOST
19 COUNTING BINARY OR TERNARY MATROIDS We can be confident in the results because the exact numbers of simple binary or ternary matroids of any given rank can be determined by Pólya s Enumeration Theorem Determine the cycle index Z(PGL(d, q)) of PGL(d, q): The cycle index is the multivariate polynomial in variables {X 1, X 2,...} given by Z(G; X 1, X 2,...) := 1 G g G X n k (g) k. where n k (g) is the number of cycles of length k in g. Substitute 1 + x i for each variable X i. The coefficient of x j is then the number of isomorphism classes of matroids of size j and rank at most d.
20 EXAMPLE In MAGMA > g := PGammaL(4,2); > cp := CycleIndexPolynomial(g); > cp; 1/20160*x[1]^15 + 1/192*x[1]^7*x[2]^4 + 1/96*x[1]^3*x[2]^6 + 1/16*x[1]^3*x[2]^2*x[4]^2 + 1/18*x[1]^3*x[3]^4 + 1/6*x[1]*x[2]*x[3]^2*x[6] + 1/8*x[1]*x[2]*x[4]^3 + 2/7*x[1]*x[7]^2 + 1/180*x[3]^5 + 1/12*x[3]*x[6]^2 + 1/15*x[5]^3 + 2/15*x[15] Note: For some reason, the CycleIndexPolynomial command does not appear in the documentation for MAGMA. I stumbled on it because it was the obvious name to use.
21 RANK 4 BINARY MATROIDS Substituting 1 + x i for X i yields the generating function x 15 + x 14 + x x x x x 9 + 6x 8 + 6x 7 + 5x 6 + 4x 5 + 3x 4 + 2x 3 + x 2 + x + 1 and reading off the coefficients we see that there are 3 binary matroids of size 11 and rank at most 4.
22 CAN WE PUSH FURTHER? The exact numbers give us a good idea of where to stop computing! r = 3 r = 4 r = 5 r = 6 r = 7 e = e = e = e = e = e = e = e = e = Numbers of ternary matroids
23 SQL I decided to try storing the data in an actual relational database so that it can be queried using SQL (Structured Query Language). ADVANTAGES Single fixed location for data that is (potentially) accessible from multiple computers Relatively easy to integrate web-based access for other users, or even direct programmatic access Properties can be added without breaking existing code DISADVANTAGES Rigid format can be limiting SQL can be awkward, unnatural, opaque and inefficient
24 MINIMAL SETUP At a minimum we want to store the matroids and some basic data about them. Thus we create a database table called rank6. CREATE TABLE binarymatroids ( id INT PRIMARY KEY, size INT, rank INT, points TEXT); and add the data INSERT INTO binarymatroids VALUES(1,1,1,"1"); INSERT INTO binarymatroids VALUES(2,2,2,"1 2"); INSERT INTO binarymatroids VALUES(3,3,2,"1 2 3");......
25 MINORS To make the database more than mildly useful, it is essential to capture the minor relationship between matroids, rather than just properties of single matroids. It is infeasible to list all the minors for each matroid directly, but the results of single-element deletions and contractions can be stored. CREATE TABLE binaryminors ( id INT, point INT, delid INT, conid INT); CREATE TABLE binaryminors2 ( id INT, minor INT); To populate this table we need to find and identify all the single-element deletions and contractions of every matroid.
26 MINORS To make the database more than mildly useful, it is essential to capture the minor relationship between matroids, rather than just properties of single matroids. It is infeasible to list all the minors for each matroid directly, but the results of single-element deletions and contractions can be stored. CREATE TABLE binaryminors ( id INT, point INT, delid INT, conid INT); CREATE TABLE binaryminors2 ( id INT, minor INT); To populate this table we need to find and identify all the single-element deletions and contractions of every matroid.
27 IDENTIFYING A MATROID Each matroid M is assigned a unique hash code computed from the graph Γ as follows: Use nauty to compute the canonical labelling of Γ with the points of M distinguished (i.e. coloured ). Use a hashing algorithm (in this case SHA) to give each matroid a fingerprint. Store all fingerprints in lexicographic (alphabetical) order. An unknown matroid can quickly be identified by computing its fingerprint and then using a binary search.
