15-251: Great Theoretical Ideas in Computer Science Anupam Gupta Notes on Combinatorial Games (draft!!) January 29, 2012
|
|
|
- Randall Justin Baker
- 10 years ago
- Views:
Transcription
1 15-251: Great Theoretical Ideas in Computer Science Anupam Gupta Notes on Combinatorial Games (draft!!) January 29, A Take-Away Game Consider the following game: there are 21 chips on the table. You are challenged by your arch-enemy to play the following game: you both have to alternate moves, where in each move, you can take away either 1, 2, or 3 chips from the table. The person who has no more chips to remove from the table chips loses. Should you go first or second? Hmm. Let s try some small examples. Suppose there were n chips on the table. And if n = 1, 2 or 3, clearly you should go first: you could pick up all the chips and win! But if n = 4? Then you should go second: your arch-enemy would have to take away at least one, but at most three of the chips, leaving you with a winning move! Hence, for n = 4, the first player loses. What about n = 5? Note, now, that if you went first, you could take away a single chip, leaving the game at n = 4 with arch-enemy playing next. Similarly with n = 6 or 7: you could get the game to n = 4 by removing 2 or 3 chips respectively whence you would win. And n = 8? Go second: no matter what arch-enemy does, he will leave behind 5, 6 or 7 chips on the table, you can remove some chips to get it to 4, and the process repeats. The pattern seems pretty clear by now, so let s prove the theorem. Theorem 1.1 Suppose we start off with n chips. Then the first player has a winning strategy for all n that is not a multiple of 4. For n being a multiple of 4, the second player can always win, regardless of what strategy the first player plays. Proof: The proof is by induction. Let s start with n = 0 (which is a multiple of 4): then the first player loses. And for n = 1, 2, 3 the first player wins. Now suppose the theorem is true for all k < n. And suppose n = 4a + b for integers a, b, where a 1 and b {0, 1, 2, 3}. If b 0 (and hence n is not a multiple of 4), then consider the move that removes b chips. This results in 4a chips on the table, so by the I.H. the next player will lose. Hence we ve given a winning strategy for the first player when n is not a multiple of 4 namely, pick up n (mod 4) chips. What if b = 0 and n is a multiple of 4. Then no matter how many chips c {1, 2, 3} the first player picks up, the second player can remove 4 c chips and return to a smaller multiple of 4, which by the I.H. is a loss for the first player. This proves the result. Let us call this game TAG 3 : the take-away game where one moves at most 3 chips at a time. Exercise: Consider the game TAG k, where each move consists of removing at least one chip and at most k chips, for k 1. For what values of n does the first player have a winning strategy? Exercise : Suppose each move consisted of removing either 1 or 3 chips. For what values of n does the first player have a winning strategy? 1
2 1.1 A Change of Perspective: You Win if You Can t Move What if we changed the rules to say: if it s your turn and you have no more chips to remove, you win. In this case, who wins? (Again, each player is allowed to take away 1, 2 or 3 chips in any move. Again, simple examples do the trick: n = 0, first player wins. n = 1, the first player has to remove that one chip, and the second player wins. But now for n = 2, 3, 4, the first player can remove 1, 2, 3 chips respectively, leaving behind a single chip, causing the next player to lose! Hence, the pattern suggests that the first player wins for all n that are not of the form 4k + 1. Exercise: Give a formal inductive proof of the statement the first player has a winning strategy precisely for all values of n that are not 4k Combinatorial Games What s a combinatorial game? It is a game involving two players (who we ll often call Alice and Bob). The game is in some state at any point in time, and this state is known to both the players. (This is often called perfect information.) In any state, each of the two players has a set of valid moves, and each of these valid moves causes the state to change to some other, well-defined state. The game starts in some initial state, and the players alternate moving. We say the game has reached a terminal state when there are no valid moves for the player whose turn it is. In this situation, one of the two players is declared the winner, and the other person the loser. Notice: there are no draws. Who wins? Well, under normal rules, The last player to play wins. So if Alice just played, and Bob s turn is next but he has no valid moves, then Alice wins and Bob loses. You want to make sure you always have a valid move to make. However, under misère rules, it is the opposite: the person who plays the last move loses: to win, you want to make sure the other person always has a move. In the rest of this lecture we will talk about normal rules games; however you will see misère games in exercises and homeworks. 2.1 The Take-Away Game The take-away game in the previous section was a combinatorial game: the states can be denoted by the numbers 0, 1, 2,..., 21. In state i, the valid moves for either player are to change the state to i 1, i 2 or i 3. (In any state, the set of valid moves are the same, regardless of whose turn it is next.) Such a game is called an impartial game, as opposed to partizan games. We ll only study impartial games in this lecture, and our definitions are only for such games. 2.2 What Are not Combinatorial Games? Many of the games we play are not combinatorial games, and for various reasons: 1. Combinatorial Games are games of perfect information. Hence, e.g., battleship is not a combinatorial game. 2
