It is used when neither the TX nor RX knows anything about the statistics of the source sequence at the start of the transmission
|
|
- Brittany Rice
- 6 years ago
- Views:
Transcription
1 It is used when neither the TX nor RX knows anything about the statistics of the source sequence at the start of the transmission -The code can be described in terms of a binary tree -0 corresponds to a left branch and 1 corresponds to a right branch -The squares denote the external nodes or leaves and correspond to the symbols in the source -The codeword for a symbol can be obtained by traversing the tree from the root to the leaf corresponding to the symbol LECTURES 10/30/2017 1
2 -In order to describe how the adaptive Huffman code works, we add two other parameters to the binary tree: (1) weight of node, which is written as a number inside the node, for external node it is the number of times the symbol corresponding to the external node has been encountered for internal node is the sum of the weights of its offspring (2) node number is a unique number assigned to each internal and external node and written under the node -Huffman Tree is based on the Sibling Property A binary code tree has the sibling property if : Each node (except the root) has a sibling (offspring) The nodes can be listed in order of decreasing manner, as if node 43 &44 are offspring of node 45, then the weight of 43 is less than that of 44 If A is the parent node of B (left) and C (right), then W(B) < W(C) LECTURES 10/30/2017 2
3 Fixed code for each different symbols Since in adaptive Huffman coding procedure, neither transmitter nor receiver knows anything about the statistics of the source sequence at the start of transmission, the tree at both the transmitter and the receiver consists of a single node that corresponds to all symbols Not Yet Transmitted (NYT) and has a weight of zero Before the beginning of transmission, a fixed code for each symbol is agreed upon between transmitter and receiver as follows: If the source has an alphabet {s 1, s 2,, s m } of size m (m=26 for alphabet source), then pick e and r such that: for m = 26, e = 4 and r = 10 m = 2 e +r, 0 r < 2 e and the number of nodes is 2m 1 internal and external nodes LECTURES 10/30/2017 3
4 Consider k is the order of the letter in alphabet sequence The letter s k is encoded as: the e+1 bit binary representation of k 1, if 1 k 2r else, s k is encoded as: the e bit binary representation of k r 1 Ex: The symbol a 1 is the first element in source alphabet, k = 1 It should b encoded by e+1 (=5) bit binary representation of k 1(0) as The symbol a 2 is the second element in source alphabet, k = 2 It should b encoded by e+1 (=5) bit binary representation of k 1(1) as The symbol a 22 is the twenty second element in source alphabet, k=22 It should b encoded by e (=4) bit binary representation of k r-1(11) as 1011 This coding is valid for the symbol encountered for the first time If the symbol is already exist ( transmitted before) the binary code for the symbol is obtained by traversing the tree LECTURES 10/30/2017 4
5 Updating The update procedure requires that the nodes be in a fixed order by numbering the nodes as : The largest node number is given to the root The smallest number is assigned to the NYT The numbers from the NYT node to the root of the tree are assigned in increasing order from left to right, and from lower level to upper level The set of nodes with the same weight makes up a block
6 In order that the update procedures at the transmitter and receiver both operate with the same information: The tree at the transmitter is updated after each symbol is encoded, and The tree at the receiver is updated after each symbol is decoded After a symbol has been encoded, the external node corresponding to the symbol is examined to see if it has the largest node number in its block. If the external node does not have the largest node number, it is exchanged with the node that has the largest node number in the block, as long as the node with the higher number is not the parent of the node being updated. The weight of the external node is then incremented Once we have incremented the weight of the node, we have adapted the Huffman tree at that level Updating
