Using Cloning to Solve NP Complete Problems
|
|
|
- Berenice Lee
- 10 years ago
- Views:
Transcription
1 Using Cloning to olve P Complete Problems Jon. Draopoulos an Teoore. Tomaras Department of Pysics, University of Crete P.O.Box 08, Heralion 7003, Crete, Greece. Tel , Fax ttp:// [email protected] BTRCT ssuming a cloning oracle, satisfiability, wic is an P complete problem, is sown to belong to BPP C an BQP C (epening on te ability of te oracle C to clone eiter a binary ranom variable or a qubit. Te same result is extene in te case of an approximate cloning oracle, tus establising tat P BPP C BQP C an P BPP C BQP C, were C an C are te exact an approximate cloning oracles respectively. ltoug exact cloning is impossible in quantum systems, approximate cloning remains a possibility. However, te best nown metos for approximate cloning (base on unitary evolution o not currently acieve te esire precision levels. n it remains an open question weter tey coul be improve wen non-linear (or non-unitary operators are use. Finally, a straigtforwar attempt to ispense wit cloning, replacing it by unitary evolution, is prove to be impossible.. Introuction Quantum computing is a new an exciting interisciplinary area tat combines computer science an (quantum pysics. s early as 98, Feynman observe tat te straigtforwar simulation of a quantum system on a classical computer (eterministic or probabilistic Turing macine require an exponential slowown an witout any apparent way to spee up te simulation [, ]. He ase weter tat is inerent to quantum systems an e suggeste te esign of computing macines base on quantum teory implying, at te same time, tat suc quantum computers coul peraps compute more efficiently tan classical computers. bout te same time, an aressing te opposite problem, Benioff sowe tat a eterministic Turing macine coul be simulate by te unitary evolution of a quantum process an tus provie te first inication of te strengt of quantum computing [, ]. ubsequently, Deutsc propose a general moel of quantum computation--te quantum Turing macine--wic coul simulate any given quantum system but possibly wit exponential slowown [8]. Berstein an Vazirani improve upon te concept of a quantum Turing macine proposing a univesal quantum Turing macine, wic, as tey prove, coul simulate a broa class of quantum Turing macines wit only a polynomial slowown [4]. In classical computing, logic circuits provie an alternative to Turing macines (actually current computers are buil from integrate circuits an not as Turing macines. Deutsc first propose a similar moel of quantum circuits, wic e
2 calle quantum computational networs, an examine some of teir properties [9]. Yao subsequently prove te polynomial equivalence between quantum Turing macines an quantum circuits (tus proviing a truly universal moel of quantum computation by proving tat an arbitrary quantum Turing macine coul simulate, an be simulate by, a polynomial size quantum circuit [0]. Te moel of quantum computing aving been efine, its computational power must be ientifie. Te following classes of ecision problems ave been efine: P is te class of all ecision problems tat can be solve in polynomial time by a eterministic Turing macine BPP is te class of all ecision problems tat can be solve in polynomial time by a probabilistic Turing macine wit a probability of error boune by /3 for all inputs P is te class of all ecision problems tat can be solve in polynomial time by a non-eterministic Turing macine BQP is te class of all ecision problems tat can be solve in polynomial time by a quantum Turing macine wit a probability of error boune by /3 for all inputs (pparently it is P BPP P. Furtermore, Benniof's result [, ] implies tat P BQP. Deutsc an Josza [] an Bertiaume an Brassar [0, 6] prove tat, relative to certain oracles, tere are computational problems tat can be solve exactly an in polynomial time by quantum Turing macines but cannot be solve polynomially for all inputs by eterministic or probabilistic Turing macines. However, tose problems belong to BPP; an tus te above results o not confer te suppose extra computing power of quantum Turing macines. Bennett et al. [3] prove tat relative to a ranom oracle, it is not true tat P BQP. Bernstein an Vazirani [4] prove tat BPP BQP. Bernstein an Vazirani [4] an imon [8] invente problems tat are not nown to be in BPP but belong to BQP. or gave polynomial time quantum algoritms for te factoring an iscrete log problems [7]. (ote tat not only imon's problem but also factoring an iscrete log belong to P co-p. However, Bennett et al. [3] prove tat relative to a permutation oracle, it is not true tat P co-p BQP. Finally Grover sowe ow to accept te class P relative to any oracle in time O( n/. ( formal analysis of Grover's algoritm appears in [7]. It soul be note tat or's factoring an iscrete log algoritms (wit its implications in cryptograpy an cryptosystems an Grover's atabase searc algoritm are of practical importance. Furtermore, te application of quantum computing for te evelopment of secure cryptograpic communication systems (wic etect unautorize access or guarantee tat information woul not be compromise [5] is obviously of ig commercial value. It is still unnown weter BPP BQP, an weter P BQP. (Te latter is tremenously important since te class P contains a large number of optimization problems wit a broa range of applications from computer science an statistics to engineering, automatic control, integrate circuit esign etc. In tis paper, we provie polynomial algoritms for solving te satisfiability problem, wic is a nown P complete problem, assuming an oracle tat can (eiter exactly or approximately clone a binary ranom variable or a qubit. Terefore, we prove tat P BPP C BQP C an P BPP C BQP C, were C( an C( are te exact an approximate cloning oracles as efine below. uc oracles, wic o
