Quantum Algorithms. Peter Høyer
|
|
- Wesley Tate
- 7 years ago
- Views:
Transcription
1 Quantum Algorithms Peter Høyer University of Calgary CSSQI 2015 Canadian Summer School on Quantum Information Toronto, August 11, 2015
2 QUERY MODEL x1 x2 xn x xn You can ask questions of the form: What is xi?
3 A Query What is xi? i Query xi Remember the input i Query i xi b Reversible i Query i b xi i b Unitary U X i b xi
4 A Query i b U X i b xi ᵢ αᵢ i b ᵢ αᵢ i b xi Query in superposition 1 query 1 unit cost
5 Alternative query model i i b U X i b xi RX (-1) x i i Proof of i UX 1 H H 1 (-1) x i i
6 Alternative query model i i b U X i b xi RX (-1) x i i Proof of i b H RX H i b xi
7 Problems x1 xn For instance we might want to know: Is x1 = x2 = x3 = = xn = 0? Is x1 x2 x3 xn? How many indices are there with xi =1? Find index i such that xi =1 Is graph G connected? Does graph G contain a triangle?
8 1-out-of-4 in one query x1 0 x2 0 x3 1 x RX ψ
9 1-out-of-4 in one query x1 0 x2 0 x3 1 x RX ψ U
10 Non-query x1 0 x2 0 x3 1 0 RX
11 Binary searching x1 x2 x3 x 1 x 2 x 3 = 001, 011, or RX ψ α 1 β 2 γ α 1 + β 2 - γ 3 α 1 - β 2 - γ 3 α 1 - β 2 - γ 3
12 1-out-of-N x1 x2 xn Ψ0 = N RX R Ψ Ψ RX R Ψ = Id - 2 i i i : xi = 1 = Id - 2 Ψ0 Ψ
13 Grover s algorithm x1 x2 xn Ψ0 = N RX R Ψ Ψ RX = Id - 2 i i i : xi = 1 R Ψ = Id - 2 Ψ0 Ψ0
14 Ref * Ref = Rotation θ
15 Grover s algorithm RX R Ψ RX = Id - 2 i i i : xi = 1 = Id - 2 Ψg Ψg R Ψ = Id - 2 Ψ0 Ψ0
16 Two reflections = a rotation RX R Ψ 2θ RX = Id - 2 Ψg Ψg θ R Ψ = Id - 2 Ψ0 Ψ0 If Ψg Ψ0 = sin(θ), then rotation by angle 2θ
17 Amplitude amplification A 0 = Ψ = Ψgood + Ψbad p = sin 2 (θ) = Ψgood Ψgood Ψgood RX = Id - 2 Ψgood Ψgood θ Ψbad R Ψ = Id - 2 Ψ Ψ
18 Amplitude amplification A 0 = Ψ = Ψgood + Ψbad p = sin 2 (θ) = Ψgood Ψgood Ψgood RX = Id - 2 Ψgood Ψgood θ Ψbad R Ψ = Id - 2 Ψ Ψ R Ψ RX R Ψ RX R Ψ RX R Ψ RX R Ψ RX R Ψ RX A 0 #Iterations T to get close to Ψgood = π/2 2θ 1 p
19 De-randomize (if p is known) A 0 = Ψ Ψgood Theorem: If probability p is known, we can de-randomize θ Ψbad Proof: If (2T+1)θ is slightly more than π/2, then choose slightly smaller angle θ < θ such that (2T+1)θ is equal to π/2.
