A Permutation Network
|
|
|
- Laureen Knight
- 9 years ago
- Views:
Transcription
1 A Permutation Network ABRAHAM WAKSMAN Stanford Research nstitute, Menlo Park, California,~BS'rm~CT. n this paper the construction of a switching network capable of n!-permutation of its n is:put terminals to its n output terminals is described. The building blocks for this network are binary cells capable of permuting their two input terminals to their two output terminals. The number of cells used by the network is (n.log2 n - n + 1} = ~,~1 (loge k), t could be argued that for such a network this number of cells is a lower bound, by noting th:tt binary decision trees in the network can resolve individual terminal assignments only and not the partitioning of the permutation set itself which requires only (log2 n!) = (~=~ log2 k) binary dedsions. An algorithm is also given for the sel~ting of the binary cells in the network according to any specified permutation. KEY WORDS AND PHRASES: permutation, signal set, network, network design, flipflop for CATEGORES: 6.1, 6.39, 6.9 n many applications of computer design it is desirable to efficiently construct a network which permutes u set of signals. Let the "elenmntat cell" be the basic building block of such a network, which by itself is a permutation network on two inputs and presumably can be constructed using a single flipflop (see Figure 1). Clearly, the lower bound on the number of elementary cells required for a permutation network on N signals is log,2 (N!). We describe a construction which utilizes F(N) cells, where N is a power of two, such that N~ \log, (N:)/ Definition 1. Definition 2. u~, u~,..., uu are the N inlets to the permutation networks. v~, v2,.. -, vu art the N outlets from the permutation network. Definition 3. {~r(u~) --, v~ : i, j = 1, --., N} is a permutation assigning u~ to some v~ for all i and j. Definition 4. Xi is a variable ranging over the pair (u2i, u2i-1) for i = 1,..., (,~/2). Definition 5. Yj is a variable ranging over the pair (v2j, v~j_:) forj = 1,..., (~'/2). "'~EO~EM 1. There exists a permutation {Tr(Xi) --~ Yj : i, j = 1, "", (N/2)} Under the permutation [Tr(ul) -~ vi : i,j = 1,, N}. Paoo~. LetKi = ~'(X0-+ Yi,under {rr(ui) ~v~:i,j = 1, -.., N}.That is: K~ is a mapping of some u, u C X~, onto some v, v C Yi. For each K~ there This research was supported by the Office of Naval Research under Contract Nonr-4833(00). J~amal of the Association for Computing Machinery, Vol. 15, No. 1, January 1968, pp
2 160 ABRAtAM WAKS~i~,~ u 2... ~ v 2 u 2 L,L V 2 F[m. 1. a, resetstate;b, setstste b FG. 2 art at most two such mappings where the two elements of Xi do not map onto t~ ::~ elements of a single Yj. Thus the set, {Ki} contains at most two elements. N~)'~:,~,. under the permutation{at(u,) -~ v i : i,j : 1,..., N}, no two elements of {u,: i... 1, - -, N} are mapped onto a single element of {vj : j = 1, -, N} so that ] U K,... N/2, 1 < i < N/2. But 1 U X~[ = N/2, 1 < i < N/2, so that by P. Hall's theoretic, [1] on distinct representatives of sets (set Appendix), each X~ has a distinct reprv sentative ia U K~, 1 < i < N/2. Consequently there is a set {Tr(X~) + Y~ : i, j : i~...., N/2)} which is one-to-one; hence a permutation. Q.E.D. COROLLARY 1. {Tr(Xi) -* Yj} is a subassignment of the assignmcnt under ~ ~L permulali~m {~r(ui) --~ vj} that involves exactly one u ~ Xi and one v C Y ~, for ~>:';" i and j. CO~mLLARY 2. VK, an element of the,set { vi : i = l,., N}, can be selected (~.~'5~ trarily as a fixed representative of its corresponding Y j, where v~ ~ Y j for {rr(x~)... Yi} under all the permulations of {rr(ui) --~ v~ : i,j = 1,..., N}. PROOF. Since [ U K,] = N/2, 1 < i< Y/2, there arc always two sets of represent, atives which exhaust {ul} and {vi}. Thus, h.