3 not merely provie a Boolean reply to a query but generate an object (suc as a ranom variable or qubit, are calle manufacturing oracles. In section, we escribe te satisfiability problem. In section 3, we provie an algoritm for te case of exact cloning, wile, in section 4, we prove tat te algoritm belongs to BPP C (or BQP C respectively. similar construction is mae for te case of approximate cloning in section 5. In section 6, an attempt is mae to ispense wit cloning an a negative result is sown. Finally, in concluing section 7, te limitations an some practical implications are iscusse.. Te satisfiability problem Boolean variable x is a variable tat can assume only te values true an false, (wic are usually associate wit te numbers an 0 respectively. trut assignment is an assignment of true/false values to a set of Boolean variables. logical expression or Boolean formula is an expression consisting of Boolean variables combine wit logical connectives suc as or, an, not, etc. logical expression can be unsatisfiable (wen it is false for all trut assignments of its variables, satisfiable (wen it is true for at least one assignment of its variables, an tautological (wen it is true for all trut assignments of its variables. For example, assume tat + enotes logical isjunction (or, enotes logical conjunction (an, an a bar over an expression enotes te logical negation of te expression. Ten ( x + x 3 ( x + x + x 4 is a logical expression containing four variables an is true if an only if at least one of x an x 3 is false an at least one of x, x, an x 4 is true. Terefore, it is satisfiable but not tautological. literal is a Boolean variable or its negation, an a clause is a isjunction of literals. Te satisfiability problem is as follows: Given m clauses c 0,..., c m- containing n Boolean variables x 0,..., x n- is te formula c 0 c... c m- satisfiable? atisfiability is nown to be P-complete [6, c.8, teorem 8.]. Finally, if E is a logical expression an a trut assignment E/ is te logical expression tat results after we substitute te variables of E tat appear in wit teir assigne values. For example, if E a + b + c an {afalse, true} ten E/ b + c. 3. Te logical boosting algoritm We assume tat [ ] is te Boolean-to-integer operator (tat is [ϕ], if ϕ is true; [ϕ] 0, if ϕ is false. We enote probability measure by P(, an quantum an, or, an not gates by &,, an ~ respectively. binary ranom variable is a ranom variable tat can be eiter 0 or. qubit, wic is te corresponing unit of quantum information, beaves more or less lie a ranom variable an is escribe by a pair of complex numbers (a, b wose magnitues are te probabilities tat te qubit woul be in state 0 or state (respectively. ince tose are ifferent concepts, for te rest of tis paper, we sall use bot te term binary ranom variable an qubit to escribe situations were eiter object coul be use. Te subsequent results woul tus apply to probabilistic an quantum computing (respectively. 3
4 Te following algoritm assumes a function C(X tat can generate a copy (or clone of any binary ranom variable or qubit X. In oter wors, C(X returns a binary ranom variable or qubit tat is inepenent of X an ientically istribute. Te logical boosting (B( algoritm: Given a binary ranom variable or qubit copy function C(, a satisfiability problem of m clauses c 0,..., c m- an n Boolean variables x 0,..., x n- te algoritm ecies weter c 0 c... c m- is satisfiable as follows:. Create n inepenent binary ranom variables or qubits X 0,..., X n- (corresponing to Boolean variables x 0,..., x n- suc tat P(X i P(X i 0 /, for i 0,,...,n-.. Create m Boolean ranom variables or qubits C 0,..., C m- tat correspon to clauses c 0,..., c m- : If x i,..., x i are te Boolean variables appearing non-negate in c 0 a j an x,..., x 0 b are te Boolean variables appearing negate in c j ten C j X i... X (~ X... (~ X, j 0,,..., m. 0 ia 0 b 3. Create Boolean ranom variable or qubits D 0 as follows: D 0 C 0 &... & C m- 4. Coose n an create Boolean ranom variables or qubits D,..., D as follows: D v D v- C(D v-, v,,,. 5. oo at D. If it is, te initial problem is satisfiable; oterwise assume tat te problem is unsatisfiable. ote tat te algoritm requires &-gates an -gates wit large number of inputs (n coul be very large an m coul be even larger. However, tis situation can be easily remeie since an M-input &-gate or -gate can be constructe as a networ of M K-input &-gates or -gates respectively. K 4. Te probability of error an te time complexity of te B algoritm Teorem. Te B( algoritm asserts correctly tat a given satisfiability problem is satisfiable, an te probability of error P err, in te case it asserts tat te problem is unsatisfiable, is boune: P err < e were e is te Euler number (e , n is te number of Boolean variables, an is te boosting level cosen in te B algoritm. et u be any trut assignment of te Boolean variables x 0,..., x n- u' be te corresponing assignment of values 0 an to qubits X 0,..., X n- be te number of ifferent trut assignments tat satisfy ; tat is, n 4
5 [ / u] u v P(D v 0, v 0,,,, Ten, 0 P( D0 P( D0 / u' P( u' [ / u] n n u' u an since D v an C(D v are inepenent an ientically istribute: v+ P( Dv ( Dv 0 P( Dv 0 P( ( Dv 0 v, v 0,,, - s a result, n n n 0 < n n Te above inequality emerges from te fact tat te sequence am m, m > 0, is strictly increasing an converges to its supremum e. ow, observe tat if D is foun to be, ten P( D > 0 < 0 < P( D0 > 0 > 0 is satisfiable. Tus, te algoritm fins te correct answer in tis case. On te oter an, wen D is foun to be 0 an is unsatisfiable, te algoritm again guesses correctly. Te case of error is only wen D is foun to be 0 an is satisfiable. However, in tat case it is > 0 (or equivalently an tus te probability of error is P err n n e P( D 0 < Q.E.D. e e ltoug is left out as a free parameter in te B( algoritm, it nee not be significantly larger tan n. For example, if n + 6, ten P err <.6 * 0-8. s argue in [4, 4.5.4], te probability of an error in a computer circuit ue to arware malfunction or cosmic raiation is larger tan te above boun. Teorem. ssume a satisfiability problem wit m clauses of n Boolean variables. Furtermore assume tat we implement te B( algoritm using K-input quantum gates (K tat operate in time t K ; tat te copy function C( taes time t C ; an tat te time to create a uniformly istribute qubit is t q. Ten te time complexity of B( is T O( t n + t mlog n + ( t t B ( q K K K + C wic reuces to O( t n + t mlog n t n, wen (as expecte O(n. q K K + C et T i be te time consume by te i-t step of te algoritm (i,, 3, 4, 5. Ten it is: T O(t q n (to create te n qubits T O(t K m log K n (since we can implement an -gate of O(n inputs wit log K n layers of K-input -gates T 3 O(t K log K m (since we can implement an &-gate of m inputs wit log K m layers of K-input &-gates T 4 O((t C + t K (to copy an boost times sequentially T 5 O( (to loo up a given qubit ing te above times togeter Q.E.D. m 5
