Testing Low-Degree Polynomials over

Size: px
Start display at page:

Download "Testing Low-Degree Polynomials over"

Transcription

1 Testing Low-Degree Polynomials over Noga Alon, Tali Kaufman, Michael Krivelevich, Simon Litsyn, and Dana Ron Department of Mathematics, Tel Aviv University, Tel Aviv 69978, Israel and Institute for Advanced Study, Princeton, NJ 08540, USA. School of Computer Science, Tel Aviv University,Tel Aviv Israel. Department of Mathematics, Tel Aviv University, Tel Aviv 69978, Israel. Department of Electrical Engineering-Systems, Tel Aviv University, Tel Aviv 69978, Israel. Abstract. We describe an efficient randomized algorithm to test if a given binary function is a low-degree polynomial (that is, a sum of low-degree monomials). For a given integer and a given real, the algorithm queries at!"# points. If is a polynomial of degree at most, the algorithm always accepts, and if the value of has to be modified on at least an fraction of all inputs in order to transform it to such a polynomial, then the algorithm rejects with probability at least $%&. Our result is essentially tight: Any algorithm for testing degree- polynomials over '( $# must perform ) $"# queries. 1 Introduction In this work we consider the problem of testing whether a binary function* +,-./01 2,-./0 is a polynomial of degree at most 3 satisfying * , for a given integer parameter 3. Such a polynomial is simply a sum (modulo 2) of monomials each being a product of at most 3 variables, with the free term equal to zero. (The restriction * is imposed mainly for historical reasons, to make our definition and result consistent with the previously treated case of linear functions 3 7 /. With minor changes our algorithm can be adapted to test the class of all polynomials of degree at most 3 in 8 variables, without the restriction on the free term.) The algorithm is required to accept functions that are polynomials of degree at most 3 (vanishing at zero), and to reject, with probability at least 9:;, functions that are far from any such polynomial. More precisely, the algorithm is given a distance parameter <, and is required = nogaa@post.tau.ac.il. Research supported in part by a USA Israeli BSF grant and by == a grant from the Israel Science Foundation kaufmant@post.tau.ac.il, This work is part of the author s Ph.D. thesis prepared at Tel Aviv University under the supervision of Prof. Noga Alon, and Prof. Michael Krivelevich. = = = krivelev@post.tau.ac.il. Research supported in part by a USA Israeli BSF grant and > by a grant from the Israel Science Foundation. litsyn@eng.tau.ac.il. Research supported in part by a USA Israeli BSF grant and by a? grant from the Israel Science Foundation. danar@eng.tau.ac.il. Research supported by the Israel Science Foundation (grant number 32/00-1).

2 to reject (with probability at least 9:;) any function whose value should be modified on more that an <-fraction of the domain to become a degree-3 polynomial * satisfying * To this end the algorithm can query the function * on inputs of its choice, where our goal is to minimize the query complexity of the algorithm (as a function of 3, /:<, and 8). The problem of testing multivariate low-degree polynomials has been studied quite extensively [4, 3, 13, 11, 17, 12, 2], and has important applications in the context of Probabilistically Checkable Proofs (PCP). However, with the exception of the case 3 7 /, that is, linear functions (which we discuss below), all results apply only to testing polynomials over fields that are larger than 3 (the degree bound). When the field is sufficiently large, it is possible to reduce the problem of testing whether a function * is a multivariate degree-3 polynomial to testing whether a function is a degree-3 univariate polynomial, where the latter task is simply based on interpolation. Namely, the test for * selects random lines in 1 (more precisely, in the finite projective geometry PG48 /. 6), and verifies that the restriction of * to each of these lines is a (univariate) polynomial of degree at most 3. This reduction does not hold for small fields, and in particular for 496, which is our focus. As noted above, in the case of 3 7 / (linear functions), the linearity test of Blum, Luby and Rubinfeld [10] works also when the underlying field is 496. In fact, our test can be viewed as an extension of the [10] algorithm, as we explain in more detail below. Linearity testing has also been studied in the following papers [4, 11, 6, 7, 5]. Our Results We describe and analyze an algorithm that tests whether a function * +,-./01 2,-./0 is a degree-3 polynomial satisfying * , or is <-far from any such polynomial, using 4/:< queries. As we show, the exponential dependency on 3 is unavoidable. This is in contrast to the case of testing degree-3 polynomials over larger fields, where the sample complexity is polynomial in 3. Our testing algorithm is simple. It repeats the following check times: It selects, uniformly and at random, 3 / vectors.555.,-./0 1. It then evaluates * on the sum of every non-empty subset of the selected vectors, and checks that the sum of these evaluations is 0. If all checks succeed then it accepts, otherwise it rejects. Note that for the special case of 3 7 /, we obtain the linearity test of [10] which uniformly selects 4/:<6 pairs.,-./0 1, and verifies for each pair that * 4 6 * * 4 6. Our choice of the sets corresponds to a random selection of a 43 /6-dimensional subspace in the affine geometry AG48.96 (see for example [14, Chap. 12]). In case 3 7 / we deal with lines of the affine geometry PG As a by-product of our analysis we obtain a self-corrector (as defined in [10]) for *, in case * is sufficiently close to a degree-3 polynomial. Specifically, for any given,-./01, it is possible to obtain the value 4 6 with high probability by querying * on additional, randomly selected, points.

