It is used when neither the TX nor RX knows anything about the statistics of the source sequence at the start of the transmission

Size: px
Start display at page:

Download "It is used when neither the TX nor RX knows anything about the statistics of the source sequence at the start of the transmission"

Transcription

1 It is used when neither the TX nor RX knows anything about the statistics of the source sequence at the start of the transmission -The code can be described in terms of a binary tree -0 corresponds to a left branch and 1 corresponds to a right branch -The squares denote the external nodes or leaves and correspond to the symbols in the source -The codeword for a symbol can be obtained by traversing the tree from the root to the leaf corresponding to the symbol LECTURES 10/30/2017 1

2 -In order to describe how the adaptive Huffman code works, we add two other parameters to the binary tree: (1) weight of node, which is written as a number inside the node, for external node it is the number of times the symbol corresponding to the external node has been encountered for internal node is the sum of the weights of its offspring (2) node number is a unique number assigned to each internal and external node and written under the node -Huffman Tree is based on the Sibling Property A binary code tree has the sibling property if : Each node (except the root) has a sibling (offspring) The nodes can be listed in order of decreasing manner, as if node 43 &44 are offspring of node 45, then the weight of 43 is less than that of 44 If A is the parent node of B (left) and C (right), then W(B) < W(C) LECTURES 10/30/2017 2

3 Fixed code for each different symbols Since in adaptive Huffman coding procedure, neither transmitter nor receiver knows anything about the statistics of the source sequence at the start of transmission, the tree at both the transmitter and the receiver consists of a single node that corresponds to all symbols Not Yet Transmitted (NYT) and has a weight of zero Before the beginning of transmission, a fixed code for each symbol is agreed upon between transmitter and receiver as follows: If the source has an alphabet {s 1, s 2,, s m } of size m (m=26 for alphabet source), then pick e and r such that: for m = 26, e = 4 and r = 10 m = 2 e +r, 0 r < 2 e and the number of nodes is 2m 1 internal and external nodes LECTURES 10/30/2017 3

4 Consider k is the order of the letter in alphabet sequence The letter s k is encoded as: the e+1 bit binary representation of k 1, if 1 k 2r else, s k is encoded as: the e bit binary representation of k r 1 Ex: The symbol a 1 is the first element in source alphabet, k = 1 It should b encoded by e+1 (=5) bit binary representation of k 1(0) as The symbol a 2 is the second element in source alphabet, k = 2 It should b encoded by e+1 (=5) bit binary representation of k 1(1) as The symbol a 22 is the twenty second element in source alphabet, k=22 It should b encoded by e (=4) bit binary representation of k r-1(11) as 1011 This coding is valid for the symbol encountered for the first time If the symbol is already exist ( transmitted before) the binary code for the symbol is obtained by traversing the tree LECTURES 10/30/2017 4

5 Updating The update procedure requires that the nodes be in a fixed order by numbering the nodes as : The largest node number is given to the root The smallest number is assigned to the NYT The numbers from the NYT node to the root of the tree are assigned in increasing order from left to right, and from lower level to upper level The set of nodes with the same weight makes up a block

6 In order that the update procedures at the transmitter and receiver both operate with the same information: The tree at the transmitter is updated after each symbol is encoded, and The tree at the receiver is updated after each symbol is decoded After a symbol has been encoded, the external node corresponding to the symbol is examined to see if it has the largest node number in its block. If the external node does not have the largest node number, it is exchanged with the node that has the largest node number in the block, as long as the node with the higher number is not the parent of the node being updated. The weight of the external node is then incremented Once we have incremented the weight of the node, we have adapted the Huffman tree at that level Updating

7 We then turn to the next level by examining the parent node of the node whose weight was incremented to see if it has the largest number in its block. If it does not, it is exchanged with the node with the largest number in the block. Again, an exception to this is when the node with the higher node number is the parent of the node under consideration. Once an exchange has taken place (or it has been determined that there is no need for an exchange), the weight of the parent node is incremented We then proceed to a new parent node and the process is repeated. This process continues until the root of the tree is reached If the symbol to be encoded has occurred for the first time, a new external node is assigned to the symbol and a new NYT is opened to the tree. Both the new external node and the new NYT node are offsprings of the old NYT node. We increment the weight of the new external node by one. As the old NYT node is the parent of the new external node, we increment its weight by one and then go on to update all the other nodes until we reach the root of the tree Updating

8 Ex: 1 Ex: 0 01 Then increment node number 51 to weight 5 instead of Then increment node number 48 to weight 2 instead of Then increment node number 50 to weight 3 instead of 2

9 Encoding Initially, the tree at both the encoder and decoder consists of a single node; the NYT node The codeword for the very first symbol that appears is a previously agreed upon fixed code Send the code for the NYT node, followed by the previously agreed upon fixed code for the symbol The code for the NYT node is obtained by traversing the Huffman tree from the root to the NYT node If a symbol to be encoded has a corresponding node in the tree, then the code for the symbol is generated by traversing the tree from the root to the external node corresponding to the symbol

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 15 Adaptive Huffman Coding Part I Huffman code are optimal for a