6 T etting t max{t q, t K, t C }, te time complexity of B( becomes O( t( mlog. ince soul be O(n an m woul usually be muc B ( + K n larger tan n, te complexity reuces to TB ( O( tmlogk n. n because t woul be a constant inepenent of n an m, te complexity of te B( algoritm is TB ( O( m log K n. Given tat satisfiability is P complete, an tat, epening on te nature of te cloning oracle, eiter binary ranom variables or qubits coul be use, te above teorems establis tat P BPP C BQP C. 5. pproximate cloning Unfortunately, as sown in [9], it is not possible to create a cloning function lie C( using linear evolution. ltoug, tere as been so far no suc proof for nonlinear systems, it is not very reasonable to believe--given te alreay proven fact tat cloning leas to solution of P complete problems-- tat non-linear systems capable of exact cloning woul be realizable (in te near future. Te above restrictions lea us to consier approximate cloning: a function C( tat can generate an approximate copy of any binary ranom variable or qubit X. Tat approximate copy soul ave te property tat P(X 0 - P(C(X 0 ε. In tat case, we woul say tat C(X is an ε-approximation of X an tat ε is te approximation egree of C(X. (ε woul normally be a small nonnegative number. Consequently, we can efine te approximate logical boosting algoritm (B( to be te B( algoritm were C( as been replace by C(. We sall now prove tat if ε is exponentially small (wrt n ten te error of B( is trivial an negligible. Teorem 3. Te B( algoritm asserts tat a given satisfiability problem is satisfiable or unsatisfiable wit a probability of error P err, boune: 7( n + 34 P err < max{, ( ε } were n 7 is te number of Boolean variables, is te boosting level cosen in te B algoritm, an ε -n- is te approximation egree of C(X. In orer to prove tis teorem, we must first prove te following two lemmas: emma. If { } is a sequence of real numbers satisfying te property tat n n 7( n an + ( + ε, were ε, n 7, ten it is <. pparently, + ε (te proof, by inuction on, is trivial. Terefore, { } is a ecreasing sequence. ow we sall prove tat n+ < 3 assuming tat n+ 3 an eriving a logical contraiction. Tus, if 3 ten, for every n+, it woul be 3 an: n+ 6
7 < ε ( + 3ε ( + 3ε 0 ( + 3ε { ( + } n n 3 {( ( + } n { } (by efintion of { (since (by inuction on (since (since ( n+ ( (since ( < 0 3 n } - < an ε < e e Te latter inequality, for n+, leas us to te esire contraiction. ow, te prove statement, n+ < 3, by repeate applications of te efining n inequality of { } an te fact tat ε, n 7, leas to te following bouns: n+ 3 < 4 ε, n+ 4 < 4 3ε, n+ 5 < 6 ε, n+ 6 < 56, n+ 6 + ε < 8 ; te last two now being use to complete tis proof: 6 ( + ε < <... + ( n+ 6 < ( n+ 6 7( n 34 Q.E.D. 8 8 emma. If { } is a sequence of real numbers satisfying te property tat 0 an + ( ε, ten it is ( ε (equality ols only for. We sall prove te lemma by inuction on : : 0 ( 0 ε ε (equality ols inee. : ( ε ( ε ( ε > 3ε (equality ols inee. Inuction step: ssume te mentione inequality for, an prove it for +: ε (by efintion of { } ow, it is P + err > P( D P ( { ( ε}{ ε} ( ( err,0 max + ( p + 0 / ε + P { P, P } err,0 err, err, 0 P( D 0 / > err, P( D / 0 P( 0 ε + ( > 0 P( err, p 8 ε > 0 + P( D *56 / -n- (by inuction ypotesis 0 P( 0 Q.E.D. were, P 0 is te probability of error wen is satisfiable, P is te probability of error wen is unsatisfiable, an p is te a-priori probability tat problem is unsatisfiable. Furtermore, efining { v } as in teorem ( v P(D v 0, v 0,,,,, we ave + P(D C(D 0 P(D 0P(C(D 0 ( +ε were -ε ε ε is te approximation error of C(D (at -t step. s a result ( -ε + ( +ε an tus, P err,0 P err, n 0 0 7( n + 34 ( ε (by lemma (by lemma Finally, we can substitute te above in te efinition of P err Q.E.D. n 6 consequence of te above teorem is tat, by selecting n +, ε, we get a trivial error: P < 50 [4, 4.5.4]. Furtermore, as it was sown in te above err 7
8 proof, n 6 n+ 4 < 4 3ε. Terefore, selecting n+4 an ε, we get a probability of error less tan ¼; wic means tat te B(n+4 algoritm is proof of membersip of satisfiability in BQP C (or BQP C, epening on te cloning oracle. However, te fact tat ε is exponentially small (wit respect to n is a very ar constraint. t te time of tis writing an to te best of te autors' nowlege, it is not nown weter suc ig precision approximate cloning is possible. Wen unitary evolution is use, provably optimal approximate cloning, starting from M ( + + qubits an generating M clones at te en, results in fielity (, or equivalently M + M precision n 6 ε M ( + [3]. Tat is very low wen compare to ε, wic is require by te B(n+4 algoritm. Te use of non-linearity may improve upon te situation (since cloning is a non-linear operation but it remains an open researc problem te maximum possible precision an its time complexity. Te fact tat cloning leas to solution of te P-complete problems only stresses its importance. On te oter an, if we consier low precision cloning, i.e. ε O(/p(n, were p(n is a polynomial of n, ten, since 0 can be as large as - -n, tere are no bouns on te probability of error (oter tan te trivial ones. However, it is possible, in tat case, to treat te algoritm in a probably approximately correct fasion; tat is to question weter P ( P err > δ < γ, for some small δ, γ. However, tat analysis is beyon te scope of tis paper an may be presente elsewere. 6. on-cloning logical boosting (fixe point Te uncertainty about ig precision approximate cloning leas to oter consierations: peraps we can transform D to D + ( 0,,, - using unitary evolution an logic. et + is te set of nonnegative real numbers, be te set of complex numbers, t inicate matrix an vector transpose, an z enote te magnitue of z. Eac qubit Q, represente by a vector of two complex numbers [q 0, q ] t ( q 0 P(Q 0, q P(Q, q 0 + q, correspons to a point (or vector in. Furtermore, t n if x [ x0,, x n ], we efine x x x [ ] t n an x x0,, x n n n n Finally, a function f : as a magnitue fixe point (mfp x + if an n only if y ( y x f ( y x. (pparently, if f as an mfp x, ten f ( x x. Te Unitary Boosting lgoritm (UB( is lie B( except tat, instea of using a qubit copy/cloning function, it transforms D to D + using unitary matrix U ( an logical circuit (, i.e. D + ( (U ( D P (, were P ( is a set of normalize p p + ( ( ( internal parameters (,, + p P P U. ote tat, if we esire tat UB( never errs wen it asserts tat is satisfiable, it must be wen 0 ; or, equivalently D [ ] t, 0 wen D [, 0] t 0 -- wic, in turn, means tat te overall transformation of D 0 to D as an mfp at [, 0] t. Tis later property is implie by te conition tat te transformation of D to D + (for all as an mfp at [, 0] t. However, as te following teorem sows, it is impossible to reuce in tat case. 8
