A Generalization of Sauer s Lemma to Classes of Large-Margin Functions

Size: px
Start display at page:

Download "A Generalization of Sauer s Lemma to Classes of Large-Margin Functions"

Transcription

1 A Generalization of Sauer s Lemma to Classes of Large-Margin Functions Joel Ratsaby University College Lonon Gower Street, Lonon WC1E 6BT, Unite Kingom J.Ratsaby@cs.ucl.ac.uk, WWW home page: Abstract. We generalize Sauer s Lemma to classes H of binary-value functions on [n] = {1,..., n} which have a margin of at least N on every element in a sample S [n] of carinality l, where the margin µ h (x) of f F on a point x [n] is efine as the largest non-negative integer a such that h is constant on the interval I a(x) = [x a, x + a] [n]. 1 Introuction Estimation of the complexity of classes of binary-value functions has been behin much of recent evelopments in the of theory learning. In a seminal paper Vapnik an Chervonenkis [1971] applie the law of large numbers uniformly over an infinite class F of binary functions, i.e., inicator functions of sets A in a general omain X, an showe that the complexity of the problem of learning pattern recognition from samples of n ranomly rawn examples can be characterize in terms of a combinatorial complexity of F. This complexity, known as the growth function of F an enote by φ F (n), counts the maximal number of ichotomies, i.e., binary vectors corresponing to the restriction of functions f F on a finite subset S X of carinality n, where the maximum runs over all such S. The Vapnik-Chervonenkis imension of F, enote as V C(F), plays a crucial role in controlling the rate of the growth of φ F (n) with respect to n. Such binary vectors may be viewe as binary-value functions on a finite omain [n] {1,..., n} an hence form a finite class H of the same VC-imension as F. In this paper we consier classes of binary-value functions on [n] which satisfy a constraint of having a large margin on any one set S X of carinality l. We obtain an estimate on the carinality of such a class. Recently there has been interest in learning classes via maximizing the margin [see for instance Vapnik, 1998, Cristianini an Shawe-Taylor, 000]. The usual approach analyzes the growth rate (or more precisely the covering number) of Paper appeare in the Proc. of Thir Colloq. on Math. an Comp. Sci. Alg., Trees, Combin. an Probb. (MAthInfo 004), Vienna Austria, Sept University College Lonon, Computer Science Department,Technical Report RN/03/13

2 classes of real-value functions with a large-margin on some set (sample) S. So to the best of the author s knowlege, the approach taken in the current paper of estimating the complexity of classes of large-margin binary-value functions by a generalization of Sauer s lemma is novel. Before iscussing this further we first introuce some neee notation. Some notations, efinitions an existing results Let I(E) enote the inicator function which equals 1 if the expression E is true an 0 otherwise. Let F be a class of functions f : [n] {0, 1}. For a set A = {a 1,..., a k } [n] enote by f A = [f(a 1 ),..., f(a k )]. F is sai to shatter A if {f A : f F } = k. The Vapnik-Chervonenkis imension of F, enote as V C(F ), is efine as the carinality of the largest set shattere by F. Sauer [197] obtaine the following result: Lemma 1. [Sauer, 197] If the VC-imension of F is then F i=0 ( ) n. i We note that the boun is tight as for all, n 1 there exist classes F [n] of VC-imension which achieve the equality. Consier the following efinition of functional margin 1 which naturally suits binary-value functions. Definition 1. The margin µ f (x) of f F on an element x [n] is the largest non-negative integer a such that f has a constant value of either 0 or 1 on the interval set I a (x) = {x a,..., x + a} provie that I a (x) [n]. The sample-margin µ S (f) of f on a subset S [n] is efine as µ S (f) min x S µ f (x). More generally, this efinition applies also to classes on other omains X if there is a linear orering on X. 3 Motivation an aim of the paper In recent years, in search for better learning algorithms, it has been iscovere [see for instance Vapnik, 1998, Cristianini an Shawe-Taylor, 000] that learning 1 For other efinitions of margin see for instance Cristianini an Shawe-Taylor [000].

3 3 classes F of real-value functions that are restricte to have a large margin on a training sample leas to a faster learning-error convergence. The crucial reason for such improve error bouns is the fast ecrease of the covering number of F, which is analogous to the growth-number in the case of classes of binary-value functions, with respect to an increase in sample-margin value. In this paper, we consier the latter case, restricting to a finite class H(S) of binary value functions h on [n] with the constraint that for a fixe subset S [n] of size l, for all h H(S), µ S (h) N. By generalizing Sauer s result (Lemma 1), we obtain an estimate on the carinality of H(S). Being epenent on the margin parameter N, our estimate may be viewe as being analogous to existing results that boun the covering number of classes of finite-pseuo-imension (or fat γ imension) which consists of real-value functions uner a similar margin constraint [see for instance Anthony an Bartlett, 1999, Ch. 1]. 4 Technical results We start with an auxiliary lemma: Lemma. For N 0, n 0, 0 m n, let w m,n (n) be the number of stanar (one-imensional) orere partitions of a nonnegative integer n into m parts each no larger than N. Then I(n = 0) if m = 0 ( )( ) w m,n (n) = ( 1) i/(n+1) m n i + m 1 if m 1. i/(n + 1) n i i=0,n+1,(n+1),... Remark 1. While our interest is in [n] = {1,..., n}, we allow w m,n (n) to be efine on n = 0 for use by Lemma 3. Proof: The generating function (g.f.) for w m,n (n) is W (x) = ( ) 1 x w m,n (n)x n N+1 m =. 1 x n 0 When m = 0 the only non-zero coefficient is of ( x 0 an it equals 1 so w 0,N (n) = m. I(n = 0). Let T (x) = (1 x N+1 ) m 1 an S(x) = 1 x) Then T (x) = m ( m ( 1) i i i=0 ) x i(n+1) Hence samples on which the target function (the one to be learnt) has a large margin are of consierable worth. Ratsaby [003] estimate the complexity of such samples as a function of the margin parameter an sample size.

