An Estimation of the Size of Non-Compact Suffix Trees

Size: px
Start display at page:

Download "An Estimation of the Size of Non-Compact Suffix Trees"

Transcription

1 Ata Cyernetia 22 (2016) An Estimation of the Size of Non-Compat Suffix Trees Bálint Vásárhelyi Astrat A suffix tree is a data struture used mainly for pattern mathing. It is known that the spae omplexity of simple suffix trees is quadrati in the length of the string. By a slight modifiation of the simple suffix trees one gets the ompat suffix trees, whih have linear spae omplexity. The motivation of this paper is the question whether the spae omplexity of simple suffix trees is quadrati not only in the worst ase, ut also in expetation. 1 Introdution A suffix tree is a powerful data struture whih is used for a large numer of ominatorial prolems involving strings. Suffix tree is a struture for ompat storage of the suffixes of a given string. The ompat suffix tree is a modified version of the suffix tree, and it an e stored in linear spae of the length of the string, while the non-ompat suffix tree is quadrati (see [11, 14, 18, 19]). The notion of suffix trees was first introdued y Weiner [19], though he used the name ompated i-tree. Grossi and Italiano mention that in the sientifi literature, suffix trees have een redisovered many times, sometimes under different names, like ompated i-tree, prefix tree, PAT tree, position tree, repetition finder, suword tree et. [10]. Linear time and spae algorithms for reating the ompat suffix tree were given soon y Weiner [19], MCreight [14], Ukkonen [18], Chen and Siferas [4] and others. The statistial ehaviour of suffix trees has een also studied. Most of the studies onsider improved versions. The average size of ompat suffix trees was examined y Blumer, Ehrenfeuht and Haussler [3]. They proved that the average numer of nodes in the ompat suffix tree is asymptotially the sum of an osillating funtion and a small linear funtion. An important question is the height of suffix trees, whih was answered y Devroye, Szpankowski and Rais [6], who proved that the expeted height is logarithmi in the length of the string. Szegedi Tudományegyetem, TTIK, Szeged, 6720, Hungary. mesti@math.u-szeged.hu DOI: /atay

2 824 Bálint Vásárhelyi The appliation of suffix trees is very wide. We mention ut only a few examples. Apostolio et al. [2] mention that these strutures are used in text searhing, indexing, statistis, ompression. In omputational iology, several algorithms are ased on suffix trees. Just to refer a few of them, we mention the works of Höhl et al. [12], Adeiyi et al. [1] and Kaderali et al. [13]. Suffix trees are also used for deteting plagiarism [2], in ryptography [15, 16], in data ompression [7, 8, 16] or in pattern reognition [17]. For the interested readers further details on suffix trees, their history and their appliations an e found in [2], in [10] and in [11], whih soures we also used for the overview of the history of suffix trees. It is well-known that the non-ompat suffix tree an e quadrati in spae as we referred efore. In our paper we are setting a lower ound on the average size, whih is also quadrati. 2 Preliminaries Before we turn to our results, let us define a few neessary notions. Definition 1. An alphaet Σ is a set of different haraters. The size of an alphaet is the size of this set, whih we denote y σ(σ), or more simply σ. A string S is over the alphaet Σ if eah harater of S is in Σ. Definition 2. Let S e a string. S[i] is its ith harater, while S[i, j] is a sustring of S, from S[i] to S[j], if j i, else S[i, j] is the empty string. Usually n(s) (or n if there is no danger of onfusion) denotes the length of the string. Definition 3. The suffix tree of S is a rooted direted tree with n leaves, where n is the length of S. Its struture is the following: Eah edge e has a lael l(e), and the edges from a node v have different laels (thus, the suffix tree of a string is unique). If we onatenate the edge laels along a path P, we get the path lael L(P). We denote the path from the root to the leaf j y P(j). The edge laels are suh that L(j) = L(P(j)) is S[j, n] and a $ sign at the end. The definition eomes more lear if we hek the example on 1 and 2. A naive algorithm for onstruting the suffix tree is the following: Notie that in 2 a leaf always remain a leaf, as $ (the last edge lael efore a leaf) is not a harater in S. Definition 4. The ompat suffix tree is a modified version of the suffix tree. We get it from the suffix tree y ompressing its long ranhes. The struture of the ompat suffix tree is asially similar to that of the suffix tree, ut an edge lael an e longer than one harater, and eah internal node (i.e. not leaf) must have at least two hildren. For an example see 2. With a regard to suffix trees, we an define further notions for strings.