3 Relation to Coding Our setting and results have a very natural interpretation in terms of coding theory. The set of (evaluations of) all polynomials in 8 variables of degree at most 3 over 496 is called the Reed-Muller code with parameters 3 and 8. (See, e.g., [16] for relevant background). So our algorithm can be considered as (locally) testing Reed-Muller codes. To be more accurate, as we consider only polynomials * vanishing at zero, we in fact test the so-called shortened Reed-Muller code 43.86, obtained from by choosing all codewords with the first bit (i.e. that corresponding to the zero vector) equal to zero, and deleting this bit. The Reed-Muller code is a linear code in,-./0 of minimum distance 91. The dual code of is the Reed-Muller code 48 3 /.86. The dual code of the shortened Reed-Muller code is the so called punctured Reed-Muller code with parameters8 3 / and 8, obtained from 48 3 /.86 by deleting the first bit of every codeword. The minimum distance of the punctured Reed-Muller code with parameters8 3 / and8 is 9 /, and its minimum weight codewords are obtained from the minimum weight codewords of 48 3 /.86, having the first bit equal to 1, by deleting this bit; the number of minimum weight vectors is proportional to 9 1. For an arbitrary vector from,-./0 we want to distinguish between two cases: the vector belongs to the code, or, alternatively, it is at (Hamming) distance at least < 91 from the closest codeword of Our strategy is then to pick a random minimum weight vector from the punctured 48 3 /.86, and to check if it is orthogonal to the tested vector. Clearly, this will always confirm orthogonality if the considered vector is from the code. However, we prove that if the tested vector is far enough from the code, with positive probability the test will detect it, and give an estimate for this probability. 2 Preliminaries For any integer, we denote by the set,/ For any 3 8, let denote the family of all Boolean functions over,-./01 which are polynomials of degree at most 3 without a free term. That is, * if and only if there exist coefficients,-./0, for every 8./ 3, such that * 7 1. (1) where the addition is in 496. In particular, is the family of all linear functions over,-./01, that is, all functions of the form, where 8. For any two functions *. +,-./01 2,-./0, the symmetric difference between * and is 4*.6 7,,-./01 + * The relative distance!4*.6 7 4*.6 :91. For a function and a family of -./ between * and is:!4*.6 functions, we say that is -far from, for some - " < " /, if, for every *,!4.*6 # <. Otherwise it is -close to. A testing algorithm (tester) for is a probabilistic algorithm, that is given query access to a function *, and a distance parameter <, - " < " /. If * belongs to then with

4 probability at least, the tester should accept *, and if * is <-far from, then with probability at least the tester should reject it. If the tester accepts every * in with probability 1, then it is a one-sided tester. The following notation will be used extensively in this paper. Given a function * +,-./01 2,-./0, for.555.,-./01 let *. (2) where the first sum is over 496 and the second one is over , and let * 4 over 6 5 (3) 3 Characterization of Low Degree Polynomials Claim 1 A function * belongs to (i.e., it is a polynomial of total degree at most 3 satisfying * ), if and only if for every.555.,-./0 1 we have (4) Proof. A polynomial from can be viewed as a code word in the appropriate Reed- Muller code, see, e.g., [16]. Thus, the above characterization can be proved using known facts about its dual. For completeness we provide a direct, simple proof. We first prove that if a function * belongs to then for every.555.,-./0 1. As * is a sum of monomials of total degree at most 3 it suffices to show that for every monomial 7 3,, where / for every.555.,-./0 1. The number of linear combinations, where,-./0, for which4 6 7 / is clearly the number of solutions of a linear system of equations in the 3 / variables, and the trivial combination 7 - for allis not one of the solutions. Therefore, this number of solutions (which is possibly zero) is divisible by 9, showing that there is an even number of sets satisfying 7 3 / such that4 6 7 /. This implies that , as needed. We next show that if * 7 * ,-./012,-./0 satisfies Equation (4) for every..555.,-./01, then * 5 Every function from,-./01 to,-./0 can be written uniquely as a polynomial over 496: * Our objective is to show that 7 - and that 7 - for all # 3. Taking for everywe conclude, by (4), that 7-5 Suppose, now, that there is a nonzerowith # 3. Take such anof minimum cardinality, and assume, without loss of generality, that 7 with3/.

5 Let denote the -th unit vector in,-./01, and define and monomial Then the 7 does not van- and does vanish on for every /. Thus On the other hand, for any other monomial, say, 7 ish on, with a nonzero coefficient in the representation of * Indeed, if 3 this holds by the first part of the proof. Otherwise, by the minimality of, for all 3 /. Altogether this implies that /, contradicting the assumption. This completes the proof of Claim 1. over 4 A One-Sided Tester for Low Degree Polynomials In this section we present and analyze a one-sided tester for. This tester generalizes the linearity tester of Blum, Luby and Rubinfeld [10]. Algorithm Test- 1. Uniformly and independently select groups of vectors. Each group contains 3 / that uniformly selected random vectors.555.,-./ If for some group of vectors.555. it holds , then reject, otherwise, accept. Theorem 1 The algorithm Test- is a one-sided tester for with query complexity From the test definition and from Claim 1 it is obvious that if *, then the tester accepts. Thus, the crux of the proof is to show that if * is <-far from, then the tester rejects with probability at least 9:;. Our proof has a similar general structure to Sudan s analysis [18] of the linearity test in [10], but requires some additional ideas. In particular, if * is the function tested, we can define a function as follows. For any,-./01 : 46 7 / if / /:9 and otherwise. (5) Thus is a kind of majority function. That is, for every vector,-./01, 46 is chosen to satisfy most of the equations We also define * (6) Note that is simply the probability that a single group of vectors.555. selected by the algorithm provides evidence that * :. We shall prove two claims. The first, and simpler claim (in Lemma 2), is that if is small, then is close to *. The second and more involved claim (in Lemma 5) is that if is small, then must belong to. This would suffice for proving the correctness of a slight variation on our algorithm that uses a larger sample size. In order to attain the sample complexity claimed in Theorem 1, we shall need to prove one more claim that deals with the case in which is very small (see Lemma 6).

6 Lemma 2 For a fixed function *, let and be as defined in Equations (5) and (6), respectively. Then,!4*.6 9. Proof. Recall that for every,-./01, /:9. Hence * / * / / 91 4*.6 / 9 Thus,!4* Recall that by the definition of, as a majority function, for every, we have that for at least one half of the 3-tuples of vectors In the next lemma we show that this equality actually holds for a vast majority of the 3-tuples.555. (assuming 7 is sufficiently small). 6 Lemma 3 For every,-./01 : / 93. In order to prove Lemma 3 we shall first establish the following claim. Claim 4 For every ,-./0 1, (7) Proof. Let 7, , and consider any set, , which may be the * empty set. For a vector,-./0 1 denote 7 * 4 6. For every set, , each element of type * 4 6 appears twice in both sides of Equation (7) and thus cancels out. Now for every set, (including * the empty set), we get in the left hand side of Equation (7): 46 * 4 6 * 4 6 * 46 * 4 6 * * 4 6 * 4 6 * 4 6 * 4 6 * 4 6 * In the right hand side of Equation (7) we get: This implies equality over 496.