7 We then turn to the next level by examining the parent node of the node whose weight was incremented to see if it has the largest number in its block. If it does not, it is exchanged with the node with the largest number in the block. Again, an exception to this is when the node with the higher node number is the parent of the node under consideration. Once an exchange has taken place (or it has been determined that there is no need for an exchange), the weight of the parent node is incremented We then proceed to a new parent node and the process is repeated. This process continues until the root of the tree is reached If the symbol to be encoded has occurred for the first time, a new external node is assigned to the symbol and a new NYT is opened to the tree. Both the new external node and the new NYT node are offsprings of the old NYT node. We increment the weight of the new external node by one. As the old NYT node is the parent of the new external node, we increment its weight by one and then go on to update all the other nodes until we reach the root of the tree Updating
8 Ex: 1 Ex: 0 01 Then increment node number 51 to weight 5 instead of Then increment node number 48 to weight 2 instead of Then increment node number 50 to weight 3 instead of 2
9 Encoding Initially, the tree at both the encoder and decoder consists of a single node; the NYT node The codeword for the very first symbol that appears is a previously agreed upon fixed code Send the code for the NYT node, followed by the previously agreed upon fixed code for the symbol The code for the NYT node is obtained by traversing the Huffman tree from the root to the NYT node If a symbol to be encoded has a corresponding node in the tree, then the code for the symbol is generated by traversing the tree from the root to the external node corresponding to the symbol
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 15 Adaptive Huffman Coding Part I Huffman code are optimal for a
More informationIntroduction to Greedy Algorithms: Huffman Codes
Introduction to Greedy Algorithms: Huffman Codes Yufei Tao ITEE University of Queensland In computer science, one interesting method to design algorithms is to go greedy, namely, keep doing the thing that
More informationLecture l(x) 1. (1) x X
Lecture 14 Agenda for the lecture Kraft s inequality Shannon codes The relation H(X) L u (X) = L p (X) H(X) + 1 14.1 Kraft s inequality While the definition of prefix-free codes is intuitively clear, we
More informationCSE 417 Algorithms. Huffman Codes: An Optimal Data Compression Method
CSE 417 Algorithms Huffman Codes: An Optimal Data Compression Method 1 Compression Example 100k file, 6 letter alphabet: a 45% b 13% c 12% d 16% e 9% f 5% File Size: ASCII, 8 bits/char: 800kbits 2 3 >
More informationBCJR Algorithm. Veterbi Algorithm (revisted) Consider covolutional encoder with. And information sequences of length h = 5
Chapter 2 BCJR Algorithm Ammar Abh-Hhdrohss Islamic University -Gaza ١ Veterbi Algorithm (revisted) Consider covolutional encoder with And information sequences of length h = 5 The trellis diagram has
More informationUNIT VI TREES. Marks - 14
UNIT VI TREES Marks - 14 SYLLABUS 6.1 Non-linear data structures 6.2 Binary trees : Complete Binary Tree, Basic Terms: level number, degree, in-degree and out-degree, leaf node, directed edge, path, depth,
More informationBinary and Binomial Heaps. Disclaimer: these slides were adapted from the ones by Kevin Wayne
Binary and Binomial Heaps Disclaimer: these slides were adapted from the ones by Kevin Wayne Priority Queues Supports the following operations. Insert element x. Return min element. Return and delete minimum
More informationVARN CODES AND GENERALIZED FIBONACCI TREES
Julia Abrahams Mathematical Sciences Division, Office of Naval Research, Arlington, VA 22217-5660 (Submitted June 1993) INTRODUCTION AND BACKGROUND Yarn's [6] algorithm solves the problem of finding an
More informationCSE Lecture 13/14 In Class Handout For all of these problems: HAS NOT CANNOT Add Add Add must wait until $5 written by previous add;
CSE 30321 Lecture 13/14 In Class Handout For the sequence of instructions shown below, show how they would progress through the pipeline. For all of these problems: - Stalls are indicated by placing the
More informationDesign and Analysis of Algorithms 演算法設計與分析. Lecture 8 November 16, 2016 洪國寶
Design and Analysis of Algorithms 演算法設計與分析 Lecture 8 November 6, 206 洪國寶 Outline Review Amortized analysis Advanced data structures Binary heaps Binomial heaps Fibonacci heaps Data structures for disjoint
More informationLecture 5: Tuesday, January 27, Peterson s Algorithm satisfies the No Starvation property (Theorem 1)