~.,~' any given permutation, we select the set that includes v~-. Networt~ Ctmstruction n Figure 2, 1,..., ~v/2 and 0t, -.., O~e/~_l represent elementary cells, and F~,~ ~ P~ represent permutation networks oil N/2 inputs each. By Theorem 1 and Co r~:~ lary 1, the subassignment {rr(x,) ~ Yj} ca~t be made through Pa so that each f and Oi has a single link to P~.~ and a single link to P, for all i and j. By Corollary 2 we can fix one Y variable, i.e., eliminate one cell, and we cho ~.>~ to eliminate the cell associated with vt and v~. Thus Figure 2 is a permutation ~e~ work decomposed into N - 1 elementary cells and two permutation networks ({~ Journal of the Association for Computing Machinery, Vol. 15, No. 1, January 1968
3 Permutation Network 161 N/2 inputs each. Clearly the process of decomposition can be continued until the complete network is decomposed into linked elementary cells. For N = 2 r there are r such decompositions, which result in the following number of elementary cells: F(N) = (2 ~ - 1) + 2(2 ~-~ - 1) -t- 22(2 ~ ) t- 2~'-~(2-1) = r2 ~ -- (1 + 2' k- "'" -t- 2 ~-~) = r2 ~- (2 ~- 1) = r2 "- 2 ~+ 1, F(N) = Nlog2N- N+ 1. A constructive proof ~ showing that the network of Figm'e 2 is indeed a permutation network is as follows. Consider a network as in Figure 2 where the links between P~, P8 and the inputoutput cells are omitted. Now let it be desired to realize a given arbitrary permutation by establishing the links one by one as dictated by the permutation assignment. Start with Vl and establish a link through Px to some u~ through its corresponding, Let state b of Figure 1 be the set state. Set if u is even. Proceed next with the second u associated with this and establish a link through P~ to its corresponding v through the 0 associated with it. Set this 0 if v is even. Repeat the process until all input-output pairs have been matched and the appropriate input and output cells have been set. Note that in case a specific permutation involves more than a single cycle, a link will be established to v2 via PB before all assignments are made hi this case any inlet or outlet terminal not yet linked can be used as a starting point. : Now, since by construction P~ and P, are each associated with exactly N/2 inputs and N/2 outputs, and since by assumption Pa and PB are permutation networks, the assignment {u~ --~ vi : i, j = 1,, N} is complete and the link pattern is as in Figure 2. Q.E.D. An algorithm can now be established for setting the decomposed cells of a network as well as the permutation required of PA and P. at any decomposition stage. Algorithm 1. Express the given permutation to be realized by the network in an N X N permutation matrix. 2. Rewrite the N X N permutation matrix a.s an (N/2) X (N/2) partition matrix by merging coordinates corresponding to each common input or output cell. 3. Decompose the partition matrix into the sum of two (N/2) X (N/2) permutation matrices by letting vl be a coordinate in one (corresponding to P~) and letting v~ be a coordinate in the other (corresponding to PB). 4. dentify the entries in the N X N matrix which correspond to the entries in the matrix of PA. 5. dentify the coordinates in the N X N matrix which correspond to the entries identified in step dentify the cells associated with the coordinates identified in step Set (that is, put in state b, Figure 1) any cell identified in step 6 which is associated with an even coordinate identified in step 5. This proof is due to H. Stone. Journal of the Association for Computing Machinery, Vol. 15, No. 1, January 1968
4 162 A.BRAHAM WAKSMAN U - Vl u 2 ~ PA ] F -v2 t ~j./]~ncludes CELLS r~.. /,~ --F----~'#k/1 NO, ~,6,7,,o,,3 N.,~--;~ U6 v 6 16 U7 - v7 U8 V FG. 3 Ui.,. r---~-.. F~----J. v u2 ~ vz u3 ---F-,x-F "1-'Y-'F ""--',~'- ~ ~ Fro. 4 U U2 ' ~ E ~ X - ~ r. ~ _, m -- V vl 2 ~3 t V FG. 5 u,,. vi U2 ~ v2 u 4 v 4 U5 ~ v5 u6 ~ V 6 Example U8 V i FG. 6 Let N = 8 and the required permutatiol ~, i 2 3, i [ P 27e84315). The permutation matrix is i 3 (Z) 5 Q 6 7Q s i The partition matrix is 1,2 Y Y2 Y3 Xi --! x2 x~, 2 X4i # Journal of the Association for Computing Machinery, Vol. 15, No, 1~ January 1968
