QUESTIONS, How can quantum computers do the amazing things that they are able to do, such. cryptography quantum computers

Size: px
Start display at page:

Download "QUESTIONS, How can quantum computers do the amazing things that they are able to do, such. cryptography quantum computers"

Transcription

1 2O cryptography quantum computers cryptography quantum computers QUESTIONS, Quantum Computers, and Cryptography A mathematcal metaphor for the power of quantum algorthms Mark Ettnger How can quantum computers do the amazng thngs that they are able to do, such as factorng large numbers and fndng dscrete logarthms? What makes them so dfferent from classcal computers? These questons are often asked, and they have proved to be surprsngly dffcult to answer at least to the satsfacton of everyone! In ths short artcle, I ll try to address these questons by comparng the operaton of a quantum computer wth playng the game of 20 questons But frst, let s consder an unusual perspectve on computers n general What Is a Computer? Well, a computer s really just some physcal machne that you prepare n a certan way, manpulate n certan ways, and then watch to observe the results t dsplays That s how physcsts mght descrbe the entre physcal process that mathematcans call a computaton Ths vew seems a bt strange at frst because we have become accustomed to the more abstract vew of the computer scentst, who sees a computaton as a certan type of process that acts on an nput n order to produce an output But our physcal descrpton s not really so dfferent It just emphaszes the physcal nature of the computaton, somethng that falls by the waysde n the abstracted vew The ntal preparaton s what a computer scentst calls an nput, the actual computaton s the physcal manpulaton, and the observaton at the end results n gettng the output So, whereas a computaton can be vewed abstractly as a process, ts physcal nature can also be emphaszed Ths vew wll help us make the transton to understandng what a quantum machne s dong n a specal way Unlke classcal computers, whch are physcal devces manpulated accordng to the laws of classcal physcs, quantum computers are physcal devces manpulated accordng to the laws of quantum physcs 46 Los Alamos Scence Number

2 Quantum Computers and the 20 Questons Game Havng understood that a computaton s ultmately a physcal process, let s go on to see how usng a quantum machne s much lke playng the game of 20 questons Twenty questons s played as follows I thnk of a number between and 2 20 You try to guess my secret number by askng questons such as, Is your secret number less than 2378? If you ask your questons well, you can guess my secret number n, at the most, 20 questons Why? Well, wth each queston, you can elmnate half of the remanng canddates Computer scentsts call ths process bnary search, and t allows you to fnd a secret number less than 2 n n log 2 n = n questons at the most The key dea s that, by cuttng the number of possbltes n half wth each queston, you are left wth one possblty after only n questons Ths prncple generalzes For example, f you are searchng for a secret tem among N possbltes and wth each queston you are able to elmnate a fracton /c of the possbltes, then you can fnd the secret n log c N questons In general, you mght not be lookng for a number You mght be lookng for a secret element x n a set S called a search space The key to quck success s stll to be able to elmnate a constant fracton of the remanng canddates Now, let s consder a slghtly dfferent verson of ths game, whch we call random 20 questons In playng random 20 questons, you don t get to choose your queston Instead, you randomly select a subset Q (used for the word queston ) consstng of half of the N elements n the search space, and you ask, Is the secret element n Q? After I gve you the honest answer, you choose a new random subset Q and ask agan Surprsngly, agan after only about log N questons, you wll almost surely have narrowed the possbltes down to the one correct answer We say almost surely because there s a tny, tny chance that you wll get unlucky and never be able to elmnate one of the elements that s not the secret element Ths tny chance s the result of each queston havng been selected randomly rather than determnstcally, whch s the case when playng the orgnal 20 questons game After 2 log N questons, for example, that possblty s ncredbly small So, even by askng random questons, you can dscover the secret element quckly The reason s that, as n the orgnal 20 questons game, you are able to elmnate each ncorrect element as a possblty Although n the random 20 questons game ths process of elmnaton s only very hghly probable, t s so close to beng certan that, for all practcal purposes, we won t worry about t Now, let s talk about playng quantum 20 questons In ths game, I choose a secret quantum state ρ from a search space of quantum states S ={ρ, ρ 2, ρ Ν }, and I supply a copy of the secret state whenever you request one Your task s to dscover my secret quantum state by askng quantum questons, that s, by dong measurements on each requested quantum state and thus gettng nformaton about the state Now, let s back up a bt and clarfy these terms What s a quantum state? A pure state ψ s smply a vector n a Hlbert space A mxed state, or more smply a state, s a convex combnaton of pure states ψ, that s, a classcal probablstc mxture of pure states: ρ = p ψ ψ, where p = () Number Los Alamos Scence 47

