Alain Hertz 1 and Sacha Varone 2

Size: px
Start display at page:

Download "Alain Hertz 1 and Sacha Varone 2"

Transcription

1 RAIRO Operations Research RAIRO Oper Res (2007) 6 66 DOI: 005/ro: A NOTE ON TREE REALIZATIONS OF MATRICES Alain Hertz and Sacha Varone 2 Abstract It is well known that each tree metric M has a unique realization as a tree, and that this realization minimizes the total length of the edges among all other realizations of M We extend this result to the class of symmetric matrices M with zero diagonal, positive entries, andsuchthatm ij + m kl max{m ik + m,m + m } for all distinct i, j, k, l Keywords Matrices, tree metrics, -point condition Mathematics Subject Classification 05C50, 05B20, 68R0, 68U99 Introduction An n n matrix M =(m ij ) with zero diagonal is a tree metric if it satisfies the following -point condition: m ij + m kl max{m ik + m,m + m } i, j, k, l in {,,n} By denoting s = m ij +m kl, the -point condition is equivalent to imposing that two of the three sums s,s ik and s are equal and not less than the third The -point condition entas the triangle inequality (for k = l) and symmetry (for i = k and j = l) There is an extensive literature on tree metrics; see for example [, 7 0] Received March 07, 2005 Accepted January 9, 2007 This wo has been partially funded by grant PA / from the Swiss National Science Foundation, received by the second author Département de mathématiques et de génie industriel, École Polytechnique, Montréal, Canada; alainhertz@geradca 2 Haute école de gestion de Genève, Économie d Entreprise, Genève, Switzeand; sachavarone@hesgech c EDP Sciences, ROADEF, SMAI 2007 Article published by EDP Sciences and avaable at or

2 62 A HERTZ AND S VARONE AmatrixM Its associated complete graph K M A realization of M as a tree Figure A tree realization of a tree metric It is well known that a tree metric M =(m ij ) can be represented by an unrooted tree T such that {,,n} is a subset of the vertex set of T, and the length of the unique chain connecting two vertices i and j in T ( i<j n) isequaltom ij Let G =(V,E,d) be the graph with vertex set V,edgesetE, andwhered is a function assigning a positive length d ij to each edge (i, j) of G The length of the shortest chain between two vertices i and j in G is denoted d G ij Definition 0 Let M be a symmetric n n matrix with zero diagonal and such that 0 m ij m ik + m kj for all i, j, k in {,,n} A graph G =(V,E,d) isa realization of M =(m ij ) if and only if {,,n} is a subset of V,andd G ij = m ij for all i, j in {,,n} As mentioned above, tree metrics have a realization as a tree A realization G of a matrix M is said optimal if the total length of the edges in G is minimal among all realizations of M Hakimi and Yau [7] have proved that tree metrics have a unique realization as a tree, and this realization is optimal Culberson and Rudnicki [] have designed an O(n 2 ) time algorithm for constructing a realization as a tree of tree metrics We propose to extend the above definition to matrices whose entries do not necessary satisfy the triangle inequality Given a symmetric n n matrix M = (m ij ) with zero diagonal and positive entries, let K M denote the complete graph on n vertices in which each edge (i, j) haslengthm ij Definition 02 Let M be a symmetric n n matrix with zero diagonal and positive entries A graph G =(V,E,d) is a realization of M =(m ij )ifandonly if {,,n} is a subset of V,andd G ij = dkm ij for all i, j in {,,n} Obviously, if M satisfies the triangle inequality, then d KM ij = m ij, and Definition 02 is then equivalent to Definition 0 Figure lustrates this new definition Notice that the matrix in Figure is not a tree metric, whe it has a realization as a tree Let M n denote the set of symmetric n n matrices M =(m ij ) with zero diagonal, positive entries, and such that m ij + m kl max{m ik + m,m + m } for all distinct points i, j, k, l in {,,n}

3 ANOTEONTREEREALIZATIONSOFMATRICES A matrixm that does not belong to M 2 Its associated complete graph K M 2 A realization of M as a tree Figure 2 A tree realization of a matrix that does not belong to M n Since we only impose the -point condition on distinct points i, j, k, l, theentries of a matrix in M n do not necessary satisfy the triangle inequality Whe all tree metrics belong to M n, the example in Figure 2 shows that a matrix having a realization as a tree does not necessary belong to M n However, we prove in this paper that all matrices in M n have a unique realization as a tree, and that this realization is optimal The main result Let M =(m ij ) be any matrix in M n, and consider the matrix M =(m ij ) obtained from M by setting m ij equal to the length dkm ij of the shortest chain between i and j in K M Notice that the elements in M satisfy the triangle inequality In order to prove that M has a realization as a tree, it is sufficient to prove that M is a tree metric The proof is based on Floyd s O(n )time algorithm [6] for the computation of M Floyd s algorithm [6] Set M 0 equal to M; For r := to n do For all i and j in {,,n} do Set m r ij equal to min{mr ij Set M equal to M n,m r ir + m r rj }; We shall prove that each matrix M r ( r n) isinm n Since the entries of M = M n satisfy the triangle inequality, we wl be able to conclude that M is a tree metric Theorem Let M =(m ij ) be a matrix in M n,andletm =(m ij ) be the n n matrix obtained from M by setting m ij = dkm ij for all i and j in {,,n} Then M is a tree metric Proof Following Floyd s algorithm, define M 0 = M and let M r be the matrix obtained from M r by setting m r ij = min{mr ij,m r ir + m r rj } for all i and j