More information

Introduction to Greedy Algorithms: Huffman Codes

Introduction to Greedy Algorithms: Huffman Codes Introduction to Greedy Algorithms: Huffman Codes Yufei Tao ITEE University of Queensland In computer science, one interesting method to design algorithms is to go greedy, namely, keep doing the thing that

More information

Lecture l(x) 1. (1) x X

Lecture l(x) 1. (1) x X Lecture 14 Agenda for the lecture Kraft s inequality Shannon codes The relation H(X) L u (X) = L p (X) H(X) + 1 14.1 Kraft s inequality While the definition of prefix-free codes is intuitively clear, we

More information

CSE 417 Algorithms. Huffman Codes: An Optimal Data Compression Method

CSE 417 Algorithms. Huffman Codes: An Optimal Data Compression Method CSE 417 Algorithms Huffman Codes: An Optimal Data Compression Method 1 Compression Example 100k file, 6 letter alphabet: a 45% b 13% c 12% d 16% e 9% f 5% File Size: ASCII, 8 bits/char: 800kbits 2 3 >

More information

BCJR Algorithm. Veterbi Algorithm (revisted) Consider covolutional encoder with. And information sequences of length h = 5

BCJR Algorithm. Veterbi Algorithm (revisted) Consider covolutional encoder with. And information sequences of length h = 5 Chapter 2 BCJR Algorithm Ammar Abh-Hhdrohss Islamic University -Gaza ١ Veterbi Algorithm (revisted) Consider covolutional encoder with And information sequences of length h = 5 The trellis diagram has

More information

UNIT VI TREES. Marks - 14

UNIT VI TREES. Marks - 14 UNIT VI TREES Marks - 14 SYLLABUS 6.1 Non-linear data structures 6.2 Binary trees : Complete Binary Tree, Basic Terms: level number, degree, in-degree and out-degree, leaf node, directed edge, path, depth,

More information

Binary and Binomial Heaps. Disclaimer: these slides were adapted from the ones by Kevin Wayne

Binary and Binomial Heaps. Disclaimer: these slides were adapted from the ones by Kevin Wayne Binary and Binomial Heaps Disclaimer: these slides were adapted from the ones by Kevin Wayne Priority Queues Supports the following operations. Insert element x. Return min element. Return and delete minimum

More information

VARN CODES AND GENERALIZED FIBONACCI TREES

VARN CODES AND GENERALIZED FIBONACCI TREES Julia Abrahams Mathematical Sciences Division, Office of Naval Research, Arlington, VA 22217-5660 (Submitted June 1993) INTRODUCTION AND BACKGROUND Yarn's [6] algorithm solves the problem of finding an

More information

CSE Lecture 13/14 In Class Handout For all of these problems: HAS NOT CANNOT Add Add Add must wait until $5 written by previous add;

CSE Lecture 13/14 In Class Handout For all of these problems: HAS NOT CANNOT Add Add Add must wait until $5 written by previous add; CSE 30321 Lecture 13/14 In Class Handout For the sequence of instructions shown below, show how they would progress through the pipeline. For all of these problems: - Stalls are indicated by placing the

More information

Design and Analysis of Algorithms 演算法設計與分析. Lecture 8 November 16, 2016 洪國寶

Design and Analysis of Algorithms 演算法設計與分析. Lecture 8 November 16, 2016 洪國寶 Design and Analysis of Algorithms 演算法設計與分析 Lecture 8 November 6, 206 洪國寶 Outline Review Amortized analysis Advanced data structures Binary heaps Binomial heaps Fibonacci heaps Data structures for disjoint

More information

Lecture 5: Tuesday, January 27, Peterson s Algorithm satisfies the No Starvation property (Theorem 1)

Lecture 5: Tuesday, January 27, Peterson s Algorithm satisfies the No Starvation property (Theorem 1) Com S 611 Spring Semester 2015 Advanced Topics on Distributed and Concurrent Algorithms Lecture 5: Tuesday, January 27, 2015 Instructor: Soma Chaudhuri Scribe: Nik Kinkel 1 Introduction This lecture covers

More information

MSU CSE Spring 2011 Exam 2-ANSWERS

MSU CSE Spring 2011 Exam 2-ANSWERS MSU CSE 260-001 Spring 2011 Exam 2-NSWERS Name: This is a closed book exam, with 9 problems on 5 pages totaling 100 points. Integer ivision/ Modulo rithmetic 1. We can add two numbers in base 2 by using

More information

Binary Decision Diagrams

Binary Decision Diagrams Binary Decision Diagrams Hao Zheng Department of Computer Science and Engineering University of South Florida Tampa, FL 33620 Email: zheng@cse.usf.edu Phone: (813)974-4757 Fax: (813)974-5456 Hao Zheng

More information

Ch 10 Trees. Introduction to Trees. Tree Representations. Binary Tree Nodes. Tree Traversals. Binary Search Trees

Ch 10 Trees. Introduction to Trees. Tree Representations. Binary Tree Nodes. Tree Traversals. Binary Search Trees Ch 10 Trees Introduction to Trees Tree Representations Binary Tree Nodes Tree Traversals Binary Search Trees 1 Binary Trees A binary tree is a finite set of elements called nodes. The set is either empty

More information

Binary Decision Diagrams

Binary Decision Diagrams Binary Decision Diagrams Hao Zheng Department of Computer Science and Engineering University of South Florida Tampa, FL 33620 Email: zheng@cse.usf.edu Phone: (813)974-4757 Fax: (813)974-5456 Hao Zheng