3 2. Combinatorial Games are games without any element of chance: when you play a move in a certain state, you know exactly what the resulting state is, there is no randomness. Hence, e.g., backgammon or parcheesi or most other board games that involve dice are not combinatorial games. 3. Combinatorial Games are games without draws: one person wins and the other loses. Hence, e.g., chess, or tic-tac-toe are not combinatorial games. However, we ll see games like Chomp, or Nim, in this lecture, that are combinatorial games. 3 P and N positions To make our discussion of combinatorial games precise, the definition that helps the most is that of P -positions and N-positions. An N-position is one where the player to play next has a winning strategy (and so it is a win for the Next player hence the N ). I.e., he can win no matter what the other player does. In contrast, a P -position is one where the player to play next has no winning strategy hence he will always lose against an adversary who is playing optimally so it is a win for the Previous player, which explains the P. Note that this means that in the take-away game TAG 3 where you take away up to 3 chips at a time, 21 chips is an N-position. 3.1 The Formal Inductive Definition For a normal form game, we define P - and N-positions as follows: All terminal positions are P -positions. A position such that all moves from this position lead to N-positions is a P -position. A position such that there exists at least one move from this position leading to a P -position is an N-position. Note the asymmetry in the defintion: a N-position is one where at least one move leads to a P -position, but a P -position is one from which there are no moves leading to an P - position all of them lead to N-positions. By the very definition above, we know: A position is a win for the first player if and only if it is an N-position. Let us couch our observations about the take-away game in terms of this new terminology: Example: Consider the take-away game TAG 3 : the only terminal position is when there are zero tokens left, and hence 0 is a P -position. Now 1, 2, 3 are all N-positions, because they all have a move leading to a P -position. However, 4 can only lead to 1, 2, 3, which are all N-positions, so it is a P -position. In general, we inductively prove that n is a P -position if and only if n is a multiple of 4. The base cases are proved above. Suppose this is true for all k < n. Then for n, if n is a multiple 3
4 of 4, then the only positions it leads to are n 1, n 2, n 3, all non-multiples of 4 and hence N-positions (by the I.H.), so n is a P -position. Else one of n 1, n 2, n 3 is a multiple of 4 and a P -position, so n must be an N-position. Exercise: Prove that the P -positions for the take-away game TAG k (where you remove at most k tokens at a time) are precisely those which are 0 mod (k + 1). 4 Chomp! Consider the following combinatorial game where each position is a finite connected portion of the positive two-dimensional grid: each square is numbered (x, y) for x 1 and y 1. E.g., or Each move consists of choosing a square (x, y) where x 1 and y 1 but not (1, 1) (the square colored yellow) and removing all the squares above and to the right of this chosen square. Note that the terminal position is when only the square (1, 1) remains. E.g., in the latter example above, one could choose (3, 2) and hence move to: or choose (5, 1) and hence move to: 4.1 Small Examples As with most games, it helps to play with some small examples. First, note that if the board consists only of a single row or column, it is a N-position: the player can play either (2, 1) or (1, 2) and win. What about the following small L-shaped piece? 4
5 It s a P -position: any move leads to a single row or column, which is an N-position. How about this one: It s an N-position: by removing the top piece (1, 3) we get to the little L-shaped piece above, which was a P -position. And how about the 2 2 square? Again, removing (2, 2) gets us back to the little L, and hence the 2 2 square is a N-position. Finally, how about this one: We claim it is a P -position. Why? Well, the potential moves lead to: Each of these pieces we ve already shown to be P -positions. And what about the position: It is an N-position simply because playing the move (3, 1) leads to the position which we just showed was a P -position. 5