5 [~,.:'~:~la~ i~<~,: ivch~,t: 163 the two correspo::di::g pe::muta,tio:: n::strices are Pl P2,;~h{:.rc P: corr{~pol~d~ to tho pormutation ~quired by PA, and P2 corresponds to i.l:e porn::.:tati<>:: ::<tuired of.p~. The e~:t.ries in ~he 8 X 8 matrix corresponding {o P., :re oh'clod. Thus since u=,, v.:, and v: are even, we set the cells 1, 15, attd 16 in Fig:~ro 3. We are loft with the task of decomposing and setting the permutation networks P~ a~:d P~,. The p~:rmutation a:~d p~rtition matrices for P~ are The corr(,sp<)ndi~g permt~tatioa networks P: and P2 of P<, are Pl ;%~e:~ the <.yea eooali::a~es in the 4 X 4 Pa matrix identified with P: are u4 and ~, we s~:.t, cell< 6 ~md 13 in Figure 4. l>~ and P~ also represent the permutation r~,<iuir~d ef eeil:~ 9 a~d 10 ~:spectively in Figure 4, which call for setting these cells. By h:,ihr d~:g a similar pr<)cedure we arrive at Figure 5, which represents the netw~)rk required for ~.}:w r~ alizatiott of P,. Vig~re ~i repr(',~ont~ the c<m~plete network which realizes the required permu;ation. A pp~<:.nd iz }t ~* ~,'s T,~;()~:a:. ]/,el A be any,set, and let At, A~,.., A, be any r subsels of A. nz :~ neeese~ary and a~flici):~nt cvnditic~n that there exists a set of distinct representatives a, ",a, ofa~,..,,a~,i.e.,elementsa~,..., a~ of A such that a~ ~ A ~, i = 1,..., r; ~,, ~ a~ j)~r i ~ j, il i:s "neee~'sary and sufliciez~t that ]br each K in the range 1 <. K < r ~ e unh>n of any K of #w sets A~,..., A~ have at least K elements. }~2;:FER EN Ci:S } H ~:~:~, P ()~: rep~'euen~ives of subsets. J. London Math. Soe. 10 (1965), , B~:x~:s, V. E. Mathemal@al Theory of C h~:c Press Ne,,v- York, 1935, onnectzng hretworks and Telephone Tra~c. Aea- P2 Jo:u~nal of the Association for Computing Machinery, Vol. 15, No., January 1968
α = u v. In other words, Orthogonal Projection
Orthogonal Projection Given any nonzero vector v, it is possible to decompose an arbitrary vector u into a component that points in the direction of v and one that points in a direction orthogonal to v
6.2 Permutations continued
6.2 Permutations continued Theorem A permutation on a finite set A is either a cycle or can be expressed as a product (composition of disjoint cycles. Proof is by (strong induction on the number, r, of
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem
Lecture 3: Finding integer solutions to systems of linear equations
Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture
I. GROUPS: BASIC DEFINITIONS AND EXAMPLES
I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called
NIM with Cash. Abstract. loses. This game has been well studied. For example, it is known that for NIM(1, 2, 3; n)
NIM with Cash William Gasarch Univ. of MD at College Park John Purtilo Univ. of MD at College Park Abstract NIM(a 1,..., a k ; n) is a -player game where initially there are n stones on the board and the
Lecture 18: Applications of Dynamic Programming Steven Skiena. Department of Computer Science State University of New York Stony Brook, NY 11794 4400
Lecture 18: Applications of Dynamic Programming Steven Skiena Department of Computer Science State University of New York Stony Brook, NY 11794 4400 http://www.cs.sunysb.edu/ skiena Problem of the Day
Full and Complete Binary Trees
Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full
AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC
AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC W. T. TUTTE. Introduction. In a recent series of papers [l-4] on graphs and matroids I used definitions equivalent to the following.
Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range
THEORY OF COMPUTING, Volume 1 (2005), pp. 37 46 http://theoryofcomputing.org Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range Andris Ambainis
SCORE SETS IN ORIENTED GRAPHS
Applicable Analysis and Discrete Mathematics, 2 (2008), 107 113. Available electronically at http://pefmath.etf.bg.ac.yu SCORE SETS IN ORIENTED GRAPHS S. Pirzada, T. A. Naikoo The score of a vertex v in
Split Nonthreshold Laplacian Integral Graphs
Split Nonthreshold Laplacian Integral Graphs Stephen Kirkland University of Regina, Canada [email protected] Maria Aguieiras Alvarez de Freitas Federal University of Rio de Janeiro, Brazil [email protected]
The four [10,5,4] binary codes
1 Preliminaries The four [10,,] binary codes There are four distinct [10; ; ] binary codes. We shall prove this in a moderately elementary way, using the MacWilliams identities as the main tool. (For the
Closest Pair Problem
Closest Pair Problem Given n points in d-dimensions, find two whose mutual distance is smallest. Fundamental problem in many applications as well as a key step in many algorithms. p q A naive algorithm
Inner Product Spaces
Math 571 Inner Product Spaces 1. Preliminaries An inner product space is a vector space V along with a function, called an inner product which associates each pair of vectors u, v with a scalar u, v, and
Scheduling Shop Scheduling. Tim Nieberg
Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations
Notes on Determinant
ENGG2012B Advanced Engineering Mathematics Notes on Determinant Lecturer: Kenneth Shum Lecture 9-18/02/2013 The determinant of a system of linear equations determines whether the solution is unique, without
Mathematical Induction
Mathematical Induction In logic, we often want to prove that every member of an infinite set has some feature. E.g., we would like to show: N 1 : is a number 1 : has the feature Φ ( x)(n 1 x! 1 x) How
MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.
MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column
GREATEST COMMON DIVISOR
DEFINITION: GREATEST COMMON DIVISOR The greatest common divisor (gcd) of a and b, denoted by (a, b), is the largest common divisor of integers a and b. THEOREM: If a and b are nonzero integers, then their
Math 4310 Handout - Quotient Vector Spaces
Math 4310 Handout - Quotient Vector Spaces Dan Collins The textbook defines a subspace of a vector space in Chapter 4, but it avoids ever discussing the notion of a quotient space. This is understandable
Math 319 Problem Set #3 Solution 21 February 2002
Math 319 Problem Set #3 Solution 21 February 2002 1. ( 2.1, problem 15) Find integers a 1, a 2, a 3, a 4, a 5 such that every integer x satisfies at least one of the congruences x a 1 (mod 2), x a 2 (mod
MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS
MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS Systems of Equations and Matrices Representation of a linear system The general system of m equations in n unknowns can be written a x + a 2 x 2 + + a n x n b a
Let H and J be as in the above lemma. The result of the lemma shows that the integral
Let and be as in the above lemma. The result of the lemma shows that the integral ( f(x, y)dy) dx is well defined; we denote it by f(x, y)dydx. By symmetry, also the integral ( f(x, y)dx) dy is well defined;
Chapter 3. Cartesian Products and Relations. 3.1 Cartesian Products
Chapter 3 Cartesian Products and Relations The material in this chapter is the first real encounter with abstraction. Relations are very general thing they are a special type of subset. After introducing
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS STEVEN P. LALLEY AND ANDREW NOBEL Abstract. It is shown that there are no consistent decision rules for the hypothesis testing problem
WRITING PROOFS. Christopher Heil Georgia Institute of Technology
WRITING PROOFS Christopher Heil Georgia Institute of Technology A theorem is just a statement of fact A proof of the theorem is a logical explanation of why the theorem is true Many theorems have this
Tail inequalities for order statistics of log-concave vectors and applications
Tail inequalities for order statistics of log-concave vectors and applications Rafał Latała Based in part on a joint work with R.Adamczak, A.E.Litvak, A.Pajor and N.Tomczak-Jaegermann Banff, May 2011 Basic
A REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE. 1. Introduction and Preliminaries
Acta Math. Univ. Comenianae Vol. LXVI, 2(1997), pp. 285 291 285 A REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE E. T. BASKORO, M. MILLER and J. ŠIRÁŇ Abstract. It is well known that Moore digraphs do
Quotient Rings and Field Extensions
Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.