3 Quantum Questons Playng search games s much lke tryng to break codes If you try to break a code, you want to look for a cryptographc key To solve classcal cyptographc problems wth quantum computers, you are lookng for a secret key from among a known set of possble secret keys What s a quantum queston? A quantum queston s typcally called an observable We ll thnk of a quantum queston as smply an orthonormal bass The answer to a quantum queston wll be one of the bass vectors So, suppose the secret quantum state s a pure state ϕ and the quantum queston s { φ, φ 2,, φ Μ }, a bass of the M-dmensonal Hlbert space Accordng to the basc rules of quantum mechancs, we get the answer φ wth probablty φ ϕ 2 If we have a mxed state nstead of a pure state, the probablty formula s extended by convexty, as usual How many quantum questons does t take to guess the secret quantum state? That depends on lots of thngs It depends on what quantum questons you are allowed to ask me And t also depends on how dfferent the states n S are from each other In ths context, the word dfferent means how dstngushable the states are from each other For example, two orthogonal pure states are as dfferent as two states can be Two very nearly parallel pure states are almost ndstngushable n that t takes many experments and questons to tell them apart based on the outcome statstcs The standard measure of smlarty between two pure states s smply ther overlap φ ϕ There are measures for the smlarty or overlap of mxed states as well, but we won t need the formula We just need to know that to tell apart two smlar states requres many experments whereas to tell apart two very dfferent states requres few experments So, gong back to quantum 20 questons, let s assume you can ask any quantum queston you want; that s, you can choose any orthonormal bass as the observable If all the states n S are suffcently dfferent from each other, you can fnd my secret state after only a few questons Usually, when we use the word few n ths context, we mean log S or log 2 S or somethng lke that (A computer scentst would say that few means a polynomal functon of the logarthm of the sze of the search space) The key to a fast search s that all the states must be qute dfferent from each other It turns out that playng search games s much lke tryng to break codes If you try to break a code, you want to look for a cryptographc key The key s what allows you to decpher the code and read the message One popular code s the RSA Named after ts nventors Ronald Rvest, Ad Shamr, and Leonard Adleman the RSA uses as ts key the secret factors of a large number N Now, suppose you are tryng to break a code by fndng a secret key k from among a very large set of possble keys K = {k, k 2, k Μ } Further suppose that, by some process and wthout knowng the key, you can prepare a quantum state ρ correspondng to the key k So, you now have a state ρ, whch you know comes from the search space S ={ρ,, ρ M }, whch s the set of states correspondng to all the possble secret keys, but you don t know exactly whch of the states you have If the states of S are all suffcently dfferent, then you can ask quantum questons to determne the secret state effcently And f you can fnd the secret state, then you can easly fgure out the orgnal secret key correspondng to that secret state! Indeed, ths s precsely how quantum computers would solve varous classcal cryptographc problems, such as factorng and fndng dscrete logarthms A factorng problem s one n whch you are gven a very large number N (say, one wth 2000 dgts), whch s the product of two prmes N = pq, and your task s to fnd p and q For the dscrete logarthm problem, you are gven a large prme number p (say, once agan, one wth 2000 dgts) and two numbers a and b less than p Your task s to fnd n such that a n = b (mod p) In both cases, you are lookng for a secret key k from among a known set of possble secret keys Also, n both cases there s a process by whch you can prepare a quantum state from whch k can be deduced Sgnfcantly, ths preparaton process does not requre knowng k Ths last pont s mportant because, f you had to know the key frst, then the codebreakng machne would not be very useful We wll later llustrate ths process n an 48 Los Alamos Scence Number