20 Guessing if p is un-known A 0 = Ψ Ψgood Algorithm: A 0 (R Ψ RX) A 0 (R RX) r Ψ A 0 r [1,2] (R RX) r Ψ A 0 r [1,4] (R RX) r Ψ A 0 r [1,8] (R RX) r Ψ A 0 r [1,16] #Iterations T to get close to Ψgood π/2 2θ Ψbad
21 Ref * Ref = Rotation RX = Id - 2 Ψg Ψg R Ψ = Id - 2 Ψ0 Ψ0 # Iterations 1 θ θ1
22 Ref * Ref = Rotation RX = Id - 2 ProjA R Id - 2 Ψ = ProjB # Iterations a1 a2 a3 a4 a5 a θ1 θ2 θ3 θ4 θ5 θ6 a2 θ2 a1 θ1 a5 θ5 a3 θ3 θ4 a4 a6 θ6 Detect versus Finding solutions? Search for state Ψgood a1 + a2 + + a6 = 1
23 Quantum algorithms 0 A RX R Ψ RX R Ψ RX R Ψ A RX R RX RX Ψ R Ψ R Ψ RX RX RX V0 V1 V2 VT T queries to oracle X {0,1} N
24 Life of a student Before One day of work: After Requires lots of days of work
25 Lower bounds 0 0 RX RX RX V0 V1 V2 VT To prove a lower bound, we show 1. We know very little in the beginning 2. We learn only a little by each query 3. We need to learn a lot Then we conclude we need a lot of queries
26 Finding inputs x = x1 x2 x3 x4 {0,1} 4 x1 = 1 x3 = 0
27 Distinguishing inputs x = x1 x2 x3 x4 {0,1} 4 W0 = Σ (Γ)jk jk = 2( ) = 58
28 Distinguishing inputs x = x1 x2 x3 x4 {0,1} W0 = Σ (Γ)jk jk x1 = 1 = 1 Γ 1 ΔW = 2( ) = 28
29 Distinguishing inputs x = x1 x2 x3 x4 {0,1} W0 = Σ (Γ)jk jk WT ε W0 x1 = 1 = 1 Γ 1 ΔW = 2( ) = 28 = 1 Γ 1 1 = 1 Γ 1 T (1-ε) max = i 1 Γ i 1
30 Distinguishing inputs x = x1 x2 x3 x4 {0,1} W0 = Σ (Γ)jk jk WT ε W0 x1 = 1 = Ψ Γ Ψ ΔW = 2( ) = 28 = φ Γ 1 φ = Ψ Γ Ψ T (1-ε) max = i φ Γ i φ
31 Distinguishing inputs x = x1 x2 x3 x4 {0,1} W0 = Σ (Γ)jk jk WT ε W0 T (1-ε) maxi x1 = 1 = Γ ΔW = 2( ) = 28 = Γ 1 Γ Γ i
32 Binary Searching 1/1 1/2 1/3 1/4 1/5 1/1 1/1 1/2 1/3 1/4 1/2 1/1 1 /1 1 /2 1 /3 1/3 1/2 1/1 1/1 1/2 1/4 1 /3 1 /2 1/1 1/1 1/5 1/4 1/3 1/2 1 /1 x1 x2 x5 x1 x2 x5 = 00000, 00001, 00011, 00111, 01111, or Find index i of left-most 1 W0 ΔW WT T = Γ Γi ε Γ (1-ε) Γ Γi = Θ(Nlog N) = Θ(N) = Θ(log N)
33 Polynomial Method i b U X i b xi α i, 0 + β i, 1 { α i, 0 + β i, 1 α i, 1 + β i, 0 if xi = 0 if xi = 1 = [βxi + α(1-xi)] i, 0 + [αxi + β(1-xi)] i, 1 Polynomials of degree 1 in variable xi 0 0 UX UX UX V0 V1 V2 VT
34 Lower bounds OR2 = x1 + x2 - x1x2 Parity3 = x1 + x2 + x3 - x1x2 - x1x3 - x2x3 + x1x2x3 degree(orn) = N QE(ORN) N/2 degree(parityn) = N QE(ParityN) N/2 Polynomials of degree T in variables xi 0 0 UX UX UX V0 V1 V2 VT
35 Lower bounds degree(orn) = Θ( N) degree(parityn) = Θ(N) QE(f) deg(f) Q2(ORN) Q2(ParityN) Ω(N) Q2(f) deg(f) Ω( N) Polynomials of degree T in variables xi 0 0 UX UX UX V0 V1 V2 VT
36 Binary Searching Output = leaf number leaves N leaves = log 2 (N) for binary search
37 Haar Wavelet
38 Binary Searching
39 Binary Searching
40 Binary Searching
41 Binary Searching leaves = 11 pebbles N leaves = log 3 (N) quantum search
42 s Peter Høyer University of Calgary
α α λ α = = λ λ α ψ = = α α α λ λ ψ α = + β = > θ θ β > β β θ θ θ β θ β γ θ β = γ θ > β > γ θ β γ = θ β = θ β = θ β = β θ = β β θ = = = β β θ = + α α α α α = = λ λ λ λ λ λ λ = λ λ α α α α λ ψ + α =
More informationUniversity of Maryland Fraternity & Sorority Life Spring 2015 Academic Report
University of Maryland Fraternity & Sorority Life Academic Report Academic and Population Statistics Population: # of Students: # of New Members: Avg. Size: Avg. GPA: % of the Undergraduate Population
More informationPolynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range
THEORY OF COMPUTING, Volume 1 (2005), pp. 37 46 http://theoryofcomputing.org Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range Andris Ambainis
More information0.1 Phase Estimation Technique
Phase Estimation In this lecture we will describe Kitaev s phase estimation algorithm, and use it to obtain an alternate derivation of a quantum factoring algorithm We will also use this technique to design
More informationThe Heat Equation. Lectures INF2320 p. 1/88
The Heat Equation Lectures INF232 p. 1/88 Lectures INF232 p. 2/88 The Heat Equation We study the heat equation: u t = u xx for x (,1), t >, (1) u(,t) = u(1,t) = for t >, (2) u(x,) = f(x) for x (,1), (3)
More informationContrôle dynamique de méthodes d approximation
Contrôle dynamique de méthodes d approximation Fabienne Jézéquel Laboratoire d Informatique de Paris 6 ARINEWS, ENS Lyon, 7-8 mars 2005 F. Jézéquel Dynamical control of approximation methods 7-8 Mar. 2005
More informationA Note on the Bertsimas & Sim Algorithm for Robust Combinatorial Optimization Problems
myjournal manuscript No. (will be inserted by the editor) A Note on the Bertsimas & Sim Algorithm for Robust Combinatorial Optimization Problems Eduardo Álvarez-Miranda Ivana Ljubić Paolo Toth Received:
More informationTechniques algébriques en calcul quantique