6 4.2 Chomp Starting at Square Boards Let s consider Chomp where the starting position is an n n square board. Theorem 4.1 If n > 1, the n n-square position is an N-position. Proof: To show this, it suffices to show a strategy for the first player: indeed, she should play (2, 2) as the first move. Then we re left with an L-shaped board with equal length arms, which we claim is a P -position. Indeed, if the arms of the L-shaped piece have non-zero length, whatever move the second player makes (which is either (1, y) or (x, 1)), the first player can then play the mirror-image of that move (namely either (y, 1) or (1, x) respectively) to get back to an L-shaped board with arms of equal length. Eventually both arms will be depleted, and the second player will lose. In other words, the L-shaped position with arms of equal length is a P -position. And hence the square board is an N-position. Exercise: Show that an L-shaped position where the arms have unequal lengths is an N- position. Exercise: Bonzo claims that a non-square rectangular shape (i.e., an n m board with n m) is a P -position. His argument is that by playing (2, 2), he can move to the L-shaped position with unequal length arms, which is a N-position. Why is he incorrect? Mirroring The strategy we used above one where we got into a position where we could ensure there was always a valid move that mirrored the other player s move is an important strategy in combinatorial games. This is a simple but surprisingly effective way of showing something is a P -position: show that whatever the next player does, you can always make another valid move to prevent him from winning. 4.3 Chomp Starting at Rectangle Boards You just saw mirroring: we will now see another important proof technique. How to analyze Chomp on rectangular boards? 6
7 We know that (2, 2) is not a good first move, since it leads to an N-position. What should we play? Well, in this case we don t know an explicit strategy that shows that all rectangular boards are N-positions. 1 However, we will still prove the following: Theorem 4.2 The m n-rectangular position is an N-position as long as not both of n or m equal 1. Proof: Since at least one of m, n > 1, consider the move (m, n). The new board looks like: Either this is a P -position, in which case the rectangular board was an N-position. Or this is an N-position. So there must be some move (x, y) that leads to a P -position. But then we could have made the move (x, y) right from the initial rectangular position to get to the same P -position! So the original rectangular board is an N-position in this case too!! Interesting. We don t know what the winning first move is, but we know one exists. 2 This proof technique is often called strategy stealing : either our first move was a winning one, or the other player now has a winning move and we can steal it! 5 Nim Nim is another take-away game, but somewhat different from the ones we saw earlier in the lecture. In Nim there are k piles of chips. In each move we choose one of the non-empty piles and remove some number of the chips from that pile at least one chip, at most all the chips in that pile. The terminal position is when no chips remain. 5.1 A Single Pile What if k = 1, and we have only one pile of chips? Well, we can just remove all the chips from that pile, and win. A single pile is thus an N-position. 1 You can give an explicit strategy showing this for 2 n boards. 2 It remains an open problem to give an explicit winning strategy for the first player. 7
8 5.2 Two Piles What if we have two piles, with an equal number x of chips in the two piles. Let s denote this by (x, x). Then whatever the first player plays, say removing some chips from the first pile to make it (y, x), the second player can mirror the strategy to make it (y, y) again. So the first player loses, and hence (x, x) is a P -position. And since any position (x, y) with x > y can move to (y, y), this is a N-position. So in two-pile nim, we have a P -position if and only if both piles are equal. 5.3 Three Piles This is when it gets interesting. We now consider positions (x, y, z). If any of these were zero, we would have two piles, so consider x, y, z > 0. If two piles are equal say (x, x, z) we could empty out the third pile to get (x, x, 0), which is a P -position. So (x, x, z) is an N-position. But what if x y z?? Hmm. The thing to do again is to try small examples to see if you detect a pattern; this will require some time so let s cut to the chase The Nim-Sum Operation For naturals x, y, define their nim-sum x y to be their sum modulo 2 without carry. Equivalently, it is the bitwise exclusive-or of their binary representations. E.g.: 2 3 = (10) 2 (11) 2 = (01) 2 = = (101) 2 (11) 2 = (110) 2 = = (101010) 2 (11011) 2 = (110001)2 = 49. Fact 5.1 The following facts are easy to establish: Nim-sum is commutative: x y = y x. Nim-sum is associative: (x y) z = x (y x). For naturals x, y, x y = 0 if and only if x = y. From the second and third properties above, we get x y = x z = x (x y) = x (x z) = (x x) y = (x x) z = y = z 8
9 5.3.2 Bouton s Theorem We can now describe the characterization of the P -positions and N-positions of 3-pile Nim: Theorem 5.2 (Bouton s Theorem) The position (x, y, z) is a P -position if and only if x y z = 0. The proof is subtle but simple, directly using the definitions of P - and N-positions. Proof: Define Z to be the set of positions (x, y, z) where x y z = 0, and NZ be the other positions. We will show that Z and NZ satisfy the three properties of being the set of P -positions and the set of N-positions respectively. 