5. Orthogonal matrices
L Vandenberghe EE133A (Spring 2016) 5 Orthogonal matrices matrices with orthonormal columns orthogonal matrices tall matrices with orthonormal columns complex matrices with orthonormal columns 5-1 Orthonormal
Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs
Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs Kousha Etessami U. of Edinburgh, UK Kousha Etessami (U. of Edinburgh, UK) Discrete Mathematics (Chapter 6) 1 / 13 Overview Graphs and Graph
1 Review of Least Squares Solutions to Overdetermined Systems
cs4: introduction to numerical analysis /9/0 Lecture 7: Rectangular Systems and Numerical Integration Instructor: Professor Amos Ron Scribes: Mark Cowlishaw, Nathanael Fillmore Review of Least Squares
Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010. Chapter 7: Digraphs
MCS-236: Graph Theory Handout #Ch7 San Skulrattanakulchai Gustavus Adolphus College Dec 6, 2010 Chapter 7: Digraphs Strong Digraphs Definitions. A digraph is an ordered pair (V, E), where V is the set
ON THE K-WINNERS-TAKE-ALL NETWORK
634 ON THE K-WINNERS-TAKE-ALL NETWORK E. Majani Jet Propulsion Laboratory California Institute of Technology R. Erlanson, Y. Abu-Mostafa Department of Electrical Engineering California Institute of Technology
CS473 - Algorithms I
CS473 - Algorithms I Lecture 4 The Divide-and-Conquer Design Paradigm View in slide-show mode 1 Reminder: Merge Sort Input array A sort this half sort this half Divide Conquer merge two sorted halves Combine
Continued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
Systems of Linear Equations
Systems of Linear Equations Beifang Chen Systems of linear equations Linear systems A linear equation in variables x, x,, x n is an equation of the form a x + a x + + a n x n = b, where a, a,, a n and
JUST THE MATHS UNIT NUMBER 8.5. VECTORS 5 (Vector equations of straight lines) A.J.Hobson
JUST THE MATHS UNIT NUMBER 8.5 VECTORS 5 (Vector equations of straight lines) by A.J.Hobson 8.5.1 Introduction 8.5. The straight line passing through a given point and parallel to a given vector 8.5.3
The sum of digits of polynomial values in arithmetic progressions
The sum of digits of polynomial values in arithmetic progressions Thomas Stoll Institut de Mathématiques de Luminy, Université de la Méditerranée, 13288 Marseille Cedex 9, France E-mail: [email protected]
3. Mathematical Induction
3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)
DETERMINANTS IN THE KRONECKER PRODUCT OF MATRICES: THE INCIDENCE MATRIX OF A COMPLETE GRAPH
DETERMINANTS IN THE KRONECKER PRODUCT OF MATRICES: THE INCIDENCE MATRIX OF A COMPLETE GRAPH CHRISTOPHER RH HANUSA AND THOMAS ZASLAVSKY Abstract We investigate the least common multiple of all subdeterminants,
Design Methods for Binary to Decimal Converters Using Arithmetic Decompositions
J. of Mult.-Valued Logic & Soft Computing, Vol., pp. 8 7 Old City Publishing, Inc. Reprints available directly from the publisher Published by license under the OCP Science imprint, Photocopying permitted
Notes on Symmetric Matrices
CPSC 536N: Randomized Algorithms 2011-12 Term 2 Notes on Symmetric Matrices Prof. Nick Harvey University of British Columbia 1 Symmetric Matrices We review some basic results concerning symmetric matrices.
JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004
Scientiae Mathematicae Japonicae Online, Vol. 10, (2004), 431 437 431 JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS Ondřej Čepeka and Shao Chin Sung b Received December May 12, 2003; revised February
Lecture 13 - Basic Number Theory.
Lecture 13 - Basic Number Theory. Boaz Barak March 22, 2010 Divisibility and primes Unless mentioned otherwise throughout this lecture all numbers are non-negative integers. We say that A divides B, denoted
7 Gaussian Elimination and LU Factorization
7 Gaussian Elimination and LU Factorization In this final section on matrix factorization methods for solving Ax = b we want to take a closer look at Gaussian elimination (probably the best known method
MATH 4330/5330, Fourier Analysis Section 11, The Discrete Fourier Transform
MATH 433/533, Fourier Analysis Section 11, The Discrete Fourier Transform Now, instead of considering functions defined on a continuous domain, like the interval [, 1) or the whole real line R, we wish
Max-Min Representation of Piecewise Linear Functions
Beiträge zur Algebra und Geometrie Contributions to Algebra and Geometry Volume 43 (2002), No. 1, 297-302. Max-Min Representation of Piecewise Linear Functions Sergei Ovchinnikov Mathematics Department,
A Piggybacking Design Framework for Read-and Download-efficient Distributed Storage Codes
A Piggybacing Design Framewor for Read-and Download-efficient Distributed Storage Codes K V Rashmi, Nihar B Shah, Kannan Ramchandran, Fellow, IEEE Department of Electrical Engineering and Computer Sciences
a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.
Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given
On an algorithm for classification of binary self-dual codes with minimum distance four
Thirteenth International Workshop on Algebraic and Combinatorial Coding Theory June 15-21, 2012, Pomorie, Bulgaria pp. 105 110 On an algorithm for classification of binary self-dual codes with minimum
Beyond the Stars: Revisiting Virtual Cluster Embeddings
Beyond the Stars: Revisiting Virtual Cluster Embeddings Matthias Rost Technische Universität Berlin September 7th, 2015, Télécom-ParisTech Joint work with Carlo Fuerst, Stefan Schmid Published in ACM SIGCOMM
4.5 Linear Dependence and Linear Independence
4.5 Linear Dependence and Linear Independence 267 32. {v 1, v 2 }, where v 1, v 2 are collinear vectors in R 3. 33. Prove that if S and S are subsets of a vector space V such that S is a subset of S, then
The Matrix Elements of a 3 3 Orthogonal Matrix Revisited
Physics 116A Winter 2011 The Matrix Elements of a 3 3 Orthogonal Matrix Revisited 1. Introduction In a class handout entitled, Three-Dimensional Proper and Improper Rotation Matrices, I provided a derivation
2.3 Convex Constrained Optimization Problems
42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions
PRIME FACTORS OF CONSECUTIVE INTEGERS
PRIME FACTORS OF CONSECUTIVE INTEGERS MARK BAUER AND MICHAEL A. BENNETT Abstract. This note contains a new algorithm for computing a function f(k) introduced by Erdős to measure the minimal gap size in
MATH 304 Linear Algebra Lecture 18: Rank and nullity of a matrix.