3 An Estimation of the Size of Non-Compat Suffix Trees 825 a $ 5 $ 4 $ 3 $ 6 $ 2 a $ 1 Growth of the string Figure 1: Suffix tree of string aa Definition 5. Let S e a string, and T e its (non-ompat) suffix tree. A natural diretion of T is that all edges are direted from the root towards the leaves. If there is a direted path from u to v, then v is a desendant of u and u is an anestor of v. We say that the growth of S (denoted y γ(s)) is one less than the shortest distane of leaf 1 from an internal node v whih has at least two hildren (inluding leaf 1), that is, we ount the internal nodes on the path different from v. If leaf j is a desendant of v, then the ommon prefix of S[j, n] and S[1, n] is the longest among all j s. 1. If we onsider the string S = aa, the growth of S is 5, as it an e seen on An important notion is the following one. Definition 6. Let Ω(n, k, σ) e the numer of strings of length n with growth k over an alphaet of size σ. Oserve that the onnetion etween the growth and the numer of nodes in a suffix tree is the following: Oservation 1. If we onstrut the suffix tree of S y using 2, we get that the sum of the growths of S[n 1, n], S[n 2, n],..., S[1, n] is a lower ound to the numer of nodes in the final suffix tree. In fat, there are only two more internal nodes, the root vertex, the only node on the path to leaf n, and we have the leaves. In the proofs we will need the notion of period and of aperiodi strings.

4 826 Bálint Vásárhelyi Let S e a string of length n. Let j = 1 and T e a tree of one vertex r (the root of the suffix tree). Step 1: Consider X = S[j, n] + $. Set i = 0, and v = r. Step 2: If there is an edge vu laelled X[i + 1], then set v = u and i = i + 1. Step 3: Repeat Step 2 while it is possile. Step 4: If there is no suh an edge, add a path of n j i + 2 edges from v, with laels orresponding to S[j + i, n] + $, onseutively on the edges. At the end of the path, numer the leaf with j. Step 5: Set j = j + 1, and if j n, go to Step 1. a $ $ $ $ $ a$ Figure 2: Compat tree of string aa Definition 7. Let S e a string of length n. We say that S is periodi with period d, if there is a d n for whih S[i] = S[i + d] for all i n d. Otherwise, S is aperiodi. The minimal period of S is the smallest d with the property aove. Definition 8. µ(j, σ) is the numer of j-length aperiodi strings over an alphaet of size σ. A few examples for the numer of aperiodi strings are given in 1. σ µ(1, σ) µ(2, σ) µ(3, σ) µ(4, σ) µ(5, σ) µ(6, σ) µ(7, σ) µ(8, σ) Tale 1: Numer of aperiodi strings for small alphaets. σ is the size of the alphaet, and µ(j, σ) is the numer of aperiodi strings of length j

5 An Estimation of the Size of Non-Compat Suffix Trees Main results Our main results are formulated in the following theorems. Theorem 2. On an alphaet of size σ for all n 2k, Ω(n, k, σ) φ(k, σ) for some funtion φ. Theorem 3. There is a > 0 and an n 0 suh that for any n > n 0 the following is true. Let S e a string of length n 1, and S e a string otained from S y adding a harater to its eginning hosen uniformly random from the alphaet. Then the expeted growth of S is at least n. Theorem 4. There is a d > 0 that for any n > n 0 (where n 0 is the same as in 3) the following holds. On an alphaet of size σ the simple suffix tree of a random string S of length n has at least d n 2 nodes in expetation. 4 Proofs Proof. (4) Considering 1 we have that the expeted size of the simple suffix tree of a random string S is at least E (γ(s[n m, n])) m=1 E(γ(S[n m, n])). (1) m=1 If m n 0, 3 is ovious. If m > n 0, we an divide the sum into two parts: E(γ(S[n m, n])) = m=1 n 0 m=1 E(γ(S[n m, n])) + m=n 0+1 E(γ(S[n m, n])). (2) The first part of the sum is a onstant, while the seond part an e estimated with 3: E(γ(S[n m, n])) n = d n 2. (3) This proves 4. m=n 0+1 m=n 0+1 First, we show a few lemmas aout the numer of aperiodi strings. 1 an e found in [9] or in [5], ut we give a short proof also here. Lemma 1. For all j > 0 integer and for all alphaet of size σ the numer of aperiodi strings is µ(j, σ) = σ j µ(d, σ). d j d j (4)