More information

CSCE 750, Fall 2009 Quizzes with Answers

CSCE 750, Fall 2009 Quizzes with Answers CSCE 750, Fall 009 Quizzes with Answers Stephen A. Fenner September 4, 011 1. Give an exact closed form for Simplify your answer as much as possible. k 3 k+1. We reduce the expression to a form we ve already

More information

(8m 2 5m + 2) - (-10m 2 +7m 6) (8m 2 5m + 2) + (+10m 2-7m + 6)

(8m 2 5m + 2) - (-10m 2 +7m 6) (8m 2 5m + 2) + (+10m 2-7m + 6) Adding Polynomials Adding & Subtracting Polynomials (Combining Like Terms) Subtracting Polynomials (if your nd polynomial is inside a set of parentheses). (x 8x + ) + (-x -x 7) FIRST, Identify the like

More information

Factor Graphs. Seungjin Choi

Factor Graphs. Seungjin Choi Factor Graphs Seungjin Choi Department of Computer Science and Engineering Pohang University of Science and Technology 77 Cheongam-ro, Nam-gu, Pohang 37673, Korea seungjin@postech.ac.kr 1 / 17 Tanner Graphs

More information

Binary Tree Applications

Binary Tree Applications Binary Tree Applications Lecture 32 Section 19.2 Robb T. Koether Hampden-Sydney College Wed, Apr 17, 2013 Robb T. Koether (Hampden-Sydney College) Binary Tree Applications Wed, Apr 17, 2013 1 / 46 1 Expression

More information

PRIORITY QUEUES. binary heaps d-ary heaps binomial heaps Fibonacci heaps. Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley

PRIORITY QUEUES. binary heaps d-ary heaps binomial heaps Fibonacci heaps. Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley PRIORITY QUEUES binary heaps d-ary heaps binomial heaps Fibonacci heaps Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley http://www.cs.princeton.edu/~wayne/kleinberg-tardos Last updated

More information

CS4311 Design and Analysis of Algorithms. Lecture 14: Amortized Analysis I

CS4311 Design and Analysis of Algorithms. Lecture 14: Amortized Analysis I CS43 Design and Analysis of Algorithms Lecture 4: Amortized Analysis I About this lecture Given a data structure, amortized analysis studies in a sequence of operations, the average time to perform an

More information

Algorithms PRIORITY QUEUES. binary heaps d-ary heaps binomial heaps Fibonacci heaps. binary heaps d-ary heaps binomial heaps Fibonacci heaps

Algorithms PRIORITY QUEUES. binary heaps d-ary heaps binomial heaps Fibonacci heaps. binary heaps d-ary heaps binomial heaps Fibonacci heaps Priority queue data type Lecture slides by Kevin Wayne Copyright 05 Pearson-Addison Wesley http://www.cs.princeton.edu/~wayne/kleinberg-tardos PRIORITY QUEUES binary heaps d-ary heaps binomial heaps Fibonacci

More information

Taiwan Futures Exchange. Market Data Transmission Manual

Taiwan Futures Exchange. Market Data Transmission Manual Taiwan Futures Exchange Market Data Transmission Manual (Market Data Transmission Network) Prepared by TAIFEX Ver. 2.16S (updated on 2017/11/23) This spec is for the feed that symbol format is linked with

More information

Glimpse for Best of Nasdaq Options (BONO)

Glimpse for Best of Nasdaq Options (BONO) S Market Data Feed Version 1.1 Glimpse for Best of Nasdaq Options (BONO) 1. Overview A complement to the Best of Nasdaq Options (BONO) real-time data feed products, Glimpse for Best of Nasdaq Options (BONO)

More information

On the Optimality of a Family of Binary Trees Techical Report TR

On the Optimality of a Family of Binary Trees Techical Report TR On the Optimality of a Family of Binary Trees Techical Report TR-011101-1 Dana Vrajitoru and William Knight Indiana University South Bend Department of Computer and Information Sciences Abstract In this

More information

Lattice Coding and its Applications in Communications

Lattice Coding and its Applications in Communications Lattice Coding and its Applications in Communications Alister Burr University of York alister.burr@york.ac.uk Introduction to lattices Definition; Sphere packings; Basis vectors; Matrix description Codes

More information

SET 1C Binary Trees. 2. (i) Define the height of a binary tree or subtree and also define a height balanced (AVL) tree. (2)

SET 1C Binary Trees. 2. (i) Define the height of a binary tree or subtree and also define a height balanced (AVL) tree. (2) SET 1C Binary Trees 1. Construct a binary tree whose preorder traversal is K L N M P R Q S T and inorder traversal is N L K P R M S Q T 2. (i) Define the height of a binary tree or subtree and also define

More information

CSCI 104 B-Trees (2-3, 2-3-4) and Red/Black Trees. Mark Redekopp David Kempe

CSCI 104 B-Trees (2-3, 2-3-4) and Red/Black Trees. Mark Redekopp David Kempe 1 CSCI 104 B-Trees (2-3, 2-3-4) and Red/Black Trees Mark Redekopp David Kempe 2 An example of B-Trees 2-3 TREES 3 Definition 2-3 Tree is a tree where Non-leaf nodes have 1 value & 2 children or 2 values