Techniques algébriques en calcul quantique E. Jeandel Laboratoire de l Informatique du Parallélisme LIP, ENS Lyon, CNRS, INRIA, UCB Lyon 8 Avril 25 E. Jeandel, LIP, ENS Lyon Techniques algébriques en calcul
More informationMATH 304 Linear Algebra Lecture 20: Inner product spaces. Orthogonal sets.
MATH 304 Linear Algebra Lecture 20: Inner product spaces. Orthogonal sets. Norm The notion of norm generalizes the notion of length of a vector in R n. Definition. Let V be a vector space. A function α
More information6.2 Permutations continued
6.2 Permutations continued Theorem A permutation on a finite set A is either a cycle or can be expressed as a product (composition of disjoint cycles. Proof is by (strong induction on the number, r, of
More informationIntroduction to Scheduling Theory
Introduction to Scheduling Theory Arnaud Legrand Laboratoire Informatique et Distribution IMAG CNRS, France arnaud.legrand@imag.fr November 8, 2004 1/ 26 Outline 1 Task graphs from outer space 2 Scheduling
More informationPart II Redundant Dictionaries and Pursuit Algorithms
Aisenstadt Chair Course CRM September 2009 Part II Redundant Dictionaries and Pursuit Algorithms Stéphane Mallat Centre de Mathématiques Appliquées Ecole Polytechnique Sparsity in Redundant Dictionaries
More information1 Sufficient statistics
1 Sufficient statistics A statistic is a function T = rx 1, X 2,, X n of the random sample X 1, X 2,, X n. Examples are X n = 1 n s 2 = = X i, 1 n 1 the sample mean X i X n 2, the sample variance T 1 =
More informationMath Placement Test Practice Problems
Math Placement Test Practice Problems The following problems cover material that is used on the math placement test to place students into Math 1111 College Algebra, Math 1113 Precalculus, and Math 2211
More informationv 1 v 3 u v = (( 1)4 (3)2, [1(4) ( 2)2], 1(3) ( 2)( 1)) = ( 10, 8, 1) (d) u (v w) = (u w)v (u v)w (Relationship between dot and cross product)
0.1 Cross Product The dot product of two vectors is a scalar, a number in R. Next we will define the cross product of two vectors in 3-space. This time the outcome will be a vector in 3-space. Definition
More informationPHASE ESTIMATION ALGORITHM FOR FREQUENCY HOPPED BINARY PSK AND DPSK WAVEFORMS WITH SMALL NUMBER OF REFERENCE SYMBOLS
PHASE ESTIMATION ALGORITHM FOR FREQUENCY HOPPED BINARY PSK AND DPSK WAVEFORMS WITH SMALL NUM OF REFERENCE SYMBOLS Benjamin R. Wiederholt The MITRE Corporation Bedford, MA and Mario A. Blanco The MITRE
More informationComplex Numbers. w = f(z) z. Examples
omple Numbers Geometrical Transformations in the omple Plane For functions of a real variable such as f( sin, g( 2 +2 etc ou are used to illustrating these geometricall, usuall on a cartesian graph. If
More informationAdditional questions for chapter 4
Additional questions for chapter 4 1. A stock price is currently $ 1. Over the next two six-month periods it is expected to go up by 1% or go down by 1%. The risk-free interest rate is 8% per annum with
More informationLecture 2: Universality
CS 710: Complexity Theory 1/21/2010 Lecture 2: Universality Instructor: Dieter van Melkebeek Scribe: Tyson Williams In this lecture, we introduce the notion of a universal machine, develop efficient universal
More informationThe Ergodic Theorem and randomness
The Ergodic Theorem and randomness Peter Gács Department of Computer Science Boston University March 19, 2008 Peter Gács (Boston University) Ergodic theorem March 19, 2008 1 / 27 Introduction Introduction
More informationCoNP and Function Problems
CoNP and Function Problems conp By definition, conp is the class of problems whose complement is in NP. NP is the class of problems that have succinct certificates. conp is therefore the class of problems
More information(Refer Slide Time: 01:11-01:27)
Digital Signal Processing Prof. S. C. Dutta Roy Department of Electrical Engineering Indian Institute of Technology, Delhi Lecture - 6 Digital systems (contd.); inverse systems, stability, FIR and IIR,
More information1 Approximating Set Cover
CS 05: Algorithms (Grad) Feb 2-24, 2005 Approximating Set Cover. Definition An Instance (X, F ) of the set-covering problem consists of a finite set X and a family F of subset of X, such that every elemennt
More informationTowards a Structuralist Interpretation of Saving, Investment and Current Account in Turkey
Towards a Structuralist Interpretation of Saving, Investment and Current Account in Turkey MURAT ÜNGÖR Central Bank of the Republic of Turkey http://www.muratungor.com/ April 2012 We live in the age of
More informationOutline Introduction Circuits PRGs Uniform Derandomization Refs. Derandomization. A Basic Introduction. Antonis Antonopoulos.