6 828 Bálint Vásárhelyi Proof. µ(1, σ) = σ is trivial. There are σ j strings of length j. Suppose that a string is periodi with minimal period d. This implies that its first d haraters form an aperiodi string of length d, and there are µ(d, σ) suh strings. This finishes the proof. Speially, if p is prime, then µ(p, σ) = σ p σ. Corollary 1. If p is prime and t N, then µ (p t, σ) = σ pt σ pt 1 for all alphaet of size σ. Proof. We ount the aperiodi strings of length p t. There are σ pt strings. Consider the minimal period of the string, i.e. the period whih is aperiodi. If we exlude all minimal periods of length k, we exlude µ(k, σ) strings. This yields the following equality: µ ( p t, σ ) = σ pt µ (p s, σ). (5) 1 s<t With a few transformations and using 1, we have that (5) is equal to σ pt µ ( p t 1, σ ) µ (p s, σ) = σ pt σ pt 1 + µ (p s, σ) whih is 1 s<t 1 1 s<t 1 1 s<t 1 µ (p s, σ), (6) σ pt σ pt 1. (7) Lemma 2. For all j > 1 and for all alphaet of size σ, µ(j, σ) σ j σ. Proof. From 1 we have µ(j, σ) = σ j µ(d, σ). Considering µ(d, σ) 0 and d j d j µ(1, σ) = σ, we get the laim of the lemma. Lemma 3. For all j 1, and for all alphaet of size σ µ(j, σ) σ(σ 1) j 1. (8) Proof. We prove y indution. For j = 1 the laim is ovious, as µ(1, σ) = σ. Suppose we know the laim for j 1. Consider σ(σ 1) j 2 aperiodi strings of length j 1. Now, for any of these strings there is at most one harater y appending that to the end of the string we reeive a periodi string of length j. Therefore we an append at least σ 1 haraters to get an aperiodi string, whih gives the desired result. Oservation 5. Oserve that if the growth of S is k, then there is a j suh that S[1, n k] = S[j +1, j +n k]. For example, if the string is adefada (n = 12), one an hek that the growth is 8 (the new ranh in the suffix tree whih ends in leaf 1 starts after ad), and with j = 6 we have S[1, 4] = S[7, 10] = ad.

7 An Estimation of the Size of Non-Compat Suffix Trees 829 The reverse of this oservation is that if there is a j < n suh that S[1, n k] = S[j + 1, j + n k], then the growth is at most k, as S[j + 1, n] and S[1, n] shares a ommon prefix of length n k, thus, the paths to the leaves j + 1 and n share n k internal nodes, and at most k new internal nodes are reated. Proof. (2) For proving the theorem we ount the numer of strings with growth k for n 2k. First, we fix j, and then ount the numer of possile strings where the growth ours suh that S[1, n k] = S[j + 1, j + n k] for that fixed j. Note that y this way, we only have an upper ound for this numer, as we might found an l suh that S[1, n k + 1] = S[l + 1, l + n k + 1]. We know that j k, otherwise S[j + 1, j + n k] does not exist. If j = k, then we know S[1, n k] = S[k + 1, n]. S[1, k] must e aperiodi. Suppose the opposite and let S[1, k] = p... p, where p is the minimal period, and its length is d. Then S[k + 1, n] = p... p. Oviously, in this ase S[1, n d] = S[d + 1, n], whih y 5 means that the growth would e at most d. See also 3. Therefore this ase gives us at most µ(k) strings of growth k. p p p p p p 1 k Figure 3: Proof of 2, ase j = k n If j < k, then we have S[1, n k] = S[j + 1, j + n k]. First, we note that S[1, j] must e aperiodi. Suppose the opposite and let S[1, j] = p... p, where p is the minimal period, and its length is d. Then whih means that S S[j + 1, 2j] = S[2j + 1, 3j] =... = p... p, (9) [ 1, ] [ k j = S j + 1, j + j ] k j = p... p. (10) j This implies that S[1, j + n k] = p... pp, where p is a prefix of p. However, S[1, j + n k d] = S[d, j + n k] is true, and using 5, we have that γ(s) n (j + n k) + d = k j + d < k, whih is a ontradition. Further, S[j + n k + 1] must not e the same as S[k + 1], whih means that this harater an e hosen σ 1 ways. Therefore this ase gives us at most µ(j)(σ 1)σ k j 1 strings of growth k for eah j. By summing up for eah j, we have