Com S 611 Spring Semester 2015 Advanced Topics on Distributed and Concurrent Algorithms Lecture 5: Tuesday, January 27, 2015 Instructor: Soma Chaudhuri Scribe: Nik Kinkel 1 Introduction This lecture covers
More informationMSU CSE Spring 2011 Exam 2-ANSWERS
MSU CSE 260-001 Spring 2011 Exam 2-NSWERS Name: This is a closed book exam, with 9 problems on 5 pages totaling 100 points. Integer ivision/ Modulo rithmetic 1. We can add two numbers in base 2 by using
More informationBinary Decision Diagrams
Binary Decision Diagrams Hao Zheng Department of Computer Science and Engineering University of South Florida Tampa, FL 33620 Email: zheng@cse.usf.edu Phone: (813)974-4757 Fax: (813)974-5456 Hao Zheng
More informationCh 10 Trees. Introduction to Trees. Tree Representations. Binary Tree Nodes. Tree Traversals. Binary Search Trees
Ch 10 Trees Introduction to Trees Tree Representations Binary Tree Nodes Tree Traversals Binary Search Trees 1 Binary Trees A binary tree is a finite set of elements called nodes. The set is either empty
More informationBinary Decision Diagrams
Binary Decision Diagrams Hao Zheng Department of Computer Science and Engineering University of South Florida Tampa, FL 33620 Email: zheng@cse.usf.edu Phone: (813)974-4757 Fax: (813)974-5456 Hao Zheng
More informationCSCE 750, Fall 2009 Quizzes with Answers
CSCE 750, Fall 009 Quizzes with Answers Stephen A. Fenner September 4, 011 1. Give an exact closed form for Simplify your answer as much as possible. k 3 k+1. We reduce the expression to a form we ve already
More information(8m 2 5m + 2) - (-10m 2 +7m 6) (8m 2 5m + 2) + (+10m 2-7m + 6)
Adding Polynomials Adding & Subtracting Polynomials (Combining Like Terms) Subtracting Polynomials (if your nd polynomial is inside a set of parentheses). (x 8x + ) + (-x -x 7) FIRST, Identify the like
More informationFactor Graphs. Seungjin Choi
Factor Graphs Seungjin Choi Department of Computer Science and Engineering Pohang University of Science and Technology 77 Cheongam-ro, Nam-gu, Pohang 37673, Korea seungjin@postech.ac.kr 1 / 17 Tanner Graphs
More informationBinary Tree Applications
Binary Tree Applications Lecture 32 Section 19.2 Robb T. Koether Hampden-Sydney College Wed, Apr 17, 2013 Robb T. Koether (Hampden-Sydney College) Binary Tree Applications Wed, Apr 17, 2013 1 / 46 1 Expression
More informationPRIORITY QUEUES. binary heaps d-ary heaps binomial heaps Fibonacci heaps. Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley
PRIORITY QUEUES binary heaps d-ary heaps binomial heaps Fibonacci heaps Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley http://www.cs.princeton.edu/~wayne/kleinberg-tardos Last updated
More informationCS4311 Design and Analysis of Algorithms. Lecture 14: Amortized Analysis I
CS43 Design and Analysis of Algorithms Lecture 4: Amortized Analysis I About this lecture Given a data structure, amortized analysis studies in a sequence of operations, the average time to perform an
More informationAlgorithms PRIORITY QUEUES. binary heaps d-ary heaps binomial heaps Fibonacci heaps. binary heaps d-ary heaps binomial heaps Fibonacci heaps
Priority queue data type Lecture slides by Kevin Wayne Copyright 05 Pearson-Addison Wesley http://www.cs.princeton.edu/~wayne/kleinberg-tardos PRIORITY QUEUES binary heaps d-ary heaps binomial heaps Fibonacci
More informationTaiwan Futures Exchange. Market Data Transmission Manual
Taiwan Futures Exchange Market Data Transmission Manual (Market Data Transmission Network) Prepared by TAIFEX Ver. 2.16S (updated on 2017/11/23) This spec is for the feed that symbol format is linked with
More informationGlimpse for Best of Nasdaq Options (BONO)
S Market Data Feed Version 1.1 Glimpse for Best of Nasdaq Options (BONO) 1. Overview A complement to the Best of Nasdaq Options (BONO) real-time data feed products, Glimpse for Best of Nasdaq Options (BONO)
More informationOn the Optimality of a Family of Binary Trees Techical Report TR
On the Optimality of a Family of Binary Trees Techical Report TR-011101-1 Dana Vrajitoru and William Knight Indiana University South Bend Department of Computer and Information Sciences Abstract In this
More informationLattice Coding and its Applications in Communications
Lattice Coding and its Applications in Communications Alister Burr University of York alister.burr@york.ac.uk Introduction to lattices Definition; Sphere packings; Basis vectors; Matrix description Codes