4 example (see the secton Smon s Problem ) Fnally, ths process has the specal and mportant qualty that, for two dfferent keys, k and k 2, the resultng quantum states, ρ and ρ 2, are qute dfferent, or clearly dstngushable from one another, as dscussed before We can therefore ask quantum questons, whch allow us to dstngush among states and dentfy secret keys Ths ablty to dstngush among the states s usually accomplshed by elmnatng the possblty of a constant fracton, say /2, of the remanng states As we saw n the game of 20 questons, elmnatng a constant fracton after each queston allows us to narrow the possble states down to the one true state n only log N questons However, snce the quantum formula gves probabltes for certan outcomes, we elmnate the false states wth hgh probablty (not wth certanty), as n the game of random 20 questons Identfyng Secret Quantum States Let us fll n some of the techncal detals of our sketch Frst, can we really ask any quantum queston? No, we can t, but fortunately we are able to ask the questons that let us solve factorng and dscrete logarthm problems Recallng our observaton that a computaton s actually a physcal process, we must be sure to carry out effcently the physcal process correspondng to the quantum queston we wsh to ask We accomplsh ths task by breakng down the observable nto elementary quantum gates Elementary quantum gates are analogous to the basc logcal gates and, or, and not, whch are the buldng blocks of crcuts n classcal computers (for more detals, see Shor 997) In the case of factorng and dscrete logarthm problems, t turns out that we have to ask only one quantum queston over and over agan n order to obtan enough nformaton for dentfyng the secret quantum state Called the quantum Fourer transform, ths quantum queston allows us to dstngush among the states that arse n the two search spaces for the factorng and dscrete logarthm problems These states are called hdden subgroup states because, n those problems, the key we are lookng for corresponds to an unknown subgroup H of a fnte abelan group G The search space corresponds to the set {ρ Η, ρ H2, ρ H }, where H to H s a range over all the possble subgroups of G, and ρ H s the mxed state that corresponds to a unform mxture of the pure coset states In factorng and dscrete logarthm problems, we must ask only one quantum queston over and over agan n order to obtan nformaton for dentfyng the secret quantum state c + Η = c + h H h H (2) It can be shown that for H and H 2, two dfferent subgroups, the correspondng states ρ Η and ρ H2 are suffcently dfferent Mathematcally speakng, the overlap of ρ Η and ρ H2 s less than /2 (Ettnger et al 999) For a dscusson of the hdden subgroup problem and the reasons why the quantum Fourer transform s the rght quantum queston, see Ettnger and Peter Hoyer (999) Smon s Problem To llustrate everythng we have dscussed, let s consder a concrete example known as Smon s problem Smon s problem and the quantum algorthm to solve t contan the essence of what s gong on n the factorng and dscrete logarthm problems; the latter set of problems, however, also contans a number of techncal twsts that obscure the man deas The set of all bt strngs of length n, denoted Z 2 n, s a commutatve group f Number Los Alamos Scence 49

5 Our quantum algorthm for solvng Smon s problem allows dstngushng among dfferent states and thus dscoverng the underlyng secret bt strng we add bt strngs usng bnary add wthout carry Ths group wll be our search space I wll secretly choose an element s of ths group and provde you wth a functon n the form of a black box, f s on Z 2 n, wth the followng specal property: I guarantee that f s (x) =f s (y) f and only f x y = s So, the functon f s encodes the secret bt strng s Because f depends entrely on s, the latter becomes a subscrpt on f If you compute the functon on the elements of the group f s (a), f s (b), f s (c), eventually you ll get a collson, whch means that you ll fnd f s (g) =f s (t) and then you ll know that the secret bt strng s s = g t But notce that the search space, or the group, has 2 n elements, whch s a very large number In the worst case, t could take you 2 n + calculatons to get a collson, and on average t wll take about 2 n/2 because of the so-called brthday paradox That s stll a lot of tme! But the quantum algorthm can solve ths problem much more quckly n about n tres only Here s how Smon s problem works: You start wth a quantum computer whose qubts are conceptually dvded nto two regsters Then you prepare the pure state ψ = /2 n/2 b b, where b Z 2 n Thus, n the frst regster, there s a superposton of all the bs Now, because you have the black box functon f s, you can compute f s (b) n the second regster to obtan the pure state ψ s = /2 n/2 b b f s (b), where agan b Z 2 n Notce that ths procedure for preparng the state ψ s s easly accomplshed wthout any knowledge of the secret bt strng s Of course, for dfferent secret bt strngs, we obtan dfferent states In fact, ths s the key pont Our quantum algorthm s really just a method used to dstngush among these dfferent states and thus dscover the underlyng secret bt strng We now observe, or perform a measurement, on the second regster Because of the way quantum mechancs works, ths observaton collapses ψ s, producng a specfc value n the second regster, say c, and the frst regster s left n a superposton of bt strngs that map to c under f s Because f s has the specal property descrbed earler, the bt strngs that map to c wll dffer by the secret bt strng s Therefore, the state of the computer s ψ = a c + a + s c as, 2 2, (3) where a and a + s are elements of Z 2 n such that f s (a) = c and f s (a + s) =c The only use of the second regster s to produce ths specal superposton n the frst regster We wll no longer use the second regster or ts contents, so we drop t from our notaton and wrte ψ = a + a + s as, 2 2 When c s chosen, the resultng mxed state can be wrtten as ρs = ψ ψ n as as 2,, a Recall that we don t know the secret bt strng s, and therefore we don t know that the state we just prepared s ρ s All we know s that we have prepared a state that s n the search space of quantum states {ρ s } s Z2 n Each of these possble quantum states corresponds to a possble secret bt strng Our task s to dentfy the secret quantum state (4) (5) The brthday paradox derves ts name from the surprsng result that you only need 23 people (a slghtly larger number than 365 /2 ) to have a 50 percent chance that at least two of them have the same brthday 50 Los Alamos Scence Number