7 We now turn to prove Lemma 3. Proof of Lemma 3: We fix,-./01 and let / 93. To this Recall that we are interested in proving that end, we shall bound a slightly different, but related probability. Let Then, by the definitions of and, 7 4 and and (8) 7 4/ 6 (9) where the probabilitites are over the choice of ,-./0 1. Since we are working over 496, Now, for any choice of.555. and.555. : and Consider any pair 6 that appears in the above sum. Note that 6 differ only in a single parameter. Since 4 6 is a symmetric function we can apply Claim 4 and obtain that (10) Recall that is fixed and ,-./0 1 are uniformly selected, and so all parameters on the right hand side in the above equation are uniformly distributed. Also recall that by the definition of, for , where are uniformly selected at random, Hence, by the union bound: / 93 5 (11) By combining Equations (9) and (11) we get that 4/ 6 / 93. Since /:9 it follows that 7 4/ 6 4/ 6 / 93.

8 * 5 (12) Lemma 5 If ", then the function to belongs. Proof. By Claim 1 it suffices to prove that if " then, , for every.555.,-./0 1. Let us fix the choice of.555., and recall that as defined in Equation (2), Suppose we uniformly select 3 43 /6 random vectors,-./01, / 3 /, / 3. Then by Lemma 3, for every, 7 3 /, with probability at least / 93 over the choice of the s, Let be the event that Equation (12) holds for all 7 3 /. By the union bound: / 49 /6 93 (13) Assume that holds. Then * * * * * (14) Let be the event that for every 7 3, and By the definition of : / 949 /6 (15)

9 Suppose that ". Then, by Equations (13) and (15), the probability that both and hold, is strictly positive. In other words, there exists a choice of the s for which all summands in Equation (14) are 0. But this implies that We conclude that if ", then to belongs, and this completes the lemma s proof. By combining Lemmas 2 and 5 we obtain that if * is 4/: far from, then 7 4/:439 66, and so the algorithm rejects * with sufficiently high constant probability (since it selects groups of vectors.555. ). We next deal with the case in which is small. By Lemma 2, in this case the distance 7!4*.6 between * and is small, and we show that the test rejects * with probability that is close to 49 /6. This follows from the fact that in this case, the probability over the selection of.555., that among the 49 /6 points, the functions * and differ in precisely one point, is close to 49 /6. This is formally proved in the following lemma.. Let 7!4*.6 denote the distance between * and, and let 7 49 /6 / 49 /6 49 /6 5 Then, when are chosen randomly, the probability that for exactly one Lemma 6 Suppose - " " 4 point among the 49 /6 points, 7 3 / 6, * , is at least. By definition of and the above lemma, (under the premise of the lemma). In particular, since (by Lemma 2) 9 and 3/, 49 /6, and, for fixed 3, as tends to zero, 49 /6 4 65, Proof. For each subset 7 3 /, let be the indicator random variable whose value is / if and only if * Obviously, 7 / 7 for every. It is not difficult to check that the random variables are pairwise independent, since for any two distinct nonempty., the sums and attain each pair of distinct values in,-./01 with equal probability when the vectors are chosen randomly and independently. It follows that the random variable 7 which counts the number of points of the required form in which * has expectation 7 49 /6 and variance 7 49 /6 4/ 6 5 Our objective is to lower bound the probability that 7 /. We need the well known, simple fact that for a random variable that attains nonnegative, integer values, # Indeed, if attains the value with probability for # -, then, by Cauchy-Schwartz, #

10 In our case, this implies # / 5 Therefore 7 / / / / / implying that / 5 Substituting the value of, the desired result follows. 7 /. We are now ready to wrap-up the proof of Theorem 1. Proof of Theorem 1: As we have noted previously, if * is in, then by Claim 1 the tester accepts (with probability 1). We next show that if * is <-far from, then the tester rejects with probability at least. Suppose that 4*. 6 # <. Denote 7 4*.65 If " then by Lemma 5 and, by Lemma 6, <65 Hence, 8 49 <6.. Clearly it is enough to perform 4 6 rounds of the algorithm in order to detect a violation with probability at least. This completes the proof of the theorem. 4.1 Self-Correcting and a Lower Bound From Lemmas 2, 3, and 5 one can immediately conclude the following: Corollary 7 Consider a function * +,-./01 2,-./0 that is <-close to a degree-3 polynomial +,-./01 2,-./0, where < ". Then the function * can be self-corrected. That is, for any given,-./0 1, it is possible to obtain the value 4 6 with probability at least / <3 by querying * on 9 / points in,-./01. The following is a lower bound on families of functions that correspond to linear codes. Theorem 2 Let be any family of functions * +,-./01 2,-./0 that corresponds to a linear code. Let denote the minimum distance of the code and let denote the minimum distance of the dual code of. Every testing algorithm for the family 4 must perform 6 queries, and if the distance parameter < is at most :91, then 4/:<6 is also a lower bound for the necessary number of queries. As noted in the introduction, the family corresponds to the shortened Reed-Muller code It is well known (see [16, Chap. 13]) that the distance of is 91 and the distance of the dual code (which is a punctured Reed-Muller code) is 9 /. Hence we obtain the following corollary.

11 Corollary 8 Every algorithm for testing with distance parameter < must perform queries. 4 Proof of Theorem 2: We start with showing that 6 queries are necessary. A well known fact from coding theory (see [16, Chap. 5]) states the following: for every linear code whose dual code has distance, if we examine a sub-word having length, ", of a uniformly selected codeword in, then the resulting sub-word is uniformly distributed in,-./0. Hence it is not possible to distinguish between a random codeword in and a random word in 91 (which with high probability is far from any codeword) using less than queries. We now turn to the case< " :91. To prove the lower bound here, we apply, as usual, the Yao principle by defining two distributions, one of positive instances, and the other of negative ones, and then by showing that in order to distinguish between those distributions any algorithm must perform 4/:<6 queries. The positive distribution has all its mass at the zero vector To define the negative distribution, partition the set of all coordinates into 7 /:< nearly equal parts.555. and give weight /: to each of the characteristic vectors of, 7 / (Observe that indeed - due to linearity, and < due to the assumption on the minimum distance of ). Finally, a random instance is generated by first choosing one of the distributions with probability /:9, and then generating a vector according to the chosen distribution. It is easy to check (see, e.g., [1] for details) that in order to give a correct answer with probability at least 9:;, the algorithm has to query 4/:<6 bits of the input. 5 Concluding remarks We first note that in view of the above lower bound, our upper bound is almost tight. It will be interesting to study analogous questions for other linear binary codes. Several recent papers, including [8], [9], deal with related questions. As shown above, a code is not testable with a constant number of queries if its dual distance is not a constant, and it seems plausible to conjecture that if the dual distance is a constant, and there is a doubly transitive permutation group acting on the coordinates that maps the dual code to itself, then the code can be testable with a constant number of queries. The automorphism group of punctured Reed-Muller codes contains the general linear group GL48.96, and thus those codes supply an example with these properties. Another interesting example is duals of BCH codes (this class also contains linear functions as a particular case). Another possible extension of the results could be the study of testability of low-degree multivariate polynomials over small fields 4 6. This situation corresponds to generalized Reed-Muller codes [15]. References 1. N. Alon, M. Krivelevich, I. Newman, and M. Szegedy. Regular languages are testable with a constant number of queries. In Proceedings of the Fortieth Annual Symposium on Foundations of Computer Science, pages , 1999.