More informationSET 1C Binary Trees. 2. (i) Define the height of a binary tree or subtree and also define a height balanced (AVL) tree. (2)
SET 1C Binary Trees 1. Construct a binary tree whose preorder traversal is K L N M P R Q S T and inorder traversal is N L K P R M S Q T 2. (i) Define the height of a binary tree or subtree and also define
More informationCSCI 104 B-Trees (2-3, 2-3-4) and Red/Black Trees. Mark Redekopp David Kempe
1 CSCI 104 B-Trees (2-3, 2-3-4) and Red/Black Trees Mark Redekopp David Kempe 2 An example of B-Trees 2-3 TREES 3 Definition 2-3 Tree is a tree where Non-leaf nodes have 1 value & 2 children or 2 values
More informationCSE 100: TREAPS AND RANDOMIZED SEARCH TREES
CSE 100: TREAPS AND RANDOMIZED SEARCH TREES Midterm Review Practice Midterm covered during Sunday discussion Today Run time analysis of building the Huffman tree AVL rotations and treaps Huffman s algorithm
More information1 Solutions to Tute09
s to Tute0 Questions 4. - 4. are straight forward. Q. 4.4 Show that in a binary tree of N nodes, there are N + NULL pointers. Every node has outgoing pointers. Therefore there are N pointers. Each node,
More informationLecture 17: More on Markov Decision Processes. Reinforcement learning
Lecture 17: More on Markov Decision Processes. Reinforcement learning Learning a model: maximum likelihood Learning a value function directly Monte Carlo Temporal-difference (TD) learning COMP-424, Lecture
More informationMicroeconomics of Banking: Lecture 5
Microeconomics of Banking: Lecture 5 Prof. Ronaldo CARPIO Oct. 23, 2015 Administrative Stuff Homework 2 is due next week. Due to the change in material covered, I have decided to change the grading system
More informationNasdaq Options GLIMPSE
Market Data Feed Version 3.2 Nasdaq Options GLIMPSE 1. Overview A complement to the Nasdaq Options ITCH to Trade Options (ITTO) real-time data feed product, Nasdaq Options GLIMPSE 3.0 is a point-to-point
More informationMultirate Multicast Service Provisioning I: An Algorithm for Optimal Price Splitting Along Multicast Trees
Mathematical Methods of Operations Research manuscript No. (will be inserted by the editor) Multirate Multicast Service Provisioning I: An Algorithm for Optimal Price Splitting Along Multicast Trees Tudor
More informationCEC login. Student Details Name SOLUTIONS
Student Details Name SOLUTIONS CEC login Instructions You have roughly 1 minute per point, so schedule your time accordingly. There is only one correct answer per question. Good luck! Question 1. Searching
More informationNasdaq Options GLIMPSE
Nasdaq Options GLIMPSE Market Data Feed Version 4.00 Nasdaq Options GLIMPSE 1. Overview A complement to the NASDAQ Options ITCH to Trade Options (ITTO) real-time data feed product, NASDAQ Options GLIMPSE
More informationNASDAQ OPTIONS GLIMPSE INTERFACE SPECIFICATIONS. Market Data Feed Version 1.2 BX OPTIONS GLIMPSE
Market Data Feed Version 1.2 BX OPTIONS GLIMPSE 1. Overview A complement to the Nasdaq BX Options Depth of Market (BX Depth) real-time data feed product, Nasdaq BX Options GLIMPSE (BX GLIMPSE) is a point-to-point
More informationHigh Frequency Trading Strategy Based on Prex Trees
High Frequency Trading Strategy Based on Prex Trees Yijia Zhou, 05592862, Financial Mathematics, Stanford University December 11, 2010 1 Introduction 1.1 Goal I am an M.S. Finanical Mathematics student
More informationDecision making in the presence of uncertainty
CS 271 Foundations of AI Lecture 21 Decision making in the presence of uncertainty Milos Hauskrecht milos@cs.pitt.edu 5329 Sennott Square Decision-making in the presence of uncertainty Many real-world
More informationSupporting Information
Supporting Information Novikoff et al. 0.073/pnas.0986309 SI Text The Recap Method. In The Recap Method in the paper, we described a schedule in terms of a depth-first traversal of a full binary tree,
More informationCSE 21 Winter 2016 Homework 6 Due: Wednesday, May 11, 2016 at 11:59pm. Instructions
CSE 1 Winter 016 Homework 6 Due: Wednesday, May 11, 016 at 11:59pm Instructions Homework should be done in groups of one to three people. You are free to change group members at any time throughout the
More informationPHLX GLIMPSE INTERFACE SPECIFICATIONS. Version 1.5 PHLX GLIMPSE
Version 1.5 PHLX GLIMPSE 1. Overview A complement to the PHLX Depth real-time data feed product on Nasdaq PHLX SM (referred as PHLX ) PHLX GLIMPSE is a point-to-point data feed connection that provides