4 6 A HERTZ AND S VARONE in {,,n} Given four distinct points i, j, k, l in {,,n}, wedenotes r = m r ij + mr kl We prove by induction that each M r (r =,,n)isinm n By hypothesis, M 0 = M is in M n, so assume M r M n It is sufficient to show that s r max{sr ik,sr } for all distinct i, j, k, l in {,,n}, orequivalently, that two of the three sums s r,sr ik and sr are equal and not less than the third Notice that m r ri = mr ri and m r ij mr ij for all i j n Consider any four distinct points i, j, k and l Since r is possibly one of these four points, we divide the proof into two cases Case A: r {i, j, k, l}, sayr = l Since M r M n, we may assume, without loss of generality (wlog) that s r ri sr rjik = sr ij If mr ik = mr ik and m r ij = mr ij,thens r ri s r rjik = sr ij and we are done So, we can assume wlog mr ik <mr ik It then follows that m r ri + s r rjik = mr ri + s r ij <mr ik + m r ij,which means that m r ij = mr ri + m r rj <m r ij We therefore have s r ri m r ri + m r rj + m r = s r rjik = sr ij Case B: r/ {i, j, k, l} If s r = sr,sr ik = sr assume wlog that m r ij <mr ij m r = mr and m r = mr M n and s r ij <sr ij, whe sr rjik = sr rjik and sr ri = sr case A that s r rjik = sr ri Hence, s r rjik + sr ri = sr ik and sr = sr, there is nothing to prove So Notice that if m r ik = mr ik, mr = mr,, then we are done Indeed, since M r ri,weknowfrom In a simar way, we also have sr rj = s r ri, which means that sr ri + sr rj M r M n,s r ik = sr ik,sr = sr and sr <sr ik = sr Since we conclude that s r <sr ik = sr Wlog, we can therefore assume mr ik <mr ik The rest of the proof is divided into four subcases Case B: m r <m r rj + m r and m r >m r rj + m r Since s r = mr + m r rj + m r >s r,weknowfromcaseathat s r = s r, which means that mr kl = m r + m r Hence, s r < s r = sr ik Case B2: m r <m r rj + m r and m r m r rj + m r We can assume m r kl = mr kl points j and k are exchanged We can also assume m r Indeed, if m r m r ri + m r, else we are in case B, where the roles of <m r ri + m r then s r = mr ri ri + + s r, sr ik = mr s r,andsr = mr ri + s r and we are done since M r M n But now, s r ik >sr, and we know from case A that sr rikl = s r ik, which means that m r kl = mr + mr Hence, s r >sr,andweknow + m r We from case A that s r = sr, which means that mr = mr rj therefore have s r <sr = sr ik

5 ANOTEONTREEREALIZATIONSOFMATRICES 65 Case B: m r m r rj + m r and m r >m r rj + m r It follows from cases B and B2 that i, j, k and l satisfy the -point condition in M r if m r ij <mr ij, m r ik <mr ik,andmr <m r rj + m r By permuting the roles of points i and j as well as those of k and l, we also know that i, j, k and l satisfy the -point condition in M r if m r ij <mr ij, m r <mr,andm r <m r ri + m r Sincem r ij <mr ij and m r <mr in case B, we can assume m r m r ri + m r Hence, s r sr ik = sr Case B: m r m r rj + m r and m r m r rj + m r Since M r M n,ands r ri <s r ij we know that sr rj = s r ij,which means that m r <mr Ifm r = m r rj +m r then s r sr ik = sr Else, m r <m r rj + m r, which implies s r <sr We then know from case A that s r = sr, which means that mr kl = mr + m r We therefore have s r ik <sr = sr Corollary 2 Each matrix in M n has a unique realization as a tree, and this realization is optimal Proof Let M be any matrix in M n,andletm =(m ij )bethen n matrix obtained from M by setting m ij = dkm ij for all i<j n It follows from Definition 02 that a graph is a realization of M if and only if it is a realization of M We know from the above theorem that M is a tree metric To conclude, it is sufficient to observe that each tree metric has a unique tree realization, and this realization is optimal 2 A related problem Given two n n metrics L =(l ij )andu =(u ij ), the matrix sandwich problem [5] is to find (if possible) a tree metric M =(m ij ) such that l ij m ij u ij for all i, j {,,n} Typically, the information concerning the distance matrix associated with a netwo may be inaccurate, and we are only given lower and upper bound matrices L and U We prove here below that a solution to the matrix sandwich problem can be obtained by first finding a matrix M M n that lies between L and U, andthen constructing the tree metric M =(m ij )withm ij = dkm ij Finding a matrix M M n that lies between L and U is possibly easier than finding a tree metric with the same lower and upper bound matrices, the reason being that the triangle inequality is not imposed on matrices in M n Proposition 2 Let M =(m ij ) be a matrix in M n,andletm =(m ij ) be the n n matrix obtained from M by setting m ij = dkm ij for all i and j in {,,n} If l ij m ij u ij for all i, j {,,n}, thenm is a solution to the matrix sandwich problem

6 66 A HERTZ AND S VARONE Proof Let M =(m ij ) be a matrix in M n, such that l ij m ij u ij for all i, j {,,n}, andletm =(m ij )bethen n matrix obtained from M by setting m ij = dkm ij for all i<j n We know from Theorem that M is a tree metric Moreover, since L is a metric, we have l ij m ij m ij for all i, j {,,n} References [] H-J Bandelt, Recognition of tree metrics SIAM J Algebr Discrete Methods (990) 6 [2] J-P Barthélémy and A Guénoche, Trees and proximity representations John Wey & Sons Ltd, Chichester (99) [] P Buneman, A note on metric properties of trees J Combin Theory Ser B 7 (97) 8 50 [] JC Culberson and P Rudnicki, A fast algorithm for constructing trees from distance matrices In Inf Process Lett 0 (989) [5] M Farach, S Kannan and T Warnow, A robust model for finding optimal evolutionary trees Algorithmica (995) [6] RW Floyd, Algorithm 97 Shortest path Comm ACM 5 (962) 5 [7] SL Hakimi and SS Yau, Distance matrix of a graph and its realizabity Q Appl Math 22 (96) 05 7 [8] AN Patrinos and SL Hakimi, The distance matrix of a graph and its tree realization Q Appl Math 0 (972) [9] JMS Simões-Pereira, A note on the tree realizabity of a distance matrix J Combin Theory 6 (969) 0 0 [0] SC Varone, Trees related to realizations of distance matrices Discrete Math 92 (998) 7 6 To access this journal online: wwwedpsciencesorg