Derandomization A Basic Introduction Antonis Antonopoulos CoReLab Seminar National Technical University of Athens 21/3/2011 1 Introduction History & Frame Basic Results 2 Circuits Definitions Basic Properties
More information2. Illustration of the Nikkei 225 option data
1. Introduction 2. Illustration of the Nikkei 225 option data 2.1 A brief outline of the Nikkei 225 options market τ 2.2 Estimation of the theoretical price τ = + ε ε = = + ε + = + + + = + ε + ε + ε =
More informationParabolic Equations. Chapter 5. Contents. 5.1.2 Well-Posed Initial-Boundary Value Problem. 5.1.3 Time Irreversibility of the Heat Equation
7 5.1 Definitions Properties Chapter 5 Parabolic Equations Note that we require the solution u(, t bounded in R n for all t. In particular we assume that the boundedness of the smooth function u at infinity
More informationRegular Expressions with Nested Levels of Back Referencing Form a Hierarchy
Regular Expressions with Nested Levels of Back Referencing Form a Hierarchy Kim S. Larsen Odense University Abstract For many years, regular expressions with back referencing have been used in a variety
More informationWell-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications
Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications Jie Gao Department of Computer Science Stanford University Joint work with Li Zhang Systems Research Center Hewlett-Packard
More informationInfluences in low-degree polynomials
Influences in low-degree polynomials Artūrs Bačkurs December 12, 2012 1 Introduction In 3] it is conjectured that every bounded real polynomial has a highly influential variable The conjecture is known
More informationLecture 5 - CPA security, Pseudorandom functions
Lecture 5 - CPA security, Pseudorandom functions Boaz Barak October 2, 2007 Reading Pages 82 93 and 221 225 of KL (sections 3.5, 3.6.1, 3.6.2 and 6.5). See also Goldreich (Vol I) for proof of PRF construction.
More informationFactorization in Polynomial Rings
Factorization in Polynomial Rings These notes are a summary of some of the important points on divisibility in polynomial rings from 17 and 18 of Gallian s Contemporary Abstract Algebra. Most of the important
More information4.5 Chebyshev Polynomials
230 CHAP. 4 INTERPOLATION AND POLYNOMIAL APPROXIMATION 4.5 Chebyshev Polynomials We now turn our attention to polynomial interpolation for f (x) over [ 1, 1] based on the nodes 1 x 0 < x 1 < < x N 1. Both
More informationOn the Unique Games Conjecture
On the Unique Games Conjecture Antonios Angelakis National Technical University of Athens June 16, 2015 Antonios Angelakis (NTUA) Theory of Computation June 16, 2015 1 / 20 Overview 1 Introduction 2 Preliminary
More informationLecture 1: Course overview, circuits, and formulas
Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik
More informationWeek 1: Introduction to Online Learning
Week 1: Introduction to Online Learning 1 Introduction This is written based on Prediction, Learning, and Games (ISBN: 2184189 / -21-8418-9 Cesa-Bianchi, Nicolo; Lugosi, Gabor 1.1 A Gentle Start Consider
More informationFactoring Algorithms Based on NMR Quantum
1295 2002 69-74 69 Factoring Algorithms Based on NMR Quantum Computers (Noboru Kunihiro) (Shigeru Yamashita) NTT NTT Abstract No polynomial time algorithms have been proposed for the factoring and discrete
More information8 Hyperbolic Systems of First-Order Equations
8 Hyperbolic Systems of First-Order Equations Ref: Evans, Sec 73 8 Definitions and Examples Let U : R n (, ) R m Let A i (x, t) beanm m matrix for i,,n Let F : R n (, ) R m Consider the system U t + A
More informationA General Approach to Variance Estimation under Imputation for Missing Survey Data
A General Approach to Variance Estimation under Imputation for Missing Survey Data J.N.K. Rao Carleton University Ottawa, Canada 1 2 1 Joint work with J.K. Kim at Iowa State University. 2 Workshop on Survey
More informationCross product and determinants (Sect. 12.4) Two main ways to introduce the cross product
Cross product and determinants (Sect. 12.4) Two main ways to introduce the cross product Geometrical definition Properties Expression in components. Definition in components Properties Geometrical expression.