6 and thus the secret bt strng We now defne the Fourer observable For each bt strng b n Z 2 n, defne χ b The orthonormal bass s { χ b }, where b Z n 2 s called the Fourer bass or the Fourer observable Mathematcans mght recognze ths bass as beng composed of the characters of the group Z n 2 A character χ of a fnte abelan group s a homomorphsm from the group to the crcle n the complex plane Formally, the Hlbert space n whch we are workng s C[G], the group algebra, whch s the complex vector space wth the canoncal bass, or the pont mass bass, ndexed by the elements of the group A character can be vewed as a vector n C[G] va the followng dentfcaton: χ = n 2 d Z = χ( g) g G g G n 2 bd ( ) d where b d = bd ( 2) It s a fundamental fact (Tolmer et al 997) that the set of characters vewed as vectors n ths way s an orthonormal bass for C[G] Indeed, a Fourer transform s nothng other than a change of bass from the pont mass bass, { g } g G, to the bass of characters, { χ } χ It s easy to show (Jozsa 998) that, f we now observe the contents of the remanng regster n the Fourer bass, we observe χ b wth nonzero probablty f and only f s b = 0 (mod 2) Ths s the mportant relatonshp between the secret bt strng s and the only possble outcomes of the experment Therefore, f the actual outcome of the observaton s χ b, then we have elmnated half of the possble secret states We have therefore elmnated all states ρ d such that d b = (mod 2) By repeatng the state preparaton procedure followed by a measurement n the Fourer bass approxmately n tmes, we elmnate all possble states except the true secret state ρ s, mod (6) (7) Mark Ettnger graduated from the Massachusetts Insttute of Technology n 987 wth Bachelor s degrees n physcs and mathematcs In 996, Mark receved hs PhD n mathematcs from the Unversty of Wsconsn at Madson He frst came to Los Alamos Natonal Laboratory n 993, as a graduate student, then entered the postdoctoral program after graduaton n 996, and became a staff member n 999 Mark worked on the group-theoretcal approach to quantum algorthms for four years and s now prmarly nterested n (classcal) algorthmc problems n postgenomc computatonal bology Further Readng Ettnger, M, and P Hoyer 999 Quantum State Detecton va Elmnaton [Onlne]: (quant-ph/ ) Ettnger, M, P Hoyer, and E Knll 999 Hdden Subgroup States are Almost Orthgonal[Onlne]: (quant-ph/990034) Jozsa, R 998 Quantum Algorthms and the Fourer Transform Proc R Soc London, Ser A 454: 323 Shor, P W 997 Polynomal-Tme Algorthms for Prme Factorzaton and Dscrete Logarthms on Logarthms on a Quantum Computer SIAM J Computng 26: 484 Tolmer, R, M An, and C Lu 997 Mathematcs of Multdmensonal Fourer Transform Algorthms New York: Sprnger Number Los Alamos Scence 5

Implementation of Deutsch's Algorithm Using Mathcad

Implementation of Deutsch's Algorithm Using Mathcad Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

Texas Instruments 30X IIS Calculator

Texas Instruments 30X IIS Calculator Texas Instruments 30X IIS Calculator Keystrokes for the TI-30X IIS are shown for a few topcs n whch keystrokes are unque. Start by readng the Quk Start secton. Then, before begnnng a specfc unt of the

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

Section 5.4 Annuities, Present Value, and Amortization

Section 5.4 Annuities, Present Value, and Amortization Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Laws of Electromagnetism

Laws of Electromagnetism There are four laws of electromagnetsm: Laws of Electromagnetsm The law of Bot-Savart Ampere's law Force law Faraday's law magnetc feld generated by currents n wres the effect of a current on a loop of

More information

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.

More information

Do Hidden Variables. Improve Quantum Mechanics?