More information

CSE 100: TREAPS AND RANDOMIZED SEARCH TREES

CSE 100: TREAPS AND RANDOMIZED SEARCH TREES CSE 100: TREAPS AND RANDOMIZED SEARCH TREES Midterm Review Practice Midterm covered during Sunday discussion Today Run time analysis of building the Huffman tree AVL rotations and treaps Huffman s algorithm

More information

1 Solutions to Tute09

1 Solutions to Tute09 s to Tute0 Questions 4. - 4. are straight forward. Q. 4.4 Show that in a binary tree of N nodes, there are N + NULL pointers. Every node has outgoing pointers. Therefore there are N pointers. Each node,

More information

Lecture 17: More on Markov Decision Processes. Reinforcement learning

Lecture 17: More on Markov Decision Processes. Reinforcement learning Lecture 17: More on Markov Decision Processes. Reinforcement learning Learning a model: maximum likelihood Learning a value function directly Monte Carlo Temporal-difference (TD) learning COMP-424, Lecture

More information

Microeconomics of Banking: Lecture 5

Microeconomics of Banking: Lecture 5 Microeconomics of Banking: Lecture 5 Prof. Ronaldo CARPIO Oct. 23, 2015 Administrative Stuff Homework 2 is due next week. Due to the change in material covered, I have decided to change the grading system

More information

Nasdaq Options GLIMPSE

Nasdaq Options GLIMPSE Market Data Feed Version 3.2 Nasdaq Options GLIMPSE 1. Overview A complement to the Nasdaq Options ITCH to Trade Options (ITTO) real-time data feed product, Nasdaq Options GLIMPSE 3.0 is a point-to-point

More information

Multirate Multicast Service Provisioning I: An Algorithm for Optimal Price Splitting Along Multicast Trees

Multirate Multicast Service Provisioning I: An Algorithm for Optimal Price Splitting Along Multicast Trees Mathematical Methods of Operations Research manuscript No. (will be inserted by the editor) Multirate Multicast Service Provisioning I: An Algorithm for Optimal Price Splitting Along Multicast Trees Tudor

More information

CEC login. Student Details Name SOLUTIONS

CEC login. Student Details Name SOLUTIONS Student Details Name SOLUTIONS CEC login Instructions You have roughly 1 minute per point, so schedule your time accordingly. There is only one correct answer per question. Good luck! Question 1. Searching

More information

Nasdaq Options GLIMPSE

Nasdaq Options GLIMPSE Nasdaq Options GLIMPSE Market Data Feed Version 4.00 Nasdaq Options GLIMPSE 1. Overview A complement to the NASDAQ Options ITCH to Trade Options (ITTO) real-time data feed product, NASDAQ Options GLIMPSE

More information

NASDAQ OPTIONS GLIMPSE INTERFACE SPECIFICATIONS. Market Data Feed Version 1.2 BX OPTIONS GLIMPSE

NASDAQ OPTIONS GLIMPSE INTERFACE SPECIFICATIONS. Market Data Feed Version 1.2 BX OPTIONS GLIMPSE Market Data Feed Version 1.2 BX OPTIONS GLIMPSE 1. Overview A complement to the Nasdaq BX Options Depth of Market (BX Depth) real-time data feed product, Nasdaq BX Options GLIMPSE (BX GLIMPSE) is a point-to-point

More information

High Frequency Trading Strategy Based on Prex Trees

High Frequency Trading Strategy Based on Prex Trees High Frequency Trading Strategy Based on Prex Trees Yijia Zhou, 05592862, Financial Mathematics, Stanford University December 11, 2010 1 Introduction 1.1 Goal I am an M.S. Finanical Mathematics student

More information

Decision making in the presence of uncertainty

Decision making in the presence of uncertainty CS 271 Foundations of AI Lecture 21 Decision making in the presence of uncertainty Milos Hauskrecht milos@cs.pitt.edu 5329 Sennott Square Decision-making in the presence of uncertainty Many real-world

More information

Supporting Information

Supporting Information Supporting Information Novikoff et al. 0.073/pnas.0986309 SI Text The Recap Method. In The Recap Method in the paper, we described a schedule in terms of a depth-first traversal of a full binary tree,

More information

CSE 21 Winter 2016 Homework 6 Due: Wednesday, May 11, 2016 at 11:59pm. Instructions

CSE 21 Winter 2016 Homework 6 Due: Wednesday, May 11, 2016 at 11:59pm. Instructions CSE 1 Winter 016 Homework 6 Due: Wednesday, May 11, 016 at 11:59pm Instructions Homework should be done in groups of one to three people. You are free to change group members at any time throughout the

More information

PHLX GLIMPSE INTERFACE SPECIFICATIONS. Version 1.5 PHLX GLIMPSE

PHLX GLIMPSE INTERFACE SPECIFICATIONS. Version 1.5 PHLX GLIMPSE Version 1.5 PHLX GLIMPSE 1. Overview A complement to the PHLX Depth real-time data feed product on Nasdaq PHLX SM (referred as PHLX ) PHLX GLIMPSE is a point-to-point data feed connection that provides