More informationMTAT.07.003 Cryptology II. Digital Signatures. Sven Laur University of Tartu
MTAT.07.003 Cryptology II Digital Signatures Sven Laur University of Tartu Formal Syntax Digital signature scheme pk (sk, pk) Gen (m, s) (m,s) m M 0 s Sign sk (m) Ver pk (m, s)? = 1 To establish electronic
More informationError estimates for nearly degenerate finite elements
Error estimates for nearly degenerate finite elements Pierre Jamet In RAIRO: Analyse Numérique, Vol 10, No 3, March 1976, p. 43 61 Abstract We study a property which is satisfied by most commonly used
More informationGiven three vectors A, B, andc. We list three products with formula (A B) C = B(A C) A(B C); A (B C) =B(A C) C(A B);
1.1.4. Prouct of three vectors. Given three vectors A, B, anc. We list three proucts with formula (A B) C = B(A C) A(B C); A (B C) =B(A C) C(A B); a 1 a 2 a 3 (A B) C = b 1 b 2 b 3 c 1 c 2 c 3 where the
More informationLogistic Regression. Jia Li. Department of Statistics The Pennsylvania State University. Logistic Regression
Logistic Regression Department of Statistics The Pennsylvania State University Email: jiali@stat.psu.edu Logistic Regression Preserve linear classification boundaries. By the Bayes rule: Ĝ(x) = arg max
More informationCurrent Density Impedance Imaging with Complete Electrode Model
Current Density Impedance Imaging with Complete Electrode Model Alexandru Tamasan jointly with A. Nachman & J. Veras University of Central Florida Work supported by NSF BIRS Workshop on Hybrid Methods
More informationTrading regret rate for computational efficiency in online learning with limited feedback
Trading regret rate for computational efficiency in online learning with limited feedback Shai Shalev-Shwartz TTI-C Hebrew University On-line Learning with Limited Feedback Workshop, 2009 June 2009 Shai
More informationNotes on Complexity Theory Last updated: August, 2011. Lecture 1
Notes on Complexity Theory Last updated: August, 2011 Jonathan Katz Lecture 1 1 Turing Machines I assume that most students have encountered Turing machines before. (Students who have not may want to look
More informationroot node level: internal node edge leaf node CS@VT Data Structures & Algorithms 2000-2009 McQuain
inary Trees 1 A binary tree is either empty, or it consists of a node called the root together with two binary trees called the left subtree and the right subtree of the root, which are disjoint from each
More informationA neurogeometrical model for image completion and visual illusion
A neurogeometrical model for image completion and visual illusion Benedetta Franceschiello Advisors: A. Sarti, G. Citti CAMS (Unité Mixte CNRS-EHESS), University of Bologna Mid-term review meeting of MAnET
More informationTable of Contents Appendix 4-9
Table of Contents Appendix 4-9 Appendix Multi-Input Thermometer & Datalogger Software Manual v1.0 4-8 Table of Contents 1. Introduction...1-1 1.1 Operation Environment...1-1 1.2 Hardware...1-1 1.3 Connecting
More informationMaximum Likelihood Estimation
Math 541: Statistical Theory II Lecturer: Songfeng Zheng Maximum Likelihood Estimation 1 Maximum Likelihood Estimation Maximum likelihood is a relatively simple method of constructing an estimator for
More informationLecture 4: BK inequality 27th August and 6th September, 2007
CSL866: Percolation and Random Graphs IIT Delhi Amitabha Bagchi Scribe: Arindam Pal Lecture 4: BK inequality 27th August and 6th September, 2007 4. Preliminaries The FKG inequality allows us to lower bound
More informationLecture 3 SU(2) January 26, 2011. Lecture 3
Lecture 3 SU(2) January 26, 2 Lecture 3 A Little Group Theory A group is a set of elements plus a compostion rule, such that:. Combining two elements under the rule gives another element of the group.