28 A CANONICAL FORM As the output of nauty can be machine-dependent, it would be better to store a canonical form for each matroid. One candidate would be to take the lexicographically minimal matroid equivalent to the given one. gap> LoadPackage("grape"); true gap> g := PGL(6,2); <permutation group of size with 2 generators> gap> m := [1,4,6,9,12,20,22]; [ 1, 4, 6, 9, 12, 20, 22 ] gap> SmallestImageSet(g,m); [ 1, 2, 4, 7, 8, 16, 25 ]
29 A CANONICAL FORM As the output of nauty can be machine-dependent, it would be better to store a canonical form for each matroid. One candidate would be to take the lexicographically minimal matroid equivalent to the given one. gap> LoadPackage("grape"); true gap> g := PGL(6,2); <permutation group of size with 2 generators> gap> m := [1,4,6,9,12,20,22]; [ 1, 4, 6, 9, 12, 20, 22 ] gap> SmallestImageSet(g,m); [ 1, 2, 4, 7, 8, 16, 25 ] But in general, this is too slow to compute for large numbers of matroids.
30 COMPUTING THE MINOR RELATIONSHIP For each matroid/point pair, two minors are constructed and identified and the information stored in the binaryminors table. mysql> SELECT * FROM binaryminors WHERE id = 1000; id point delid conid This is a huge computation due to the sheer number of matroids but is only done once.
31 SAMPLE USE An even cycle matroid is a binary matroid M that with a representing matrix of the form Graphic Single extra row Equivalently M is even cycle if there is binary element e such that (M + e)/e is graphic. This property is minor-closed what are the excluded minors for even cycle matroids?
32 SETTING UP THE DATABASE We ll add the property isevencycle to the database ALTER TABLE binarymatroids ADD COLUMN (isevencycle tinyint(1)); Then we actually have to compute which matroids are even cycle. def is_evencycle(m): return True in [n.contract( X ).is_graphic() for n in m.linear_extensions( X )] and enter this data into the database:... UPDATE binarymatroids SET isevencycle = 1 WHERE id = ; UPDATE binarymatroids SET isevencycle = 1 WHERE id = ; UPDATE binarymatroids SET isevencycle = 0 WHERE id = ;...
33 THE FINAL COMMAND SELECT B.id, B.points FROM binarymatroids B WHERE B.size < 17 AND B.isEvenCycle = 0 AND NOT EXISTS (SELECT * FROM binarymatroids B2, binaryminors2 BM WHERE B.id = BM.id AND BM.minor = B2.id AND B2.isEvenCycle = 0);
34 IN PICTURES id isec B id minor BM id isec B2
35 IN PICTURES id isec id minor id isec B BM B2
36 AND THE FINAL id points rows in set (2 min sec)
37 HOW CAN THIS BE PROVIDED IN SAGE? Demo
38 PROBLEMS Many problems: Technical problems Non-technical problems Too much data, but not enough proofs!
Analysis of Algorithms I: Binary Search Trees
Analysis of Algorithms I: Binary Search Trees Xi Chen Columbia University Hash table: A data structure that maintains a subset of keys from a universe set U = {0, 1,..., p 1} and supports all three dictionary
On an algorithm for classification of binary self-dual codes with minimum distance four
Thirteenth International Workshop on Algebraic and Combinatorial Coding Theory June 15-21, 2012, Pomorie, Bulgaria pp. 105 110 On an algorithm for classification of binary self-dual codes with minimum
CS 3719 (Theory of Computation and Algorithms) Lecture 4
CS 3719 (Theory of Computation and Algorithms) Lecture 4 Antonina Kolokolova January 18, 2012 1 Undecidable languages 1.1 Church-Turing thesis Let s recap how it all started. In 1990, Hilbert stated a
5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1
5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 General Integer Linear Program: (ILP) min c T x Ax b x 0 integer Assumption: A, b integer The integrality condition
Applied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
Circuits 1 M H Miller
Introduction to Graph Theory Introduction These notes are primarily a digression to provide general background remarks. The subject is an efficient procedure for the determination of voltages and currents
Every tree contains a large induced subgraph with all degrees odd
Every tree contains a large induced subgraph with all degrees odd A.J. Radcliffe Carnegie Mellon University, Pittsburgh, PA A.D. Scott Department of Pure Mathematics and Mathematical Statistics University
Copyrighted Material. Chapter 1 DEGREE OF A CURVE
Chapter 1 DEGREE OF A CURVE Road Map The idea of degree is a fundamental concept, which will take us several chapters to explore in depth. We begin by explaining what an algebraic curve is, and offer two
Solutions to In-Class Problems Week 4, Mon.