4 4 which generates the sequence t N (n) = ( m n/(n+1)) ( 1) n/(n+1) I(n mo (N + 1) = 0). Similarly, for m 1, it is easy to show S(x) generates s(n) = ( ) n+m 1 n. The prouct W (x) = T (x)s(x) generates their convolution t N (n) s(n), namely, w m,n (n) = i=0,n+1,(n+1),..., ( )( ) ( 1) i/(n+1) m n i + m 1. i/(n + 1) n i Remark. By an alternate proof one obtains a slightly simpler form of over m 1. w m,n (n) = m ( )( ) m n + m 1 k(n + 1) ( 1) k, k m 1 k=0 Before proceeing to the main theorem we have two aitional lemmas. Lemma 3. Let the integer 1 N n an consier the class F consisting of all binary-value functions f on [n] which take the value 1 on no more than r n elements of [n] an whose margin on any element x [n] satisfies µ f (x) N. Then where F = r k=0 c(k, n k; m, N) β r (N) (n) c(k, n k; m, N) 1 = w m i,n (k m + 1 i(n + 1))w m j,n (n k m + 1 j(n + 1)). i,j=0 Proof: Consier the integer pair [k, n k], where n 1 an 0 k n. A two-imensional orere m-partition of [k, n k] is an orere partition into m two-imensional parts, [a j, b j ] where 0 a j, b j n but not both are zero an where m j=1 [a j, b j ] = [k, n k]. For instance, [, 1] = [0, 1]+[, 0] = [1, 1]+[1, 0] = [, 0] + [0, 1] are three partitions of [, 1] into two parts (for more examples see Anrews Anrews [1998] ). Suppose we a the constraint that only a 1 or b m may be zero while all remaining a j, b k 1, j m, 1 k m 1. Denote any partition that satisfies this as vali. For instance, let k =, m = 3 then the m-partitions of [k, n k] are: {[0, 1][1, 1][1, n 4]},{[0, 1][1, ][1, n 5]},...,{[0, 1][1, n 3][1, 0]}, {[0, ][1, 1][1, n 5]}, {[0, ][1, ][1, n 6]},..., {[0, ][1, n 4][1, 0]},..., {[0, n 3][1, 1][1, 0]}. For [k, n k], let P n,k be the collection of all vali partitions of [k, n k]. Let F k enote all binary functions on [n] which take the value 1 over exactly k elements of [n]. Define the mapping Π : F k P n,k where for any f F k (1)

5 5 the partition Π(f) is efine by the following proceure: Start from the first element of [n], i.e., 1. If f takes the value 1 on it then let a 1 be the length of the constant 1-segment, i.e., the set of all elements starting from 1 on which f takes the constant value 1. Otherwise if f takes the value 0 let a 1 = 0. Then let b 1 be the length of the subsequent 0-segment on which f takes the value 0. Let [a 1, b 1 ] be the first part of Π(f). Next, repeat the following: if there is at least one more element of [n] which has not been inclue in the preceing segment, then let a j be the length of the next 1-segment an b j the length of the subsequent 0-segment. Let [a j, b j ], j = 1,..., m, be the resulting sequence of parts where m is the total number of parts. Only the last part may have a zero value b m since the function may take the value 1 on the last element n of [n] while all other parts, [a j, b j ], j m 1, must have a j, b j 1. The result is a vali partition of [k, n k] into m parts. Clearly, every f F k has a unique partition. Therefore Π is a bijection. Moreover, we may ivie P n,k into mutually exclusive subsets V m consisting of all vali partitions of [k, n k] having exactly m parts, where 1 m n. Thus F k = V m. Consier the following constraint on components of parts: a i, b i N + 1, 1 i m. () Denote by V m,n P n,k the collection of vali partitions of [k, n k] into m parts each of which satisfies this constraint. Let F k,n = F F k consist of all functions satisfying the margin constraint in the statement of the lemma an having exactly k ones. Note that f having a margin no larger than N on any element of [n] implies there oes not exist a segment a i or b i of length larger than N + 1 on which f takes a constant value. Hence the parts of Π(f) satisfy (). Hence, for any f F k,n, its unique vali partition Π(f) must be in V m,n. We therefore have By efinition of F it follows that Let us enote by F k,n = F = V m,n. (3) r F k,n. (4) k=0 c(k, n k; m, N) V m,n (5) the number of vali partitions of [k, n k] into exactly m parts whose components satisfy (). In orer to etermine F it therefore suffices to etermine c(k, n k; m, N).

6 6 We next construct the generating function G(t 1, t ) = c(α 1, α ; m, N)t α1 1 tα. (6) α 1 0 α 0 For m 1, G(t 1, t ) = (t t t N+1 1 )(t 1 + t + + t N+1 ) I(m ) ((t t N+1 1 )(t t N+1 ) ) (m ) + (t t N+1 1 ) I(m ) (t 0 + t t N+1 ) where the values of the exponents of all terms in the first an secon factors represent the possible values for a 1 an b 1, respectively. The values of the exponents in the mile m factors are for the values of a j, b j, j m 1 an those in the factor before last an last are for a m an b m, respectively. Equating this to (6) implies the coefficient of t α1 1 tα equals c(α 1, α ; m, N) which we seek. The right sie of (7) equals ( ( Let W (x) = t m 1 1 t m 1 So (8) becomes ( 1 t N t 1 1 t N+1 1 t ) m + t N+1 1 ) m + t N+1 (7) ( ) m 1 1 t N t 1 ( ) m 1 1 t N+1 1 t. (8) ) m 1 1 x N+1 1 x generate wm 1,N (n) which is efine in Lemma. α 1,α 0 ( w m,n (α 1 )w m,n (α )t α1+m 1 1 t α+m 1 + w m 1,N (α 1 )w m,n (α )t α1+m+n 1 t α+m 1 + w m,n (α 1 )w m 1,N (α )t α1+m 1 1 t α+m+n + w m 1,N (α 1 )w m 1,N (α )t α1+m+n 1 t α+m+n Equating the coefficients of t α 1 1 tα in (6) an (9) yiels ). (9) c(α 1, α ; m, N) 1 = w m i,n (α 1 m + 1 i(n + 1))w m j,n (α m + 1 j(n + 1)). i,j=0 Substituting k for α 1, n k for α, combining (3), (4) an (5) yiels the result. The next lemma extens the result of Lemma 3 to classes H of finite VCimension.