9 Teorem 4. If D + (U D H, were D an D + are qubits ( D, D +, H is a unit-lengt vector of complex numbers ( H is te set of internal of ien parameters corresponing to qubits, U is a + + unitary matrix ( + + U, is an arbitrary logical circuit of + inputs, an te overall transformation as an mfp at [,0] t, ten +. If W is a matrix, let W i,j enote te i-t row an j-t column element of W, W j enote t te j-t column of W, an tus ( W i enote te vector correspoing to te i-t row of W. imilarly, if V is a vector, let V i be te i-t element of V. ow let { 0, R, R } be an ortonormal base of, were R, 0 H an form te matrix R0 R X t 0 0 R0 R t t X,,( X is an ortonormal base of +. (pparently, { } ( 0 ow efine UX -, or, equivalently, UX, an D [ a, b ] t. s a result, is unitary an t t UD H X [ a P, b H ] [ a,0,,0, b,0,,0] a 0 + b an if we inicate by T an F te sets of integers (in te interval [0, + -] wose binary representation correspons to logical assignments tat mae to yiel true or false, respectively, ten it woul be, P( ( UD H 0 (by te efinition of, D + 0 a i,0 a + b a + b ( a + b i + b i, i, i, + Y + Y + Y + Y (by te prev.result about UD (werey a b (assuming (assuming Y 0 (since a i,0 + i,0 i, + + H i F i, 0 To complete te proof, we must prove te premises an Y0 (bot of wic result from te fact tat our -U transformation as an mfp at [, 0] t. Inee, wen D [, 0] t t ten ( U[,0] H. Finally, te fact tat U + i F (an tus is unitary implies tat:.,0 +,0 i i i,0 0 i T i, 0 i,0 ( 0 0 i T i T. 0 0,0 +,0 0,0 0 0 i, Y i i i, i i, i T Q.E.D. 9
10 Te above teorem emonstrates tat no combination of suc unitary transformations an logic can solve te P complete problems (probabilistically. Weter tere is a sequence of unitary matrices an logical circuits wic constitute transformations wit no mfp at [, 0] t an result in an algoritm wit small probability of error is still an open researc question. 7. Conclusion P is a very interesting class of problems of extensive an tremenous practical significance. P complete problems (te arest in P seem, at first sigt, to be irrelevant to cloning. However, teir irect relationsip to cloning an terefore te inerent ifficulty of te latter as now been establise. Exact cloning is peraps impossible since it is an operation of infinite precision. pproximate cloning is possible but being a non-linear operation, it is peraps best acieve troug non-linear operations. inear (an unitary approaces offer very limite precision, wic oes not allow for te solution of large P complete problems. It is terefore important to try to evelop cloning metos tat woul employ non-linearity to gain precision. Finally, it is not clear weter it woul be possible to replace cloning in te B( algoritm by a sequence of (unitary an non-linear transformations tat woul result in a final binary ranom variable or qubit wit trivial (or small probability of error. straigtforwar attempt was proven fruitless, but tere is no evience in eiter irection about more elaborate scemes. Te matter is an open researc question. cnowlegements Tis wor was partially supporte by te European Union RT grants HPR-CT an References. P. Benioff, "Quantum mecanical Hamiltonian moels of Turing macines," Journal of tatistical Pysics, vol. 9, pp , 98.. P. Benioff, "Quantum mecanical Hamiltonian moels of Turing macines tat issipate no energy," Pysics Review etters, vol. 48, pp , C. H. Bennett, E. Bernstein, G. Brassar, an U. Vazirani, "trengts an weanesses of quantum computing," IM Journal on Computing, vol. 6, no. 5, pp , E. Bernstein an U. Vazirani, "Quantum complexity teory," Proceeings of 5t CM ymposium on Teory of Computing, pp. -0, Bertiaume an C. Brassar, "Te quantum callenge to structural complexity teroy," Proceeing of 7t IEEE Conference on tructure in Complexity Teory," pp. 3-37, 99. 0
11 6.. Bertiaume an C. Brassar, "Oracle quantum computing," Journal of Moern Optics, 4, pp , M. Boyer, C. Brassar, P. Hoyer, an. Tapp, "Tigt bouns on quantum searcing," Proceeings of 4t Worsop on Pysics an Computation, Boston, pp.36-43, 996. (vailable online: ttp://interjournal.org. 8. D. Deutsc, "Quantum teory, te Curc-Turing principle an te universal quantum computer," Proceeings of Royal ociety, onon, ser., vol. 45, pp , D. Deutsc, "Quantum computational networs," Proceeings of Royal ociety, onon, ser., vol. 439, pp , D. Deutsc an R. Jozsa, "Rapi solution of problems by quantum computation," Proceeings of Royal ociety, onon, ser., vol. 439, pp , 99.. R. Feynman, "imulating pysics wit computers," International Journal of Teoretical Pysics, vol., o. 6/7, pp , 98.. R. Feynman, "Quantum mecanical computers," Founations of Pysics, vol. 6, pp , Gisin an. Massar, "Optimal quantum cloning macines," Pysical Review etters, 79, pp , D. Knut, Te rt of Computer Programming, Vol : eminumerical lgoritms. ison-wesley, Reaing, Mass., omonaco, Jr., " quic glance at Quantum Cryptograpy," ttp://xxx.lanl.gov/abs/quant-p/ C. H. Papaimitriou, "Computattional Complexity," ison-wesley, P. or, "lgoritms for quantum computation: Discrete logaritms an factoring," Proceeings of 35t IEEE ymposium on Founations of Computer cience, pp. 4-34, D. imon, "On te power of quantum computation," Proceeings of 35t ymposium on Founations of Computers cience, pp. 6-3, IEEE Computer ociety Press, W. K. Wooters an W. H. Zure, " single quantum cannot be clone," ature, 99, pp , Yao, "Quantum circuit complexity," Proceeings of 34t IEEE ymposium on Founations of Computer cience, pp , 993.