12 2. S. Arora and S. Safra. Improved low-degree testing and its applications. In Proceedings of the Twenty-Ninth Annual ACM Symposium on the Theory of Computing, pages , L. Babai, L. Fortnow, L. Levin, and M. Szegedy. Checking computations in polylogarithmic time. In Proceedings of the Twenty-Third Annual ACM Symposium on Theory of Computing, pages 21 31, L. Babai, L. Fortnow, and C. Lund. Non-deterministic exponential time has two-prover interactive protocols. Computational Complexity, 1(1):3 40, M. Bellare, D. Coppersmith, J. Håstad, M. Kiwi, and M. Sudan. Linearity testing in characteristic two. In Proceedings of the Thirty-Sixth Annual Symposium on Foundations of Computer Science, pages , M. Bellare, S. Goldwasser, C. Lund, and A. Russell. Efficient probabilistically checkable proofs and applications to approximation. In Proceedings of the Twenty-Fifth Annual ACM Symposium on the Theory of Computing, pages , M. Bellare and M. Sudan. Improved non-approximability results. In Proceedings of the Twenty-Sixth Annual ACM Symposium on the Theory of Computing, pages , E. Ben-Sasson, P. Harsha, and S. Raskhodnikova. 3CNF properties are hard to test. In Proceedings of the Thirty-Fifth Annual ACM Symposium on the Theory of Computing, To appear. 9. E. Ben-Sasson, M. Sudan, S. Vadhan, and A. Wigderson. Derandomizing low degree tests via epsilon-biased spaces. In Proceedings of the Thirty-Fifth Annual ACM Symposium on the Theory of Computing, To appear. 10. M. Blum, M. Luby, and R. Rubinfeld. Self-testing/correcting with applications to numerical problems. Journal of Computer and System Sciences, 47: , U. Feige, S. Goldwasser, L. Lovász, S. Safra, and M. Szegedy. Approximating clique is almost NP-complete. Journal of the Association for Computing Machinery, pages , K. Friedl and M. Sudan. Some improvements to total degree tests. In Proceedings of the 3rd Annual Israel Symposium on Theory of Computing and Systems, pages , Corrected version available online at madhu/papers/friedl.ps. 13. P. Gemmell, R. Lipton, R. Rubinfeld, M. Sudan, and A. Wigderson. Self-testing/correcting for polynomials and for approximate functions. In Proceedings of the Twenty-Third Annual ACM Symposium on Theory of Computing, pages 32 42, M. Hall. Combinatorial Theory. John Wiley & Sons, T. Kasami, S. Lin, and W.W. Peterson. New generalizations of the reed-muller codes, part i: Primitive codes. IEEE Transactions on Information Theory, pages , F. J. MacWilliams and N. J. A. Sloane. The Theory of Error Correcting Codes. North Holland, R. Rubinfeld and M. Sudan. Robust characterization of polynomials with applications to program testing. SIAM Journal on Computing, 25(2): , M. Sudan. Private communications, 1995.

Linearity and Group Homomorphism Testing / Testing Hadamard Codes

Linearity and Group Homomorphism Testing / Testing Hadamard Codes Title: Linearity and Group Homomorphism Testing / Testing Hadamard Codes Name: Sofya Raskhodnikova 1, Ronitt Rubinfeld 2 Affil./Addr. 1: Pennsylvania State University Affil./Addr. 2: Keywords: SumOriWork:

More information

A Brief Introduction to Property Testing

A Brief Introduction to Property Testing A Brief Introduction to Property Testing Oded Goldreich Abstract. This short article provides a brief description of the main issues that underly the study of property testing. It is meant to serve as

More information

1 Formulating The Low Degree Testing Problem

1 Formulating The Low Degree Testing Problem 6.895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Linearity Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz In the last lecture, we proved a weak PCP Theorem,

More information

1 The Line vs Point Test

1 The Line vs Point Test 6.875 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Low Degree Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz Having seen a probabilistic verifier for linearity

More information

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1. MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column

More information

LEARNING OBJECTIVES FOR THIS CHAPTER

LEARNING OBJECTIVES FOR THIS CHAPTER CHAPTER 2 American mathematician Paul Halmos (1916 2006), who in 1942 published the first modern linear algebra book. The title of Halmos s book was the same as the title of this chapter. Finite-Dimensional

More information

Notes 11: List Decoding Folded Reed-Solomon Codes

Notes 11: List Decoding Folded Reed-Solomon Codes Introduction to Coding Theory CMU: Spring 2010 Notes 11: List Decoding Folded Reed-Solomon Codes April 2010 Lecturer: Venkatesan Guruswami Scribe: Venkatesan Guruswami At the end of the previous notes,

More information

I. GROUPS: BASIC DEFINITIONS AND EXAMPLES

I. GROUPS: BASIC DEFINITIONS AND EXAMPLES I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called

More information

Duality of linear conic problems

Duality of linear conic problems Duality of linear conic problems Alexander Shapiro and Arkadi Nemirovski Abstract It is well known that the optimal values of a linear programming problem and its dual are equal to each other if at least

More information

Linear Codes. Chapter 3. 3.1 Basics

Linear Codes. Chapter 3. 3.1 Basics Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length