7 7 Lemma 4. Let n 1 an 0 n. Let H be a class of binary-value functions h on [n] satisfying µ h (x) N on any x [n] an let V C(H). Then where β (N) is efine in Lemma 3. H β (N) (n) Proof: The proof buils on that of Lemma 7 in Haussler & Long Haussler an Long [1995] which consiere generalizations of the V C-imension an is one by ouble inuction on n an. Start with the case = 0, the boun reuces to H 1 since β (N) 0 (n) 1 when n 1. The boun is correct since if H > 1 then it implies there are two istinct functions h, g. Let k [n] be the element on which they iffer. Then the singleton {k} is shattere by H hence the VC-imension of H is at least 1 which contraicts the assumption that = 0 hence H 1 an the lemma hols. Next, suppose = n. Consier the class F in Lemma 3 with r = n. Such F consists of all binary-value functions f on [n] which satisfy the margin constraint µ f (x) N on every x [n]. By Lemma 3, F β n (N) (n). Clearly by efinition, H F. Hence H β n (N) (n) as claime. Next, suppose 0 < < n. Define π : H {0, 1} by π(h) = [h(1),..., h(n 1)]. Define α : π(h) {0, 1} by α(u 1,..., u ) = min{v : h H, h(i) = u i, h(n) = v, 1 i n 1}. Define A = {h H : h(n) = α(h(1),..., h(n 1))} an enote by A c = H \ A. Consier any h H. If α(h(1),..., h(n 1)) = 1 then A c oes not contain h. Otherwise, A c contains the function g which agrees with h on 1,..., n 1 an g(n) = 1. Hence for all h A c, h(n) = 1. Make the inuctive assumption that the claime boun hols for all classes H on any subset of [n] having carinality an satisfying the margin constraint. Then we claim the following: Claim 1 A β (N) (n 1). This is prove next: the mapping π is one-to-one on A an the set π(a) has VC-imension no larger than since any subset of [n] shattere by π(a) is also shattere by A which is in H an V C(H). Hence by the inuction hypothesis π(a) β (N) (n 1) an since π is one-to-one then A = π(a). Next, uner the same inuction hypothesis, we have: Claim A c β (N) 1 (n 1). We prove this next: First we show that V C(A c ) 1. Let E [n] be shattere by A c an let E = l. Note that n E since as note earlier h(n) = 1 for all

8 8 h A c. For any b {0, 1} l+1 let h A c be such that h E = [b 1,..., b l ]. If b l+1 = 1 then h(n) = b l+1 since all functions in A c take the value 1 on n. If b l+1 = 0 then there exists a g A which satisfies g(i) = h(i), 1 i n 1 an g(n) = α(h(1),..., h(n 1)), the latter being g(n) = 0. It follows that E {n} is shattere by H. But by assumption V C(H) an n E hence E 1. Since E was chosen arbitrarily then V C(A c ) 1. The same argument as in the proof of Claim 1 applie to A c using 1 to boun its VC-imension, obtains the statement of Claim. From Claims 1 an an recalling the efinition of c(k, n k; m, N) from Lemma 3, it follows that H β (N) = k=0 (n 1) + β (N) 1 (n 1) = I(n/ N) + = I(n/ N) + 1 c(k, n k 1; m, N) + k=1 k=0 c(k, n k 1; m, N) + c(k, n k 1; m, N) k=1 c(k 1, n k; m, N) ( ) c(k, n k 1; m, N) + c(k 1, n k; m, N) k=1 where the inicator I(n/ N) enters here since in case k = 0 the only vali function h is the constant-0 on [n] satisfying µ h (x) n/, for all x [n]. We now have: Claim 3 ( ) c(k, n k; m, N) = c(k, n k 1; m, N) + c(k 1, n k; m, N). (11) Note that this is a recurrence formula for the number (left han sie of (11)) of vali partitions of [k, n k] (excluing the case k = 0) into parts that satisfy (). We prove the claim next: given any such partition π n there is exactly one of four possible ways that it can be constructe by aing a part to a vali two imensional partition π of [n 1] while still satisfying (). The first two amount to starting from a partition π of [k 1, n k] an: (i) aing the part [1, 0] algebraically to any existing part in π, e.g., [x, y] + [1, 0] = [x + 1, y], to obtain a π n with [x + 1, y] as one of the parts (provie that () is still satisfie) which yiels a total number of parts no larger than n 1 or (ii) aing [1, 0] to π as a new last part to obtain a π n (provie it is still vali) with no more than n parts. The remaining two ways amount to starting from a partition π of [k, n k 1] an acting as before except now aing the part [0, 1] instea of (10)

9 9 [1, 0] either algebraically or as a new first part. There are c(k, n k 1; m, N) vali partitions of [k, n k 1] an there are c(k 1, n k; m, N) vali partitions of [k 1, n k], all satisfying (). Doing the aforementione construction to each one of these partitions yiels all vali partitions of [k, n k] that satisfy (). Continuing, the right han sie of (10) becomes I(n/ N) + k=1 c(k, n k; m, N) = k=0 c(k, n k; m, N) which is precisely β (N) (n). This completes the inuction. Theorem 1. Let n 1, 1 l n an 0 < n l. Let H be a class of binary-value functions h on [n] having V C(H). Let S [n] be a sample of carinality l an consier the subclass H(S) H which consists of all functions h H with a margin µ h (x) > N iff x S. Then H(S) β (N) (n l (N + 1)). Proof: The conition µ h (x) > N implies only two types of functions h are allowe, those which take either a constant-0 value or a constant-1 value over all elements in the interval I N+1 (x). The conition µ h (x) N implies that any function is possible except one that takes a constant-0 or a constant-1 value over I N+1 (x) (see Definition 1). Hence clearly the first conition is significantly more restrictive. Since we seek an upper boun on H(S) then we consier among all sets of [n] of carinality l a set S with the least restrictive constraint, namely, causing as few elements x [n] as possible (except those in S) to have µ h (x) > N. This is achieve by a maximally-packe set S [n] of l elements, for instance S = {N +,..., N + l + 1}. It yiels a minimal-size region R = {1,..., (N + 1) + l} on which every caniate h must take either a constant-0 or constant-1 value, i.e., have a margin larger than N for every x S. This leaves a maximal-size region [n]\r on which the less stringent constraint of having a margin no larger than N must hol. By Lemma 4, there are no more than β (N) (n l (N + 1)) functions in H that satisfy the latter. Hence for any S [n] of carinality S = l, H(S) β (N) (n l (N + 1)).