Massachusetts Institute of Technology 6.042J/18.062J, Fall 05: Mathematics for Computer Science September 26 Prof. Albert R. Meyer and Prof. Ronitt Rubinfeld revised September 26, 2005, 1050 minutes Solutions
Generating Elementary Combinatorial Objects
Fall 2009 Combinatorial Generation Combinatorial Generation: an old subject Excerpt from: D. Knuth, History of Combinatorial Generation, in pre-fascicle 4B, The Art of Computer Programming Vol 4. Combinatorial
Linear Codes. Chapter 3. 3.1 Basics
Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length
ENUMERATION OF INTEGRAL TETRAHEDRA
ENUMERATION OF INTEGRAL TETRAHEDRA SASCHA KURZ Abstract. We determine the numbers of integral tetrahedra with diameter d up to isomorphism for all d 1000 via computer enumeration. Therefore we give an
Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits
Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique
2.3. Finding polynomial functions. An Introduction:
2.3. Finding polynomial functions. An Introduction: As is usually the case when learning a new concept in mathematics, the new concept is the reverse of the previous one. Remember how you first learned
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms
IE 680 Special Topics in Production Systems: Networks, Routing and Logistics*
IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* Rakesh Nagi Department of Industrial Engineering University at Buffalo (SUNY) *Lecture notes from Network Flows by Ahuja, Magnanti
On Matroid Representability and Minor Problems
On Matroid Representability and Minor Problems Petr Hliněný Faculty of Informatics, Masaryk University in Brno, Botanická 68a, 602 00 Brno, Czech Republic and Department of Computer Science, VŠB Technical
Lecture 1: Systems of Linear Equations
MTH Elementary Matrix Algebra Professor Chao Huang Department of Mathematics and Statistics Wright State University Lecture 1 Systems of Linear Equations ² Systems of two linear equations with two variables
Operation Count; Numerical Linear Algebra
10 Operation Count; Numerical Linear Algebra 10.1 Introduction Many computations are limited simply by the sheer number of required additions, multiplications, or function evaluations. If floating-point
3-17 15-25 5 15-10 25 3-2 5 0. 1b) since the remainder is 0 I need to factor the numerator. Synthetic division tells me this is true
Section 5.2 solutions #1-10: a) Perform the division using synthetic division. b) if the remainder is 0 use the result to completely factor the dividend (this is the numerator or the polynomial to the
USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS
USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA [email protected] ABSTRACT This
Linear Programming Problems
Linear Programming Problems Linear programming problems come up in many applications. In a linear programming problem, we have a function, called the objective function, which depends linearly on a number
Catalan Numbers. Thomas A. Dowling, Department of Mathematics, Ohio State Uni- versity.