1. All terminal positions are P -positions. Indeed, the only terminal position is (0, 0, 0), which is in Z. 2. All moves from a P -position lead only to N-positions. Consider any state (x, y, z) in Z so x y z = 0. Note that removing tokens from any of the piles (say x x ) gives us x y z 0 = x y z, by the cancellation property and the fact that x x. So all moves from (x, y, z) Z lead to positions in NZ. 3. There exists a move from an N-position to some P -position. Consider a position (x, y, z) NZ: hence x y z = w 0. We claim we can choose a pile and some number of chips to remove from it to get to a position in Z. Since w 0, let the i th bit be the highest bit set to 1 in w. Since w is the bit-wise XOR of x, y, z, at least one of these three must have their i th bit set to 1 say it is x. Now consider x = x w. We claim this is the binary representation of a number strictly less than x. Why? Because x x = 2 j 2 j. j i:x j =1,x j =0 j i:x j =0,x j =1 But, since the first sum contains at least the index i, this is at least 2 i j<i:x j x 2 j j 1. Hence we can remove x x chips from the pile x to get to (x, y, z). And moreover, x y z = (x w) y z = (x y z) w = w w = 0, so we have shown how to get to some position in Z. 5.4 More Piles and Bouton In fact, Bouton s theorem easily generalizes to k piles: (x 1, x 2,..., x k ) is a P -position x 1 x 2,... x k = 0. Exercise : Characterize the P - and N-positions for misère form of Nim. There are many variants of Nim: you ll probably see some in homeworks and recitations. For example here is one of them. Exercise : Consider a restricted from of Nim, where we are allowed to only remove up to k chips from the chosen pile. What are the P - and N-positions for this game? 9
10 6 Extensions and Further Reading The theory of combinatorial games are intricately connected with Nim. Indeed, one can show that, in a very precise sense, Nim captures all impartial games in normal form. Much more about this can be found, e.g., in the book Game Theory by Tom Ferguson (available online), or the book Winning Ways for your Mathematical Plays by Berlekamp, Conway and Guy. And if you are interested, you should keep an eye out for the course (one in the series of theory topics courses) on mathematical games that Alan Frieze and Danny Sleator teach every couple of years. 7 To Do Add more exercises and examples. Add (optional) discussion about Nimbers, misère form games, some partizan games? 10
Discrete Math in Computer Science Homework 7 Solutions (Max Points: 80)
Discrete Math in Computer Science Homework 7 Solutions (Max Points: 80) CS 30, Winter 2016 by Prasad Jayanti 1. (10 points) Here is the famous Monty Hall Puzzle. Suppose you are on a game show, and you
Sowing Games JEFF ERICKSON
Games of No Chance MSRI Publications Volume 29, 1996 Sowing Games JEFF ERICKSON Abstract. At the Workshop, John Conway and Richard Guy proposed the class of sowing games, loosely based on the ancient African
TAKE-AWAY GAMES. ALLEN J. SCHWENK California Institute of Technology, Pasadena, California INTRODUCTION
TAKE-AWAY GAMES ALLEN J. SCHWENK California Institute of Technology, Pasadena, California L INTRODUCTION Several games of Tf take-away?f have become popular. The purpose of this paper is to determine the
6.042/18.062J Mathematics for Computer Science. Expected Value I
6.42/8.62J Mathematics for Computer Science Srini Devadas and Eric Lehman May 3, 25 Lecture otes Expected Value I The expectation or expected value of a random variable is a single number that tells you
Clock Arithmetic and Modular Systems Clock Arithmetic The introduction to Chapter 4 described a mathematical system
CHAPTER Number Theory FIGURE FIGURE FIGURE Plus hours Plus hours Plus hours + = + = + = FIGURE. Clock Arithmetic and Modular Systems Clock Arithmetic The introduction to Chapter described a mathematical
One pile, two pile, three piles
CHAPTER 4 One pile, two pile, three piles 1. One pile Rules: One pile is a two-player game. Place a small handful of stones in the middle. At every turn, the player decided whether to take one, two, or
Colored Hats and Logic Puzzles
Colored Hats and Logic Puzzles Alex Zorn January 21, 2013 1 Introduction In this talk we ll discuss a collection of logic puzzles/games in which a number of people are given colored hats, and they try
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
Gaming the Law of Large Numbers
Gaming the Law of Large Numbers Thomas Hoffman and Bart Snapp July 3, 2012 Many of us view mathematics as a rich and wonderfully elaborate game. In turn, games can be used to illustrate mathematical ideas.
Pigeonhole Principle Solutions
Pigeonhole Principle Solutions 1. Show that if we take n + 1 numbers from the set {1, 2,..., 2n}, then some pair of numbers will have no factors in common. Solution: Note that consecutive numbers (such
AMS 5 CHANCE VARIABILITY
AMS 5 CHANCE VARIABILITY The Law of Averages When tossing a fair coin the chances of tails and heads are the same: 50% and 50%. So if the coin is tossed a large number of times, the number of heads and
Factoring & Primality
Factoring & Primality Lecturer: Dimitris Papadopoulos In this lecture we will discuss the problem of integer factorization and primality testing, two problems that have been the focus of a great amount
NIM with Cash. Abstract. loses. This game has been well studied. For example, it is known that for NIM(1, 2, 3; n)
NIM with Cash William Gasarch Univ. of MD at College Park John Purtilo Univ. of MD at College Park Abstract NIM(a 1,..., a k ; n) is a -player game where initially there are n stones on the board and the
Mathematical Induction
Mathematical Induction (Handout March 8, 01) The Principle of Mathematical Induction provides a means to prove infinitely many statements all at once The principle is logical rather than strictly mathematical,
Offline 1-Minesweeper is NP-complete
Offline 1-Minesweeper is NP-complete James D. Fix Brandon McPhail May 24 Abstract We use Minesweeper to illustrate NP-completeness proofs, arguments that establish the hardness of solving certain problems.