8 830 Bálint Vásárhelyi Figure 4: Proof of 2, ase j < k This ompletes the proof. k 1 φ(k, σ) = µ(j, σ)(σ 1)σ k j 1 + µ(k, σ) (11) j=1 Proof. (3) Aording to 2, µ(j, σ) σ j σ (if j > 1). In the proof of 2 at (11) we saw for k 1 and n 2k 1 that k 1 φ(k, σ) = µ(k, σ) + µ(j, σ)(σ 1)σ k j 1. (12) We an ound the right hand side of (12) from aove as it follows: µ(k, σ) + k 1 j=1 whih is y 2 at most j=1 µ(j, σ)(σ 1)σ k j 1 = µ(k, σ) + µ(1, σ)(σ 1)σ k 2 + k 1 j=2 µ(j, σ)(σ 1)σ k j 1, (13) k 1 k 1 σ k σ+σ(σ 1)σ k 2 + (σ j σ)(σ 1)σ k j 1 σ k +σ k + σ j σσ k j 1 kσ k. n 2 j=2 Thus, φ(k, σ) kσ k, whih means k=1 j=2 (14) m m φ(k, σ) kσ k (m + 1)σ m+1. (15) k=1 The left hand side of 15 is an upper ound for the strings of growth at most m. Let m = n 2. As σ n n 2 σ n 2, this implies that in most ases the suffix tree of S has at least more nodes than the suffix tree of S[1, n 1]. Thus, a lower ound on the expetation of the growth of S is whih is E (γ(s)) 1 ( n ( σ n 2 σ n 2 + σ n n ) ( 2 σ n n )) , (16) ( ( ) ) 1 n + 2 n σ n σ n n(n + 2) + σ n 2 = n, (17)

9 An Estimation of the Size of Non-Compat Suffix Trees 831 with some, if n is large enough. With this, we have finished the proof and gave a quadrati lower ound on the average size of suffix trees. Referenes [1] E.F. Adeiyi, T. Jiang, and M. Kaufmann. An effiient algorithm for finding short approximate non-tandem repeats. Bioinformatis, 17:5S 12S, [2] A. Apostolio, M. Crohemore, M. Farah-Colton, Z. Galil, and S. Muthukrishnan. 40 years of suffix trees. Communiations of the ACM, 59:66 73, [3] A. Blumer, A. Ehrenfeuht, and D. Haussler. Average sizes of suffix trees and DAWGs. Disrete Applied Mathematis, 24:37 45, [4] M.T. Chen and J. Siferas. Effiient and elegant suword tree onstrution. In Cominatorial algorithms on words, pages Springer-Verlag, [5] J.D. Cook. Counting primitve it strings /12/23/ounting-primitive-it-strings/, [Online; aessed 02-May-2016]. [6] L. Devroye, W. Szpankowski, and B. Rais. A note on the height of suffix trees. SIAM Journal on Computing, 21:48 53, [7] E. R. Fiala and D. H. Greene. Data ompression with finite windows. Communiations of the ACM, 32: , [8] C. Fraser, A. Wendt, and E.W. Myers. Analyzing and ompressing assemly ode. In Proeedings SIGPLAN Symposium on Compiler Constrution, pages , [9] E.N. Gilert and J. Riordan. Symmetry types of periodi sequenes. Illinois Journal of Mathematis, 5: , [10] R. Grossi and G.F. Italiano. Suffix trees and their appliations in string algorithms. In Proeedings of the 1st South Amerian Workshop on String Proessing, pages 57 76, [11] D. Gusfield. Algorithms on Strings, Trees and Sequenes. Camridge University Press, [12] M. Höhl, S. Kurtz, and E. Ohleush. Effiient multiple genome alignment. Bioinformatis, 18:312S 320S, [13] L. Kaderali and A. Shliep. Seleting signature oligonuleotides to identify organisms using DNA arrays. Bioinformatis, 18: , 2002.

10 832 Bálint Vásárhelyi [14] E. M. MCreight. A spae-eonomial suffix tree onstrution algorithm. Journal of the ACM, 23: , [15] L. O Connor and T. Snider. Suffix trees and string omplexity. In Advanes in Cryptology: Proeedings of EUROCRYPT, LNCS 658, pages Springer-Verlag, [16] M. Rodeh. A fast test for unique deipheraility ased on suffix trees,. IEEE Transations on Information Theory, 28(4): , [17] S.L. Tanimoto. A method for deteting struture in polygons. Pattern Reognition, 13: , [18] E. Ukkonen. On-line onstrution of suffix trees. Algorithmia, 14: , [19] P. Weiner. Linear pattern mathing algorithms. In Proeedings of the 14th IEEE Symposium on Swithing and Automata Theory, pages 1 11, Reeived 13th July 2015