7 Catalan Numbers Thomas A. Dowling, Department of Mathematics, Ohio State Uni- Author: versity. Prerequisites: The prerequisites for this chapter are recursive definitions, basic counting principles,
Enumerating possible Sudoku grids
Enumerating possible Sudoku grids Bertram Felgenhauer Department of Computer Science TU Dresden 00 Dresden Germany [email protected] Frazer Jarvis Department of Pure Mathematics University of Sheffield,
International Journal of Software and Web Sciences (IJSWS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
11 Multivariate Polynomials
CS 487: Intro. to Symbolic Computation Winter 2009: M. Giesbrecht Script 11 Page 1 (These lecture notes were prepared and presented by Dan Roche.) 11 Multivariate Polynomials References: MC: Section 16.6
SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH
31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,
December 4, 2013 MATH 171 BASIC LINEAR ALGEBRA B. KITCHENS
December 4, 2013 MATH 171 BASIC LINEAR ALGEBRA B KITCHENS The equation 1 Lines in two-dimensional space (1) 2x y = 3 describes a line in two-dimensional space The coefficients of x and y in the equation
Some facts about polynomials modulo m (Full proof of the Fingerprinting Theorem)
Some facts about polynomials modulo m (Full proof of the Fingerprinting Theorem) In order to understand the details of the Fingerprinting Theorem on fingerprints of different texts from Chapter 19 of the
A REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE. 1. Introduction and Preliminaries
Acta Math. Univ. Comenianae Vol. LXVI, 2(1997), pp. 285 291 285 A REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE E. T. BASKORO, M. MILLER and J. ŠIRÁŇ Abstract. It is well known that Moore digraphs do
FACTORING SPARSE POLYNOMIALS
FACTORING SPARSE POLYNOMIALS Theorem 1 (Schinzel): Let r be a positive integer, and fix non-zero integers a 0,..., a r. Let F (x 1,..., x r ) = a r x r + + a 1 x 1 + a 0. Then there exist finite sets S
On Integer Additive Set-Indexers of Graphs
On Integer Additive Set-Indexers of Graphs arxiv:1312.7672v4 [math.co] 2 Mar 2014 N K Sudev and K A Germina Abstract A set-indexer of a graph G is an injective set-valued function f : V (G) 2 X such that
Intro to Data Analysis, Economic Statistics and Econometrics
Intro to Data Analysis, Economic Statistics and Econometrics Statistics deals with the techniques for collecting and analyzing data that arise in many different contexts. Econometrics involves the development
GRAPH THEORY LECTURE 4: TREES
GRAPH THEORY LECTURE 4: TREES Abstract. 3.1 presents some standard characterizations and properties of trees. 3.2 presents several different types of trees. 3.7 develops a counting method based on a bijection
Figure 1. An embedded chart on a worksheet.
8. Excel Charts and Analysis ToolPak Charts, also known as graphs, have been an integral part of spreadsheets since the early days of Lotus 1-2-3. Charting features have improved significantly over the
Lecture 6. SQL, Logical DB Design
Lecture 6 SQL, Logical DB Design Relational Query Languages A major strength of the relational model: supports simple, powerful querying of data. Queries can be written intuitively, and the DBMS is responsible
Zeros of a Polynomial Function
Zeros of a Polynomial Function An important consequence of the Factor Theorem is that finding the zeros of a polynomial is really the same thing as factoring it into linear factors. In this section we
Factoring Polynomials
Factoring Polynomials Hoste, Miller, Murieka September 12, 2011 1 Factoring In the previous section, we discussed how to determine the product of two or more terms. Consider, for instance, the equations
1 Review of Least Squares Solutions to Overdetermined Systems
cs4: introduction to numerical analysis /9/0 Lecture 7: Rectangular Systems and Numerical Integration Instructor: Professor Amos Ron Scribes: Mark Cowlishaw, Nathanael Fillmore Review of Least Squares
AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC
AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC W. T. TUTTE. Introduction. In a recent series of papers [l-4] on graphs and matroids I used definitions equivalent to the following.
Max-Min Representation of Piecewise Linear Functions
Beiträge zur Algebra und Geometrie Contributions to Algebra and Geometry Volume 43 (2002), No. 1, 297-302. Max-Min Representation of Piecewise Linear Functions Sergei Ovchinnikov Mathematics Department,
College Tuition: Data mining and analysis
CS105 College Tuition: Data mining and analysis By Jeanette Chu & Khiem Tran 4/28/2010 Introduction College tuition issues are steadily increasing every year. According to the college pricing trends report
MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.
MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column
Dynamic Programming. Lecture 11. 11.1 Overview. 11.2 Introduction
Lecture 11 Dynamic Programming 11.1 Overview Dynamic Programming is a powerful technique that allows one to solve many different types of problems in time O(n 2 ) or O(n 3 ) for which a naive approach
Zachary Monaco Georgia College Olympic Coloring: Go For The Gold
Zachary Monaco Georgia College Olympic Coloring: Go For The Gold Coloring the vertices or edges of a graph leads to a variety of interesting applications in graph theory These applications include various
Why? A central concept in Computer Science. Algorithms are ubiquitous.
Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online
3 Monomial orders and the division algorithm
3 Monomial orders and the division algorithm We address the problem of deciding which term of a polynomial is the leading term. We noted above that, unlike in the univariate case, the total degree does
Once the schema has been designed, it can be implemented in the RDBMS.
2. Creating a database Designing the database schema... 1 Representing Classes, Attributes and Objects... 2 Data types... 5 Additional constraints... 6 Choosing the right fields... 7 Implementing a table
Zeros of Polynomial Functions
Zeros of Polynomial Functions Objectives: 1.Use the Fundamental Theorem of Algebra to determine the number of zeros of polynomial functions 2.Find rational zeros of polynomial functions 3.Find conjugate
UNCORRECTED PAGE PROOFS
number and and algebra TopIC 17 Polynomials 17.1 Overview Why learn this? Just as number is learned in stages, so too are graphs. You have been building your knowledge of graphs and functions over time.
Overview of Violations of the Basic Assumptions in the Classical Normal Linear Regression Model
Overview of Violations of the Basic Assumptions in the Classical Normal Linear Regression Model 1 September 004 A. Introduction and assumptions The classical normal linear regression model can be written
1 Formulating The Low Degree Testing Problem
6.895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Linearity Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz In the last lecture, we proved a weak PCP Theorem,
A Catalogue of the Steiner Triple Systems of Order 19
A Catalogue of the Steiner Triple Systems of Order 19 Petteri Kaski 1, Patric R. J. Östergård 2, Olli Pottonen 2, and Lasse Kiviluoto 3 1 Helsinki Institute for Information Technology HIIT University of
Cubic Functions: Global Analysis
Chapter 14 Cubic Functions: Global Analysis The Essential Question, 231 Concavity-sign, 232 Slope-sign, 234 Extremum, 235 Height-sign, 236 0-Concavity Location, 237 0-Slope Location, 239 Extremum Location,
Relational Database: Additional Operations on Relations; SQL
Relational Database: Additional Operations on Relations; SQL Greg Plaxton Theory in Programming Practice, Fall 2005 Department of Computer Science University of Texas at Austin Overview The course packet
Review of Fundamental Mathematics
Review of Fundamental Mathematics As explained in the Preface and in Chapter 1 of your textbook, managerial economics applies microeconomic theory to business decision making. The decision-making tools
Cluster Editing And Search Tree Algorithms
Automated Generation of Search Tree Algorithms for Hard Graph Modification Problems Jens Gramm Jiong Guo Falk Hüffner Rolf Niedermeier Wilhelm-Schickard-Institut für Informatik, Universität Tübingen, Sand
Algorithm Design and Analysis
Algorithm Design and Analysis LECTURE 27 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/6/2011 S. Raskhodnikova;
The four [10,5,4] binary codes
1 Preliminaries The four [10,,] binary codes There are four distinct [10; ; ] binary codes. We shall prove this in a moderately elementary way, using the MacWilliams identities as the main tool. (For the
A Brief Introduction to Property Testing
A Brief Introduction to Property Testing Oded Goldreich Abstract. This short article provides a brief description of the main issues that underly the study of property testing. It is meant to serve as