Do Hidden Variables. Improve Quantum Mechanics? Radboud Unverstet Njmegen Do Hdden Varables Improve Quantum Mechancs? Bachelor Thess Author: Denns Hendrkx Begeleder: Prof. dr. Klaas Landsman Abstract Snce the dawn of quantum mechancs physcst have contemplated

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

1. Measuring association using correlation and regression

1. Measuring association using correlation and regression How to measure assocaton I: Correlaton. 1. Measurng assocaton usng correlaton and regresson We often would lke to know how one varable, such as a mother's weght, s related to another varable, such as a

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Financial Mathemetics

Financial Mathemetics Fnancal Mathemetcs 15 Mathematcs Grade 12 Teacher Gude Fnancal Maths Seres Overvew In ths seres we am to show how Mathematcs can be used to support personal fnancal decsons. In ths seres we jon Tebogo,

More information

Types of Injuries. (20 minutes) LEARNING OBJECTIVES MATERIALS NEEDED

Types of Injuries. (20 minutes) LEARNING OBJECTIVES MATERIALS NEEDED U N I T 3 Types of Injures (20 mnutes) PURPOSE: To help coaches learn how to recognze the man types of acute and chronc njures. LEARNING OBJECTIVES In ths unt, coaches wll learn how most njures occur,

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES

THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES The goal: to measure (determne) an unknown quantty x (the value of a RV X) Realsaton: n results: y 1, y 2,..., y j,..., y n, (the measured values of Y 1, Y 2,..., Y j,..., Y n ) every result s encumbered

More information

Joe Pimbley, unpublished, 2005. Yield Curve Calculations

Joe Pimbley, unpublished, 2005. Yield Curve Calculations Joe Pmbley, unpublshed, 005. Yeld Curve Calculatons Background: Everythng s dscount factors Yeld curve calculatons nclude valuaton of forward rate agreements (FRAs), swaps, nterest rate optons, and forward

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

We are now ready to answer the question: What are the possible cardinalities for finite fields?

We are now ready to answer the question: What are the possible cardinalities for finite fields? Chapter 3 Fnte felds We have seen, n the prevous chapters, some examples of fnte felds. For example, the resdue class rng Z/pZ (when p s a prme) forms a feld wth p elements whch may be dentfed wth the

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

+ + + - - This circuit than can be reduced to a planar circuit

+ + + - - This circuit than can be reduced to a planar circuit MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to

More information

PERRON FROBENIUS THEOREM

PERRON FROBENIUS THEOREM PERRON FROBENIUS THEOREM R. CLARK ROBINSON Defnton. A n n matrx M wth real entres m, s called a stochastc matrx provded () all the entres m satsfy 0 m, () each of the columns sum to one, m = for all, ()

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

A Probabilistic Theory of Coherence

A Probabilistic Theory of Coherence A Probablstc Theory of Coherence BRANDEN FITELSON. The Coherence Measure C Let E be a set of n propostons E,..., E n. We seek a probablstc measure C(E) of the degree of coherence of E. Intutvely, we want

More information

How Much to Bet on Video Poker

How Much to Bet on Video Poker How Much to Bet on Vdeo Poker Trstan Barnett A queston that arses whenever a gae s favorable to the player s how uch to wager on each event? Whle conservatve play (or nu bet nzes large fluctuatons, t lacks

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

n + d + q = 24 and.05n +.1d +.25q = 2 { n + d + q = 24 (3) n + 2d + 5q = 40 (2)

n + d + q = 24 and.05n +.1d +.25q = 2 { n + d + q = 24 (3) n + 2d + 5q = 40 (2) MATH 16T Exam 1 : Part I (In-Class) Solutons 1. (0 pts) A pggy bank contans 4 cons, all of whch are nckels (5 ), dmes (10 ) or quarters (5 ). The pggy bank also contans a con of each denomnaton. The total

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

where the coordinates are related to those in the old frame as follows.

where the coordinates are related to those in the old frame as follows. Chapter 2 - Cartesan Vectors and Tensors: Ther Algebra Defnton of a vector Examples of vectors Scalar multplcaton Addton of vectors coplanar vectors Unt vectors A bass of non-coplanar vectors Scalar product

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

21 Vectors: The Cross Product & Torque

21 Vectors: The Cross Product & Torque 21 Vectors: The Cross Product & Torque Do not use our left hand when applng ether the rght-hand rule for the cross product of two vectors dscussed n ths chapter or the rght-hand rule for somethng curl

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

14.74 Lecture 5: Health (2)

14.74 Lecture 5: Health (2) 14.74 Lecture 5: Health (2) Esther Duflo February 17, 2004 1 Possble Interventons Last tme we dscussed possble nterventons. Let s take one: provdng ron supplements to people, for example. From the data,

More information

1. Math 210 Finite Mathematics

1. Math 210 Finite Mathematics 1. ath 210 Fnte athematcs Chapter 5.2 and 5.3 Annutes ortgages Amortzaton Professor Rchard Blecksmth Dept. of athematcal Scences Northern Illnos Unversty ath 210 Webste: http://math.nu.edu/courses/math210