More informationPriority Queues 9/10. Binary heaps Leftist heaps Binomial heaps Fibonacci heaps
Priority Queues 9/10 Binary heaps Leftist heaps Binomial heaps Fibonacci heaps Priority queues are important in, among other things, operating systems (process control in multitasking systems), search
More informationBX Options Depth of Market
Market Data Feed Version 1.3 BX Options Depth of Market 1. Overview Nasdaq BX Options Depth of Market (BX Depth) is a direct data feed product offered by The Nasdaq BX Options Market, which features the
More informationSublinear Time Algorithms Oct 19, Lecture 1
0368.416701 Sublinear Time Algorithms Oct 19, 2009 Lecturer: Ronitt Rubinfeld Lecture 1 Scribe: Daniel Shahaf 1 Sublinear-time algorithms: motivation Twenty years ago, there was practically no investigation
More informationBasic Data Structures. Figure 8.1 Lists, stacks, and queues. Terminology for Stacks. Terminology for Lists. Chapter 8: Data Abstractions
Chapter 8: Data Abstractions Computer Science: An Overview Tenth Edition by J. Glenn Brookshear Chapter 8: Data Abstractions 8.1 Data Structure Fundamentals 8.2 Implementing Data Structures 8.3 A Short
More informationDecision making in the presence of uncertainty
Lecture 19 Decision making in the presence of uncertainty Milos Hauskrecht milos@cs.pitt.edu 5329 Sennott Square Decision-making in the presence of uncertainty Many real-world problems require to choose
More informationHomework #4. CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class
Homework #4 CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class o Grades depend on neatness and clarity. o Write your answers with enough detail about your approach and concepts
More informationLondon Stock Exchange Derivatives Market
London Stock Exchange Derivatives Market LSEDM 401 HSVF Market Data Technical Specification (SOLA 9) Issue 9.0.1 16 September 2016 Contents 2.0 Introduction 6 7.1 Message Type F: Option Quote 22 7.2 Message
More informationLondon Stock Exchange Derivatives Market
London Stock Exchange Derivatives Market LSEDM 401 HSVF Market Data Technical Specification (SOLA 11) Issue 5.1 31 March 2017 Contents 1.0 Introduction 6 6.4 Message Type ES: Instrument Schedule Notice
More informationStatistical Intervals (One sample) (Chs )
7 Statistical Intervals (One sample) (Chs 8.1-8.3) Confidence Intervals The CLT tells us that as the sample size n increases, the sample mean X is close to normally distributed with expected value µ and
More informationStructural Induction
Structural Induction Jason Filippou CMSC250 @ UMCP 07-05-2016 Jason Filippou (CMSC250 @ UMCP) Structural Induction 07-05-2016 1 / 26 Outline 1 Recursively defined structures 2 Proofs Binary Trees Jason
More informationDecision making in the presence of uncertainty
CS 2750 Foundations of AI Lecture 20 Decision making in the presence of uncertainty Milos Hauskrecht milos@cs.pitt.edu 5329 Sennott Square Decision-making in the presence of uncertainty Computing the probability
More informationOutline for this Week
Binomial Heaps Outline for this Week Binomial Heaps (Today) A simple, fexible, and versatile priority queue. Lazy Binomial Heaps (Today) A powerful building block for designing advanced data structures.
More informationAbout this lecture. Three Methods for the Same Purpose (1) Aggregate Method (2) Accounting Method (3) Potential Method.
About this lecture Given a data structure, amortized analysis studies in a sequence of operations, the average time to perform an operation Introduce amortized cost of an operation Three Methods for the
More informationDiscrete Random Variables
Discrete Random Variables In this chapter, we introduce a new concept that of a random variable or RV. A random variable is a model to help us describe the state of the world around us. Roughly, a RV can
More information3/7/13. Binomial Tree. Binomial Tree. Binomial Tree. Binomial Tree. Number of nodes with respect to k? N(B o ) = 1 N(B k ) = 2 N(B k-1 ) = 2 k
//1 Adapted from: Kevin Wayne B k B k B k : a binomial tree with the addition of a left child with another binomial tree Number of nodes with respect to k? N(B o ) = 1 N(B k ) = 2 N( ) = 2 k B 1 B 2 B
More informationPractice Second Midterm Exam II
CS13 Handout 34 Fall 218 November 2, 218 Practice Second Midterm Exam II This exam is closed-book and closed-computer. You may have a double-sided, 8.5 11 sheet of notes with you when you take this exam.