Tennessee Department of Education. Task: Sally s Car Loan
Tennessee Department of Education Task: Sally s Car Loan Sally bought a new car. Her total cost including all fees and taxes was $15,. She made a down payment of $43. She financed the remaining amount
A Dynamic Programming Approach for Generating N-ary Reflected Gray Code List
A Dynamic Programming Approach for Generating N-ary Reflected Gray Code List Mehmet Kurt 1, Can Atilgan 2, Murat Ersen Berberler 3 1 Izmir University, Department of Mathematics and Computer Science, Izmir
ON THE COMPLEXITY OF THE GAME OF SET. {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu
ON THE COMPLEXITY OF THE GAME OF SET KAMALIKA CHAUDHURI, BRIGHTEN GODFREY, DAVID RATAJCZAK, AND HOETECK WEE {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu ABSTRACT. Set R is a card game played with a
Chapter 5 More SQL: Complex Queries, Triggers, Views, and Schema Modification
Chapter 5 More SQL: Complex Queries, Triggers, Views, and Schema Modification Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 5 Outline More Complex SQL Retrieval Queries
Introduction to SQL for Data Scientists
Introduction to SQL for Data Scientists Ben O. Smith College of Business Administration University of Nebraska at Omaha Learning Objectives By the end of this document you will learn: 1. How to perform
Frans J.C.T. de Ruiter, Norman L. Biggs Applications of integer programming methods to cages
Frans J.C.T. de Ruiter, Norman L. Biggs Applications of integer programming methods to cages Article (Published version) (Refereed) Original citation: de Ruiter, Frans and Biggs, Norman (2015) Applications
Using SQL Server Management Studio
Using SQL Server Management Studio Microsoft SQL Server Management Studio 2005 is a graphical tool for database designer or programmer. With SQL Server Management Studio 2005 you can: Create databases
Creating QBE Queries in Microsoft SQL Server
Creating QBE Queries in Microsoft SQL Server When you ask SQL Server or any other DBMS (including Access) a question about the data in a database, the question is called a query. A query is simply a question
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
Natural cubic splines
Natural cubic splines Arne Morten Kvarving Department of Mathematical Sciences Norwegian University of Science and Technology October 21 2008 Motivation We are given a large dataset, i.e. a function sampled
. P. 4.3 Basic feasible solutions and vertices of polyhedra. x 1. x 2
4. Basic feasible solutions and vertices of polyhedra Due to the fundamental theorem of Linear Programming, to solve any LP it suffices to consider the vertices (finitely many) of the polyhedron P of the
The Geometry of Polynomial Division and Elimination
The Geometry of Polynomial Division and Elimination Kim Batselier, Philippe Dreesen Bart De Moor Katholieke Universiteit Leuven Department of Electrical Engineering ESAT/SCD/SISTA/SMC May 2012 1 / 26 Outline
Minimally Infeasible Set Partitioning Problems with Balanced Constraints
Minimally Infeasible Set Partitioning Problems with alanced Constraints Michele Conforti, Marco Di Summa, Giacomo Zambelli January, 2005 Revised February, 2006 Abstract We study properties of systems of
Knowledge Discovery and Data Mining. Structured vs. Non-Structured Data
Knowledge Discovery and Data Mining Unit # 2 1 Structured vs. Non-Structured Data Most business databases contain structured data consisting of well-defined fields with numeric or alphanumeric values.
7 Time series analysis
7 Time series analysis In Chapters 16, 17, 33 36 in Zuur, Ieno and Smith (2007), various time series techniques are discussed. Applying these methods in Brodgar is straightforward, and most choices are
3.6. The factor theorem
3.6. The factor theorem Example 1. At the right we have drawn the graph of the polynomial y = x 4 9x 3 + 8x 36x + 16. Your problem is to write the polynomial in factored form. Does the geometry of the
Linear and quadratic Taylor polynomials for functions of several variables.