More information

Implied (risk neutral) probabilities, betting odds and prediction markets

Implied (risk neutral) probabilities, betting odds and prediction markets Impled (rsk neutral) probabltes, bettng odds and predcton markets Fabrzo Caccafesta (Unversty of Rome "Tor Vergata") ABSTRACT - We show that the well known euvalence between the "fundamental theorem of

More information

L10: Linear discriminants analysis

L10: Linear discriminants analysis L0: Lnear dscrmnants analyss Lnear dscrmnant analyss, two classes Lnear dscrmnant analyss, C classes LDA vs. PCA Lmtatons of LDA Varants of LDA Other dmensonalty reducton methods CSCE 666 Pattern Analyss

More information

CHAPTER 5 RELATIONSHIPS BETWEEN QUANTITATIVE VARIABLES

CHAPTER 5 RELATIONSHIPS BETWEEN QUANTITATIVE VARIABLES CHAPTER 5 RELATIONSHIPS BETWEEN QUANTITATIVE VARIABLES In ths chapter, we wll learn how to descrbe the relatonshp between two quanttatve varables. Remember (from Chapter 2) that the terms quanttatve varable

More information

Using Series to Analyze Financial Situations: Present Value

Using Series to Analyze Financial Situations: Present Value 2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated

More information

Tools for Privacy Preserving Distributed Data Mining

Tools for Privacy Preserving Distributed Data Mining Tools for Prvacy Preservng Dstrbuted Data Mnng hrs lfton, Murat Kantarcoglu, Jadeep Vadya Purdue Unversty Department of omputer Scences 250 N Unversty St West Lafayette, IN 47907-2066 USA (clfton, kanmurat,

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Ring structure of splines on triangulations

Ring structure of splines on triangulations www.oeaw.ac.at Rng structure of splnes on trangulatons N. Vllamzar RICAM-Report 2014-48 www.rcam.oeaw.ac.at RING STRUCTURE OF SPLINES ON TRIANGULATIONS NELLY VILLAMIZAR Introducton For a trangulated regon

More information

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background:

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background: SPEE Recommended Evaluaton Practce #6 efnton of eclne Curve Parameters Background: The producton hstores of ol and gas wells can be analyzed to estmate reserves and future ol and gas producton rates and

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

Lecture 2: Single Layer Perceptrons Kevin Swingler

Lecture 2: Single Layer Perceptrons Kevin Swingler Lecture 2: Sngle Layer Perceptrons Kevn Sngler kms@cs.str.ac.uk Recap: McCulloch-Ptts Neuron Ths vastly smplfed model of real neurons s also knon as a Threshold Logc Unt: W 2 A Y 3 n W n. A set of synapses

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

Thursday, December 10, 2009 Noon - 1:50 pm Faraday 143

Thursday, December 10, 2009 Noon - 1:50 pm Faraday 143 1. ath 210 Fnte athematcs Chapter 5.2 and 4.3 Annutes ortgages Amortzaton Professor Rchard Blecksmth Dept. of athematcal Scences Northern Illnos Unversty ath 210 Webste: http://math.nu.edu/courses/math210

More information

We assume your students are learning about self-regulation (how to change how alert they feel) through the Alert Program with its three stages:

We assume your students are learning about self-regulation (how to change how alert they feel) through the Alert Program with its three stages: Welcome to ALERT BINGO, a fun-flled and educatonal way to learn the fve ways to change engnes levels (Put somethng n your Mouth, Move, Touch, Look, and Lsten) as descrbed n the How Does Your Engne Run?

More information

Semantic Link Analysis for Finding Answer Experts *

Semantic Link Analysis for Finding Answer Experts * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 28, 51-65 (2012) Semantc Lnk Analyss for Fndng Answer Experts * YAO LU 1,2,3, XIAOJUN QUAN 2, JINGSHENG LEI 4, XINGLIANG NI 1,2,3, WENYIN LIU 2,3 AND YINLONG

More information

Usage of LCG/CLCG numbers for electronic gambling applications

Usage of LCG/CLCG numbers for electronic gambling applications Usage of LCG/CLCG numbers for electronc gamblng applcatons Anders Knutsson Smovts Consultng, Wenner-Gren Center, Sveavägen 166, 113 46 Stockholm, Sweden anders.knutsson@smovts.com Abstract. Several attacks

More information

An Overview of Financial Mathematics

An Overview of Financial Mathematics An Overvew of Fnancal Mathematcs Wllam Benedct McCartney July 2012 Abstract Ths document s meant to be a quck ntroducton to nterest theory. It s wrtten specfcally for actuaral students preparng to take

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Computing Arbitrary Functions of Encrypted Data March 2010 Communications of the ACM

Computing Arbitrary Functions of Encrypted Data March 2010 Communications of the ACM Home» Magazne Archve» 2010» No. 3» Computng Arbtrary Functons of Encrypted Data» Full Text RESEARCH HIGHLIGHTS Computng Arbtrary Functons of Encrypted Data Crag Gentry Communcatons of the ACM Vol. 53 No.