Alain Hertz 1 and Sacha Varone 2. Introduction A NOTE ON TREE REALIZATIONS OF MATRICES. RAIRO Operations Research Will be set by the publisher

Alain Hertz 1 and Sacha Varone 2. Introduction A NOTE ON TREE REALIZATIONS OF MATRICES. RAIRO Operations Research Will be set by the publisher RAIRO Operations Research Will be set by the publisher A NOTE ON TREE REALIZATIONS OF MATRICES Alain Hertz and Sacha Varone 2 Abstract It is well known that each tree metric M has a unique realization

More information

Essays on Some Combinatorial Optimization Problems with Interval Data

Essays on Some Combinatorial Optimization Problems with Interval Data Essays on Some Combinatorial Optimization Problems with Interval Data a thesis submitted to the department of industrial engineering and the institute of engineering and sciences of bilkent university

More information

Applied Mathematics Letters

Applied Mathematics Letters Applied Mathematics Letters 23 (2010) 286 290 Contents lists available at ScienceDirect Applied Mathematics Letters journal homepage: wwwelseviercom/locate/aml The number of spanning trees of a graph Jianxi

More information

A relation on 132-avoiding permutation patterns

A relation on 132-avoiding permutation patterns Discrete Mathematics and Theoretical Computer Science DMTCS vol. VOL, 205, 285 302 A relation on 32-avoiding permutation patterns Natalie Aisbett School of Mathematics and Statistics, University of Sydney,

More information

IEOR E4004: Introduction to OR: Deterministic Models

IEOR E4004: Introduction to OR: Deterministic Models IEOR E4004: Introduction to OR: Deterministic Models 1 Dynamic Programming Following is a summary of the problems we discussed in class. (We do not include the discussion on the container problem or the

More information

An Application of Ramsey Theorem to Stopping Games

An Application of Ramsey Theorem to Stopping Games An Application of Ramsey Theorem to Stopping Games Eran Shmaya, Eilon Solan and Nicolas Vieille July 24, 2001 Abstract We prove that every two-player non zero-sum deterministic stopping game with uniformly

More information

Strong Subgraph k-connectivity of Digraphs

Strong Subgraph k-connectivity of Digraphs Strong Subgraph k-connectivity of Digraphs Yuefang Sun joint work with Gregory Gutin, Anders Yeo, Xiaoyan Zhang yuefangsun2013@163.com Department of Mathematics Shaoxing University, China July 2018, Zhuhai

More information

Lattices and the Knaster-Tarski Theorem

Lattices and the Knaster-Tarski Theorem Lattices and the Knaster-Tarski Theorem Deepak D Souza Department of Computer Science and Automation Indian Institute of Science, Bangalore. 8 August 27 Outline 1 Why study lattices 2 Partial Orders 3

More information

Equilibrium payoffs in finite games

Equilibrium payoffs in finite games Equilibrium payoffs in finite games Ehud Lehrer, Eilon Solan, Yannick Viossat To cite this version: Ehud Lehrer, Eilon Solan, Yannick Viossat. Equilibrium payoffs in finite games. Journal of Mathematical

More information

Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem

Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem Joshua Cooper August 14, 006 Abstract We show that the problem of counting collinear points in a permutation (previously considered by the

More information

MAT 4250: Lecture 1 Eric Chung

MAT 4250: Lecture 1 Eric Chung 1 MAT 4250: Lecture 1 Eric Chung 2Chapter 1: Impartial Combinatorial Games 3 Combinatorial games Combinatorial games are two-person games with perfect information and no chance moves, and with a win-or-lose

More information

CATEGORICAL SKEW LATTICES

CATEGORICAL SKEW LATTICES CATEGORICAL SKEW LATTICES MICHAEL KINYON AND JONATHAN LEECH Abstract. Categorical skew lattices are a variety of skew lattices on which the natural partial order is especially well behaved. While most

More information

Yao s Minimax Principle

Yao s Minimax Principle Complexity of algorithms The complexity of an algorithm is usually measured with respect to the size of the input, where size may for example refer to the length of a binary word describing the input,

More information

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Department of Computer Science, University of Toronto, shlomoh,szeider@cs.toronto.edu Abstract.

More information

CSE 21 Winter 2016 Homework 6 Due: Wednesday, May 11, 2016 at 11:59pm. Instructions

CSE 21 Winter 2016 Homework 6 Due: Wednesday, May 11, 2016 at 11:59pm. Instructions CSE 1 Winter 016 Homework 6 Due: Wednesday, May 11, 016 at 11:59pm Instructions Homework should be done in groups of one to three people. You are free to change group members at any time throughout the

More information

ON THE MAXIMUM AND MINIMUM SIZES OF A GRAPH

ON THE MAXIMUM AND MINIMUM SIZES OF A GRAPH Discussiones Mathematicae Graph Theory 37 (2017) 623 632 doi:10.7151/dmgt.1941 ON THE MAXIMUM AND MINIMUM SIZES OF A GRAPH WITH GIVEN k-connectivity Yuefang Sun Department of Mathematics Shaoxing University

More information

The Real Numbers. Here we show one way to explicitly construct the real numbers R. First we need a definition.