More information

Priority Queues 9/10. Binary heaps Leftist heaps Binomial heaps Fibonacci heaps

Priority Queues 9/10. Binary heaps Leftist heaps Binomial heaps Fibonacci heaps Priority Queues 9/10 Binary heaps Leftist heaps Binomial heaps Fibonacci heaps Priority queues are important in, among other things, operating systems (process control in multitasking systems), search

More information

BX Options Depth of Market

BX Options Depth of Market Market Data Feed Version 1.3 BX Options Depth of Market 1. Overview Nasdaq BX Options Depth of Market (BX Depth) is a direct data feed product offered by The Nasdaq BX Options Market, which features the

More information

Sublinear Time Algorithms Oct 19, Lecture 1

Sublinear Time Algorithms Oct 19, Lecture 1 0368.416701 Sublinear Time Algorithms Oct 19, 2009 Lecturer: Ronitt Rubinfeld Lecture 1 Scribe: Daniel Shahaf 1 Sublinear-time algorithms: motivation Twenty years ago, there was practically no investigation

More information

Basic Data Structures. Figure 8.1 Lists, stacks, and queues. Terminology for Stacks. Terminology for Lists. Chapter 8: Data Abstractions

Basic Data Structures. Figure 8.1 Lists, stacks, and queues. Terminology for Stacks. Terminology for Lists. Chapter 8: Data Abstractions Chapter 8: Data Abstractions Computer Science: An Overview Tenth Edition by J. Glenn Brookshear Chapter 8: Data Abstractions 8.1 Data Structure Fundamentals 8.2 Implementing Data Structures 8.3 A Short

More information

Decision making in the presence of uncertainty

Decision making in the presence of uncertainty Lecture 19 Decision making in the presence of uncertainty Milos Hauskrecht milos@cs.pitt.edu 5329 Sennott Square Decision-making in the presence of uncertainty Many real-world problems require to choose

More information

Homework #4. CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class

Homework #4. CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class Homework #4 CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class o Grades depend on neatness and clarity. o Write your answers with enough detail about your approach and concepts

More information

London Stock Exchange Derivatives Market

London Stock Exchange Derivatives Market London Stock Exchange Derivatives Market LSEDM 401 HSVF Market Data Technical Specification (SOLA 9) Issue 9.0.1 16 September 2016 Contents 2.0 Introduction 6 7.1 Message Type F: Option Quote 22 7.2 Message

More information

London Stock Exchange Derivatives Market

London Stock Exchange Derivatives Market London Stock Exchange Derivatives Market LSEDM 401 HSVF Market Data Technical Specification (SOLA 11) Issue 5.1 31 March 2017 Contents 1.0 Introduction 6 6.4 Message Type ES: Instrument Schedule Notice

More information

Statistical Intervals (One sample) (Chs )

Statistical Intervals (One sample) (Chs ) 7 Statistical Intervals (One sample) (Chs 8.1-8.3) Confidence Intervals The CLT tells us that as the sample size n increases, the sample mean X is close to normally distributed with expected value µ and

More information

Structural Induction

Structural Induction Structural Induction Jason Filippou CMSC250 @ UMCP 07-05-2016 Jason Filippou (CMSC250 @ UMCP) Structural Induction 07-05-2016 1 / 26 Outline 1 Recursively defined structures 2 Proofs Binary Trees Jason

More information

Decision making in the presence of uncertainty

Decision making in the presence of uncertainty CS 2750 Foundations of AI Lecture 20 Decision making in the presence of uncertainty Milos Hauskrecht milos@cs.pitt.edu 5329 Sennott Square Decision-making in the presence of uncertainty Computing the probability

More information

Outline for this Week

Outline for this Week Binomial Heaps Outline for this Week Binomial Heaps (Today) A simple, fexible, and versatile priority queue. Lazy Binomial Heaps (Today) A powerful building block for designing advanced data structures.

More information

About this lecture. Three Methods for the Same Purpose (1) Aggregate Method (2) Accounting Method (3) Potential Method.

About this lecture. Three Methods for the Same Purpose (1) Aggregate Method (2) Accounting Method (3) Potential Method. About this lecture Given a data structure, amortized analysis studies in a sequence of operations, the average time to perform an operation Introduce amortized cost of an operation Three Methods for the

More information

Discrete Random Variables

Discrete Random Variables Discrete Random Variables In this chapter, we introduce a new concept that of a random variable or RV. A random variable is a model to help us describe the state of the world around us. Roughly, a RV can

More information

3/7/13. Binomial Tree. Binomial Tree. Binomial Tree. Binomial Tree. Number of nodes with respect to k? N(B o ) = 1 N(B k ) = 2 N(B k-1 ) = 2 k

3/7/13. Binomial Tree. Binomial Tree. Binomial Tree. Binomial Tree. Number of nodes with respect to k? N(B o ) = 1 N(B k ) = 2 N(B k-1 ) = 2 k //1 Adapted from: Kevin Wayne B k B k B k : a binomial tree with the addition of a left child with another binomial tree Number of nodes with respect to k? N(B o ) = 1 N(B k ) = 2 N( ) = 2 k B 1 B 2 B

More information

Practice Second Midterm Exam II

Practice Second Midterm Exam II CS13 Handout 34 Fall 218 November 2, 218 Practice Second Midterm Exam II This exam is closed-book and closed-computer. You may have a double-sided, 8.5 11 sheet of notes with you when you take this exam.