Section 3.3. Differentiation of Polynomials and Rational Functions. Difference Equations to Differential Equations
Difference Equations to Differential Equations Section 3.3 Differentiation of Polynomials an Rational Functions In tis section we begin te task of iscovering rules for ifferentiating various classes of
4.4 The Derivative. 51. Disprove the claim: If lim f (x) = L, then either lim f (x) = L or. 52. If lim x a. f (x) = and lim x a. g(x) =, then lim x a
Capter 4 Real Analysis 281 51. Disprove te claim: If lim f () = L, ten eiter lim f () = L or a a lim f () = L. a 52. If lim a f () = an lim a g() =, ten lim a f + g =. 53. If lim f () = an lim g() = L
f(x + h) f(x) h as representing the slope of a secant line. As h goes to 0, the slope of the secant line approaches the slope of the tangent line.
Derivative of f(z) Dr. E. Jacobs Te erivative of a function is efine as a limit: f (x) 0 f(x + ) f(x) We can visualize te expression f(x+) f(x) as representing te slope of a secant line. As goes to 0,
Verifying Numerical Convergence Rates
1 Order of accuracy Verifying Numerical Convergence Rates We consider a numerical approximation of an exact value u. Te approximation depends on a small parameter, suc as te grid size or time step, and
Can a Lump-Sum Transfer Make Everyone Enjoy the Gains. from Free Trade?
Can a Lump-Sum Transfer Make Everyone Enjoy te Gains from Free Trade? Yasukazu Icino Department of Economics, Konan University June 30, 2010 Abstract I examine lump-sum transfer rules to redistribute te
Schedulability Analysis under Graph Routing in WirelessHART Networks
Scedulability Analysis under Grap Routing in WirelessHART Networks Abusayeed Saifulla, Dolvara Gunatilaka, Paras Tiwari, Mo Sa, Cenyang Lu, Bo Li Cengjie Wu, and Yixin Cen Department of Computer Science,
Computer Science and Engineering, UCSD October 7, 1999 Goldreic-Levin Teorem Autor: Bellare Te Goldreic-Levin Teorem 1 Te problem We æx a an integer n for te lengt of te strings involved. If a is an n-bit
Optimized Data Indexing Algorithms for OLAP Systems
Database Systems Journal vol. I, no. 2/200 7 Optimized Data Indexing Algoritms for OLAP Systems Lucian BORNAZ Faculty of Cybernetics, Statistics and Economic Informatics Academy of Economic Studies, Bucarest
How To Ensure That An Eac Edge Program Is Successful
Introduction Te Economic Diversification and Growt Enterprises Act became effective on 1 January 1995. Te creation of tis Act was to encourage new businesses to start or expand in Newfoundland and Labrador.
M(0) = 1 M(1) = 2 M(h) = M(h 1) + M(h 2) + 1 (h > 1)
Insertion and Deletion in VL Trees Submitted in Partial Fulfillment of te Requirements for Dr. Eric Kaltofen s 66621: nalysis of lgoritms by Robert McCloskey December 14, 1984 1 ackground ccording to Knut
Instantaneous Rate of Change:
Instantaneous Rate of Cange: Last section we discovered tat te average rate of cange in F(x) can also be interpreted as te slope of a scant line. Te average rate of cange involves te cange in F(x) over
Firewall Design: Consistency, Completeness, and Compactness
C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS Contents 1. Moment generating functions 2. Sum of a ranom number of ranom variables 3. Transforms
Research on the Anti-perspective Correction Algorithm of QR Barcode
Researc on te Anti-perspective Correction Algoritm of QR Barcode Jianua Li, Yi-Wen Wang, YiJun Wang,Yi Cen, Guoceng Wang Key Laboratory of Electronic Tin Films and Integrated Devices University of Electronic
An inquiry into the multiplier process in IS-LM model
An inquiry into te multiplier process in IS-LM model Autor: Li ziran Address: Li ziran, Room 409, Building 38#, Peing University, Beijing 00.87,PRC. Pone: (86) 00-62763074 Internet Address: [email protected]
CHAPTER 7. Di erentiation
CHAPTER 7 Di erentiation 1. Te Derivative at a Point Definition 7.1. Let f be a function defined on a neigborood of x 0. f is di erentiable at x 0, if te following it exists: f 0 fx 0 + ) fx 0 ) x 0 )=.