The Real Numbers. Here we show one way to explicitly construct the real numbers R. First we need a definition. The Real Numbers Here we show one way to explicitly construct the real numbers R. First we need a definition. Definitions/Notation: A sequence of rational numbers is a funtion f : N Q. Rather than write

More information

Permutation Factorizations and Prime Parking Functions

Permutation Factorizations and Prime Parking Functions Permutation Factorizations and Prime Parking Functions Amarpreet Rattan Department of Combinatorics and Optimization University of Waterloo Waterloo, ON, Canada N2L 3G1 arattan@math.uwaterloo.ca June 10,

More information

UNIT 2. Greedy Method GENERAL METHOD

UNIT 2. Greedy Method GENERAL METHOD UNIT 2 GENERAL METHOD Greedy Method Greedy is the most straight forward design technique. Most of the problems have n inputs and require us to obtain a subset that satisfies some constraints. Any subset

More information

BINOMIAL TRANSFORMS OF QUADRAPELL SEQUENCES AND QUADRAPELL MATRIX SEQUENCES

BINOMIAL TRANSFORMS OF QUADRAPELL SEQUENCES AND QUADRAPELL MATRIX SEQUENCES Journal of Science and Arts Year 17, No. 1(38), pp. 69-80, 2017 ORIGINAL PAPER BINOMIAL TRANSFORMS OF QUADRAPELL SEQUENCES AND QUADRAPELL MATRIX SEQUENCES CAN KIZILATEŞ 1, NAIM TUGLU 2, BAYRAM ÇEKİM 2

More information

GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv: v1 [math.lo] 25 Mar 2019

GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv: v1 [math.lo] 25 Mar 2019 GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv:1903.10476v1 [math.lo] 25 Mar 2019 Abstract. In this article we prove three main theorems: (1) guessing models are internally unbounded, (2)

More information

Equity Importance Modeling With Financial Network and Betweenness Centrality

Equity Importance Modeling With Financial Network and Betweenness Centrality Equity Importance Modeling With Financial Network and Betweenness Centrality Zhao Zhao 1 Guanhong Pei 1 Fei Huang 1 Xiaomo Liu 2 1 NDSSL,Virginia Bioinformatics Institute, Virginia Tech, Blacksburg, VA,

More information

The Probabilistic Method - Probabilistic Techniques. Lecture 7: Martingales

The Probabilistic Method - Probabilistic Techniques. Lecture 7: Martingales The Probabilistic Method - Probabilistic Techniques Lecture 7: Martingales Sotiris Nikoletseas Associate Professor Computer Engineering and Informatics Department 2015-2016 Sotiris Nikoletseas, Associate

More information

Decision Trees with Minimum Average Depth for Sorting Eight Elements

Decision Trees with Minimum Average Depth for Sorting Eight Elements Decision Trees with Minimum Average Depth for Sorting Eight Elements Hassan AbouEisha, Igor Chikalov, Mikhail Moshkov Computer, Electrical and Mathematical Sciences and Engineering Division, King Abdullah

More information

Quadrant marked mesh patterns in 123-avoiding permutations

Quadrant marked mesh patterns in 123-avoiding permutations Quadrant marked mesh patterns in 23-avoiding permutations Dun Qiu Department of Mathematics University of California, San Diego La Jolla, CA 92093-02. USA duqiu@math.ucsd.edu Jeffrey Remmel Department

More information

The Stackelberg Minimum Spanning Tree Game

The Stackelberg Minimum Spanning Tree Game The Stackelberg Minimum Spanning Tree Game J. Cardinal, E. Demaine, S. Fiorini, G. Joret, S. Langerman, I. Newman, O. Weimann, The Stackelberg Minimum Spanning Tree Game, WADS 07 Stackelberg Game 2 players:

More information

Lecture l(x) 1. (1) x X

Lecture l(x) 1. (1) x X Lecture 14 Agenda for the lecture Kraft s inequality Shannon codes The relation H(X) L u (X) = L p (X) H(X) + 1 14.1 Kraft s inequality While the definition of prefix-free codes is intuitively clear, we

More information

AN ALGORITHM FOR FINDING SHORTEST ROUTES FROM ALL SOURCE NODES TO A GIVEN DESTINATION IN GENERAL NETWORKS*

AN ALGORITHM FOR FINDING SHORTEST ROUTES FROM ALL SOURCE NODES TO A GIVEN DESTINATION IN GENERAL NETWORKS* 526 AN ALGORITHM FOR FINDING SHORTEST ROUTES FROM ALL SOURCE NODES TO A GIVEN DESTINATION IN GENERAL NETWORKS* By JIN Y. YEN (University of California, Berkeley) Summary. This paper presents an algorithm

More information

Lecture 19: March 20

Lecture 19: March 20 CS71 Randomness & Computation Spring 018 Instructor: Alistair Sinclair Lecture 19: March 0 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They may

More information

Sublinear Time Algorithms Oct 19, Lecture 1

Sublinear Time Algorithms Oct 19, Lecture 1 0368.416701 Sublinear Time Algorithms Oct 19, 2009 Lecturer: Ronitt Rubinfeld Lecture 1 Scribe: Daniel Shahaf 1 Sublinear-time algorithms: motivation Twenty years ago, there was practically no investigation

More information

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Abstract (k, s)-sat is the propositional satisfiability problem restricted to instances where each

More information

Notes on the symmetric group

Notes on the symmetric group Notes on the symmetric group 1 Computations in the symmetric group Recall that, given a set X, the set S X of all bijections from X to itself (or, more briefly, permutations of X) is group under function

More information

Structural Induction

Structural Induction Structural Induction Jason Filippou CMSC250 @ UMCP 07-05-2016 Jason Filippou (CMSC250 @ UMCP) Structural Induction 07-05-2016 1 / 26 Outline 1 Recursively defined structures 2 Proofs Binary Trees Jason

More information

ECE 586GT: Problem Set 1: Problems and Solutions Analysis of static games

ECE 586GT: Problem Set 1: Problems and Solutions Analysis of static games University of Illinois Fall 2018 ECE 586GT: Problem Set 1: Problems and Solutions Analysis of static games Due: Tuesday, Sept. 11, at beginning of class Reading: Course notes, Sections 1.1-1.4 1. [A random

More information

Some Bounds for the Singular Values of Matrices

Some Bounds for the Singular Values of Matrices Applied Mathematical Sciences, Vol., 007, no. 49, 443-449 Some Bounds for the Singular Values of Matrices Ramazan Turkmen and Haci Civciv Department of Mathematics, Faculty of Art and Science Selcuk University,