ams/econ 11b supplementary notes ucsc Linear quadratic Taylor polynomials for functions of several variables. c 010, Yonatan Katznelson Finding the extreme (minimum or maximum) values of a function, is
WEEK #3, Lecture 1: Sparse Systems, MATLAB Graphics
WEEK #3, Lecture 1: Sparse Systems, MATLAB Graphics Visualization of Matrices Good visuals anchor any presentation. MATLAB has a wide variety of ways to display data and calculation results that can be
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
Lecture 5 Principal Minors and the Hessian
Lecture 5 Principal Minors and the Hessian Eivind Eriksen BI Norwegian School of Management Department of Economics October 01, 2010 Eivind Eriksen (BI Dept of Economics) Lecture 5 Principal Minors and
Cacti with minimum, second-minimum, and third-minimum Kirchhoff indices
MATHEMATICAL COMMUNICATIONS 47 Math. Commun., Vol. 15, No. 2, pp. 47-58 (2010) Cacti with minimum, second-minimum, and third-minimum Kirchhoff indices Hongzhuan Wang 1, Hongbo Hua 1, and Dongdong Wang
Lecture 3: Finding integer solutions to systems of linear equations
Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture
A basic create statement for a simple student table would look like the following.
Creating Tables A basic create statement for a simple student table would look like the following. create table Student (SID varchar(10), FirstName varchar(30), LastName varchar(30), EmailAddress varchar(30));
University of Lille I PC first year list of exercises n 7. Review
University of Lille I PC first year list of exercises n 7 Review Exercise Solve the following systems in 4 different ways (by substitution, by the Gauss method, by inverting the matrix of coefficients
Mathematics for Algorithm and System Analysis
Mathematics for Algorithm and System Analysis for students of computer and computational science Edward A. Bender S. Gill Williamson c Edward A. Bender & S. Gill Williamson 2005. All rights reserved. Preface
THE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0
THE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0 RICHARD J. MATHAR Abstract. We count solutions to the Ramanujan-Nagell equation 2 y +n = x 2 for fixed positive n. The computational
Competitive Analysis of On line Randomized Call Control in Cellular Networks
Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising
Introduction to computer science
Introduction to computer science Michael A. Nielsen University of Queensland Goals: 1. Introduce the notion of the computational complexity of a problem, and define the major computational complexity classes.
1 Solving LPs: The Simplex Algorithm of George Dantzig
Solving LPs: The Simplex Algorithm of George Dantzig. Simplex Pivoting: Dictionary Format We illustrate a general solution procedure, called the simplex algorithm, by implementing it on a very simple example.
Improving SQL Server Performance
Informatica Economică vol. 14, no. 2/2010 55 Improving SQL Server Performance Nicolae MERCIOIU 1, Victor VLADUCU 2 1 Prosecutor's Office attached to the High Court of Cassation and Justice 2 Prosecutor's
Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
Intellect Platform - The Workflow Engine Basic HelpDesk Troubleticket System - A102
Intellect Platform - The Workflow Engine Basic HelpDesk Troubleticket System - A102 Interneer, Inc. Updated on 2/22/2012 Created by Erika Keresztyen Fahey 2 Workflow - A102 - Basic HelpDesk Ticketing System
Chapter 15: Dynamic Programming
Chapter 15: Dynamic Programming Dynamic programming is a general approach to making a sequence of interrelated decisions in an optimum way. While we can describe the general characteristics, the details
Algorithms Chapter 12 Binary Search Trees
Algorithms Chapter 1 Binary Search Trees Outline Assistant Professor: Ching Chi Lin 林 清 池 助 理 教 授 [email protected] Department of Computer Science and Engineering National Taiwan Ocean University
Binary Search Trees. A Generic Tree. Binary Trees. Nodes in a binary search tree ( B-S-T) are of the form. P parent. Key. Satellite data L R
Binary Search Trees A Generic Tree Nodes in a binary search tree ( B-S-T) are of the form P parent Key A Satellite data L R B C D E F G H I J The B-S-T has a root node which is the only node whose parent
Practical Guide to the Simplex Method of Linear Programming
Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear
Manifold Learning Examples PCA, LLE and ISOMAP
Manifold Learning Examples PCA, LLE and ISOMAP Dan Ventura October 14, 28 Abstract We try to give a helpful concrete example that demonstrates how to use PCA, LLE and Isomap, attempts to provide some intuition
8. Linear least-squares
8. Linear least-squares EE13 (Fall 211-12) definition examples and applications solution of a least-squares problem, normal equations 8-1 Definition overdetermined linear equations if b range(a), cannot