More informationSplay Trees. Splay Trees - 1
Splay Trees In balanced tree schemes, explicit rules are followed to ensure balance. In splay trees, there are no such rules. Search, insert, and delete operations are like in binary search trees, except
More informationEcon 6900: Statistical Problems. Instructor: Yogesh Uppal
Econ 6900: Statistical Problems Instructor: Yogesh Uppal Email: yuppal@ysu.edu Lecture Slides 4 Random Variables Probability Distributions Discrete Distributions Discrete Uniform Probability Distribution
More informationRecitation 1. Solving Recurrences. 1.1 Announcements. Welcome to 15210!
Recitation 1 Solving Recurrences 1.1 Announcements Welcome to 1510! The course website is http://www.cs.cmu.edu/ 1510/. It contains the syllabus, schedule, library documentation, staff contact information,
More informationFiscal Software User s Guide, BSA April Chapter 6 - Project Maintenance
Chapter 6 - Project Maintenance This Section Includes: 6.1 Project Definition and Use 6.2 Adding Projects 6.3 Managing Deferred Projects 6.3.1 Allocations 6.3.1.1 Monthly Allocation of Deferred Values
More informationChapter 16. Binary Search Trees (BSTs)
Chapter 16 Binary Search Trees (BSTs) Search trees are tree-based data structures that can be used to store and search for items that satisfy a total order. There are many types of search trees designed
More informationAdvanced Numerical Methods
Advanced Numerical Methods Solution to Homework One Course instructor: Prof. Y.K. Kwok. When the asset pays continuous dividend yield at the rate q the expected rate of return of the asset is r q under
More informationCauses of Poor Decisions
Lecture 7: Decision Analysis Decision process Decision tree analysis The Decision Process Specify objectives and the criteria for making a choice Develop alternatives Analyze and compare alternatives Select
More informationThe exam is closed book, closed calculator, and closed notes except your three crib sheets.
CS 188 Spring 2016 Introduction to Artificial Intelligence Final V2 You have approximately 2 hours and 50 minutes. The exam is closed book, closed calculator, and closed notes except your three crib sheets.
More informationSum-Product: Message Passing Belief Propagation
Sum-Product: Message Passing Belief Propagation 40-956 Advanced Topics in AI: Probabilistic Graphical Models Sharif University of Technology Soleymani Spring 2015 All single-node marginals If we need the
More informationFast Simplified Successive-Cancellation List Decoding of Polar Codes
Fast Simplified Successive-Cancellation List Decoding of Polar Codes Seyyed Ali Hashemi, Carlo Condo, Warren J. Gross Department of Electrical and Computer Engineering, McGill University, Montréal, Québec,
More informationSum-Product: Message Passing Belief Propagation
Sum-Product: Message Passing Belief Propagation Probabilistic Graphical Models Sharif University of Technology Spring 2017 Soleymani All single-node marginals If we need the full set of marginals, repeating
More informationNASDAQ ITCH to Trade Options
Market Data Feed Version 4.0 NASDAQ ITCH to Trade Options 1. Overview NASDAQ ITCH to Trade Options (ITTO) is a direct data feed product in NOM2 system offered by The NASDAQ Option Market, which features
More informationRewriting Codes for Flash Memories Based Upon Lattices, and an Example Using the E8 Lattice
Rewriting Codes for Flash Memories Based Upon Lattices, and an Example Using the E Lattice Brian M. Kurkoski kurkoski@ice.uec.ac.jp University of Electro-Communications Tokyo, Japan Workshop on Application
More informationDesign and Analysis of Algorithms 演算法設計與分析. Lecture 9 November 19, 2014 洪國寶
Design and Analysis of Algorithms 演算法設計與分析 Lecture 9 November 19, 2014 洪國寶 1 Outline Advanced data structures Binary heaps(review) Binomial heaps Fibonacci heaps Data structures for disjoint sets 2 Mergeable
More informationCHAPTER 10 OPTION PRICING - II. Derivatives and Risk Management By Rajiv Srivastava. Copyright Oxford University Press
CHAPTER 10 OPTION PRICING - II Options Pricing II Intrinsic Value and Time Value Boundary Conditions for Option Pricing Arbitrage Based Relationship for Option Pricing Put Call Parity 2 Binomial Option
More informationUnit 6: Amortized Analysis
: Amortized Analysis Course contents: Aggregate method Accounting method Potential method Reading: Chapter 17 Y.-W. Chang 1 Amortized Analysis Why Amortized Analysis? Find a tight bound of a sequence of
More information4/8/13. Part 6. Trees (2) Outline. Balanced Search Trees. 2-3 Trees Trees Red-Black Trees AVL Trees. to maximum n. Tree A. Tree B.