THE DIMENSION OF A VECTOR SPACE
THE DIMENSION OF A VECTOR SPACE KEITH CONRAD This handout is a supplementary discussion leading up to the definition of dimension and some of its basic properties. Let V be a vector space over a field
Worksheet for Teaching Module Probability (Lesson 1)
Worksheet for Teaching Module Probability (Lesson 1) Topic: Basic Concepts and Definitions Equipment needed for each student 1 computer with internet connection Introduction In the regular lectures in
Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 13. Random Variables: Distribution and Expectation
CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 3 Random Variables: Distribution and Expectation Random Variables Question: The homeworks of 20 students are collected
Mathematical Induction
Mathematical Induction In logic, we often want to prove that every member of an infinite set has some feature. E.g., we would like to show: N 1 : is a number 1 : has the feature Φ ( x)(n 1 x! 1 x) How
VISUAL ALGEBRA FOR COLLEGE STUDENTS. Laurie J. Burton Western Oregon University
VISUAL ALGEBRA FOR COLLEGE STUDENTS Laurie J. Burton Western Oregon University VISUAL ALGEBRA FOR COLLEGE STUDENTS TABLE OF CONTENTS Welcome and Introduction 1 Chapter 1: INTEGERS AND INTEGER OPERATIONS
An Innocent Investigation
An Innocent Investigation D. Joyce, Clark University January 2006 The beginning. Have you ever wondered why every number is either even or odd? I don t mean to ask if you ever wondered whether every number
Chapter 7. Sealed-bid Auctions
Chapter 7 Sealed-bid Auctions An auction is a procedure used for selling and buying items by offering them up for bid. Auctions are often used to sell objects that have a variable price (for example oil)
Chapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm.
Chapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm. We begin by defining the ring of polynomials with coefficients in a ring R. After some preliminary results, we specialize
Game Theory and Poker
Game Theory and Poker Jason Swanson April, 2005 Abstract An extremely simplified version of poker is completely solved from a game theoretic standpoint. The actual properties of the optimal solution are
15-251. Great Theoretical Ideas in Computer Science
15-251 Great Theoretical Ideas in Computer Science 15-251 Course Evaluations: sadistic Student Comments 251 is like: we re gonna kick your ass and you re gonna enjoy it. And we did! Awesome, despite soul-crushing
Math 319 Problem Set #3 Solution 21 February 2002
Math 319 Problem Set #3 Solution 21 February 2002 1. ( 2.1, problem 15) Find integers a 1, a 2, a 3, a 4, a 5 such that every integer x satisfies at least one of the congruences x a 1 (mod 2), x a 2 (mod
Solutions for Practice problems on proofs
Solutions for Practice problems on proofs Definition: (even) An integer n Z is even if and only if n = 2m for some number m Z. Definition: (odd) An integer n Z is odd if and only if n = 2m + 1 for some
Some Polynomial Theorems. John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 [email protected].
Some Polynomial Theorems by John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 [email protected] This paper contains a collection of 31 theorems, lemmas,
POLYNOMIAL RINGS AND UNIQUE FACTORIZATION DOMAINS
POLYNOMIAL RINGS AND UNIQUE FACTORIZATION DOMAINS RUSS WOODROOFE 1. Unique Factorization Domains Throughout the following, we think of R as sitting inside R[x] as the constant polynomials (of degree 0).
11 Ideals. 11.1 Revisiting Z
11 Ideals The presentation here is somewhat different than the text. In particular, the sections do not match up. We have seen issues with the failure of unique factorization already, e.g., Z[ 5] = O Q(
Universal hashing. In other words, the probability of a collision for two different keys x and y given a hash function randomly chosen from H is 1/m.
Universal hashing No matter how we choose our hash function, it is always possible to devise a set of keys that will hash to the same slot, making the hash scheme perform poorly. To circumvent this, we
Full and Complete Binary Trees
Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full
MA 1125 Lecture 14 - Expected Values. Friday, February 28, 2014. Objectives: Introduce expected values.
MA 5 Lecture 4 - Expected Values Friday, February 2, 24. Objectives: Introduce expected values.. Means, Variances, and Standard Deviations of Probability Distributions Two classes ago, we computed the
Regular Languages and Finite Automata
Regular Languages and Finite Automata 1 Introduction Hing Leung Department of Computer Science New Mexico State University Sep 16, 2010 In 1943, McCulloch and Pitts [4] published a pioneering work on a
The Theory of Tetris
The Theory of Tetris Hendrik Jan Hoogeboom and Walter A. Kosters Leiden Institute of Advanced Computer Science Universiteit Leiden, The Netherlands {hoogeboo,kosters}@liacs.nl 1 Introduction Any algorithm
Linear Risk Management and Optimal Selection of a Limited Number
How to build a probability-free casino Adam Chalcraft CCR La Jolla [email protected] Chris Freiling Cal State San Bernardino [email protected] Randall Dougherty CCR La Jolla [email protected] Jason
Mathematics Course 111: Algebra I Part IV: Vector Spaces
Mathematics Course 111: Algebra I Part IV: Vector Spaces D. R. Wilkins Academic Year 1996-7 9 Vector Spaces A vector space over some field K is an algebraic structure consisting of a set V on which are
Linear Codes. Chapter 3. 3.1 Basics
Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length
Probability and Expected Value
Probability and Expected Value This handout provides an introduction to probability and expected value. Some of you may already be familiar with some of these topics. Probability and expected value are
Lecture 13 - Basic Number Theory.