More information

Lecture 3: Force of Interest, Real Interest Rate, Annuity

Lecture 3: Force of Interest, Real Interest Rate, Annuity Lecture 3: Force of Interest, Real Interest Rate, Annuty Goals: Study contnuous compoundng and force of nterest Dscuss real nterest rate Learn annuty-mmedate, and ts present value Study annuty-due, and

More information

How To Know The Components Of Mean Squared Error Of Herarchcal Estmator S

How To Know The Components Of Mean Squared Error Of Herarchcal Estmator S S C H E D A E I N F O R M A T I C A E VOLUME 0 0 On Mean Squared Error of Herarchcal Estmator Stans law Brodowsk Faculty of Physcs, Astronomy, and Appled Computer Scence, Jagellonan Unversty, Reymonta

More information

7.5. Present Value of an Annuity. Investigate

7.5. Present Value of an Annuity. Investigate 7.5 Present Value of an Annuty Owen and Anna are approachng retrement and are puttng ther fnances n order. They have worked hard and nvested ther earnngs so that they now have a large amount of money on

More information

Multiplication Algorithms for Radix-2 RN-Codings and Two s Complement Numbers

Multiplication Algorithms for Radix-2 RN-Codings and Two s Complement Numbers Multplcaton Algorthms for Radx- RN-Codngs and Two s Complement Numbers Jean-Luc Beuchat Projet Arénare, LIP, ENS Lyon 46, Allée d Itale F 69364 Lyon Cedex 07 jean-luc.beuchat@ens-lyon.fr Jean-Mchel Muller

More information

: ;,i! i.i.i; " '^! THE LOGIC THEORY MACHINE; EMPIRICAL EXPLORATIONS WITH A CASE STUDY IN HEURISTICS

: ;,i! i.i.i;  '^! THE LOGIC THEORY MACHINE; EMPIRICAL EXPLORATIONS WITH A CASE STUDY IN HEURISTICS ! EMPRCAL EXPLORATONS WTH THE LOGC THEORY MACHNE; A CASE STUDY N HEURSTCS. :, by Allen Newell, J. C. Shaw, & H. A. Smon Ths s a case study n problem-solvng, representng part of a program of research on

More information

Simple Interest Loans (Section 5.1) :

Simple Interest Loans (Section 5.1) : Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part

More information

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007.

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. Inter-Ing 2007 INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. UNCERTAINTY REGION SIMULATION FOR A SERIAL ROBOT STRUCTURE MARIUS SEBASTIAN

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Lecture 2 Sequence Alignment. Burr Settles IBS Summer Research Program 2008 bsettles@cs.wisc.edu www.cs.wisc.edu/~bsettles/ibs08/

Lecture 2 Sequence Alignment. Burr Settles IBS Summer Research Program 2008 bsettles@cs.wisc.edu www.cs.wisc.edu/~bsettles/ibs08/ Lecture 2 Sequence lgnment Burr Settles IBS Summer Research Program 2008 bsettles@cs.wsc.edu www.cs.wsc.edu/~bsettles/bs08/ Sequence lgnment: Task Defnton gven: a par of sequences DN or proten) a method

More information

Time Value of Money Module

Time Value of Money Module Tme Value of Money Module O BJECTIVES After readng ths Module, you wll be able to: Understand smple nterest and compound nterest. 2 Compute and use the future value of a sngle sum. 3 Compute and use the

More information

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME, ISSUE, FEBRUARY ISSN 77-866 Logcal Development Of Vogel s Approxmaton Method (LD- An Approach To Fnd Basc Feasble Soluton Of Transportaton

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching)

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching) Face Recognton Problem Face Verfcaton Problem Face Verfcaton (1:1 matchng) Querymage face query Face Recognton (1:N matchng) database Applcaton: Access Control www.vsage.com www.vsoncs.com Bometrc Authentcaton

More information

An Empirical Study of Search Engine Advertising Effectiveness

An Empirical Study of Search Engine Advertising Effectiveness An Emprcal Study of Search Engne Advertsng Effectveness Sanjog Msra, Smon School of Busness Unversty of Rochester Edeal Pnker, Smon School of Busness Unversty of Rochester Alan Rmm-Kaufman, Rmm-Kaufman

More information

`Will it snow tomorrow?' `What are our chances of winning the lottery?' What is the time between emission of alpha particles by a radioactive source?