More information

Lecture 6. 1 Polynomial-time algorithms for the global min-cut problem

Lecture 6. 1 Polynomial-time algorithms for the global min-cut problem ORIE 633 Network Flows September 20, 2007 Lecturer: David P. Williamson Lecture 6 Scribe: Animashree Anandkumar 1 Polynomial-time algorithms for the global min-cut problem 1.1 The global min-cut problem

More information

On the Lower Arbitrage Bound of American Contingent Claims

On the Lower Arbitrage Bound of American Contingent Claims On the Lower Arbitrage Bound of American Contingent Claims Beatrice Acciaio Gregor Svindland December 2011 Abstract We prove that in a discrete-time market model the lower arbitrage bound of an American

More information

CONSTRUCTION OF CODES BY LATTICE VALUED FUZZY SETS. 1. Introduction. Novi Sad J. Math. Vol. 35, No. 2, 2005,

CONSTRUCTION OF CODES BY LATTICE VALUED FUZZY SETS. 1. Introduction. Novi Sad J. Math. Vol. 35, No. 2, 2005, Novi Sad J. Math. Vol. 35, No. 2, 2005, 155-160 CONSTRUCTION OF CODES BY LATTICE VALUED FUZZY SETS Mališa Žižović 1, Vera Lazarević 2 Abstract. To every finite lattice L, one can associate a binary blockcode,

More information

An Optimal Algorithm for Finding All the Jumps of a Monotone Step-Function. Stutistics Deportment, Tel Aoio Unioersitv, Tel Aoiu, Isrue169978

An Optimal Algorithm for Finding All the Jumps of a Monotone Step-Function. Stutistics Deportment, Tel Aoio Unioersitv, Tel Aoiu, Isrue169978 An Optimal Algorithm for Finding All the Jumps of a Monotone Step-Function REFAEL HASSIN AND NIMROD MEGIDDO* Stutistics Deportment, Tel Aoio Unioersitv, Tel Aoiu, Isrue169978 Received July 26, 1983 The

More information

Mechanisms for House Allocation with Existing Tenants under Dichotomous Preferences

Mechanisms for House Allocation with Existing Tenants under Dichotomous Preferences Mechanisms for House Allocation with Existing Tenants under Dichotomous Preferences Haris Aziz Data61 and UNSW, Sydney, Australia Phone: +61-294905909 Abstract We consider house allocation with existing

More information

Collective Profitability and Welfare in Selling-Buying Intermediation Processes

Collective Profitability and Welfare in Selling-Buying Intermediation Processes Collective Profitability and Welfare in Selling-Buying Intermediation Processes Amelia Bădică 1, Costin Bădică 1(B), Mirjana Ivanović 2, and Ionuţ Buligiu 1 1 University of Craiova, A. I. Cuza 13, 200530

More information

THE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE

THE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE THE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE GÜNTER ROTE Abstract. A salesperson wants to visit each of n objects that move on a line at given constant speeds in the shortest possible time,

More information

Non replication of options

Non replication of options Non replication of options Christos Kountzakis, Ioannis A Polyrakis and Foivos Xanthos June 30, 2008 Abstract In this paper we study the scarcity of replication of options in the two period model of financial

More information

Cumulants and triangles in Erdős-Rényi random graphs

Cumulants and triangles in Erdős-Rényi random graphs Cumulants and triangles in Erdős-Rényi random graphs Valentin Féray partially joint work with Pierre-Loïc Méliot (Orsay) and Ashkan Nighekbali (Zürich) Institut für Mathematik, Universität Zürich Probability

More information

Online Algorithms SS 2013

Online Algorithms SS 2013 Faculty of Computer Science, Electrical Engineering and Mathematics Algorithms and Complexity research group Jun.-Prof. Dr. Alexander Skopalik Online Algorithms SS 2013 Summary of the lecture by Vanessa

More information

Math 167: Mathematical Game Theory Instructor: Alpár R. Mészáros

Math 167: Mathematical Game Theory Instructor: Alpár R. Mészáros Math 167: Mathematical Game Theory Instructor: Alpár R. Mészáros Midterm #1, February 3, 2017 Name (use a pen): Student ID (use a pen): Signature (use a pen): Rules: Duration of the exam: 50 minutes. By

More information

Variations on a theme by Weetman

Variations on a theme by Weetman Variations on a theme by Weetman A.E. Brouwer Abstract We show for many strongly regular graphs, and for all Taylor graphs except the hexagon, that locally graphs have bounded diameter. 1 Locally graphs

More information

A Property Equivalent to n-permutability for Infinite Groups

A Property Equivalent to n-permutability for Infinite Groups Journal of Algebra 221, 570 578 (1999) Article ID jabr.1999.7996, available online at http://www.idealibrary.com on A Property Equivalent to n-permutability for Infinite Groups Alireza Abdollahi* and Aliakbar

More information

Heap Building Bounds

Heap Building Bounds Heap Building Bounds Zhentao Li 1 and Bruce A. Reed 2 1 School of Computer Science, McGill University zhentao.li@mail.mcgill.ca 2 School of Computer Science, McGill University breed@cs.mcgill.ca Abstract.

More information

Maximum Contiguous Subsequences

Maximum Contiguous Subsequences Chapter 8 Maximum Contiguous Subsequences In this chapter, we consider a well-know problem and apply the algorithm-design techniques that we have learned thus far to this problem. While applying these

More information

A NEW NOTION OF TRANSITIVE RELATIVE RETURN RATE AND ITS APPLICATIONS USING STOCHASTIC DIFFERENTIAL EQUATIONS. Burhaneddin İZGİ

A NEW NOTION OF TRANSITIVE RELATIVE RETURN RATE AND ITS APPLICATIONS USING STOCHASTIC DIFFERENTIAL EQUATIONS. Burhaneddin İZGİ A NEW NOTION OF TRANSITIVE RELATIVE RETURN RATE AND ITS APPLICATIONS USING STOCHASTIC DIFFERENTIAL EQUATIONS Burhaneddin İZGİ Department of Mathematics, Istanbul Technical University, Istanbul, Turkey

More information

Outline. 1 Introduction. 2 Algorithms. 3 Examples. Algorithm 1 General coordinate minimization framework. 1: Choose x 0 R n and set k 0.