art 6. Trees (2) C 200 Algorithms and Data tructures 1 Outline 2-3 Trees 2-3-4 Trees Red-Black Trees AV Trees 2 Balanced earch Trees Tree A Tree B to maximum n Tree D 3 1 Balanced earch Trees A search
More informationSuccessor. CS 361, Lecture 19. Tree-Successor. Outline
Successor CS 361, Lecture 19 Jared Saia University of New Mexico The successor of a node x is the node that comes after x in the sorted order determined by an in-order tree walk. If all keys are distinct,
More informationCIS 540 Fall 2009 Homework 2 Solutions
CIS 54 Fall 29 Homework 2 Solutions October 25, 29 Problem (a) We can choose a simple ordering for the variables: < x 2 < x 3 < x 4. The resulting OBDD is given in Fig.. x 2 x 2 x 3 x 4 x 3 Figure : OBDD
More informationFinite-length analysis of the TEP decoder for LDPC ensembles over the BEC
Finite-length analysis of the TEP decoder for LDPC ensembles over the BEC Pablo M. Olmos, Fernando Pérez-Cruz Departamento de Teoría de la Señal y Comunicaciones. Universidad Carlos III in Madrid. email:
More informationWhite-Box Testing Techniques I
White-Box Testing Techniques I Software Testing and Verification Lecture 7 Prepared by Stephen M. Thebaut, Ph.D. University of Florida Definition of White-Box Testing Testing based on analysis of internal
More informationBinary Search Tree and AVL Trees. Binary Search Tree. Binary Search Tree. Binary Search Tree. Techniques: How does the BST works?
Binary Searc Tree and AVL Trees Binary Searc Tree A commonly-used data structure for storing and retrieving records in main memory PUC-Rio Eduardo S. Laber Binary Searc Tree Binary Searc Tree A commonly-used
More informationChapter 18 Student Lecture Notes 18-1
Chapter 18 Student Lecture Notes 18-1 Business Statistics: A Decision-Making Approach 6 th Edition Chapter 18 Introduction to Decision Analysis 5 Prentice-Hall, Inc. Chap 18-1 Chapter Goals After completing
More informationWhite-Box Testing Techniques I
White-Box Testing Techniques I Software Testing and Verification Lecture 7 Prepared by Stephen M. Thebaut, Ph.D. University of Florida Definition of White-Box Testing Testing based on analysis of internal
More informationBits and Bit Patterns. Chapter 1: Data Storage (continued) Chapter 1: Data Storage
Chapter 1: Data Storage Computer Science: An Overview by J. Glenn Brookshear Chapter 1: Data Storage 1.1 Bits and Their Storage 1.2 Main Memory 1.3 Mass Storage 1.4 Representing Information as Bit Patterns
More informationPHLX Clearing Trade Interface (CTI)
PHLX Clearing Trade Interface (CTI) Specification Version 1.1 Table of Contents Table of Contents... 1 1. Overview... 2 2. Architecture... 3 2.1 Network protocol... 3 2.2 Connection... 3 2.3 Backup...