`Will it snow tomorrow?' `What are our chances of winning the lottery?' What is the time between emission of alpha particles by a radioactive source? Notes for Chapter of DeGroot and Schervsh The world s full of random events that we seek to understand. x. `Wll t snow tomorrow?' `What are our chances of wnnng the lottery?' What s the tme between emsson

More information

Section C2: BJT Structure and Operational Modes

Section C2: BJT Structure and Operational Modes Secton 2: JT Structure and Operatonal Modes Recall that the semconductor dode s smply a pn juncton. Dependng on how the juncton s based, current may easly flow between the dode termnals (forward bas, v

More information

CHAPTER 14 MORE ABOUT REGRESSION

CHAPTER 14 MORE ABOUT REGRESSION CHAPTER 14 MORE ABOUT REGRESSION We learned n Chapter 5 that often a straght lne descrbes the pattern of a relatonshp between two quanttatve varables. For nstance, n Example 5.1 we explored the relatonshp

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan

More information

The Full-Wave Rectifier

The Full-Wave Rectifier 9/3/2005 The Full Wae ectfer.doc /0 The Full-Wae ectfer Consder the followng juncton dode crcut: s (t) Power Lne s (t) 2 Note that we are usng a transformer n ths crcut. The job of ths transformer s to

More information

In our example i = r/12 =.0825/12 At the end of the first month after your payment is received your amount in the account, the balance, is

In our example i = r/12 =.0825/12 At the end of the first month after your payment is received your amount in the account, the balance, is Payout annutes: Start wth P dollars, e.g., P = 100, 000. Over a 30 year perod you receve equal payments of A dollars at the end of each month. The amount of money left n the account, the balance, earns

More information

Mining Multiple Large Data Sources

Mining Multiple Large Data Sources The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 2 24 Mnng Multple Large Data Sources Anmesh Adhkar, Pralhad Ramachandrarao 2, Bhanu Prasad 3, and Jhml Adhkar 4 Department of

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Certificate No. 68613082 ONTARIO COURT (PROVINCIAL DIVISION) - versus - PAULO RAPOSO TRANSCRIPT OF PROCEEDINGS

Certificate No. 68613082 ONTARIO COURT (PROVINCIAL DIVISION) - versus - PAULO RAPOSO TRANSCRIPT OF PROCEEDINGS Certfcate No. 686182 ONTARIO COURT (PROVINCIAL DIVISION) HER MAJESTY THE QUEEN - versus - PAULO RAPOSO TRANSCRIPT OF PROCEEDINGS Heard before The Honourable Mr. Justce D. Cooper at Hamlton, Ontaro on Aprl

More information

How To Calculate The Accountng Perod Of Nequalty

How To Calculate The Accountng Perod Of Nequalty Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

Complete Fairness in Secure Two-Party Computation

Complete Fairness in Secure Two-Party Computation Complete Farness n Secure Two-Party Computaton S. Dov Gordon Carmt Hazay Jonathan Katz Yehuda Lndell Abstract In the settng of secure two-party computaton, two mutually dstrustng partes wsh to compute

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification Lecture 4: More classfers and classes C4B Machne Learnng Hlary 20 A. Zsserman Logstc regresson Loss functons revsted Adaboost Loss functons revsted Optmzaton Multple class classfcaton Logstc Regresson

More information

The Application of Fractional Brownian Motion in Option Pricing

The Application of Fractional Brownian Motion in Option Pricing Vol. 0, No. (05), pp. 73-8 http://dx.do.org/0.457/jmue.05.0..6 The Applcaton of Fractonal Brownan Moton n Opton Prcng Qng-xn Zhou School of Basc Scence,arbn Unversty of Commerce,arbn zhouqngxn98@6.com

More information

Title Language Model for Information Retrieval

Title Language Model for Information Retrieval Ttle Language Model for Informaton Retreval Rong Jn Language Technologes Insttute School of Computer Scence Carnege Mellon Unversty Alex G. Hauptmann Computer Scence Department School of Computer Scence

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

POLYSA: A Polynomial Algorithm for Non-binary Constraint Satisfaction Problems with and

POLYSA: A Polynomial Algorithm for Non-binary Constraint Satisfaction Problems with and POLYSA: A Polynomal Algorthm for Non-bnary Constrant Satsfacton Problems wth and Mguel A. Saldo, Federco Barber Dpto. Sstemas Informátcos y Computacón Unversdad Poltécnca de Valenca, Camno de Vera s/n

More information

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE

More information