Lecture 13 - Basic Number Theory. Boaz Barak March 22, 2010 Divisibility and primes Unless mentioned otherwise throughout this lecture all numbers are non-negative integers. We say that A divides B, denoted
Ready, Set, Go! Math Games for Serious Minds
Math Games with Cards and Dice presented at NAGC November, 2013 Ready, Set, Go! Math Games for Serious Minds Rande McCreight Lincoln Public Schools Lincoln, Nebraska Math Games with Cards Close to 20 -
Random Fibonacci-type Sequences in Online Gambling
Random Fibonacci-type Sequences in Online Gambling Adam Biello, CJ Cacciatore, Logan Thomas Department of Mathematics CSUMS Advisor: Alfa Heryudono Department of Mathematics University of Massachusetts
Revised Version of Chapter 23. We learned long ago how to solve linear congruences. ax c (mod m)
Chapter 23 Squares Modulo p Revised Version of Chapter 23 We learned long ago how to solve linear congruences ax c (mod m) (see Chapter 8). It s now time to take the plunge and move on to quadratic equations.
Gamesman: A Graphical Game Analysis System
Gamesman: A Graphical Game Analysis System Dan Garcia Abstract We present Gamesman, a graphical system for implementing, learning, analyzing and playing small finite two-person
Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
Answer: (a) Since we cannot repeat men on the committee, and the order we select them in does not matter, ( )
1. (Chapter 1 supplementary, problem 7): There are 12 men at a dance. (a) In how many ways can eight of them be selected to form a cleanup crew? (b) How many ways are there to pair off eight women at the
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
The Math. P (x) = 5! = 1 2 3 4 5 = 120.
The Math Suppose there are n experiments, and the probability that someone gets the right answer on any given experiment is p. So in the first example above, n = 5 and p = 0.2. Let X be the number of correct
WHAT ARE MATHEMATICAL PROOFS AND WHY THEY ARE IMPORTANT?
WHAT ARE MATHEMATICAL PROOFS AND WHY THEY ARE IMPORTANT? introduction Many students seem to have trouble with the notion of a mathematical proof. People that come to a course like Math 216, who certainly
MACM 101 Discrete Mathematics I
MACM 101 Discrete Mathematics I Exercises on Combinatorics, Probability, Languages and Integers. Due: Tuesday, November 2th (at the beginning of the class) Reminder: the work you submit must be your own.
ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2015
ECON 459 Game Theory Lecture Notes Auctions Luca Anderlini Spring 2015 These notes have been used before. If you can still spot any errors or have any suggestions for improvement, please let me know. 1
= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that
Instructions. Answer each of the questions on your own paper, and be sure to show your work so that partial credit can be adequately assessed. Credit will not be given for answers (even correct ones) without
Math 55: Discrete Mathematics
Math 55: Discrete Mathematics UC Berkeley, Fall 2011 Homework # 5, due Wednesday, February 22 5.1.4 Let P (n) be the statement that 1 3 + 2 3 + + n 3 = (n(n + 1)/2) 2 for the positive integer n. a) What
Factoring Algorithms
Factoring Algorithms The p 1 Method and Quadratic Sieve November 17, 2008 () Factoring Algorithms November 17, 2008 1 / 12 Fermat s factoring method Fermat made the observation that if n has two factors
6.042/18.062J Mathematics for Computer Science December 12, 2006 Tom Leighton and Ronitt Rubinfeld. Random Walks
6.042/8.062J Mathematics for Comuter Science December 2, 2006 Tom Leighton and Ronitt Rubinfeld Lecture Notes Random Walks Gambler s Ruin Today we re going to talk about one-dimensional random walks. In
3.2 Roulette and Markov Chains
238 CHAPTER 3. DISCRETE DYNAMICAL SYSTEMS WITH MANY VARIABLES 3.2 Roulette and Markov Chains In this section we will be discussing an application of systems of recursion equations called Markov Chains.
Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and
Breaking The Code Ryan Lowe Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and a minor in Applied Physics. As a sophomore, he took an independent study
Statistics 100A Homework 4 Solutions
Chapter 4 Statistics 00A Homework 4 Solutions Ryan Rosario 39. A ball is drawn from an urn containing 3 white and 3 black balls. After the ball is drawn, it is then replaced and another ball is drawn.
3 0 + 4 + 3 1 + 1 + 3 9 + 6 + 3 0 + 1 + 3 0 + 1 + 3 2 mod 10 = 4 + 3 + 1 + 27 + 6 + 1 + 1 + 6 mod 10 = 49 mod 10 = 9.