Outline. 1 Introduction. 2 Algorithms. 3 Examples. Algorithm 1 General coordinate minimization framework. 1: Choose x 0 R n and set k 0. Outline Coordinate Minimization Daniel P. Robinson Department of Applied Mathematics and Statistics Johns Hopkins University November 27, 208 Introduction 2 Algorithms Cyclic order with exact minimization

More information

Optimal Satisficing Tree Searches

Optimal Satisficing Tree Searches Optimal Satisficing Tree Searches Dan Geiger and Jeffrey A. Barnett Northrop Research and Technology Center One Research Park Palos Verdes, CA 90274 Abstract We provide an algorithm that finds optimal

More information

The assignment game: Decentralized dynamics, rate of convergence, and equitable core selection

The assignment game: Decentralized dynamics, rate of convergence, and equitable core selection 1 / 29 The assignment game: Decentralized dynamics, rate of convergence, and equitable core selection Bary S. R. Pradelski (with Heinrich H. Nax) ETH Zurich October 19, 2015 2 / 29 3 / 29 Two-sided, one-to-one

More information

1 The Exchange Economy...

1 The Exchange Economy... ON THE ROLE OF A MONEY COMMODITY IN A TRADING PROCESS L. Peter Jennergren Abstract An exchange economy is considered, where commodities are exchanged in subsets of traders. No trader gets worse off during

More information

GENERATION OF STANDARD NORMAL RANDOM NUMBERS. Naveen Kumar Boiroju and M. Krishna Reddy

GENERATION OF STANDARD NORMAL RANDOM NUMBERS. Naveen Kumar Boiroju and M. Krishna Reddy GENERATION OF STANDARD NORMAL RANDOM NUMBERS Naveen Kumar Boiroju and M. Krishna Reddy Department of Statistics, Osmania University, Hyderabad- 500 007, INDIA Email: nanibyrozu@gmail.com, reddymk54@gmail.com

More information

Online Shopping Intermediaries: The Strategic Design of Search Environments

Online Shopping Intermediaries: The Strategic Design of Search Environments Online Supplemental Appendix to Online Shopping Intermediaries: The Strategic Design of Search Environments Anthony Dukes University of Southern California Lin Liu University of Central Florida February

More information

Blackwell Optimality in Markov Decision Processes with Partial Observation

Blackwell Optimality in Markov Decision Processes with Partial Observation Blackwell Optimality in Markov Decision Processes with Partial Observation Dinah Rosenberg and Eilon Solan and Nicolas Vieille April 6, 2000 Abstract We prove the existence of Blackwell ε-optimal strategies

More information

Epimorphisms and Ideals of Distributive Nearlattices

Epimorphisms and Ideals of Distributive Nearlattices Annals of Pure and Applied Mathematics Vol. 18, No. 2, 2018,175-179 ISSN: 2279-087X (P), 2279-0888(online) Published on 9 November 2018 www.researchmathsci.org DOI: http://dx.doi.org/10.22457/apam.v18n2a5

More information

Algebra homework 8 Homomorphisms, isomorphisms

Algebra homework 8 Homomorphisms, isomorphisms MATH-UA.343.005 T.A. Louis Guigo Algebra homework 8 Homomorphisms, isomorphisms For every n 1 we denote by S n the n-th symmetric group. Exercise 1. Consider the following permutations: ( ) ( 1 2 3 4 5

More information

Anh Maciag. A Two-Person Bargaining Problem

Anh Maciag. A Two-Person Bargaining Problem Anh Maciag Saint Mary s College of California Department of Mathematics May 16, 2016 A Two-Person Bargaining Problem Supervisors: Professor Kathryn Porter Professor Michael Nathanson Professor Chris Jones

More information

Investigating First Returns: The Effect of Multicolored Vectors

Investigating First Returns: The Effect of Multicolored Vectors Investigating First Returns: The Effect of Multicolored Vectors arxiv:1811.02707v1 [math.co] 7 Nov 2018 Shakuan Frankson and Myka Terry Mathematics Department SPIRAL Program at Morgan State University,

More information

CHARACTERIZATION OF CLOSED CONVEX SUBSETS OF R n

CHARACTERIZATION OF CLOSED CONVEX SUBSETS OF R n CHARACTERIZATION OF CLOSED CONVEX SUBSETS OF R n Chebyshev Sets A subset S of a metric space X is said to be a Chebyshev set if, for every x 2 X; there is a unique point in S that is closest to x: Put

More information

Pareto-Optimal Assignments by Hierarchical Exchange

Pareto-Optimal Assignments by Hierarchical Exchange Preprints of the Max Planck Institute for Research on Collective Goods Bonn 2011/11 Pareto-Optimal Assignments by Hierarchical Exchange Sophie Bade MAX PLANCK SOCIETY Preprints of the Max Planck Institute

More information

On the number of one-factorizations of the complete graph on 12 points

On the number of one-factorizations of the complete graph on 12 points On the number of one-factorizations of the complete graph on 12 points D. K. Garnick J. H. Dinitz Department of Computer Science Department of Mathematics Bowdoin College University of Vermont Brunswick

More information

RISK ADJUSTMENT FOR LOSS RESERVING BY A COST OF CAPITAL TECHNIQUE

RISK ADJUSTMENT FOR LOSS RESERVING BY A COST OF CAPITAL TECHNIQUE RISK ADJUSTMENT FOR LOSS RESERVING BY A COST OF CAPITAL TECHNIQUE B. POSTHUMA 1, E.A. CATOR, V. LOUS, AND E.W. VAN ZWET Abstract. Primarily, Solvency II concerns the amount of capital that EU insurance