10 10 5 Conclusions The main result of the paper is a boun on the carinality of a class of finite VC-imension consisting of binary functions on [n] which have a margin greater than N on a set S of carinality l. This result generalizes the well known Sauer s Lemma an is analogous to existing bouns on the covering number of classes of real-value functions that have a large-margin on a sample S. The result may be use for obtaining the sample complexity of PAC-learning a a class of boolean hypotheses while maximizing the margin on a given training sample.

11 Bibliography G. E. Anrews. The Theory of Partitions. Cambrige University Press, M. Anthony an P. L. Bartlett. Neural Network Learning:Theoretical Founations. Cambrige University Press, N. Cristianini an J. Shawe-Taylor. An Introuction to Support Vector Machines an other Kernel-base learning methos. Cambrige University Press, 000. D. Haussler an P.M. Long. A generalization of sauer s lemma. Journal of Combinatorial Theory (A), 71():19 40, J. Ratsaby. On the complexity of goo samples for learning. Technical Report RN/03/1, Department of Computer Science, University College Lonon, September 003. N. Sauer. On the ensity of families of sets. J. Combinatorial Theory (A), 13: , 197. V. Vapnik. Statistical Learning Theory. Wiley, V. N. Vapnik an A. Ya. Chervonenkis. On the uniform convergence of relative frequencies of events to their probabilities. Theory Probab. Apl., 16:64 80, 1971.

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS Contents 1. Moment generating functions 2. Sum of a ranom number of ranom variables 3. Transforms

More information

Factoring Dickson polynomials over finite fields

Factoring Dickson polynomials over finite fields Factoring Dickson polynomials over finite fiels Manjul Bhargava Department of Mathematics, Princeton University. Princeton NJ 08544 manjul@math.princeton.eu Michael Zieve Department of Mathematics, University

More information

2r 1. Definition (Degree Measure). Let G be a r-graph of order n and average degree d. Let S V (G). The degree measure µ(s) of S is defined by,

2r 1. Definition (Degree Measure). Let G be a r-graph of order n and average degree d. Let S V (G). The degree measure µ(s) of S is defined by, Theorem Simple Containers Theorem) Let G be a simple, r-graph of average egree an of orer n Let 0 < δ < If is large enough, then there exists a collection of sets C PV G)) satisfying: i) for every inepenent

More information

Pythagorean Triples Over Gaussian Integers

Pythagorean Triples Over Gaussian Integers International Journal of Algebra, Vol. 6, 01, no., 55-64 Pythagorean Triples Over Gaussian Integers Cheranoot Somboonkulavui 1 Department of Mathematics, Faculty of Science Chulalongkorn University Bangkok

More information

Firewall Design: Consistency, Completeness, and Compactness

Firewall Design: Consistency, Completeness, and Compactness C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,

More information

10.2 Systems of Linear Equations: Matrices

10.2 Systems of Linear Equations: Matrices SECTION 0.2 Systems of Linear Equations: Matrices 7 0.2 Systems of Linear Equations: Matrices OBJECTIVES Write the Augmente Matrix of a System of Linear Equations 2 Write the System from the Augmente Matrix

More information

On Adaboost and Optimal Betting Strategies

On Adaboost and Optimal Betting Strategies On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore

More information

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION MAXIMUM-LIKELIHOOD ESTIMATION The General Theory of M-L Estimation In orer to erive an M-L estimator, we are boun to make an assumption about the functional form of the istribution which generates the

More information

Math 230.01, Fall 2012: HW 1 Solutions

Math 230.01, Fall 2012: HW 1 Solutions Math 3., Fall : HW Solutions Problem (p.9 #). Suppose a wor is picke at ranom from this sentence. Fin: a) the chance the wor has at least letters; SOLUTION: All wors are equally likely to be chosen. The

More information

Given three vectors A, B, andc. We list three products with formula (A B) C = B(A C) A(B C); A (B C) =B(A C) C(A B);

Given three vectors A, B, andc. We list three products with formula (A B) C = B(A C) A(B C); A (B C) =B(A C) C(A B); 1.1.4. Prouct of three vectors. Given three vectors A, B, anc. We list three proucts with formula (A B) C = B(A C) A(B C); A (B C) =B(A C) C(A B); a 1 a 2 a 3 (A B) C = b 1 b 2 b 3 c 1 c 2 c 3 where the

More information

Inverse Trig Functions

Inverse Trig Functions Inverse Trig Functions c A Math Support Center Capsule February, 009 Introuction Just as trig functions arise in many applications, so o the inverse trig functions. What may be most surprising is that

More information

Modelling and Resolving Software Dependencies

Modelling and Resolving Software Dependencies June 15, 2005 Abstract Many Linux istributions an other moern operating systems feature the explicit eclaration of (often complex) epenency relationships between the pieces of software

More information

Ch 10. Arithmetic Average Options and Asian Opitons

Ch 10. Arithmetic Average Options and Asian Opitons Ch 10. Arithmetic Average Options an Asian Opitons I. Asian Option an the Analytic Pricing Formula II. Binomial Tree Moel to Price Average Options III. Combination of Arithmetic Average an Reset Options

More information

Differentiability of Exponential Functions

Differentiability of Exponential Functions Differentiability of Exponential Functions Philip M. Anselone an John W. Lee Philip Anselone (panselone@actionnet.net) receive his Ph.D. from Oregon State in 1957. After a few years at Johns Hopkins an

More information

BV has the bounded approximation property

BV has the bounded approximation property The Journal of Geometric Analysis volume 15 (2005), number 1, pp. 1-7 [version, April 14, 2005] BV has the boune approximation property G. Alberti, M. Csörnyei, A. Pe lczyński, D. Preiss Abstract: We prove

More information

Mannheim curves in the three-dimensional sphere

Mannheim curves in the three-dimensional sphere Mannheim curves in the three-imensional sphere anju Kahraman, Mehmet Öner Manisa Celal Bayar University, Faculty of Arts an Sciences, Mathematics Department, Muraiye Campus, 5, Muraiye, Manisa, urkey.