SOLUTIONS TO HOMEWORK 2 - MATH 170, SUMMER SESSION I (2012) (1) (Exercise 11, Page 107) Which of the following is the correct UPC for Progresso minestrone soup? Show why the other numbers are not valid
Meeting the requirements of the Care Certificate is a challenge for all employers of health and social care support workers.
Contents Each game kit contains: 1 x Game Board 1 x 60 second Timer 1 x Dice 53 Yellow & 53 Red Tokens 2 x Player Counters 106 Care Certificate Question Cards Introduction Meeting the requirements of the
CS 103X: Discrete Structures Homework Assignment 3 Solutions
CS 103X: Discrete Structures Homework Assignment 3 s Exercise 1 (20 points). On well-ordering and induction: (a) Prove the induction principle from the well-ordering principle. (b) Prove the well-ordering
Applications of Fermat s Little Theorem and Congruences
Applications of Fermat s Little Theorem and Congruences Definition: Let m be a positive integer. Then integers a and b are congruent modulo m, denoted by a b mod m, if m (a b). Example: 3 1 mod 2, 6 4
The Chinese Remainder Theorem
The Chinese Remainder Theorem Evan Chen [email protected] February 3, 2015 The Chinese Remainder Theorem is a theorem only in that it is useful and requires proof. When you ask a capable 15-year-old why
Probabilistic Strategies: Solutions
Probability Victor Xu Probabilistic Strategies: Solutions Western PA ARML Practice April 3, 2016 1 Problems 1. You roll two 6-sided dice. What s the probability of rolling at least one 6? There is a 1
Unit 19: Probability Models
Unit 19: Probability Models Summary of Video Probability is the language of uncertainty. Using statistics, we can better predict the outcomes of random phenomena over the long term from the very complex,
Integer roots of quadratic and cubic polynomials with integer coefficients
Integer roots of quadratic and cubic polynomials with integer coefficients Konstantine Zelator Mathematics, Computer Science and Statistics 212 Ben Franklin Hall Bloomsburg University 400 East Second Street
How to Win at Tic-Tac-Toe
XOXOXOXOXOXOXOXOXOXOXOXOXOXOXOXOXOXOXOXOXOXOXOXOX How to Win at Tic-Tac-Toe By Ryan Aycock Copyright 2002 XOXOXOXOXOXOXOXOXOXOXOXOXOXOXOXOXOXOXOXOXOXOXOXOX To Susan and Kellie, who rightfully believed
Math Games For Skills and Concepts
Math Games p.1 Math Games For Skills and Concepts Original material 2001-2006, John Golden, GVSU permission granted for educational use Other material copyright: Investigations in Number, Data and Space,
Reading 13 : Finite State Automata and Regular Expressions
CS/Math 24: Introduction to Discrete Mathematics Fall 25 Reading 3 : Finite State Automata and Regular Expressions Instructors: Beck Hasti, Gautam Prakriya In this reading we study a mathematical model
A Second Course in Mathematics Concepts for Elementary Teachers: Theory, Problems, and Solutions
A Second Course in Mathematics Concepts for Elementary Teachers: Theory, Problems, and Solutions Marcel B. Finan Arkansas Tech University c All Rights Reserved First Draft February 8, 2006 1 Contents 25
Continued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
Chapter 4 Lecture Notes
Chapter 4 Lecture Notes Random Variables October 27, 2015 1 Section 4.1 Random Variables A random variable is typically a real-valued function defined on the sample space of some experiment. For instance,
Find-The-Number. 1 Find-The-Number With Comps
Find-The-Number 1 Find-The-Number With Comps Consider the following two-person game, which we call Find-The-Number with Comps. Player A (for answerer) has a number x between 1 and 1000. Player Q (for questioner)
Pattern matching probabilities and paradoxes A new variation on Penney s coin game
Osaka Keidai Ronshu, Vol. 63 No. 4 November 2012 Pattern matching probabilities and paradoxes A new variation on Penney s coin game Yutaka Nishiyama Abstract This paper gives an outline of an interesting
Math Board Games. For School or Home Education. by Teresa Evans. Copyright 2005 Teresa Evans. All rights reserved.
Math Board Games For School or Home Education by Teresa Evans Copyright 2005 Teresa Evans. All rights reserved. Permission is given for the making of copies for use in the home or classroom of the purchaser
CONTRIBUTIONS TO ZERO SUM PROBLEMS
CONTRIBUTIONS TO ZERO SUM PROBLEMS S. D. ADHIKARI, Y. G. CHEN, J. B. FRIEDLANDER, S. V. KONYAGIN AND F. PAPPALARDI Abstract. A prototype of zero sum theorems, the well known theorem of Erdős, Ginzburg
Sequential lmove Games. Using Backward Induction (Rollback) to Find Equilibrium
Sequential lmove Games Using Backward Induction (Rollback) to Find Equilibrium Sequential Move Class Game: Century Mark Played by fixed pairs of players taking turns. At each turn, each player chooses
1 Portfolio Selection
COS 5: Theoretical Machine Learning Lecturer: Rob Schapire Lecture # Scribe: Nadia Heninger April 8, 008 Portfolio Selection Last time we discussed our model of the stock market N stocks start on day with
Probability Using Dice
Using Dice One Page Overview By Robert B. Brown, The Ohio State University Topics: Levels:, Statistics Grades 5 8 Problem: What are the probabilities of rolling various sums with two dice? How can you
Patterns in Pascal s Triangle
Pascal s Triangle Pascal s Triangle is an infinite triangular array of numbers beginning with a at the top. Pascal s Triangle can be constructed starting with just the on the top by following one easy
Cryptography: Authentication, Blind Signatures, and Digital Cash
Cryptography: Authentication, Blind Signatures, and Digital Cash Rebecca Bellovin 1 Introduction One of the most exciting ideas in cryptography in the past few decades, with the widest array of applications,
def: An axiom is a statement that is assumed to be true, or in the case of a mathematical system, is used to specify the system.