More informationThe Tree Data Model. Laura Kovács
The Tree Data Model Laura Kovács Trees (Baumstrukturen) Definition Trees are sets of points, called nodes (Knoten) and lines, called edges (Kanten), connecting two distinct nodes, such that: n 2 n 3 n
More informationMolecular Phylogenetics
Mole_Oce Lecture # 16: Molecular Phylogenetics Maximum Likelihood & Bahesian Statistics Optimality criterion: a rule used to decide which of two trees is best. Four optimality criteria are currently widely
More informationQ1. [?? pts] Search Traces
CS 188 Spring 2010 Introduction to Artificial Intelligence Midterm Exam Solutions Q1. [?? pts] Search Traces Each of the trees (G1 through G5) was generated by searching the graph (below, left) with a
More informationUNIT 2. Greedy Method GENERAL METHOD
UNIT 2 GENERAL METHOD Greedy Method Greedy is the most straight forward design technique. Most of the problems have n inputs and require us to obtain a subset that satisfies some constraints. Any subset
More informationFinding Equilibria in Games of No Chance
Finding Equilibria in Games of No Chance Kristoffer Arnsfelt Hansen, Peter Bro Miltersen, and Troels Bjerre Sørensen Department of Computer Science, University of Aarhus, Denmark {arnsfelt,bromille,trold}@daimi.au.dk
More informationVersion Overview
O*U*C*H Version 4.1 Updated July 18, 2016 1 Overview... 1 1.1 Architecture... 2 1.2 Data Types... 2 1.3 Fault Redundancy... 2 1.4 Service Bureau Configuration... 3 2 Inbound Messages... 3 2.1 Enter Order
More informationCboe Summary Depth Feed Specification. Version 1.0.2
Specification Version 1.0.2 October 17, 2017 Contents 1 Introduction... 4 1.1 Overview... 4 1.2 Cboe Summary Depth Server (TCP)... 4 1.3 Cboe Summary Depth Feed Server (UDP)... 5 1.4 Cboe Summary Depth
More informationHeaps. Heap/Priority queue. Binomial heaps: Advanced Algorithmics (4AP) Heaps Binary heap. Binomial heap. Jaak Vilo 2009 Spring
.0.00 Heaps http://en.wikipedia.org/wiki/category:heaps_(structure) Advanced Algorithmics (4AP) Heaps Jaak Vilo 00 Spring Binary heap http://en.wikipedia.org/wiki/binary_heap Binomial heap http://en.wikipedia.org/wiki/binomial_heap
More informationInitializing A Max Heap. Initializing A Max Heap
Initializing A Max Heap 3 4 5 6 7 8 70 8 input array = [-,,, 3, 4, 5, 6, 7, 8,, 0, ] Initializing A Max Heap 3 4 5 6 7 8 70 8 Start at rightmost array position that has a child. Index is n/. Initializing
More informationKeller: Stats for Mgmt & Econ, 7th Ed July 17, 2006
Chapter 7 Random Variables and Discrete Probability Distributions 7.1 Random Variables A random variable is a function or rule that assigns a number to each outcome of an experiment. Alternatively, the
More informationThe exam is closed book, closed calculator, and closed notes except your one-page crib sheet.
CS 188 Spring 2016 Introduction to Artificial Intelligence Midterm V2 You have approximately 2 hours and 50 minutes. The exam is closed book, closed calculator, and closed notes except your one-page crib
More informationDesign and Analysis of Algorithms. Lecture 9 November 20, 2013 洪國寶
Design and Analysis of Algorithms 演算法設計與分析 Lecture 9 November 20, 2013 洪國寶 1 Outline Advanced data structures Binary heaps (review) Binomial heaps Fibonacci heaps Dt Data structures t for disjoint dijitsets
More informationProject Trainee : Abhinav Yellanki 5 th year Integrated M.Sc. Student Mathematics and Computing Indian Institute of Technology, Kharagpur
SIMULATION MODELLING OF ASSETS AND LIABILITI ES OF A BANK Project Trainee : Abhinav Yellanki 5 th year Integrated M.Sc. Student Mathematics and Computing Indian Institute of Technology, Kharagpur Project
More informationPrior knowledge in economic applications of data mining
Prior knowledge in economic applications of data mining A.J. Feelders Tilburg University Faculty of Economics Department of Information Management PO Box 90153 5000 LE Tilburg, The Netherlands A.J.Feelders@kub.nl
More informationO*U*C*H 4.1 Updated February 25 th, 2013
O*U*C*H Updated February 25 th, 2013 1 Overview... 1 1.1 Architecture... 2 1.2 Data Types... 2 1.3 Fault Redundancy... 3 1.4 Service Bureau Configuration... 3 2 Inbound Messages... 3 2.1 Enter Order Message...
More informationHeaps
AdvancedAlgorithmics (4AP) Heaps Jaak Vilo 2009 Spring Jaak Vilo MTAT.03.190 Text Algorithms 1 Heaps http://en.wikipedia.org/wiki/category:heaps_(structure) Binary heap http://en.wikipedia.org/wiki/binary_heap
More information