GRAPH: A network of NODES (or VERTICES) and ARCS (or EDGES) joining the nodes with each other

GRAPH: A network of NODES (or VERTICES) and ARCS (or EDGES) joining the nodes with each other GRPH: network of NS (or VRTIS) and RS (or GS) joining the nodes with eah other IGRPH: graph where the ars have an RINTTIN (or IRTIN). a Graph a igraph d e d HIN etween two nodes is a sequene of ars where

More information

Technische Universität Ilmenau Institut für Mathematik

Technische Universität Ilmenau Institut für Mathematik Tehnishe Universität Ilmenau Institut für Mathematik Preprint No. M 09/23 The Repeater Tree Constrution Problem Bartoshek, Christoph; Held, Stephan; Maßberg, Jens; Rautenbah, Dieter; Vygen, Jens 2009 Impressum:

More information

Properties of the nonsymmetric Robinson-Schensted-Knuth algorithm

Properties of the nonsymmetric Robinson-Schensted-Knuth algorithm Properties of the nonsymmetri Roinson-Shensted-Knuth algorithm James Haglund Department of Mathematis University of Pennsylvania, Philadelphia, PA 90. USA jhaglund@math.upenn.edu Sarah Mason Department

More information

ON TRANSACTION COSTS IN STOCK TRADING

ON TRANSACTION COSTS IN STOCK TRADING QUANTITATIVE METHODS IN ECONOMICS Volume XVIII, No., 07, pp. 58 67 ON TRANSACTION COSTS IN STOCK TRADING Marek Andrzej Koiński Faulty of Applied Informatis and Mathematis Warsaw University of Life Sienes

More information

How to process a Canadian currency deposit

How to process a Canadian currency deposit Table of Contents Before you begin........................................ 2 Proess................................................ 2 Creating a new doument................................. 3 Add totals

More information

A relation on 132-avoiding permutation patterns

A relation on 132-avoiding permutation patterns Discrete Mathematics and Theoretical Computer Science DMTCS vol. VOL, 205, 285 302 A relation on 32-avoiding permutation patterns Natalie Aisbett School of Mathematics and Statistics, University of Sydney,

More information

THE SCIENCE COUNCIL Regulations

THE SCIENCE COUNCIL Regulations THE SCIENCE COUNCIL Regulations 1. Memership appliation (Bylaws 3 and 4) 2. Memership Susriptions (Bylaw 6) 3. Memership disiplinary ations (Bylaw 9) and removal y the Counil (Bylaw 11) 4. Memership Disiplinary

More information

Maximum Contiguous Subsequences

Maximum Contiguous Subsequences Chapter 8 Maximum Contiguous Subsequences In this chapter, we consider a well-know problem and apply the algorithm-design techniques that we have learned thus far to this problem. While applying these

More information

Notes on Natural Logic

Notes on Natural Logic Notes on Natural Logic Notes for PHIL370 Eric Pacuit November 16, 2012 1 Preliminaries: Trees A tree is a structure T = (T, E), where T is a nonempty set whose elements are called nodes and E is a relation

More information

Sublinear Time Algorithms Oct 19, Lecture 1

Sublinear Time Algorithms Oct 19, Lecture 1 0368.416701 Sublinear Time Algorithms Oct 19, 2009 Lecturer: Ronitt Rubinfeld Lecture 1 Scribe: Daniel Shahaf 1 Sublinear-time algorithms: motivation Twenty years ago, there was practically no investigation

More information

A solution by stochastic iteration method for nonlinear Black- Scholes equation with transaction cost and volatile portfolio risk in Hilbert space

A solution by stochastic iteration method for nonlinear Black- Scholes equation with transaction cost and volatile portfolio risk in Hilbert space International Journal of Mathematial Analysis and Appliations 2014; 1(3): 43-48 Published online August 20, 2014 (http://www.aasit.org/journal/ijmaa) A solution by stohasti iteration method for nonlinear

More information

Introduction to Greedy Algorithms: Huffman Codes

Introduction to Greedy Algorithms: Huffman Codes Introduction to Greedy Algorithms: Huffman Codes Yufei Tao ITEE University of Queensland In computer science, one interesting method to design algorithms is to go greedy, namely, keep doing the thing that

More information

Heap Building Bounds

Heap Building Bounds Heap Building Bounds Zhentao Li 1 and Bruce A. Reed 2 1 School of Computer Science, McGill University zhentao.li@mail.mcgill.ca 2 School of Computer Science, McGill University breed@cs.mcgill.ca Abstract.