More information

Splay Trees. Splay Trees - 1

Splay Trees. Splay Trees - 1 Splay Trees In balanced tree schemes, explicit rules are followed to ensure balance. In splay trees, there are no such rules. Search, insert, and delete operations are like in binary search trees, except

More information

Econ 6900: Statistical Problems. Instructor: Yogesh Uppal

Econ 6900: Statistical Problems. Instructor: Yogesh Uppal Econ 6900: Statistical Problems Instructor: Yogesh Uppal Email: yuppal@ysu.edu Lecture Slides 4 Random Variables Probability Distributions Discrete Distributions Discrete Uniform Probability Distribution

More information

Recitation 1. Solving Recurrences. 1.1 Announcements. Welcome to 15210!

Recitation 1. Solving Recurrences. 1.1 Announcements. Welcome to 15210! Recitation 1 Solving Recurrences 1.1 Announcements Welcome to 1510! The course website is http://www.cs.cmu.edu/ 1510/. It contains the syllabus, schedule, library documentation, staff contact information,

More information

Fiscal Software User s Guide, BSA April Chapter 6 - Project Maintenance

Fiscal Software User s Guide, BSA April Chapter 6 - Project Maintenance Chapter 6 - Project Maintenance This Section Includes: 6.1 Project Definition and Use 6.2 Adding Projects 6.3 Managing Deferred Projects 6.3.1 Allocations 6.3.1.1 Monthly Allocation of Deferred Values

More information

Chapter 16. Binary Search Trees (BSTs)

Chapter 16. Binary Search Trees (BSTs) Chapter 16 Binary Search Trees (BSTs) Search trees are tree-based data structures that can be used to store and search for items that satisfy a total order. There are many types of search trees designed

More information

Advanced Numerical Methods

Advanced Numerical Methods Advanced Numerical Methods Solution to Homework One Course instructor: Prof. Y.K. Kwok. When the asset pays continuous dividend yield at the rate q the expected rate of return of the asset is r q under

More information

Causes of Poor Decisions

Causes of Poor Decisions Lecture 7: Decision Analysis Decision process Decision tree analysis The Decision Process Specify objectives and the criteria for making a choice Develop alternatives Analyze and compare alternatives Select

More information

The exam is closed book, closed calculator, and closed notes except your three crib sheets.

The exam is closed book, closed calculator, and closed notes except your three crib sheets. CS 188 Spring 2016 Introduction to Artificial Intelligence Final V2 You have approximately 2 hours and 50 minutes. The exam is closed book, closed calculator, and closed notes except your three crib sheets.

More information

Sum-Product: Message Passing Belief Propagation

Sum-Product: Message Passing Belief Propagation Sum-Product: Message Passing Belief Propagation 40-956 Advanced Topics in AI: Probabilistic Graphical Models Sharif University of Technology Soleymani Spring 2015 All single-node marginals If we need the

More information

Fast Simplified Successive-Cancellation List Decoding of Polar Codes

Fast Simplified Successive-Cancellation List Decoding of Polar Codes Fast Simplified Successive-Cancellation List Decoding of Polar Codes Seyyed Ali Hashemi, Carlo Condo, Warren J. Gross Department of Electrical and Computer Engineering, McGill University, Montréal, Québec,

More information

Sum-Product: Message Passing Belief Propagation

Sum-Product: Message Passing Belief Propagation Sum-Product: Message Passing Belief Propagation Probabilistic Graphical Models Sharif University of Technology Spring 2017 Soleymani All single-node marginals If we need the full set of marginals, repeating

More information

NASDAQ ITCH to Trade Options

NASDAQ ITCH to Trade Options Market Data Feed Version 4.0 NASDAQ ITCH to Trade Options 1. Overview NASDAQ ITCH to Trade Options (ITTO) is a direct data feed product in NOM2 system offered by The NASDAQ Option Market, which features

More information

Rewriting Codes for Flash Memories Based Upon Lattices, and an Example Using the E8 Lattice

Rewriting Codes for Flash Memories Based Upon Lattices, and an Example Using the E8 Lattice Rewriting Codes for Flash Memories Based Upon Lattices, and an Example Using the E Lattice Brian M. Kurkoski kurkoski@ice.uec.ac.jp University of Electro-Communications Tokyo, Japan Workshop on Application

More information

Design and Analysis of Algorithms 演算法設計與分析. Lecture 9 November 19, 2014 洪國寶

Design and Analysis of Algorithms 演算法設計與分析. Lecture 9 November 19, 2014 洪國寶 Design and Analysis of Algorithms 演算法設計與分析 Lecture 9 November 19, 2014 洪國寶 1 Outline Advanced data structures Binary heaps(review) Binomial heaps Fibonacci heaps Data structures for disjoint sets 2 Mergeable

More information

CHAPTER 10 OPTION PRICING - II. Derivatives and Risk Management By Rajiv Srivastava. Copyright Oxford University Press

CHAPTER 10 OPTION PRICING - II. Derivatives and Risk Management By Rajiv Srivastava. Copyright Oxford University Press CHAPTER 10 OPTION PRICING - II Options Pricing II Intrinsic Value and Time Value Boundary Conditions for Option Pricing Arbitrage Based Relationship for Option Pricing Put Call Parity 2 Binomial Option

More information

Unit 6: Amortized Analysis

Unit 6: Amortized Analysis : Amortized Analysis Course contents: Aggregate method Accounting method Potential method Reading: Chapter 17 Y.-W. Chang 1 Amortized Analysis Why Amortized Analysis? Find a tight bound of a sequence of

More information

4/8/13. Part 6. Trees (2) Outline. Balanced Search Trees. 2-3 Trees Trees Red-Black Trees AVL Trees. to maximum n. Tree A. Tree B.