A Generalization of Sauer s Lemma to Classes of Large-Margin Functions
A Generalization of Sauer s Lemma to Classes of Large-Margin Functions Joel Ratsaby University College Lonon Gower Street, Lonon WC1E 6BT, Unite Kingom [email protected], WWW home page: http://www.cs.ucl.ac.uk/staff/j.ratsaby/
Distances in random graphs with infinite mean degrees
Distances in random graps wit infinite mean degrees Henri van den Esker, Remco van der Hofstad, Gerard Hoogiemstra and Dmitri Znamenski April 26, 2005 Abstract We study random graps wit an i.i.d. degree
CHAPTER 8: DIFFERENTIAL CALCULUS
CHAPTER 8: DIFFERENTIAL CALCULUS 1. Rules of Differentiation As we ave seen, calculating erivatives from first principles can be laborious an ifficult even for some relatively simple functions. It is clearly
Pre-trial Settlement with Imperfect Private Monitoring
Pre-trial Settlement wit Imperfect Private Monitoring Mostafa Beskar University of New Hampsire Jee-Hyeong Park y Seoul National University July 2011 Incomplete, Do Not Circulate Abstract We model pretrial
Modelling and Resolving Software Dependencies
June 15, 2005 Abstract Many Linux istributions an other moern operating systems feature the explicit eclaration of (often complex) epenency relationships between the pieces of software
Ross Recovery Empirical Project
Jens Carsten Jackwert Marco Menner University of Konstanz [email protected] ttp://www.wiwi.ni-konstanz.e/jackwert/ 2 Motivation State prices q pricing kernel m pysical probabilities f Normally
MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION
MAXIMUM-LIKELIHOOD ESTIMATION The General Theory of M-L Estimation In orer to erive an M-L estimator, we are boun to make an assumption about the functional form of the istribution which generates the
2.23 Gambling Rehabilitation Services. Introduction
2.23 Gambling Reabilitation Services Introduction Figure 1 Since 1995 provincial revenues from gambling activities ave increased over 56% from $69.2 million in 1995 to $108 million in 2004. Te majority
The EOQ Inventory Formula
Te EOQ Inventory Formula James M. Cargal Matematics Department Troy University Montgomery Campus A basic problem for businesses and manufacturers is, wen ordering supplies, to determine wat quantity of
10.2 Systems of Linear Equations: Matrices
SECTION 0.2 Systems of Linear Equations: Matrices 7 0.2 Systems of Linear Equations: Matrices OBJECTIVES Write the Augmente Matrix of a System of Linear Equations 2 Write the System from the Augmente Matrix
OPTIMAL DISCONTINUOUS GALERKIN METHODS FOR THE ACOUSTIC WAVE EQUATION IN HIGHER DIMENSIONS
OPTIMAL DISCONTINUOUS GALERKIN METHODS FOR THE ACOUSTIC WAVE EQUATION IN HIGHER DIMENSIONS ERIC T. CHUNG AND BJÖRN ENGQUIST Abstract. In tis paper, we developed and analyzed a new class of discontinuous
Comparison between two approaches to overload control in a Real Server: local or hybrid solutions?
Comparison between two approaces to overload control in a Real Server: local or ybrid solutions? S. Montagna and M. Pignolo Researc and Development Italtel S.p.A. Settimo Milanese, ITALY Abstract Tis wor
Cyber Epidemic Models with Dependences
Cyber Epidemic Models wit Dependences Maocao Xu 1, Gaofeng Da 2 and Souuai Xu 3 1 Department of Matematics, Illinois State University [email protected] 2 Institute for Cyber Security, University of Texas
Math 230.01, Fall 2012: HW 1 Solutions
Math 3., Fall : HW Solutions Problem (p.9 #). Suppose a wor is picke at ranom from this sentence. Fin: a) the chance the wor has at least letters; SOLUTION: All wors are equally likely to be chosen. The
2r 1. Definition (Degree Measure). Let G be a r-graph of order n and average degree d. Let S V (G). The degree measure µ(s) of S is defined by,
Theorem Simple Containers Theorem) Let G be a simple, r-graph of average egree an of orer n Let 0 < δ < If is large enough, then there exists a collection of sets C PV G)) satisfying: i) for every inepenent
Neighborhood-Privacy Protected Shortest Distance Computing in Cloud
Neigboroo-Priacy Protecte Sortest Distance Computing in Clou Jun Gao Jeery Yu Xu Ruoming Jin Jiasuai Zou Tengjiao Wang Dongqing Yang Key Laboratory o Hig Conience Sotware Tecnologies, EECS, Peking Uniersity
FINITE DIFFERENCE METHODS
FINITE DIFFERENCE METHODS LONG CHEN Te best known metods, finite difference, consists of replacing eac derivative by a difference quotient in te classic formulation. It is simple to code and economic to
A New Pricing Model for Competitive Telecommunications Services Using Congestion Discounts
A New Pricing Moel for Competitive Telecommunications Services Using Congestion Discounts N. Keon an G. Ananalingam Department of Systems Engineering University of Pennsylvania Philaelphia, PA 19104-6315
SAMPLE DESIGN FOR THE TERRORISM RISK INSURANCE PROGRAM SURVEY
ASA Section on Survey Researc Metods SAMPLE DESIG FOR TE TERRORISM RISK ISURACE PROGRAM SURVEY G. ussain Coudry, Westat; Mats yfjäll, Statisticon; and Marianne Winglee, Westat G. ussain Coudry, Westat,
An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations
This page may be remove to conceal the ientities of the authors An intertemporal moel of the real exchange rate, stock market, an international ebt ynamics: policy simulations Saziye Gazioglu an W. Davi
Improved dynamic programs for some batcing problems involving te maximum lateness criterion A P M Wagelmans Econometric Institute Erasmus University Rotterdam PO Box 1738, 3000 DR Rotterdam Te Neterlands
A Comparison of Performance Measures for Online Algorithms
A Comparison of Performance Measures for Online Algorithms Joan Boyar 1, Sany Irani 2, an Kim S. Larsen 1 1 Department of Mathematics an Computer Science, University of Southern Denmark, Campusvej 55,
ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters
ThroughputScheuler: Learning to Scheule on Heterogeneous Haoop Clusters Shehar Gupta, Christian Fritz, Bob Price, Roger Hoover, an Johan e Kleer Palo Alto Research Center, Palo Alto, CA, USA {sgupta, cfritz,
Verification of Security Protocols with Lists: from Length One to Unbounded Length
Verification of Security Protocols wit Lists: from Lengt One to Unbounded Lengt INRIA, Miriam Paiola and Bruno Blancet École Normale Supérieure, CNRS, Paris {paiola,blancet}@di.ens.fr Abstract. We present