More information

Continued Fractions and the Euclidean Algorithm

Continued Fractions and the Euclidean Algorithm Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction

More information

arxiv:math/0202219v1 [math.co] 21 Feb 2002

arxiv:math/0202219v1 [math.co] 21 Feb 2002 RESTRICTED PERMUTATIONS BY PATTERNS OF TYPE (2, 1) arxiv:math/0202219v1 [math.co] 21 Feb 2002 TOUFIK MANSOUR LaBRI (UMR 5800), Université Bordeaux 1, 351 cours de la Libération, 33405 Talence Cedex, France

More information

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sewoong Oh an Anrea Montanari Electrical Engineering an Statistics Department Stanfor University, Stanfor,

More information

Web Appendices to Selling to Overcon dent Consumers

Web Appendices to Selling to Overcon dent Consumers Web Appenices to Selling to Overcon ent Consumers Michael D. Grubb MIT Sloan School of Management Cambrige, MA 02142 mgrubbmit.eu www.mit.eu/~mgrubb May 2, 2008 B Option Pricing Intuition This appenix

More information

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations This page may be remove to conceal the ientities of the authors An intertemporal moel of the real exchange rate, stock market, an international ebt ynamics: policy simulations Saziye Gazioglu an W. Davi

More information

Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany

Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany Parameterize Algorithms for -Hitting Set: the Weighte Case Henning Fernau Trierer Forschungsberichte; Trier: Technical Reports Informatik / Mathematik No. 08-6, July 2008 Univ. Trier, FB 4 Abteilung Informatik

More information

Inner Product Spaces

Inner Product Spaces Math 571 Inner Product Spaces 1. Preliminaries An inner product space is a vector space V along with a function, called an inner product which associates each pair of vectors u, v with a scalar u, v, and

More information

Sensitivity Analysis of Non-linear Performance with Probability Distortion

Sensitivity Analysis of Non-linear Performance with Probability Distortion Preprints of the 19th Worl Congress The International Feeration of Automatic Control Cape Town, South Africa. August 24-29, 214 Sensitivity Analysis of Non-linear Performance with Probability Distortion

More information

MATH 4330/5330, Fourier Analysis Section 11, The Discrete Fourier Transform

MATH 4330/5330, Fourier Analysis Section 11, The Discrete Fourier Transform MATH 433/533, Fourier Analysis Section 11, The Discrete Fourier Transform Now, instead of considering functions defined on a continuous domain, like the interval [, 1) or the whole real line R, we wish

More information

INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS

INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS STEVEN P. LALLEY AND ANDREW NOBEL Abstract. It is shown that there are no consistent decision rules for the hypothesis testing problem

More information

Web Appendices of Selling to Overcon dent Consumers

Web Appendices of Selling to Overcon dent Consumers Web Appenices of Selling to Overcon ent Consumers Michael D. Grubb A Option Pricing Intuition This appenix provies aitional intuition base on option pricing for the result in Proposition 2. Consier the

More information

Optimal Energy Commitments with Storage and Intermittent Supply

Optimal Energy Commitments with Storage and Intermittent Supply Submitte to Operations Research manuscript OPRE-2009-09-406 Optimal Energy Commitments with Storage an Intermittent Supply Jae Ho Kim Department of Electrical Engineering, Princeton University, Princeton,

More information

DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS

DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS ASHER M. KACH, KAREN LANGE, AND REED SOLOMON Abstract. We construct two computable presentations of computable torsion-free abelian groups, one of isomorphism

More information

Mathematics Review for Economists

Mathematics Review for Economists Mathematics Review for Economists by John E. Floy University of Toronto May 9, 2013 This ocument presents a review of very basic mathematics for use by stuents who plan to stuy economics in grauate school

More information

Answers to the Practice Problems for Test 2

Answers to the Practice Problems for Test 2 Answers to the Practice Problems for Test 2 Davi Murphy. Fin f (x) if it is known that x [f(2x)] = x2. By the chain rule, x [f(2x)] = f (2x) 2, so 2f (2x) = x 2. Hence f (2x) = x 2 /2, but the lefthan

More information

UNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH

UNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH UNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH OLIVIER BERNARDI AND ÉRIC FUSY Abstract. This article presents unifie bijective constructions for planar maps, with control on the face egrees

More information

The one-year non-life insurance risk

The one-year non-life insurance risk The one-year non-life insurance risk Ohlsson, Esbjörn & Lauzeningks, Jan Abstract With few exceptions, the literature on non-life insurance reserve risk has been evote to the ultimo risk, the risk in the

More information

Exponential Functions: Differentiation and Integration. The Natural Exponential Function

Exponential Functions: Differentiation and Integration. The Natural Exponential Function 46_54.q //4 :59 PM Page 5 5 CHAPTER 5 Logarithmic, Eponential, an Other Transcenental Functions Section 5.4 f () = e f() = ln The inverse function of the natural logarithmic function is the natural eponential

More information

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market RATIO MATHEMATICA 25 (2013), 29 46 ISSN:1592-7415 Optimal Control Policy of a Prouction an Inventory System for multi-prouct in Segmente Market Kuleep Chauhary, Yogener Singh, P. C. Jha Department of Operational

More information

1. Prove that the empty set is a subset of every set.

1. Prove that the empty set is a subset of every set. 1. Prove that the empty set is a subset of every set. Basic Topology Written by Men-Gen Tsai email: b89902089@ntu.edu.tw Proof: For any element x of the empty set, x is also an element of every set since

More information

FUNCTIONAL ANALYSIS LECTURE NOTES: QUOTIENT SPACES

FUNCTIONAL ANALYSIS LECTURE NOTES: QUOTIENT SPACES FUNCTIONAL ANALYSIS LECTURE NOTES: QUOTIENT SPACES CHRISTOPHER HEIL 1. Cosets and the Quotient Space Any vector space is an abelian group under the operation of vector addition. So, if you are have studied

More information

Which Networks Are Least Susceptible to Cascading Failures?