Section 1.5 Methods of Proof 1.5.1 1.5 METHODS OF PROOF Some forms of argument ( valid ) never lead from correct statements to an incorrect. Some other forms of argument ( fallacies ) can lead from true
3.2 The Factor Theorem and The Remainder Theorem
3. The Factor Theorem and The Remainder Theorem 57 3. The Factor Theorem and The Remainder Theorem Suppose we wish to find the zeros of f(x) = x 3 + 4x 5x 4. Setting f(x) = 0 results in the polynomial
ON THE COMPLEXITY OF THE GAME OF SET. {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu
ON THE COMPLEXITY OF THE GAME OF SET KAMALIKA CHAUDHURI, BRIGHTEN GODFREY, DAVID RATAJCZAK, AND HOETECK WEE {kamalika,pbg,dratajcz,hoeteck}@cs.berkeley.edu ABSTRACT. Set R is a card game played with a
8 Primes and Modular Arithmetic
8 Primes and Modular Arithmetic 8.1 Primes and Factors Over two millennia ago already, people all over the world were considering the properties of numbers. One of the simplest concepts is prime numbers.
MOP 2007 Black Group Integer Polynomials Yufei Zhao. Integer Polynomials. June 29, 2007 Yufei Zhao [email protected]
Integer Polynomials June 9, 007 Yufei Zhao [email protected] We will use Z[x] to denote the ring of polynomials with integer coefficients. We begin by summarizing some of the common approaches used in dealing
Lecture 13: Message Authentication Codes
Lecture 13: Message Authentication Codes Last modified 2015/02/02 In CCA security, the distinguisher can ask the library to decrypt arbitrary ciphertexts of its choosing. Now in addition to the ciphertexts
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory
REWARD System For Even Money Bet in Roulette By Izak Matatya
REWARD System For Even Money Bet in Roulette By Izak Matatya By even money betting we mean betting on Red or Black, High or Low, Even or Odd, because they pay 1 to 1. With the exception of the green zeros,
TOPOLOGY: THE JOURNEY INTO SEPARATION AXIOMS
TOPOLOGY: THE JOURNEY INTO SEPARATION AXIOMS VIPUL NAIK Abstract. In this journey, we are going to explore the so called separation axioms in greater detail. We shall try to understand how these axioms
Math 231b Lecture 35. G. Quick
Math 231b Lecture 35 G. Quick 35. Lecture 35: Sphere bundles and the Adams conjecture 35.1. Sphere bundles. Let X be a connected finite cell complex. We saw that the J-homomorphism could be defined by
SQUARE-SQUARE ROOT AND CUBE-CUBE ROOT
UNIT 3 SQUAREQUARE AND CUBEUBE (A) Main Concepts and Results A natural number is called a perfect square if it is the square of some natural number. i.e., if m = n 2, then m is a perfect square where m
Notes on Factoring. MA 206 Kurt Bryan
The General Approach Notes on Factoring MA 26 Kurt Bryan Suppose I hand you n, a 2 digit integer and tell you that n is composite, with smallest prime factor around 5 digits. Finding a nontrivial factor
SCRATCHING THE SURFACE OF PROBABILITY. Robert J. Russell, University of Paisley, UK
SCRATCHING THE SURFACE OF PROBABILITY Robert J. Russell, University of Paisley, UK Scratch cards are widely used to promote the interests of charities and commercial concerns. They provide a useful mechanism
3. Mathematical Induction
3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)
GAMES WITH ONE DIE Games where you only use a single die can be plenty exciting indeed. Here are two good examples of this!
[TACTIC rules for dice games] Here are 21 different dice games, with one, two, three or even more dice. We wish you lots of enjoyment! GAMES WITH ONE DIE Games where you only use a single die can be plenty
5. Factoring by the QF method
5. Factoring by the QF method 5.0 Preliminaries 5.1 The QF view of factorability 5.2 Illustration of the QF view of factorability 5.3 The QF approach to factorization 5.4 Alternative factorization by the
Advanced Cryptography
Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed.
MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.
MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column