Theoretical calculation of the heat capacity
eoretical calculation of te eat capacity Principle of equipartition of energy Heat capacity of ideal and real gases Heat capacity of solids: Dulong-Petit, Einstein, Debye models Heat capacity of metals
Note nine: Linear programming CSE 101. 1 Linear constraints and objective functions. 1.1 Introductory example. Copyright c Sanjoy Dasgupta 1
Copyrigt c Sanjoy Dasgupta Figure. (a) Te feasible region for a linear program wit two variables (see tet for details). (b) Contour lines of te objective function: for different values of (profit). Te
Catalogue no. 12-001-XIE. Survey Methodology. December 2004
Catalogue no. 1-001-XIE Survey Metodology December 004 How to obtain more information Specific inquiries about tis product and related statistics or services sould be directed to: Business Survey Metods
Geometric Stratification of Accounting Data
Stratification of Accounting Data Patricia Gunning * Jane Mary Horgan ** William Yancey *** Abstract: We suggest a new procedure for defining te boundaries of te strata in igly skewed populations, usual
2 Limits and Derivatives
2 Limits and Derivatives 2.7 Tangent Lines, Velocity, and Derivatives A tangent line to a circle is a line tat intersects te circle at exactly one point. We would like to take tis idea of tangent line
Optimal Energy Commitments with Storage and Intermittent Supply
Submitte to Operations Research manuscript OPRE-2009-09-406 Optimal Energy Commitments with Storage an Intermittent Supply Jae Ho Kim Department of Electrical Engineering, Princeton University, Princeton,
MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND
art I. robobabilystic Moels Computer Moelling an New echnologies 27 Vol. No. 2-3 ransport an elecommunication Institute omonosova iga V-9 atvia MOEING OF WO AEGIE IN INVENOY CONO YEM WIH ANOM EA IME AN
Ch 10. Arithmetic Average Options and Asian Opitons
Ch 10. Arithmetic Average Options an Asian Opitons I. Asian Option an the Analytic Pricing Formula II. Binomial Tree Moel to Price Average Options III. Combination of Arithmetic Average an Reset Options
Training Robust Support Vector Regression via D. C. Program
Journal of Information & Computational Science 7: 12 (2010) 2385 2394 Available at ttp://www.joics.com Training Robust Support Vector Regression via D. C. Program Kuaini Wang, Ping Zong, Yaoong Zao College
ACT Math Facts & Formulas
Numbers, Sequences, Factors Integers:..., -3, -2, -1, 0, 1, 2, 3,... Rationals: fractions, tat is, anyting expressable as a ratio of integers Reals: integers plus rationals plus special numbers suc as
A system to monitor the quality of automated coding of textual answers to open questions
Researc in Official Statistics Number 2/2001 A system to monitor te quality of automated coding of textual answers to open questions Stefania Maccia * and Marcello D Orazio ** Italian National Statistical
JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT
OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,
Which Networks Are Least Susceptible to Cascading Failures?
Which Networks Are Least Susceptible to Cascaing Failures? Larry Blume Davi Easley Jon Kleinberg Robert Kleinberg Éva Taros July 011 Abstract. The resilience of networks to various types of failures is
On Adaboost and Optimal Betting Strategies
On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore
Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law
Detecting Possibly Frauulent or Error-Prone Survey Data Using Benfor s Law Davi Swanson, Moon Jung Cho, John Eltinge U.S. Bureau of Labor Statistics 2 Massachusetts Ave., NE, Room 3650, Washington, DC
Equilibria in sequential bargaining games as solutions to systems of equations
Economics Letters 84 (2004) 407 411 www.elsevier.com/locate/econbase Equilibria in sequential bargaining games as solutions to systems of equations Tasos Kalandrakis* Department of Political Science, Yale
The modelling of business rules for dashboard reporting using mutual information
8 t World IMACS / MODSIM Congress, Cairns, Australia 3-7 July 2009 ttp://mssanz.org.au/modsim09 Te modelling of business rules for dasboard reporting using mutual information Gregory Calbert Command, Control,
Hollow cylinder flywheels
Hollow cyliner flyweels Magnus Helun February 22, 2012 1 Introuction 1.1 Applications Two main applications ave been ientifie, along wit oter so-calle sie-applications. Wen eploying a flyweel site, one
Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5
Binomial Moel Hull, Chapter 11 + ections 17.1 an 17.2 Aitional reference: John Cox an Mark Rubinstein, Options Markets, Chapter 5 1. One-Perio Binomial Moel Creating synthetic options (replicating options)
Math 113 HW #5 Solutions
Mat 3 HW #5 Solutions. Exercise.5.6. Suppose f is continuous on [, 5] and te only solutions of te equation f(x) = 6 are x = and x =. If f() = 8, explain wy f(3) > 6. Answer: Suppose we ad tat f(3) 6. Ten
Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany
Parameterize Algorithms for -Hitting Set: the Weighte Case Henning Fernau Trierer Forschungsberichte; Trier: Technical Reports Informatik / Mathematik No. 08-6, July 2008 Univ. Trier, FB 4 Abteilung Informatik
A Data Placement Strategy in Scientific Cloud Workflows
A Data Placement Strategy in Scientific Clou Workflows Dong Yuan, Yun Yang, Xiao Liu, Jinjun Chen Faculty of Information an Communication Technologies, Swinburne University of Technology Hawthorn, Melbourne,
Sections 3.1/3.2: Introducing the Derivative/Rules of Differentiation
Sections 3.1/3.2: Introucing te Derivative/Rules of Differentiation 1 Tangent Line Before looking at te erivative, refer back to Section 2.1, looking at average velocity an instantaneous velocity. Here
Lecture 10: What is a Function, definition, piecewise defined functions, difference quotient, domain of a function
Lecture 10: Wat is a Function, definition, piecewise defined functions, difference quotient, domain of a function A function arises wen one quantity depends on anoter. Many everyday relationsips between
- 1 - Handout #22 May 23, 2012 Huffman Encoding and Data Compression. CS106B Spring 2012. Handout by Julie Zelenski with minor edits by Keith Schwarz
CS106B Spring 01 Handout # May 3, 01 Huffman Encoding and Data Compression Handout by Julie Zelenski wit minor edits by Keit Scwarz In te early 1980s, personal computers ad ard disks tat were no larger