More informationConcrete Security of the Blum-Blum-Shub Pseudorandom Generator
Appears in Cryptography and Coding: 10th IMA International Conference, Lecture Notes in Computer Science 3796 (2005) 355 375. Springer-Verlag. Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
More informationGuessing Game: NP-Complete?
Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple
More informationFINITE ELEMENT : MATRIX FORMULATION. Georges Cailletaud Ecole des Mines de Paris, Centre des Matériaux UMR CNRS 7633
FINITE ELEMENT : MATRIX FORMULATION Georges Cailletaud Ecole des Mines de Paris, Centre des Matériaux UMR CNRS 76 FINITE ELEMENT : MATRIX FORMULATION Discrete vs continuous Element type Polynomial approximation
More informationMonte Carlo Simulation
1 Monte Carlo Simulation Stefan Weber Leibniz Universität Hannover email: sweber@stochastik.uni-hannover.de web: www.stochastik.uni-hannover.de/ sweber Monte Carlo Simulation 2 Quantifying and Hedging
More informationHøgskolen i Narvik Sivilingeniørutdanningen STE6237 ELEMENTMETODER. Oppgaver
Høgskolen i Narvik Sivilingeniørutdanningen STE637 ELEMENTMETODER Oppgaver Klasse: 4.ID, 4.IT Ekstern Professor: Gregory A. Chechkin e-mail: chechkin@mech.math.msu.su Narvik 6 PART I Task. Consider two-point
More information4.1 Introduction - Online Learning Model
Computational Learning Foundations Fall semester, 2010 Lecture 4: November 7, 2010 Lecturer: Yishay Mansour Scribes: Elad Liebman, Yuval Rochman & Allon Wagner 1 4.1 Introduction - Online Learning Model
More information1 Prior Probability and Posterior Probability
Math 541: Statistical Theory II Bayesian Approach to Parameter Estimation Lecturer: Songfeng Zheng 1 Prior Probability and Posterior Probability Consider now a problem of statistical inference in which
More informationMAN-BITES-DOG BUSINESS CYCLES ONLINE APPENDIX
MAN-BITES-DOG BUSINESS CYCLES ONLINE APPENDIX KRISTOFFER P. NIMARK The next section derives the equilibrium expressions for the beauty contest model from Section 3 of the main paper. This is followed by
More informationSimple Harmonic Motion
Simple Harmonic Motion 1 Object To determine the period of motion of objects that are executing simple harmonic motion and to check the theoretical prediction of such periods. 2 Apparatus Assorted weights
More informationTHE REMEZ ALGORITHM FOR TRIGONOMETRIC APPROXIMATION OF PERIODIC FUNCTIONS
THE REMEZ ALGORITHM FOR TRIGONOMETRIC APPROXIMATION OF PERIODIC FUNCTIONS MOHSIN JAVED AND LLOYD N. TREFETHEN Abstract. In this paper we present an implementation of the Remez algorithm for trigonometric
More informationFACTORING SPARSE POLYNOMIALS
FACTORING SPARSE POLYNOMIALS Theorem 1 (Schinzel): Let r be a positive integer, and fix non-zero integers a 0,..., a r. Let F (x 1,..., x r ) = a r x r + + a 1 x 1 + a 0. Then there exist finite sets S
More informationEfficient Interference-Aware TDMA Link Scheduling for Static Wireless Networks
Efficient Interference-Aware TDMA Link Scheduling for Static Wireless Networks Weizhao Wang Yu Wang Xiang-Yang Li Wen-Zhan Song Ophir Frieder Department of Computer Science, Illinois Institute of Technology,
More information3. Regression & Exponential Smoothing
3. Regression & Exponential Smoothing 3.1 Forecasting a Single Time Series Two main approaches are traditionally used to model a single time series z 1, z 2,..., z n 1. Models the observation z t as a
More informationNear Optimal Solutions
Near Optimal Solutions Many important optimization problems are lacking efficient solutions. NP-Complete problems unlikely to have polynomial time solutions. Good heuristics important for such problems.