More information

Cartesian Product of Two S-Valued Graphs

Cartesian Product of Two S-Valued Graphs Global Journal of Mathematical Sciences: Theory and Practical. ISSN 0974-3200 Volume 9, Number 3 (2017), pp. 347-355 International Research Publication House http://www.irphouse.com Cartesian Product of

More information

MSU CSE Spring 2011 Exam 2-ANSWERS

MSU CSE Spring 2011 Exam 2-ANSWERS MSU CSE 260-001 Spring 2011 Exam 2-NSWERS Name: This is a closed book exam, with 9 problems on 5 pages totaling 100 points. Integer ivision/ Modulo rithmetic 1. We can add two numbers in base 2 by using

More information

Error Bounds for P-matrix Linear Complementarity Problems and Their Applications

Error Bounds for P-matrix Linear Complementarity Problems and Their Applications Error Bounds for P-matrix Linear Complementarity Problems and Their Applications Xiaojun Chen The Hong Kong Polytechnic University NPA2008, Beijing, 7-9 April Outline Computational Global Error Bounds

More information

Single Machine Inserted Idle Time Scheduling with Release Times and Due Dates

Single Machine Inserted Idle Time Scheduling with Release Times and Due Dates Single Machine Inserted Idle Time Scheduling with Release Times and Due Dates Natalia Grigoreva Department of Mathematics and Mechanics, St.Petersburg State University, Russia n.s.grig@gmail.com Abstract.

More information

Course Information and Introduction

Course Information and Introduction August 20, 2015 Course Information 1 Instructor : Email : arash.rafiey@indstate.edu Office : Root Hall A-127 Office Hours : Tuesdays 12:00 pm to 1:00 pm in my office (A-127) 2 Course Webpage : http://cs.indstate.edu/

More information

On the Optimality of FCFS for Networks of Multi-Server Queues

On the Optimality of FCFS for Networks of Multi-Server Queues On the Optimality of FCFS for Networks of Multi-Server Queues Ger Koole Vrie Universiteit De Boelelaan 1081a, 1081 HV Amsterdam The Netherlands Technical Report BS-R9235, CWI, Amsterdam, 1992 Abstract

More information

Brouwer, A.E.; Koolen, J.H.

Brouwer, A.E.; Koolen, J.H. Brouwer, A.E.; Koolen, J.H. Published in: European Journal of Combinatorics DOI: 10.1016/j.ejc.008.07.006 Published: 01/01/009 Document Version Publisher s PDF, also known as Version of Record (includes

More information

Richardson Extrapolation Techniques for the Pricing of American-style Options

Richardson Extrapolation Techniques for the Pricing of American-style Options Richardson Extrapolation Techniques for the Pricing of American-style Options June 1, 2005 Abstract Richardson Extrapolation Techniques for the Pricing of American-style Options In this paper we re-examine

More information

NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE INTRODUCTION 1. FIBONACCI TREES

NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE INTRODUCTION 1. FIBONACCI TREES 0#0# NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE Shizuoka University, Hamamatsu, 432, Japan (Submitted February 1982) INTRODUCTION Continuing a previous paper [3], some new observations

More information

Strategyproof Facility Location for Concave Cost Functions

Strategyproof Facility Location for Concave Cost Functions Strategyproof Facility Location for Concave Cost Functions The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher

More information

Fractional Graphs. Figure 1

Fractional Graphs. Figure 1 Fractional Graphs Richard H. Hammack Department of Mathematics and Applied Mathematics Virginia Commonwealth University Richmond, VA 23284-2014, USA rhammack@vcu.edu Abstract. Edge-colorings are used to

More information

The Binomial Theorem and Consequences

The Binomial Theorem and Consequences The Binomial Theorem and Consequences Juris Steprāns York University November 17, 2011 Fermat s Theorem Pierre de Fermat claimed the following theorem in 1640, but the first published proof (by Leonhard

More information

Optimal rebalancing of portfolios with transaction costs assuming constant risk aversion

Optimal rebalancing of portfolios with transaction costs assuming constant risk aversion Optimal rebalancing of portfolios with transaction costs assuming constant risk aversion Lars Holden PhD, Managing director t: +47 22852672 Norwegian Computing Center, P. O. Box 114 Blindern, NO 0314 Oslo,

More information

The Duo-Item Bisection Auction

The Duo-Item Bisection Auction Comput Econ DOI 10.1007/s10614-013-9380-0 Albin Erlanson Accepted: 2 May 2013 Springer Science+Business Media New York 2013 Abstract This paper proposes an iterative sealed-bid auction for selling multiple

More information

Tug of War Game. William Gasarch and Nick Sovich and Paul Zimand. October 6, Abstract

Tug of War Game. William Gasarch and Nick Sovich and Paul Zimand. October 6, Abstract Tug of War Game William Gasarch and ick Sovich and Paul Zimand October 6, 2009 To be written later Abstract Introduction Combinatorial games under auction play, introduced by Lazarus, Loeb, Propp, Stromquist,

More information

Counting Basics. Venn diagrams

Counting Basics. Venn diagrams Counting Basics Sets Ways of specifying sets Union and intersection Universal set and complements Empty set and disjoint sets Venn diagrams Counting Inclusion-exclusion Multiplication principle Addition

More information

On the Distribution and Its Properties of the Sum of a Normal and a Doubly Truncated Normal

On the Distribution and Its Properties of the Sum of a Normal and a Doubly Truncated Normal The Korean Communications in Statistics Vol. 13 No. 2, 2006, pp. 255-266 On the Distribution and Its Properties of the Sum of a Normal and a Doubly Truncated Normal Hea-Jung Kim 1) Abstract This paper

More information

Laurence Boxer and Ismet KARACA

Laurence Boxer and Ismet KARACA SOME PROPERTIES OF DIGITAL COVERING SPACES Laurence Boxer and Ismet KARACA Abstract. In this paper we study digital versions of some properties of covering spaces from algebraic topology. We correct and