More information

Definition 11.1. Given a graph G on n vertices, we define the following quantities:

Definition 11.1. Given a graph G on n vertices, we define the following quantities: Lecture 11 The Lovász ϑ Function 11.1 Perfect graphs We begin with some background on perfect graphs. graphs. First, we define some quantities on Definition 11.1. Given a graph G on n vertices, we define

More information

Lecture 1: Course overview, circuits, and formulas

Lecture 1: Course overview, circuits, and formulas Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik

More information

Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range

Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range THEORY OF COMPUTING, Volume 1 (2005), pp. 37 46 http://theoryofcomputing.org Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range Andris Ambainis

More information

The degree, size and chromatic index of a uniform hypergraph

The degree, size and chromatic index of a uniform hypergraph The degree, size and chromatic index of a uniform hypergraph Noga Alon Jeong Han Kim Abstract Let H be a k-uniform hypergraph in which no two edges share more than t common vertices, and let D denote the

More information

Continued Fractions and the Euclidean Algorithm

Continued Fractions and the Euclidean Algorithm Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction

More information

Exponential time algorithms for graph coloring

Exponential time algorithms for graph coloring Exponential time algorithms for graph coloring Uriel Feige Lecture notes, March 14, 2011 1 Introduction Let [n] denote the set {1,..., k}. A k-labeling of vertices of a graph G(V, E) is a function V [k].

More information

Gröbner Bases and their Applications

Gröbner Bases and their Applications Gröbner Bases and their Applications Kaitlyn Moran July 30, 2008 1 Introduction We know from the Hilbert Basis Theorem that any ideal in a polynomial ring over a field is finitely generated [3]. However,

More information

COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction

COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH ZACHARY ABEL 1. Introduction In this survey we discuss properties of the Higman-Sims graph, which has 100 vertices, 1100 edges, and is 22 regular. In fact

More information

8 Primes and Modular Arithmetic

8 Primes and Modular Arithmetic 8 Primes and Modular Arithmetic 8.1 Primes and Factors Over two millennia ago already, people all over the world were considering the properties of numbers. One of the simplest concepts is prime numbers.

More information

A Sublinear Bipartiteness Tester for Bounded Degree Graphs

A Sublinear Bipartiteness Tester for Bounded Degree Graphs A Sublinear Bipartiteness Tester for Bounded Degree Graphs Oded Goldreich Dana Ron February 5, 1998 Abstract We present a sublinear-time algorithm for testing whether a bounded degree graph is bipartite

More information

THE DIMENSION OF A VECTOR SPACE

THE DIMENSION OF A VECTOR SPACE THE DIMENSION OF A VECTOR SPACE KEITH CONRAD This handout is a supplementary discussion leading up to the definition of dimension and some of its basic properties. Let V be a vector space over a field

More information

Tiers, Preference Similarity, and the Limits on Stable Partners

Tiers, Preference Similarity, and the Limits on Stable Partners Tiers, Preference Similarity, and the Limits on Stable Partners KANDORI, Michihiro, KOJIMA, Fuhito, and YASUDA, Yosuke February 7, 2010 Preliminary and incomplete. Do not circulate. Abstract We consider

More information

11 Multivariate Polynomials

11 Multivariate Polynomials CS 487: Intro. to Symbolic Computation Winter 2009: M. Giesbrecht Script 11 Page 1 (These lecture notes were prepared and presented by Dan Roche.) 11 Multivariate Polynomials References: MC: Section 16.6

More information

2.1 Complexity Classes

2.1 Complexity Classes 15-859(M): Randomized Algorithms Lecturer: Shuchi Chawla Topic: Complexity classes, Identity checking Date: September 15, 2004 Scribe: Andrew Gilpin 2.1 Complexity Classes In this lecture we will look

More information

arxiv:1203.1525v1 [math.co] 7 Mar 2012

arxiv:1203.1525v1 [math.co] 7 Mar 2012 Constructing subset partition graphs with strong adjacency and end-point count properties Nicolai Hähnle haehnle@math.tu-berlin.de arxiv:1203.1525v1 [math.co] 7 Mar 2012 March 8, 2012 Abstract Kim defined

More information

POLYNOMIAL RINGS AND UNIQUE FACTORIZATION DOMAINS

POLYNOMIAL RINGS AND UNIQUE FACTORIZATION DOMAINS POLYNOMIAL RINGS AND UNIQUE FACTORIZATION DOMAINS RUSS WOODROOFE 1. Unique Factorization Domains Throughout the following, we think of R as sitting inside R[x] as the constant polynomials (of degree 0).

More information

Prime Numbers and Irreducible Polynomials

Prime Numbers and Irreducible Polynomials Prime Numbers and Irreducible Polynomials M. Ram Murty The similarity between prime numbers and irreducible polynomials has been a dominant theme in the development of number theory and algebraic geometry.

More information

Algorithmic and Analysis Techniques in Property Testing

Algorithmic and Analysis Techniques in Property Testing Algorithmic and Analysis Techniques in Property Testing Dana Ron School of EE Tel-Aviv University Ramat Aviv, Israel danar@eng.tau.ac.il Abstract Property testing algorithms are ultra -efficient algorithms

More information

These axioms must hold for all vectors ū, v, and w in V and all scalars c and d.

These axioms must hold for all vectors ū, v, and w in V and all scalars c and d. DEFINITION: A vector space is a nonempty set V of objects, called vectors, on which are defined two operations, called addition and multiplication by scalars (real numbers), subject to the following axioms

More information

Mathematics Course 111: Algebra I Part IV: Vector Spaces

Mathematics Course 111: Algebra I Part IV: Vector Spaces Mathematics Course 111: Algebra I Part IV: Vector Spaces D. R. Wilkins Academic Year 1996-7 9 Vector Spaces A vector space over some field K is an algebraic structure consisting of a set V on which are

More information

On the representability of the bi-uniform matroid

On the representability of the bi-uniform matroid On the representability of the bi-uniform matroid Simeon Ball, Carles Padró, Zsuzsa Weiner and Chaoping Xing August 3, 2012 Abstract Every bi-uniform matroid is representable over all sufficiently large