More informationTrigonometric Functions and Triangles
Trigonometric Functions and Triangles Dr. Philippe B. Laval Kennesaw STate University August 27, 2010 Abstract This handout defines the trigonometric function of angles and discusses the relationship between
More informationAlgorithm Design and Analysis Homework #1 Due: 5pm, Friday, October 4, 2013 TA email: ada@csie.ntu.edu.tw. === Homework submission instructions ===
Algorithm Design and Analysis Homework #1 Due: 5pm, Friday, October 4, 2013 TA email: ada@csie.ntu.edu.tw === Homework submission instructions === For Problem 1, commit your source code and a brief documentation
More informationLecture L3 - Vectors, Matrices and Coordinate Transformations
S. Widnall 16.07 Dynamics Fall 2009 Lecture notes based on J. Peraire Version 2.0 Lecture L3 - Vectors, Matrices and Coordinate Transformations By using vectors and defining appropriate operations between
More informationPROBLEM SET. Practice Problems for Exam #1. Math 1352, Fall 2004. Oct. 1, 2004 ANSWERS
PROBLEM SET Practice Problems for Exam # Math 352, Fall 24 Oct., 24 ANSWERS i Problem. vlet R be the region bounded by the curves x = y 2 and y = x. A. Find the volume of the solid generated by revolving
More information3-17 15-25 5 15-10 25 3-2 5 0. 1b) since the remainder is 0 I need to factor the numerator. Synthetic division tells me this is true
Section 5.2 solutions #1-10: a) Perform the division using synthetic division. b) if the remainder is 0 use the result to completely factor the dividend (this is the numerator or the polynomial to the
More informationStatistical Machine Learning from Data
Samy Bengio Statistical Machine Learning from Data 1 Statistical Machine Learning from Data Gaussian Mixture Models Samy Bengio IDIAP Research Institute, Martigny, Switzerland, and Ecole Polytechnique
More informationBasic Geometry Review For Trigonometry Students. 16 June 2010 Ventura College Mathematics Department 1
Basic Geometry Review For Trigonometry Students 16 June 2010 Ventura College Mathematics Department 1 Undefined Geometric Terms Point A Line AB Plane ABC 16 June 2010 Ventura College Mathematics Department
More informationStatistical Machine Learning
Statistical Machine Learning UoC Stats 37700, Winter quarter Lecture 4: classical linear and quadratic discriminants. 1 / 25 Linear separation For two classes in R d : simple idea: separate the classes
More informationBasics of Statistical Machine Learning
CS761 Spring 2013 Advanced Machine Learning Basics of Statistical Machine Learning Lecturer: Xiaojin Zhu jerryzhu@cs.wisc.edu Modern machine learning is rooted in statistics. You will find many familiar
More informationLecture 1: Oracle Turing Machines
Computational Complexity Theory, Fall 2008 September 10 Lecture 1: Oracle Turing Machines Lecturer: Kristoffer Arnsfelt Hansen Scribe: Casper Kejlberg-Rasmussen Oracle TM Definition 1 Let A Σ. Then a Oracle
More informationChapter 2: Binomial Methods and the Black-Scholes Formula
Chapter 2: Binomial Methods and the Black-Scholes Formula 2.1 Binomial Trees We consider a financial market consisting of a bond B t = B(t), a stock S t = S(t), and a call-option C t = C(t), where the
More informationTotal Degrees and Nonsplitting Properties of Σ 0 2 Enumeration Degrees
Total Degrees and Nonsplitting Properties of Σ 0 2 Enumeration Degrees M. M. Arslanov, S. B. Cooper, I. Sh. Kalimullin and M. I. Soskova Kazan State University, Russia University of Leeds, U.K. This paper
More informationOptimal File Sharing in Distributed Networks
Optimal File Sharing in Distributed Networks Moni Naor Ron M. Roth Abstract The following file distribution problem is considered: Given a network of processors represented by an undirected graph G = (V,
More informationHomework 2 Solutions
Homework Solutions 1. (a) Find the area of a regular heagon inscribed in a circle of radius 1. Then, find the area of a regular heagon circumscribed about a circle of radius 1. Use these calculations to
More informationAn Overview of Integer Factoring Algorithms. The Problem
An Overview of Integer Factoring Algorithms Manindra Agrawal IITK / NUS The Problem Given an integer n, find all its prime divisors as efficiently as possible. 1 A Difficult Problem No efficient algorithm
More informationLecture 7: Finding Lyapunov Functions 1
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.243j (Fall 2003): DYNAMICS OF NONLINEAR SYSTEMS by A. Megretski Lecture 7: Finding Lyapunov Functions 1
More informationCalculus with Parametric Curves
Calculus with Parametric Curves Suppose f and g are differentiable functions and we want to find the tangent line at a point on the parametric curve x f(t), y g(t) where y is also a differentiable function
More informationMATH 425, PRACTICE FINAL EXAM SOLUTIONS.
MATH 45, PRACTICE FINAL EXAM SOLUTIONS. Exercise. a Is the operator L defined on smooth functions of x, y by L u := u xx + cosu linear? b Does the answer change if we replace the operator L by the operator
More informationExact Inference for Gaussian Process Regression in case of Big Data with the Cartesian Product Structure
Exact Inference for Gaussian Process Regression in case of Big Data with the Cartesian Product Structure Belyaev Mikhail 1,2,3, Burnaev Evgeny 1,2,3, Kapushev Yermek 1,2 1 Institute for Information Transmission
More informationQuotient Rings and Field Extensions
Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.