Which Networks Are Least Susceptible to Cascading Failures? Which Networks Are Least Susceptible to Cascaing Failures? Larry Blume Davi Easley Jon Kleinberg Robert Kleinberg Éva Taros July 011 Abstract. The resilience of networks to various types of failures is

More information

6.2 Permutations continued

6.2 Permutations continued 6.2 Permutations continued Theorem A permutation on a finite set A is either a cycle or can be expressed as a product (composition of disjoint cycles. Proof is by (strong induction on the number, r, of

More information

FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z

FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z DANIEL BIRMAJER, JUAN B GIL, AND MICHAEL WEINER Abstract We consider polynomials with integer coefficients and discuss their factorization

More information

HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)!

HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)! Math 7 Fall 205 HOMEWORK 5 SOLUTIONS Problem. 2008 B2 Let F 0 x = ln x. For n 0 and x > 0, let F n+ x = 0 F ntdt. Evaluate n!f n lim n ln n. By directly computing F n x for small n s, we obtain the following

More information

Stationary random graphs on Z with prescribed iid degrees and finite mean connections

Stationary random graphs on Z with prescribed iid degrees and finite mean connections Stationary random graphs on Z with prescribed iid degrees and finite mean connections Maria Deijfen Johan Jonasson February 2006 Abstract Let F be a probability distribution with support on the non-negative

More information

Department of Mathematical Sciences, University of Copenhagen. Kandidat projekt i matematik. Jens Jakob Kjær. Golod Complexes

Department of Mathematical Sciences, University of Copenhagen. Kandidat projekt i matematik. Jens Jakob Kjær. Golod Complexes F A C U L T Y O F S C I E N C E U N I V E R S I T Y O F C O P E N H A G E N Department of Mathematical Sciences, University of Copenhagen Kaniat projekt i matematik Jens Jakob Kjær Golo Complexes Avisor:

More information

1 VECTOR SPACES AND SUBSPACES

1 VECTOR SPACES AND SUBSPACES 1 VECTOR SPACES AND SUBSPACES What is a vector? Many are familiar with the concept of a vector as: Something which has magnitude and direction. an ordered pair or triple. a description for quantities such

More information

2. Properties of Functions

2. Properties of Functions 2. PROPERTIES OF FUNCTIONS 111 2. Properties of Funtions 2.1. Injetions, Surjetions, an Bijetions. Definition 2.1.1. Given f : A B 1. f is one-to-one (short han is 1 1) or injetive if preimages are unique.

More information

minimal polyonomial Example

minimal polyonomial Example Minimal Polynomials Definition Let α be an element in GF(p e ). We call the monic polynomial of smallest degree which has coefficients in GF(p) and α as a root, the minimal polyonomial of α. Example: We

More information

Data Center Power System Reliability Beyond the 9 s: A Practical Approach

Data Center Power System Reliability Beyond the 9 s: A Practical Approach Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical

More information

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5 Binomial Moel Hull, Chapter 11 + ections 17.1 an 17.2 Aitional reference: John Cox an Mark Rubinstein, Options Markets, Chapter 5 1. One-Perio Binomial Moel Creating synthetic options (replicating options)

More information

The Quick Calculus Tutorial

The Quick Calculus Tutorial The Quick Calculus Tutorial This text is a quick introuction into Calculus ieas an techniques. It is esigne to help you if you take the Calculus base course Physics 211 at the same time with Calculus I,

More information

MATH10040 Chapter 2: Prime and relatively prime numbers

MATH10040 Chapter 2: Prime and relatively prime numbers MATH10040 Chapter 2: Prime and relatively prime numbers Recall the basic definition: 1. Prime numbers Definition 1.1. Recall that a positive integer is said to be prime if it has precisely two positive

More information

CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e.

CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e. CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e. This chapter contains the beginnings of the most important, and probably the most subtle, notion in mathematical analysis, i.e.,

More information

CURRENCY OPTION PRICING II

CURRENCY OPTION PRICING II Jones Grauate School Rice University Masa Watanabe INTERNATIONAL FINANCE MGMT 657 Calibrating the Binomial Tree to Volatility Black-Scholes Moel for Currency Options Properties of the BS Moel Option Sensitivity

More information

What is Linear Programming?

What is Linear Programming? Chapter 1 What is Linear Programming? An optimization problem usually has three essential ingredients: a variable vector x consisting of a set of unknowns to be determined, an objective function of x to

More information

Notes on tangents to parabolas

Notes on tangents to parabolas Notes on tangents to parabolas (These are notes for a talk I gave on 2007 March 30.) The point of this talk is not to publicize new results. The most recent material in it is the concept of Bézier curves,

More information

Notes on Determinant

Notes on Determinant ENGG2012B Advanced Engineering Mathematics Notes on Determinant Lecturer: Kenneth Shum Lecture 9-18/02/2013 The determinant of a system of linear equations determines whether the solution is unique, without

More information

Measures of distance between samples: Euclidean

Measures of distance between samples: Euclidean 4- Chapter 4 Measures of istance between samples: Eucliean We will be talking a lot about istances in this book. The concept of istance between two samples or between two variables is funamental in multivariate

More information

a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.

a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2. Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given

More information

Lecture L25-3D Rigid Body Kinematics

Lecture L25-3D Rigid Body Kinematics J. Peraire, S. Winall 16.07 Dynamics Fall 2008 Version 2.0 Lecture L25-3D Rigi Boy Kinematics In this lecture, we consier the motion of a 3D rigi boy. We shall see that in the general three-imensional

More information

Risk Adjustment for Poker Players

Risk Adjustment for Poker Players Risk Ajustment for Poker Players William Chin DePaul University, Chicago, Illinois Marc Ingenoso Conger Asset Management LLC, Chicago, Illinois September, 2006 Introuction In this article we consier risk

More information

NOTES ON LINEAR TRANSFORMATIONS

NOTES ON LINEAR TRANSFORMATIONS NOTES ON LINEAR TRANSFORMATIONS Definition 1. Let V and W be vector spaces. A function T : V W is a linear transformation from V to W if the following two properties hold. i T v + v = T v + T v for all