4/8/13. Part 6. Trees (2) Outline. Balanced Search Trees. 2-3 Trees Trees Red-Black Trees AVL Trees. to maximum n. Tree A. Tree B. art 6. Trees (2) C 200 Algorithms and Data tructures 1 Outline 2-3 Trees 2-3-4 Trees Red-Black Trees AV Trees 2 Balanced earch Trees Tree A Tree B to maximum n Tree D 3 1 Balanced earch Trees A search

More information

Successor. CS 361, Lecture 19. Tree-Successor. Outline

Successor. CS 361, Lecture 19. Tree-Successor. Outline Successor CS 361, Lecture 19 Jared Saia University of New Mexico The successor of a node x is the node that comes after x in the sorted order determined by an in-order tree walk. If all keys are distinct,

More information

CIS 540 Fall 2009 Homework 2 Solutions

CIS 540 Fall 2009 Homework 2 Solutions CIS 54 Fall 29 Homework 2 Solutions October 25, 29 Problem (a) We can choose a simple ordering for the variables: < x 2 < x 3 < x 4. The resulting OBDD is given in Fig.. x 2 x 2 x 3 x 4 x 3 Figure : OBDD

More information

Finite-length analysis of the TEP decoder for LDPC ensembles over the BEC

Finite-length analysis of the TEP decoder for LDPC ensembles over the BEC Finite-length analysis of the TEP decoder for LDPC ensembles over the BEC Pablo M. Olmos, Fernando Pérez-Cruz Departamento de Teoría de la Señal y Comunicaciones. Universidad Carlos III in Madrid. email:

More information

White-Box Testing Techniques I

White-Box Testing Techniques I White-Box Testing Techniques I Software Testing and Verification Lecture 7 Prepared by Stephen M. Thebaut, Ph.D. University of Florida Definition of White-Box Testing Testing based on analysis of internal

More information

Binary Search Tree and AVL Trees. Binary Search Tree. Binary Search Tree. Binary Search Tree. Techniques: How does the BST works?

Binary Search Tree and AVL Trees. Binary Search Tree. Binary Search Tree. Binary Search Tree. Techniques: How does the BST works? Binary Searc Tree and AVL Trees Binary Searc Tree A commonly-used data structure for storing and retrieving records in main memory PUC-Rio Eduardo S. Laber Binary Searc Tree Binary Searc Tree A commonly-used

More information

Chapter 18 Student Lecture Notes 18-1

Chapter 18 Student Lecture Notes 18-1 Chapter 18 Student Lecture Notes 18-1 Business Statistics: A Decision-Making Approach 6 th Edition Chapter 18 Introduction to Decision Analysis 5 Prentice-Hall, Inc. Chap 18-1 Chapter Goals After completing

More information

White-Box Testing Techniques I

White-Box Testing Techniques I White-Box Testing Techniques I Software Testing and Verification Lecture 7 Prepared by Stephen M. Thebaut, Ph.D. University of Florida Definition of White-Box Testing Testing based on analysis of internal

More information

Bits and Bit Patterns. Chapter 1: Data Storage (continued) Chapter 1: Data Storage

Bits and Bit Patterns. Chapter 1: Data Storage (continued) Chapter 1: Data Storage Chapter 1: Data Storage Computer Science: An Overview by J. Glenn Brookshear Chapter 1: Data Storage 1.1 Bits and Their Storage 1.2 Main Memory 1.3 Mass Storage 1.4 Representing Information as Bit Patterns

More information

PHLX Clearing Trade Interface (CTI)

PHLX Clearing Trade Interface (CTI) PHLX Clearing Trade Interface (CTI) Specification Version 1.1 Table of Contents Table of Contents... 1 1. Overview... 2 2. Architecture... 3 2.1 Network protocol... 3 2.2 Connection... 3 2.3 Backup...

More information

The Tree Data Model. Laura Kovács

The Tree Data Model. Laura Kovács The Tree Data Model Laura Kovács Trees (Baumstrukturen) Definition Trees are sets of points, called nodes (Knoten) and lines, called edges (Kanten), connecting two distinct nodes, such that: n 2 n 3 n

More information

Molecular Phylogenetics

Molecular Phylogenetics Mole_Oce Lecture # 16: Molecular Phylogenetics Maximum Likelihood & Bahesian Statistics Optimality criterion: a rule used to decide which of two trees is best. Four optimality criteria are currently widely

More information

Q1. [?? pts] Search Traces

Q1. [?? pts] Search Traces CS 188 Spring 2010 Introduction to Artificial Intelligence Midterm Exam Solutions Q1. [?? pts] Search Traces Each of the trees (G1 through G5) was generated by searching the graph (below, left) with a