More informationThis is the second in a series of two papers investigating the solitary wave solutions of the integrable model wave equation
CONVERGENCE OF SOLITARY-WAVE SOLUTIONS IN A PERTURBED BI-HAMILTONIAN DYNAMICAL SYSTEM. II. COMPLEX ANALYTIC BEHAVIOR AND CONVERGENCE TO NON-ANALYTIC SOLUTIONS. Y. A. Li 1 and P. J. Olver 1, Abstract. In
More informationCryptography Lecture 8. Digital signatures, hash functions
Cryptography Lecture 8 Digital signatures, hash functions A Message Authentication Code is what you get from symmetric cryptography A MAC is used to prevent Eve from creating a new message and inserting
More informationit = α + β i + γ 1 t + γ 2 t + γ 3 t +λ 1 ( i ) + λ 2 ( i ) + λ 3 ( i ) +δx i + ϵ it, it i i t t t i λ 1 λ 3 t t t i = α + β i + δx i + ϵ i i i i 12 Harrison Cleveland McKinley Roosevelt 10 8 6
More informationSensors & Transducers 2015 by IFSA Publishing, S. L. http://www.sensorsportal.com
Sensors & Transducers 2015 by IFSA Publishing, S. L. http://www.sensorsportal.com A Dynamic Deployment Policy of Slave Controllers for Software Defined Network Yongqiang Yang and Gang Xu College of Computer
More informationABSTRACT ALGEBRA: A STUDY GUIDE FOR BEGINNERS
ABSTRACT ALGEBRA: A STUDY GUIDE FOR BEGINNERS John A. Beachy Northern Illinois University 2014 ii J.A.Beachy This is a supplement to Abstract Algebra, Third Edition by John A. Beachy and William D. Blair
More informationMidterm Solutions. mvr = ω f (I wheel + I bullet ) = ω f 2 MR2 + mr 2 ) ω f = v R. 1 + M 2m
Midterm Solutions I) A bullet of mass m moving at horizontal velocity v strikes and sticks to the rim of a wheel a solid disc) of mass M, radius R, anchored at its center but free to rotate i) Which of
More informationMATHEMATICAL ENGINEERING TECHNICAL REPORTS. The Best-fit Heuristic for the Rectangular Strip Packing Problem: An Efficient Implementation
MATHEMATICAL ENGINEERING TECHNICAL REPORTS The Best-fit Heuristic for the Rectangular Strip Packing Problem: An Efficient Implementation Shinji IMAHORI, Mutsunori YAGIURA METR 2007 53 September 2007 DEPARTMENT
More informationTrigonometric Functions and Equations
Contents Trigonometric Functions and Equations Lesson 1 Reasoning with Trigonometric Functions Investigations 1 Proving Trigonometric Identities... 271 2 Sum and Difference Identities... 276 3 Extending
More informationSorting revisited. Build the binary search tree: O(n^2) Traverse the binary tree: O(n) Total: O(n^2) + O(n) = O(n^2)
Sorting revisited How did we use a binary search tree to sort an array of elements? Tree Sort Algorithm Given: An array of elements to sort 1. Build a binary search tree out of the elements 2. Traverse
More informationMATH 4552 Cubic equations and Cardano s formulae
MATH 455 Cubic equations and Cardano s formulae Consider a cubic equation with the unknown z and fixed complex coefficients a, b, c, d (where a 0): (1) az 3 + bz + cz + d = 0. To solve (1), it is convenient
More information1.3. DOT PRODUCT 19. 6. If θ is the angle (between 0 and π) between two non-zero vectors u and v,
1.3. DOT PRODUCT 19 1.3 Dot Product 1.3.1 Definitions and Properties The dot product is the first way to multiply two vectors. The definition we will give below may appear arbitrary. But it is not. It
More informationNonlinear Algebraic Equations. Lectures INF2320 p. 1/88
Nonlinear Algebraic Equations Lectures INF2320 p. 1/88 Lectures INF2320 p. 2/88 Nonlinear algebraic equations When solving the system u (t) = g(u), u(0) = u 0, (1) with an implicit Euler scheme we have
More informationR 2 -type Curves for Dynamic Predictions from Joint Longitudinal-Survival Models
Faculty of Health Sciences R 2 -type Curves for Dynamic Predictions from Joint Longitudinal-Survival Models Inference & application to prediction of kidney graft failure Paul Blanche joint work with M-C.
More information