More information

Generating Elementary Combinatorial Objects

Generating Elementary Combinatorial Objects Fall 2009 Combinatorial Generation Combinatorial Generation: an old subject Excerpt from: D. Knuth, History of Combinatorial Generation, in pre-fascicle 4B, The Art of Computer Programming Vol 4. Combinatorial

More information

A Comparison of Performance Measures for Online Algorithms

A Comparison of Performance Measures for Online Algorithms A Comparison of Performance Measures for Online Algorithms Joan Boyar 1, Sany Irani 2, an Kim S. Larsen 1 1 Department of Mathematics an Computer Science, University of Southern Denmark, Campusvej 55,

More information

11 CHAPTER 11: FOOTINGS

11 CHAPTER 11: FOOTINGS CHAPTER ELEVEN FOOTINGS 1 11 CHAPTER 11: FOOTINGS 11.1 Introuction Footings are structural elements that transmit column or wall loas to the unerlying soil below the structure. Footings are esigne to transmit

More information

Optimal Control Of Production Inventory Systems With Deteriorating Items And Dynamic Costs

Optimal Control Of Production Inventory Systems With Deteriorating Items And Dynamic Costs Applie Mathematics E-Notes, 8(2008), 194-202 c ISSN 1607-2510 Available free at mirror sites of http://www.math.nthu.eu.tw/ amen/ Optimal Control Of Prouction Inventory Systems With Deteriorating Items

More information

Similarity and Diagonalization. Similar Matrices

Similarity and Diagonalization. Similar Matrices MATH022 Linear Algebra Brief lecture notes 48 Similarity and Diagonalization Similar Matrices Let A and B be n n matrices. We say that A is similar to B if there is an invertible n n matrix P such that

More information

SOLUTIONS TO EXERCISES FOR. MATHEMATICS 205A Part 3. Spaces with special properties

SOLUTIONS TO EXERCISES FOR. MATHEMATICS 205A Part 3. Spaces with special properties SOLUTIONS TO EXERCISES FOR MATHEMATICS 205A Part 3 Fall 2008 III. Spaces with special properties III.1 : Compact spaces I Problems from Munkres, 26, pp. 170 172 3. Show that a finite union of compact subspaces

More information

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are

More information

Optimal shift scheduling with a global service level constraint

Optimal shift scheduling with a global service level constraint Optimal shift scheduling with a global service level constraint Ger Koole & Erik van der Sluis Vrije Universiteit Division of Mathematics and Computer Science De Boelelaan 1081a, 1081 HV Amsterdam The

More information

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem

More information

How To Find Out How To Calculate Volume Of A Sphere

How To Find Out How To Calculate Volume Of A Sphere Contents High-Dimensional Space. Properties of High-Dimensional Space..................... 4. The High-Dimensional Sphere......................... 5.. The Sphere an the Cube in Higher Dimensions...........

More information

SEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS. Nickolay Khadzhiivanov, Nedyalko Nenov

SEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS. Nickolay Khadzhiivanov, Nedyalko Nenov Serdica Math. J. 30 (2004), 95 102 SEQUENCES OF MAXIMAL DEGREE VERTICES IN GRAPHS Nickolay Khadzhiivanov, Nedyalko Nenov Communicated by V. Drensky Abstract. Let Γ(M) where M V (G) be the set of all vertices

More information

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS Systems of Equations and Matrices Representation of a linear system The general system of m equations in n unknowns can be written a x + a 2 x 2 + + a n x n b a

More information

A New Evaluation Measure for Information Retrieval Systems

A New Evaluation Measure for Information Retrieval Systems A New Evaluation Measure for Information Retrieval Systems Martin Mehlitz martin.mehlitz@ai-labor.e Christian Bauckhage Deutsche Telekom Laboratories christian.bauckhage@telekom.e Jérôme Kunegis jerome.kunegis@ai-labor.e

More information

1 Formulating The Low Degree Testing Problem

1 Formulating The Low Degree Testing Problem 6.895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Linearity Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz In the last lecture, we proved a weak PCP Theorem,

More information

Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks

Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks Low-Complexity an Distribute Energy inimization in ulti-hop Wireless Networks Longbi Lin, Xiaojun Lin, an Ness B. Shroff Center for Wireless Systems an Applications (CWSA) School of Electrical an Computer

More information

Kevin James. MTHSC 412 Section 2.4 Prime Factors and Greatest Comm

Kevin James. MTHSC 412 Section 2.4 Prime Factors and Greatest Comm MTHSC 412 Section 2.4 Prime Factors and Greatest Common Divisor Greatest Common Divisor Definition Suppose that a, b Z. Then we say that d Z is a greatest common divisor (gcd) of a and b if the following

More information

5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1

5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 General Integer Linear Program: (ILP) min c T x Ax b x 0 integer Assumption: A, b integer The integrality condition

More information

I. Pointwise convergence

I. Pointwise convergence MATH 40 - NOTES Sequences of functions Pointwise and Uniform Convergence Fall 2005 Previously, we have studied sequences of real numbers. Now we discuss the topic of sequences of real valued functions.

More information

A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements

A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements International Journal of nowlege an Systems Science, 3(), -7, January-March 0 A lame-ase Approach to Generating Proposals for Hanling Inconsistency in Software Requirements eian Mu, Peking University,

More information

BANACH AND HILBERT SPACE REVIEW

BANACH AND HILBERT SPACE REVIEW BANACH AND HILBET SPACE EVIEW CHISTOPHE HEIL These notes will briefly review some basic concepts related to the theory of Banach and Hilbert spaces. We are not trying to give a complete development, but

More information

1 = (a 0 + b 0 α) 2 + + (a m 1 + b m 1 α) 2. for certain elements a 0,..., a m 1, b 0,..., b m 1 of F. Multiplying out, we obtain

1 = (a 0 + b 0 α) 2 + + (a m 1 + b m 1 α) 2. for certain elements a 0,..., a m 1, b 0,..., b m 1 of F. Multiplying out, we obtain Notes on real-closed fields These notes develop the algebraic background needed to understand the model theory of real-closed fields. To understand these notes, a standard graduate course in algebra is