More information

About the inverse football pool problem for 9 games 1

About the inverse football pool problem for 9 games 1 Seventh International Workshop on Optimal Codes and Related Topics September 6-1, 013, Albena, Bulgaria pp. 15-133 About the inverse football pool problem for 9 games 1 Emil Kolev Tsonka Baicheva Institute

More information

On an algorithm for classification of binary self-dual codes with minimum distance four

On an algorithm for classification of binary self-dual codes with minimum distance four Thirteenth International Workshop on Algebraic and Combinatorial Coding Theory June 15-21, 2012, Pomorie, Bulgaria pp. 105 110 On an algorithm for classification of binary self-dual codes with minimum

More information

Lecture 3: Finding integer solutions to systems of linear equations

Lecture 3: Finding integer solutions to systems of linear equations Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture

More information

The four [10,5,4] binary codes

The four [10,5,4] binary codes 1 Preliminaries The four [10,,] binary codes There are four distinct [10; ; ] binary codes. We shall prove this in a moderately elementary way, using the MacWilliams identities as the main tool. (For the

More information

The Online Set Cover Problem

The Online Set Cover Problem The Online Set Cover Problem Noga Alon Baruch Awerbuch Yossi Azar Niv Buchbinder Joseph Seffi Naor ABSTRACT Let X = {, 2,..., n} be a ground set of n elements, and let S be a family of subsets of X, S

More information

Lecture 13 - Basic Number Theory.

Lecture 13 - Basic Number Theory. Lecture 13 - Basic Number Theory. Boaz Barak March 22, 2010 Divisibility and primes Unless mentioned otherwise throughout this lecture all numbers are non-negative integers. We say that A divides B, denoted

More information

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013 FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,

More information

List-Decoding Reed-Muller Codes over Small Fields

List-Decoding Reed-Muller Codes over Small Fields List-Decoding Reed-Muller Codes over Small Fields Parikshit Gopalan University of Washington parik@cs.washington.edu Adam R. Klivans UT Austin klivans@cs.utexas.edu David Zuckerman UT Austin diz@cs.utexas.edu

More information

High degree graphs contain large-star factors

High degree graphs contain large-star factors High degree graphs contain large-star factors Dedicated to László Lovász, for his 60th birthday Noga Alon Nicholas Wormald Abstract We show that any finite simple graph with minimum degree d contains a

More information

The Complexity of Approximating a Nonlinear Program

The Complexity of Approximating a Nonlinear Program The Complexity of Approximating a Nonlinear Program Mihir Bellare Phillip Rogaway October 1993 Abstract We consider the problem of finding the maximum of a multivariate polynomial inside a convex polytope.

More information

IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL. 1. Introduction

IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL. 1. Introduction IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL R. DRNOVŠEK, T. KOŠIR Dedicated to Prof. Heydar Radjavi on the occasion of his seventieth birthday. Abstract. Let S be an irreducible

More information

Hard Functions for Low-degree Polynomials over Prime Fields

Hard Functions for Low-degree Polynomials over Prime Fields 0 Hard Functions for Low-degree Polynomials over Prime Fields Andrej Bogdanov, Department of Computer Science and Engineering and Institute for Theoretical Computer Science and Communications, Chinese

More information

Testing Hereditary Properties of Non-Expanding Bounded-Degree Graphs

Testing Hereditary Properties of Non-Expanding Bounded-Degree Graphs Testing Hereditary Properties of Non-Expanding Bounded-Degree Graphs Artur Czumaj Asaf Shapira Christian Sohler Abstract We study graph properties which are testable for bounded degree graphs in time independent

More information

Two classes of ternary codes and their weight distributions

Two classes of ternary codes and their weight distributions Two classes of ternary codes and their weight distributions Cunsheng Ding, Torleiv Kløve, and Francesco Sica Abstract In this paper we describe two classes of ternary codes, determine their minimum weight

More information

Minimally Infeasible Set Partitioning Problems with Balanced Constraints

Minimally Infeasible Set Partitioning Problems with Balanced Constraints Minimally Infeasible Set Partitioning Problems with alanced Constraints Michele Conforti, Marco Di Summa, Giacomo Zambelli January, 2005 Revised February, 2006 Abstract We study properties of systems of

More information

α = u v. In other words, Orthogonal Projection

α = u v. In other words, Orthogonal Projection Orthogonal Projection Given any nonzero vector v, it is possible to decompose an arbitrary vector u into a component that points in the direction of v and one that points in a direction orthogonal to v

More information

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory

More information

The Complexity of Online Memory Checking

The Complexity of Online Memory Checking The Complexity of Online Memory Checking Moni Naor Guy N. Rothblum Abstract We consider the problem of storing a large file on a remote and unreliable server. To verify that the file has not been corrupted,

More information

ALMOST COMMON PRIORS 1. INTRODUCTION

ALMOST COMMON PRIORS 1. INTRODUCTION ALMOST COMMON PRIORS ZIV HELLMAN ABSTRACT. What happens when priors are not common? We introduce a measure for how far a type space is from having a common prior, which we term prior distance. If a type

More information

Quotient Rings and Field Extensions

Quotient Rings and Field Extensions Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.

More information

8 Divisibility and prime numbers

8 Divisibility and prime numbers 8 Divisibility and prime numbers 8.1 Divisibility In this short section we extend the concept of a multiple from the natural numbers to the integers. We also summarize several other terms that express

More information

Mathematical Induction

Mathematical Induction Mathematical Induction (Handout March 8, 01) The Principle of Mathematical Induction provides a means to prove infinitely many statements all at once The principle is logical rather than strictly mathematical,

More information

HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)!

HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)! Math 7 Fall 205 HOMEWORK 5 SOLUTIONS Problem. 2008 B2 Let F 0 x = ln x. For n 0 and x > 0, let F n+ x = 0 F ntdt. Evaluate n!f n lim n ln n. By directly computing F n x for small n s, we obtain the following

More information

Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs

Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Stavros Athanassopoulos, Ioannis Caragiannis, and Christos Kaklamanis Research Academic Computer Technology Institute

More information

4.5 Linear Dependence and Linear Independence

4.5 Linear Dependence and Linear Independence 4.5 Linear Dependence and Linear Independence 267 32. {v 1, v 2 }, where v 1, v 2 are collinear vectors in R 3. 33. Prove that if S and S are subsets of a vector space V such that S is a subset of S, then

More information

3. Mathematical Induction

3. Mathematical Induction 3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)

More information

Victor Shoup Avi Rubin. fshoup,rubing@bellcore.com. Abstract

Victor Shoup Avi Rubin. fshoup,rubing@bellcore.com. Abstract Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,rubing@bellcore.com Abstract In this paper, we investigate a method by which smart

More information

DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS

DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS ASHER M. KACH, KAREN LANGE, AND REED SOLOMON Abstract. We construct two computable presentations of computable torsion-free abelian groups, one of isomorphism

More information

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding

More information

PYTHAGOREAN TRIPLES KEITH CONRAD

PYTHAGOREAN TRIPLES KEITH CONRAD PYTHAGOREAN TRIPLES KEITH CONRAD 1. Introduction A Pythagorean triple is a triple of positive integers (a, b, c) where a + b = c. Examples include (3, 4, 5), (5, 1, 13), and (8, 15, 17). Below is an ancient

More information

Metric Spaces. Chapter 7. 7.1. Metrics

Metric Spaces. Chapter 7. 7.1. Metrics Chapter 7 Metric Spaces A metric space is a set X that has a notion of the distance d(x, y) between every pair of points x, y X. The purpose of this chapter is to introduce metric spaces and give some

More information

Chapter 3. Cartesian Products and Relations. 3.1 Cartesian Products

Chapter 3. Cartesian Products and Relations. 3.1 Cartesian Products Chapter 3 Cartesian Products and Relations The material in this chapter is the first real encounter with abstraction. Relations are very general thing they are a special type of subset. After introducing

More information

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS Systems of Equations and Matrices Representation of a linear system The general system of m equations in n unknowns can be written a x + a 2 x 2 + + a n x n b a

More information

On Rank vs. Communication Complexity

On Rank vs. Communication Complexity On Rank vs. Communication Complexity Noam Nisan Avi Wigderson Abstract This paper concerns the open problem of Lovász and Saks regarding the relationship between the communication complexity of a boolean

More information

SECRET sharing schemes were introduced by Blakley [5]

SECRET sharing schemes were introduced by Blakley [5] 206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has

More information

1 VECTOR SPACES AND SUBSPACES

1 VECTOR SPACES AND SUBSPACES 1 VECTOR SPACES AND SUBSPACES What is a vector? Many are familiar with the concept of a vector as: Something which has magnitude and direction. an ordered pair or triple. a description for quantities such

More information

Fairness in Routing and Load Balancing

Fairness in Routing and Load Balancing Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria

More information

The Prime Numbers. Definition. A prime number is a positive integer with exactly two positive divisors.

The Prime Numbers. Definition. A prime number is a positive integer with exactly two positive divisors. The Prime Numbers Before starting our study of primes, we record the following important lemma. Recall that integers a, b are said to be relatively prime if gcd(a, b) = 1. Lemma (Euclid s Lemma). If gcd(a,

More information

So let us begin our quest to find the holy grail of real analysis.

So let us begin our quest to find the holy grail of real analysis. 1 Section 5.2 The Complete Ordered Field: Purpose of Section We present an axiomatic description of the real numbers as a complete ordered field. The axioms which describe the arithmetic of the real numbers

More information

Similarity and Diagonalization. Similar Matrices

Similarity and Diagonalization. Similar Matrices MATH022 Linear Algebra Brief lecture notes 48 Similarity and Diagonalization Similar Matrices Let A and B be n n matrices. We say that A is similar to B if there is an invertible n n matrix P such that

More information

1 if 1 x 0 1 if 0 x 1

1 if 1 x 0 1 if 0 x 1 Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or

More information

Permutation Betting Markets: Singleton Betting with Extra Information

Permutation Betting Markets: Singleton Betting with Extra Information Permutation Betting Markets: Singleton Betting with Extra Information Mohammad Ghodsi Sharif University of Technology ghodsi@sharif.edu Hamid Mahini Sharif University of Technology mahini@ce.sharif.edu

More information

Basics of Polynomial Theory

Basics of Polynomial Theory 3 Basics of Polynomial Theory 3.1 Polynomial Equations In geodesy and geoinformatics, most observations are related to unknowns parameters through equations of algebraic (polynomial) type. In cases where

More information

Lecture 17 : Equivalence and Order Relations DRAFT

Lecture 17 : Equivalence and Order Relations DRAFT CS/Math 240: Introduction to Discrete Mathematics 3/31/2011 Lecture 17 : Equivalence and Order Relations Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT Last lecture we introduced the notion

More information

Vector and Matrix Norms

Vector and Matrix Norms Chapter 1 Vector and Matrix Norms 11 Vector Spaces Let F be a field (such as the real numbers, R, or complex numbers, C) with elements called scalars A Vector Space, V, over the field F is a non-empty

More information

ALGEBRAIC APPROACH TO COMPOSITE INTEGER FACTORIZATION

ALGEBRAIC APPROACH TO COMPOSITE INTEGER FACTORIZATION ALGEBRAIC APPROACH TO COMPOSITE INTEGER FACTORIZATION Aldrin W. Wanambisi 1* School of Pure and Applied Science, Mount Kenya University, P.O box 553-50100, Kakamega, Kenya. Shem Aywa 2 Department of Mathematics,

More information

Every Positive Integer is the Sum of Four Squares! (and other exciting problems)

Every Positive Integer is the Sum of Four Squares! (and other exciting problems) Every Positive Integer is the Sum of Four Squares! (and other exciting problems) Sophex University of Texas at Austin October 18th, 00 Matilde N. Lalín 1. Lagrange s Theorem Theorem 1 Every positive integer

More information

CS 103X: Discrete Structures Homework Assignment 3 Solutions

CS 103X: Discrete Structures Homework Assignment 3 Solutions CS 103X: Discrete Structures Homework Assignment 3 s Exercise 1 (20 points). On well-ordering and induction: (a) Prove the induction principle from the well-ordering principle. (b) Prove the well-ordering

More information

Introduction to Algebraic Coding Theory

Introduction to Algebraic Coding Theory Introduction to Algebraic Coding Theory Supplementary material for Math 336 Cornell University Sarah A. Spence Contents 1 Introduction 1 2 Basics 2 2.1 Important code parameters..................... 4