Search Advertising Based Promotion Strategies for Online Retailers
Search Avertising Base Promotion Strategies for Online Retailers Amit Mehra The Inian School of Business yeraba, Inia Amit [email protected] ABSTRACT Web site aresses of small on line retailers are often unknown
Multivariate time series analysis: Some essential notions
Capter 2 Multivariate time series analysis: Some essential notions An overview of a modeling and learning framework for multivariate time series was presented in Capter 1. In tis capter, some notions on
Option Pricing for Inventory Management and Control
Option Pricing for Inventory Management an Control Bryant Angelos, McKay Heasley, an Jeffrey Humpherys Abstract We explore the use of option contracts as a means of managing an controlling inventories
The most common model to support workforce management of telephone call centers is
Designing a Call Center with Impatient Customers O. Garnett A. Manelbaum M. Reiman Davison Faculty of Inustrial Engineering an Management, Technion, Haifa 32000, Israel Davison Faculty of Inustrial Engineering
Enterprise Resource Planning
Enterprise Resource Planning MPC 6 th Eition Chapter 1a McGraw-Hill/Irwin Copyright 2011 by The McGraw-Hill Companies, Inc. All rights reserve. Enterprise Resource Planning A comprehensive software approach
Simultaneous Location of Trauma Centers and Helicopters for Emergency Medical Service Planning
Simultaneous Location of Trauma Centers and Helicopters for Emergency Medical Service Planning Soo-Haeng Co Hoon Jang Taesik Lee Jon Turner Tepper Scool of Business, Carnegie Mellon University, Pittsburg,
Tangent Lines and Rates of Change
Tangent Lines and Rates of Cange 9-2-2005 Given a function y = f(x), ow do you find te slope of te tangent line to te grap at te point P(a, f(a))? (I m tinking of te tangent line as a line tat just skims
Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market
RATIO MATHEMATICA 25 (2013), 29 46 ISSN:1592-7415 Optimal Control Policy of a Prouction an Inventory System for multi-prouct in Segmente Market Kuleep Chauhary, Yogener Singh, P. C. Jha Department of Operational
Staffing and routing in a two-tier call centre. Sameer Hasija*, Edieal J. Pinker and Robert A. Shumsky
8 Int. J. Operational Researc, Vol. 1, Nos. 1/, 005 Staffing and routing in a two-tier call centre Sameer Hasija*, Edieal J. Pinker and Robert A. Sumsky Simon Scool, University of Rocester, Rocester 1467,
Channel Allocation in Non-Cooperative Multi-Radio Multi-Channel Wireless Networks
Cannel Allocation in Non-Cooperative Multi-Radio Multi-Cannel Wireless Networks Dejun Yang, Xi Fang, Guoliang Xue Arizona State University Abstract Wile tremendous efforts ave been made on cannel allocation
Tis Problem and Retail Inventory Management
Optimizing Inventory Replenisment of Retail Fasion Products Marsall Fiser Kumar Rajaram Anant Raman Te Warton Scool, University of Pennsylvania, 3620 Locust Walk, 3207 SH-DH, Piladelpia, Pennsylvania 19104-6366
To motivate the notion of a variogram for a covariance stationary process, { Ys ( ): s R}
4. Variograms Te covariogram and its normalized form, te correlogram, are by far te most intuitive metods for summarizing te structure of spatial dependencies in a covariance stationary process. However,
OPTIMAL FLEET SELECTION FOR EARTHMOVING OPERATIONS
New Developments in Structural Engineering and Construction Yazdani, S. and Sing, A. (eds.) ISEC-7, Honolulu, June 18-23, 2013 OPTIMAL FLEET SELECTION FOR EARTHMOVING OPERATIONS JIALI FU 1, ERIK JENELIUS
A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements
International Journal of nowlege an Systems Science, 3(), -7, January-March 0 A lame-ase Approach to Generating Proposals for Hanling Inconsistency in Software Requirements eian Mu, Peking University,
Data Center Power System Reliability Beyond the 9 s: A Practical Approach
Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical
Discuss the size of the instance for the minimum spanning tree problem.
3.1 Algorithm complexity The algorithms A, B are given. The former has complexity O(n 2 ), the latter O(2 n ), where n is the size of the instance. Let n A 0 be the size of the largest instance that can
Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
Tis article as been accepted for publication in a future issue of tis journal, but as not been fully edited Content may cange prior to final publication Citation information: DOI 101109/TCC20152389842,
Predicting the behavior of interacting humans by fusing data from multiple sources
Predicting te beavior of interacting umans by fusing data from multiple sources Erik J. Sclict 1, Ritcie Lee 2, David H. Wolpert 3,4, Mykel J. Kocenderfer 1, and Brendan Tracey 5 1 Lincoln Laboratory,
1 The Collocation Method
CS410 Assignment 7 Due: 1/5/14 (Fri) at 6pm You must wor eiter on your own or wit one partner. You may discuss bacground issues and general solution strategies wit oters, but te solutions you submit must
Web Appendices of Selling to Overcon dent Consumers
Web Appenices of Selling to Overcon ent Consumers Michael D. Grubb A Option Pricing Intuition This appenix provies aitional intuition base on option pricing for the result in Proposition 2. Consier the
On a Satellite Coverage
I. INTRODUCTION On a Satellite Coverage Problem DANNY T. CHI Kodak Berkeley Researc Yu T. su National Ciao Tbng University Te eart coverage area for a satellite in an Eart syncronous orbit wit a nonzero
Asymmetric Trade Liberalizations and Current Account Dynamics
Asymmetric Trade Liberalizations and Current Account Dynamics Alessandro Barattieri January 15, 2015 Abstract Te current account deficits of Spain, Portugal and Greece are te result of large deficits in
Risk Management for Derivatives
Risk Management or Derivatives he Greeks are coming the Greeks are coming! Managing risk is important to a large number o iniviuals an institutions he most unamental aspect o business is a process where
A New Evaluation Measure for Information Retrieval Systems
A New Evaluation Measure for Information Retrieval Systems Martin Mehlitz [email protected] Christian Bauckhage Deutsche Telekom Laboratories [email protected] Jérôme Kunegis [email protected]