More information

State of Louisiana Office of Information Technology. Change Management Plan

State of Louisiana Office of Information Technology. Change Management Plan State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change

More information

it is easy to see that α = a

it is easy to see that α = a 21. Polynomial rings Let us now turn out attention to determining the prime elements of a polynomial ring, where the coefficient ring is a field. We already know that such a polynomial ring is a UF. Therefore

More information

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND art I. robobabilystic Moels Computer Moelling an New echnologies 27 Vol. No. 2-3 ransport an elecommunication Institute omonosova iga V-9 atvia MOEING OF WO AEGIE IN INVENOY CONO YEM WIH ANOM EA IME AN

More information

Undergraduate Notes in Mathematics. Arkansas Tech University Department of Mathematics

Undergraduate Notes in Mathematics. Arkansas Tech University Department of Mathematics Undergraduate Notes in Mathematics Arkansas Tech University Department of Mathematics An Introductory Single Variable Real Analysis: A Learning Approach through Problem Solving Marcel B. Finan c All Rights

More information

Search Advertising Based Promotion Strategies for Online Retailers

Search Advertising Based Promotion Strategies for Online Retailers Search Avertising Base Promotion Strategies for Online Retailers Amit Mehra The Inian School of Business yeraba, Inia Amit Mehra@isb.eu ABSTRACT Web site aresses of small on line retailers are often unknown

More information

Catalan Numbers. Thomas A. Dowling, Department of Mathematics, Ohio State Uni- versity.

Catalan Numbers. Thomas A. Dowling, Department of Mathematics, Ohio State Uni- versity. 7 Catalan Numbers Thomas A. Dowling, Department of Mathematics, Ohio State Uni- Author: versity. Prerequisites: The prerequisites for this chapter are recursive definitions, basic counting principles,

More information

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1. MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column

More information

Systems of Linear Equations

Systems of Linear Equations Systems of Linear Equations Beifang Chen Systems of linear equations Linear systems A linear equation in variables x, x,, x n is an equation of the form a x + a x + + a n x n = b, where a, a,, a n and

More information

I. GROUPS: BASIC DEFINITIONS AND EXAMPLES

I. GROUPS: BASIC DEFINITIONS AND EXAMPLES I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called

More information

The wave equation is an important tool to study the relation between spectral theory and geometry on manifolds. Let U R n be an open set and let

The wave equation is an important tool to study the relation between spectral theory and geometry on manifolds. Let U R n be an open set and let 1. The wave equation The wave equation is an important tool to stuy the relation between spectral theory an geometry on manifols. Let U R n be an open set an let = n j=1 be the Eucliean Laplace operator.

More information

Recursive Algorithms. Recursion. Motivating Example Factorial Recall the factorial function. { 1 if n = 1 n! = n (n 1)! if n > 1

Recursive Algorithms. Recursion. Motivating Example Factorial Recall the factorial function. { 1 if n = 1 n! = n (n 1)! if n > 1 Recursion Slides by Christopher M Bourke Instructor: Berthe Y Choueiry Fall 007 Computer Science & Engineering 35 Introduction to Discrete Mathematics Sections 71-7 of Rosen cse35@cseunledu Recursive Algorithms

More information

NEAR-FIELD TO FAR-FIELD TRANSFORMATION WITH PLANAR SPIRAL SCANNING

NEAR-FIELD TO FAR-FIELD TRANSFORMATION WITH PLANAR SPIRAL SCANNING Progress In Electromagnetics Research, PIER 73, 49 59, 27 NEAR-FIELD TO FAR-FIELD TRANSFORMATION WITH PLANAR SPIRAL SCANNING S. Costanzo an G. Di Massa Dipartimento i Elettronica Informatica e Sistemistica

More information

Sample Induction Proofs

Sample Induction Proofs Math 3 Worksheet: Induction Proofs III, Sample Proofs A.J. Hildebrand Sample Induction Proofs Below are model solutions to some of the practice problems on the induction worksheets. The solutions given

More information

No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics

No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics No: 10 04 Bilkent University Monotonic Extension Farhad Husseinov Discussion Papers Department of Economics The Discussion Papers of the Department of Economics are intended to make the initial results

More information

On the representability of the bi-uniform matroid

On the representability of the bi-uniform matroid On the representability of the bi-uniform matroid Simeon Ball, Carles Padró, Zsuzsa Weiner and Chaoping Xing August 3, 2012 Abstract Every bi-uniform matroid is representable over all sufficiently large

More information

Calculus Refresher, version 2008.4. c 1997-2008, Paul Garrett, garrett@math.umn.edu http://www.math.umn.edu/ garrett/

Calculus Refresher, version 2008.4. c 1997-2008, Paul Garrett, garrett@math.umn.edu http://www.math.umn.edu/ garrett/ Calculus Refresher, version 2008.4 c 997-2008, Paul Garrett, garrett@math.umn.eu http://www.math.umn.eu/ garrett/ Contents () Introuction (2) Inequalities (3) Domain of functions (4) Lines (an other items

More information

Safety Stock or Excess Capacity: Trade-offs under Supply Risk

Safety Stock or Excess Capacity: Trade-offs under Supply Risk Safety Stock or Excess Capacity: Trae-offs uner Supply Risk Aahaar Chaturvei Victor Martínez-e-Albéniz IESE Business School, University of Navarra Av. Pearson, 08034 Barcelona, Spain achaturvei@iese.eu

More information

Section 3.3. Differentiation of Polynomials and Rational Functions. Difference Equations to Differential Equations

Section 3.3. Differentiation of Polynomials and Rational Functions. Difference Equations to Differential Equations Difference Equations to Differential Equations Section 3.3 Differentiation of Polynomials an Rational Functions In tis section we begin te task of iscovering rules for ifferentiating various classes of

More information

T ( a i x i ) = a i T (x i ).

T ( a i x i ) = a i T (x i ). Chapter 2 Defn 1. (p. 65) Let V and W be vector spaces (over F ). We call a function T : V W a linear transformation form V to W if, for all x, y V and c F, we have (a) T (x + y) = T (x) + T (y) and (b)

More information