More information

An Optimal Odd Unimodular Lattice in Dimension 72

An Optimal Odd Unimodular Lattice in Dimension 72 An Optimal Odd Unimodular Lattice in Dimension 72 Masaaki Harada and Tsuyoshi Miezaki September 27, 2011 Abstract It is shown that if there is an extremal even unimodular lattice in dimension 72, then

More information

Inversion Formulae on Permutations Avoiding 321

Inversion Formulae on Permutations Avoiding 321 Inversion Formulae on Permutations Avoiding 31 Pingge Chen College of Mathematics and Econometrics Hunan University Changsha, P. R. China. chenpingge@hnu.edu.cn Suijie Wang College of Mathematics and Econometrics

More information

Fundamental Algorithms - Surprise Test

Fundamental Algorithms - Surprise Test Technische Universität München Fakultät für Informatik Lehrstuhl für Effiziente Algorithmen Dmytro Chibisov Sandeep Sadanandan Winter Semester 007/08 Sheet Model Test January 16, 008 Fundamental Algorithms

More information

Path Auction Games When an Agent Can Own Multiple Edges

Path Auction Games When an Agent Can Own Multiple Edges Path Auction Games When an Agent Can Own Multiple Edges Ye Du Rahul Sami Yaoyun Shi Department of Electrical Engineering and Computer Science, University of Michigan 2260 Hayward Ave, Ann Arbor, MI 48109-2121,

More information

1 Shapley-Shubik Model

1 Shapley-Shubik Model 1 Shapley-Shubik Model There is a set of buyers B and a set of sellers S each selling one unit of a good (could be divisible or not). Let v ij 0 be the monetary value that buyer j B assigns to seller i

More information

Structure connectivity and substructure connectivity of twisted hypercubes

Structure connectivity and substructure connectivity of twisted hypercubes arxiv:1803.08408v1 [math.co] Mar 018 Structure connectivity and substructure connectivity of twisted hypercubes Dong Li, Xiaolan Hu, Huiqing Liu Abstract Let G be a graph and T a certain connected subgraph

More information

6.231 DYNAMIC PROGRAMMING LECTURE 3 LECTURE OUTLINE

6.231 DYNAMIC PROGRAMMING LECTURE 3 LECTURE OUTLINE 6.21 DYNAMIC PROGRAMMING LECTURE LECTURE OUTLINE Deterministic finite-state DP problems Backward shortest path algorithm Forward shortest path algorithm Shortest path examples Alternative shortest path

More information

TEST 1 SOLUTIONS MATH 1002

TEST 1 SOLUTIONS MATH 1002 October 17, 2014 1 TEST 1 SOLUTIONS MATH 1002 1. Indicate whether each it below exists or does not exist. If the it exists then write what it is. No proofs are required. For example, 1 n exists and is

More information

A Note on the Extinction of Renewable Resources

A Note on the Extinction of Renewable Resources JOURNAL OF ENVIRONMENTAL ECONOMICS AND MANAGEMENT &64-70 (1988) A Note on the Extinction of Renewable Resources M. L. CROPPER Department of Economics and Bureau of Business and Economic Research, University

More information

Sy D. Friedman. August 28, 2001

Sy D. Friedman. August 28, 2001 0 # and Inner Models Sy D. Friedman August 28, 2001 In this paper we examine the cardinal structure of inner models that satisfy GCH but do not contain 0 #. We show, assuming that 0 # exists, that such

More information

Assortment Optimization Over Time

Assortment Optimization Over Time Assortment Optimization Over Time James M. Davis Huseyin Topaloglu David P. Williamson Abstract In this note, we introduce the problem of assortment optimization over time. In this problem, we have a sequence

More information

6 -AL- ONE MACHINE SEQUENCING TO MINIMIZE MEAN FLOW TIME WITH MINIMUM NUMBER TARDY. Hamilton Emmons \,«* Technical Memorandum No. 2.

6 -AL- ONE MACHINE SEQUENCING TO MINIMIZE MEAN FLOW TIME WITH MINIMUM NUMBER TARDY. Hamilton Emmons \,«* Technical Memorandum No. 2. li. 1. 6 -AL- ONE MACHINE SEQUENCING TO MINIMIZE MEAN FLOW TIME WITH MINIMUM NUMBER TARDY f \,«* Hamilton Emmons Technical Memorandum No. 2 May, 1973 1 il 1 Abstract The problem of sequencing n jobs on

More information

Handout 4: Deterministic Systems and the Shortest Path Problem

Handout 4: Deterministic Systems and the Shortest Path Problem SEEM 3470: Dynamic Optimization and Applications 2013 14 Second Term Handout 4: Deterministic Systems and the Shortest Path Problem Instructor: Shiqian Ma January 27, 2014 Suggested Reading: Bertsekas

More information

The Limiting Distribution for the Number of Symbol Comparisons Used by QuickSort is Nondegenerate (Extended Abstract)

The Limiting Distribution for the Number of Symbol Comparisons Used by QuickSort is Nondegenerate (Extended Abstract) The Limiting Distribution for the Number of Symbol Comparisons Used by QuickSort is Nondegenerate (Extended Abstract) Patrick Bindjeme 1 James Allen Fill 1 1 Department of Applied Mathematics Statistics,

More information

Solutions of Bimatrix Coalitional Games

Solutions of Bimatrix Coalitional Games Applied Mathematical Sciences, Vol. 8, 2014, no. 169, 8435-8441 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2014.410880 Solutions of Bimatrix Coalitional Games Xeniya Grigorieva St.Petersburg

More information

Semantics with Applications 2b. Structural Operational Semantics

Semantics with Applications 2b. Structural Operational Semantics Semantics with Applications 2b. Structural Operational Semantics Hanne Riis Nielson, Flemming Nielson (thanks to Henrik Pilegaard) [SwA] Hanne Riis Nielson, Flemming Nielson Semantics with Applications:

More information