More information

Lecture 11: The Goldreich-Levin Theorem

Lecture 11: The Goldreich-Levin Theorem COM S 687 Introduction to Cryptography September 28, 2006 Lecture 11: The Goldreich-Levin Theorem Instructor: Rafael Pass Scribe: Krishnaprasad Vikram Hard-Core Bits Definition: A predicate b : {0, 1}

More information

Regular Languages and Finite Automata

Regular Languages and Finite Automata Regular Languages and Finite Automata 1 Introduction Hing Leung Department of Computer Science New Mexico State University Sep 16, 2010 In 1943, McCulloch and Pitts [4] published a pioneering work on a

More information

k, then n = p2α 1 1 pα k

k, then n = p2α 1 1 pα k Powers of Integers An integer n is a perfect square if n = m for some integer m. Taking into account the prime factorization, if m = p α 1 1 pα k k, then n = pα 1 1 p α k k. That is, n is a perfect square

More information

15. Symmetric polynomials

15. Symmetric polynomials 15. Symmetric polynomials 15.1 The theorem 15.2 First examples 15.3 A variant: discriminants 1. The theorem Let S n be the group of permutations of {1,, n}, also called the symmetric group on n things.

More information

Notes on Determinant

Notes on Determinant ENGG2012B Advanced Engineering Mathematics Notes on Determinant Lecturer: Kenneth Shum Lecture 9-18/02/2013 The determinant of a system of linear equations determines whether the solution is unique, without

More information

ON SEQUENTIAL CONTINUITY OF COMPOSITION MAPPING. 0. Introduction

ON SEQUENTIAL CONTINUITY OF COMPOSITION MAPPING. 0. Introduction ON SEQUENTIAL CONTINUITY OF COMPOSITION MAPPING Abstract. In [1] there was proved a theorem concerning the continuity of the composition mapping, and there was announced a theorem on sequential continuity

More information

SCORE SETS IN ORIENTED GRAPHS

SCORE SETS IN ORIENTED GRAPHS Applicable Analysis and Discrete Mathematics, 2 (2008), 107 113. Available electronically at http://pefmath.etf.bg.ac.yu SCORE SETS IN ORIENTED GRAPHS S. Pirzada, T. A. Naikoo The score of a vertex v in

More information

CONTRIBUTIONS TO ZERO SUM PROBLEMS

CONTRIBUTIONS TO ZERO SUM PROBLEMS CONTRIBUTIONS TO ZERO SUM PROBLEMS S. D. ADHIKARI, Y. G. CHEN, J. B. FRIEDLANDER, S. V. KONYAGIN AND F. PAPPALARDI Abstract. A prototype of zero sum theorems, the well known theorem of Erdős, Ginzburg

More information

A Little Set Theory (Never Hurt Anybody)

A Little Set Theory (Never Hurt Anybody) A Little Set Theory (Never Hurt Anybody) Matthew Saltzman Department of Mathematical Sciences Clemson University Draft: August 21, 2013 1 Introduction The fundamental ideas of set theory and the algebra

More information

A characterization of trace zero symmetric nonnegative 5x5 matrices

A characterization of trace zero symmetric nonnegative 5x5 matrices A characterization of trace zero symmetric nonnegative 5x5 matrices Oren Spector June 1, 009 Abstract The problem of determining necessary and sufficient conditions for a set of real numbers to be the

More information

How To Prove The Dirichlet Unit Theorem

How To Prove The Dirichlet Unit Theorem Chapter 6 The Dirichlet Unit Theorem As usual, we will be working in the ring B of algebraic integers of a number field L. Two factorizations of an element of B are regarded as essentially the same if

More information

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH 31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,

More information

Influences in low-degree polynomials

Influences in low-degree polynomials Influences in low-degree polynomials Artūrs Bačkurs December 12, 2012 1 Introduction In 3] it is conjectured that every bounded real polynomial has a highly influential variable The conjecture is known

More information

Follow links for Class Use and other Permissions. For more information send email to: permissions@pupress.princeton.edu

Follow links for Class Use and other Permissions. For more information send email to: permissions@pupress.princeton.edu COPYRIGHT NOTICE: Ariel Rubinstein: Lecture Notes in Microeconomic Theory is published by Princeton University Press and copyrighted, c 2006, by Princeton University Press. All rights reserved. No part

More information

Optimal File Sharing in Distributed Networks

Optimal File Sharing in Distributed Networks Optimal File Sharing in Distributed Networks Moni Naor Ron M. Roth Abstract The following file distribution problem is considered: Given a network of processors represented by an undirected graph G = (V,

More information

FINITE DIMENSIONAL ORDERED VECTOR SPACES WITH RIESZ INTERPOLATION AND EFFROS-SHEN S UNIMODULARITY CONJECTURE AARON TIKUISIS

FINITE DIMENSIONAL ORDERED VECTOR SPACES WITH RIESZ INTERPOLATION AND EFFROS-SHEN S UNIMODULARITY CONJECTURE AARON TIKUISIS FINITE DIMENSIONAL ORDERED VECTOR SPACES WITH RIESZ INTERPOLATION AND EFFROS-SHEN S UNIMODULARITY CONJECTURE AARON TIKUISIS Abstract. It is shown that, for any field F R, any ordered vector space structure

More information

ON THE COEFFICIENTS OF THE LINKING POLYNOMIAL

ON THE COEFFICIENTS OF THE LINKING POLYNOMIAL ADSS, Volume 3, Number 3, 2013, Pages 45-56 2013 Aditi International ON THE COEFFICIENTS OF THE LINKING POLYNOMIAL KOKO KALAMBAY KAYIBI Abstract Let i j T( M; = tijx y be the Tutte polynomial of the matroid

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

Max-Min Representation of Piecewise Linear Functions

Max-Min Representation of Piecewise Linear Functions Beiträge zur Algebra und Geometrie Contributions to Algebra and Geometry Volume 43 (2002), No. 1, 297-302. Max-Min Representation of Piecewise Linear Functions Sergei Ovchinnikov Mathematics Department,

More information

Notes on Complexity Theory Last updated: August, 2011. Lecture 1

Notes on Complexity Theory Last updated: August, 2011. Lecture 1 Notes on Complexity Theory Last updated: August, 2011 Jonathan Katz Lecture 1 1 Turing Machines I assume that most students have encountered Turing machines before. (Students who have not may want to look

More information