More information

UNIT 2. Greedy Method GENERAL METHOD

UNIT 2. Greedy Method GENERAL METHOD UNIT 2 GENERAL METHOD Greedy Method Greedy is the most straight forward design technique. Most of the problems have n inputs and require us to obtain a subset that satisfies some constraints. Any subset

More information

Finding Equilibria in Games of No Chance

Finding Equilibria in Games of No Chance Finding Equilibria in Games of No Chance Kristoffer Arnsfelt Hansen, Peter Bro Miltersen, and Troels Bjerre Sørensen Department of Computer Science, University of Aarhus, Denmark {arnsfelt,bromille,trold}@daimi.au.dk

More information

Version Overview

Version Overview O*U*C*H Version 4.1 Updated July 18, 2016 1 Overview... 1 1.1 Architecture... 2 1.2 Data Types... 2 1.3 Fault Redundancy... 2 1.4 Service Bureau Configuration... 3 2 Inbound Messages... 3 2.1 Enter Order

More information

Cboe Summary Depth Feed Specification. Version 1.0.2

Cboe Summary Depth Feed Specification. Version 1.0.2 Specification Version 1.0.2 October 17, 2017 Contents 1 Introduction... 4 1.1 Overview... 4 1.2 Cboe Summary Depth Server (TCP)... 4 1.3 Cboe Summary Depth Feed Server (UDP)... 5 1.4 Cboe Summary Depth

More information

Heaps. Heap/Priority queue. Binomial heaps: Advanced Algorithmics (4AP) Heaps Binary heap. Binomial heap. Jaak Vilo 2009 Spring

Heaps. Heap/Priority queue. Binomial heaps: Advanced Algorithmics (4AP) Heaps Binary heap. Binomial heap. Jaak Vilo 2009 Spring .0.00 Heaps http://en.wikipedia.org/wiki/category:heaps_(structure) Advanced Algorithmics (4AP) Heaps Jaak Vilo 00 Spring Binary heap http://en.wikipedia.org/wiki/binary_heap Binomial heap http://en.wikipedia.org/wiki/binomial_heap

More information

Initializing A Max Heap. Initializing A Max Heap

Initializing A Max Heap. Initializing A Max Heap Initializing A Max Heap 3 4 5 6 7 8 70 8 input array = [-,,, 3, 4, 5, 6, 7, 8,, 0, ] Initializing A Max Heap 3 4 5 6 7 8 70 8 Start at rightmost array position that has a child. Index is n/. Initializing

More information

Keller: Stats for Mgmt & Econ, 7th Ed July 17, 2006

Keller: Stats for Mgmt & Econ, 7th Ed July 17, 2006 Chapter 7 Random Variables and Discrete Probability Distributions 7.1 Random Variables A random variable is a function or rule that assigns a number to each outcome of an experiment. Alternatively, the

More information

The exam is closed book, closed calculator, and closed notes except your one-page crib sheet.

The exam is closed book, closed calculator, and closed notes except your one-page crib sheet. CS 188 Spring 2016 Introduction to Artificial Intelligence Midterm V2 You have approximately 2 hours and 50 minutes. The exam is closed book, closed calculator, and closed notes except your one-page crib

More information

Design and Analysis of Algorithms. Lecture 9 November 20, 2013 洪國寶

Design and Analysis of Algorithms. Lecture 9 November 20, 2013 洪國寶 Design and Analysis of Algorithms 演算法設計與分析 Lecture 9 November 20, 2013 洪國寶 1 Outline Advanced data structures Binary heaps (review) Binomial heaps Fibonacci heaps Dt Data structures t for disjoint dijitsets

More information

Project Trainee : Abhinav Yellanki 5 th year Integrated M.Sc. Student Mathematics and Computing Indian Institute of Technology, Kharagpur

Project Trainee : Abhinav Yellanki 5 th year Integrated M.Sc. Student Mathematics and Computing Indian Institute of Technology, Kharagpur SIMULATION MODELLING OF ASSETS AND LIABILITI ES OF A BANK Project Trainee : Abhinav Yellanki 5 th year Integrated M.Sc. Student Mathematics and Computing Indian Institute of Technology, Kharagpur Project

More information

Prior knowledge in economic applications of data mining

Prior knowledge in economic applications of data mining Prior knowledge in economic applications of data mining A.J. Feelders Tilburg University Faculty of Economics Department of Information Management PO Box 90153 5000 LE Tilburg, The Netherlands A.J.Feelders@kub.nl

More information

O*U*C*H 4.1 Updated February 25 th, 2013

O*U*C*H 4.1 Updated February 25 th, 2013 O*U*C*H Updated February 25 th, 2013 1 Overview... 1 1.1 Architecture... 2 1.2 Data Types... 2 1.3 Fault Redundancy... 3 1.4 Service Bureau Configuration... 3 2 Inbound Messages... 3 2.1 Enter Order Message...

More information

Heaps

Heaps AdvancedAlgorithmics (4AP) Heaps Jaak Vilo 2009 Spring Jaak Vilo MTAT.03.190 Text Algorithms 1 Heaps http://en.wikipedia.org/wiki/category:heaps_(structure) Binary heap http://en.wikipedia.org/wiki/binary_heap

More information