MATH 304 Linear Algebra Lecture 18: Rank and nullity of a matrix. Nullspace Let A = (a ij ) be an m n matrix. Definition. The nullspace of the matrix A, denoted N(A), is the set of all n-dimensional column
ML for the Working Programmer
ML for the Working Programmer 2nd edition Lawrence C. Paulson University of Cambridge CAMBRIDGE UNIVERSITY PRESS CONTENTS Preface to the Second Edition Preface xiii xv 1 Standard ML 1 Functional Programming
Lecture 22: November 10
CS271 Randomness & Computation Fall 2011 Lecture 22: November 10 Lecturer: Alistair Sinclair Based on scribe notes by Rafael Frongillo Disclaimer: These notes have not been subjected to the usual scrutiny
Vector and Matrix Norms
Chapter 1 Vector and Matrix Norms 11 Vector Spaces Let F be a field (such as the real numbers, R, or complex numbers, C) with elements called scalars A Vector Space, V, over the field F is a non-empty
Test1. Due Friday, March 13, 2015.
1 Abstract Algebra Professor M. Zuker Test1. Due Friday, March 13, 2015. 1. Euclidean algorithm and related. (a) Suppose that a and b are two positive integers and that gcd(a, b) = d. Find all solutions
A Note on the Bertsimas & Sim Algorithm for Robust Combinatorial Optimization Problems
myjournal manuscript No. (will be inserted by the editor) A Note on the Bertsimas & Sim Algorithm for Robust Combinatorial Optimization Problems Eduardo Álvarez-Miranda Ivana Ljubić Paolo Toth Received:
8. Matchings and Factors
8. Matchings and Factors Consider the formation of an executive council by the parliament committee. Each committee needs to designate one of its members as an official representative to sit on the council,
Local periods and binary partial words: An algorithm
Local periods and binary partial words: An algorithm F. Blanchet-Sadri and Ajay Chriscoe Department of Mathematical Sciences University of North Carolina P.O. Box 26170 Greensboro, NC 27402 6170, USA E-mail:
A Study on the Necessary Conditions for Odd Perfect Numbers
A Study on the Necessary Conditions for Odd Perfect Numbers Ben Stevens U63750064 Abstract A collection of all of the known necessary conditions for an odd perfect number to exist, along with brief descriptions
Customer Classification And Prediction Based On Data Mining Technique
Customer Classification And Prediction Based On Data Mining Technique Ms. Neethu Baby 1, Mrs. Priyanka L.T 2 1 M.E CSE, Sri Shakthi Institute of Engineering and Technology, Coimbatore 2 Assistant Professor
Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications
Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications Jie Gao Department of Computer Science Stanford University Joint work with Li Zhang Systems Research Center Hewlett-Packard
IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL. 1. Introduction
IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL R. DRNOVŠEK, T. KOŠIR Dedicated to Prof. Heydar Radjavi on the occasion of his seventieth birthday. Abstract. Let S be an irreducible
1 A duality between descents and connectivity.
The Descent Set and Connectivity Set of a Permutation 1 Richard P. Stanley 2 Department of Mathematics, Massachusetts Institute of Technology Cambridge, MA 02139, USA [email protected] version of 16 August
Math 223 Abstract Algebra Lecture Notes
Math 223 Abstract Algebra Lecture Notes Steven Tschantz Spring 2001 (Apr. 23 version) Preamble These notes are intended to supplement the lectures and make up for the lack of a textbook for the course
Suk-Geun Hwang and Jin-Woo Park
Bull. Korean Math. Soc. 43 (2006), No. 3, pp. 471 478 A NOTE ON PARTIAL SIGN-SOLVABILITY Suk-Geun Hwang and Jin-Woo Park Abstract. In this paper we prove that if Ax = b is a partial signsolvable linear
CAPM, Arbitrage, and Linear Factor Models
CAPM, Arbitrage, and Linear Factor Models CAPM, Arbitrage, Linear Factor Models 1/ 41 Introduction We now assume all investors actually choose mean-variance e cient portfolios. By equating these investors
Chapter 7. Permutation Groups
Chapter 7 Permutation Groups () We started the study of groups by considering planar isometries In the previous chapter, we learnt that finite groups of planar isometries can only be cyclic or dihedral
A characterization of trace zero symmetric nonnegative 5x5 matrices
A characterization of trace zero symmetric nonnegative 5x5 matrices Oren Spector June 1, 009 Abstract The problem of determining necessary and sufficient conditions for a set of real numbers to be the
Row Echelon Form and Reduced Row Echelon Form
These notes closely follow the presentation of the material given in David C Lay s textbook Linear Algebra and its Applications (3rd edition) These notes are intended primarily for in-class presentation
Sample Induction Proofs
Math 3 Worksheet: Induction Proofs III, Sample Proofs A.J. Hildebrand Sample Induction Proofs Below are model solutions to some of the practice problems on the induction worksheets. The solutions given
Lecture 4: BK inequality 27th August and 6th September, 2007
CSL866: Percolation and Random Graphs IIT Delhi Amitabha Bagchi Scribe: Arindam Pal Lecture 4: BK inequality 27th August and 6th September, 2007 4. Preliminaries The FKG inequality allows us to lower bound
Orthogonal Diagonalization of Symmetric Matrices
MATH10212 Linear Algebra Brief lecture notes 57 Gram Schmidt Process enables us to find an orthogonal basis of a subspace. Let u 1,..., u k be a basis of a subspace V of R n. We begin the process of finding
Data Structures Fibonacci Heaps, Amortized Analysis
Chapter 4 Data Structures Fibonacci Heaps, Amortized Analysis Algorithm Theory WS 2012/13 Fabian Kuhn Fibonacci Heaps Lacy merge variant of binomial heaps: Do not merge trees as long as possible Structure:
CONTROLLABILITY. Chapter 2. 2.1 Reachable Set and Controllability. Suppose we have a linear system described by the state equation
Chapter 2 CONTROLLABILITY 2 Reachable Set and Controllability Suppose we have a linear system described by the state equation ẋ Ax + Bu (2) x() x Consider the following problem For a given vector x in
8 Divisibility and prime numbers
8 Divisibility and prime numbers 8.1 Divisibility In this short section we extend the concept of a multiple from the natural numbers to the integers. We also summarize several other terms that express
Direct Methods for Solving Linear Systems. Matrix Factorization
Direct Methods for Solving Linear Systems Matrix Factorization Numerical Analysis (9th Edition) R L Burden & J D Faires Beamer Presentation Slides prepared by John Carroll Dublin City University c 2011
Polarization codes and the rate of polarization
Polarization codes and the rate of polarization Erdal Arıkan, Emre Telatar Bilkent U., EPFL Sept 10, 2008 Channel Polarization Given a binary input DMC W, i.i.d. uniformly distributed inputs (X 1,...,
A note on companion matrices
Linear Algebra and its Applications 372 (2003) 325 33 www.elsevier.com/locate/laa A note on companion matrices Miroslav Fiedler Academy of Sciences of the Czech Republic Institute of Computer Science Pod
ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS
ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS DANIEL RABAYEV AND JACK SONN Abstract. Let f(x) be a monic polynomial in Z[x] with no rational roots but with roots in Q p for
Linear Maps. Isaiah Lankham, Bruno Nachtergaele, Anne Schilling (February 5, 2007)
MAT067 University of California, Davis Winter 2007 Linear Maps Isaiah Lankham, Bruno Nachtergaele, Anne Schilling (February 5, 2007) As we have discussed in the lecture on What is Linear Algebra? one of
Metric Spaces. Chapter 7. 7.1. Metrics
Chapter 7 Metric Spaces A metric space is a set X that has a notion of the distance d(x, y) between every pair of points x, y X. The purpose of this chapter is to introduce metric spaces and give some
1. Prove that the empty set is a subset of every set.
1. Prove that the empty set is a subset of every set. Basic Topology Written by Men-Gen Tsai email: [email protected] Proof: For any element x of the empty set, x is also an element of every set since
The Method of Least Squares
Hervé Abdi 1 1 Introduction The least square methods (LSM) is probably the most popular technique in statistics. This is due to several factors. First, most common estimators can be casted within this
1 if 1 x 0 1 if 0 x 1
Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or