More information

1 Solutions to Tute09

1 Solutions to Tute09 s to Tute0 Questions 4. - 4. are straight forward. Q. 4.4 Show that in a binary tree of N nodes, there are N + NULL pointers. Every node has outgoing pointers. Therefore there are N pointers. Each node,

More information

Lecture l(x) 1. (1) x X

Lecture l(x) 1. (1) x X Lecture 14 Agenda for the lecture Kraft s inequality Shannon codes The relation H(X) L u (X) = L p (X) H(X) + 1 14.1 Kraft s inequality While the definition of prefix-free codes is intuitively clear, we

More information

2 all subsequent nodes. 252 all subsequent nodes. 401 all subsequent nodes. 398 all subsequent nodes. 330 all subsequent nodes

2 all subsequent nodes. 252 all subsequent nodes. 401 all subsequent nodes. 398 all subsequent nodes. 330 all subsequent nodes ¼ À ÈÌ Ê ½¾ ÈÊÇ Ä ÅË ½µ ½¾º¾¹½ ¾µ ½¾º¾¹ µ ½¾º¾¹ µ ½¾º¾¹ µ ½¾º ¹ µ ½¾º ¹ µ ½¾º ¹¾ µ ½¾º ¹ µ ½¾¹¾ ½¼µ ½¾¹ ½ (1) CLR 12.2-1 Based on the structure of the binary tree, and the procedure of Tree-Search, any

More information

On the Optimality of a Family of Binary Trees Techical Report TR

On the Optimality of a Family of Binary Trees Techical Report TR On the Optimality of a Family of Binary Trees Techical Report TR-011101-1 Dana Vrajitoru and William Knight Indiana University South Bend Department of Computer and Information Sciences Abstract In this

More information

Bonus-Malus System with the Claim Frequency Distribution is Geometric and the Severity Distribution is Truncated Weibull

Bonus-Malus System with the Claim Frequency Distribution is Geometric and the Severity Distribution is Truncated Weibull IOP Conferene Series: Earth and Environmental Siene PAPER OPEN ACCESS Bonus-Malus System with the Claim Frequeny Distribution is Geometri and the Severity Distribution is Trunated Weibull To ite this artile:

More information

Essays on Some Combinatorial Optimization Problems with Interval Data

Essays on Some Combinatorial Optimization Problems with Interval Data Essays on Some Combinatorial Optimization Problems with Interval Data a thesis submitted to the department of industrial engineering and the institute of engineering and sciences of bilkent university

More information

Supporting Information

Supporting Information Supporting Information Novikoff et al. 0.073/pnas.0986309 SI Text The Recap Method. In The Recap Method in the paper, we described a schedule in terms of a depth-first traversal of a full binary tree,

More information

Page 80. where C) refers to estimation cell (defined by industry and, for selected industries, region)

Page 80. where C) refers to estimation cell (defined by industry and, for selected industries, region) Nonresponse Adjustment in the Current Statistis Survey 1 Kennon R. Copeland U.S. Bureau of Labor Statistis 2 Massahusetts Avenue, N.E. Washington, DC 20212 (Copeland.Kennon@bls.gov) I. Introdution The

More information

Kurtosis Statistics with Reference to Power Function Distribution

Kurtosis Statistics with Reference to Power Function Distribution ISSN 68-80 Journal o Statistis Volume, 06. pp. -0 Abstrat Kurtosis Statistis with Reerene to Power Funtion Distribution Azaz Ahmad and Ahmed Saeed Akhter Pearson statistis o skewness and kurtosis gave

More information

Lecture 23: April 10

Lecture 23: April 10 CS271 Randomness & Computation Spring 2018 Instructor: Alistair Sinclair Lecture 23: April 10 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They

More information

Valuation of Bermudan-DB-Underpin Option

Valuation of Bermudan-DB-Underpin Option Valuation of Bermudan-DB-Underpin Option Mary, Hardy 1, David, Saunders 1 and Xiaobai, Zhu 1 1 Department of Statistis and Atuarial Siene, University of Waterloo Marh 31, 2017 Abstrat The study of embedded

More information

Efficient Pricing of European Options with Stochastic Interest Rate Using Fourier Transform Method

Efficient Pricing of European Options with Stochastic Interest Rate Using Fourier Transform Method Amerian Journal of Applied Mathematis 2016; 4(4): 181-185 http://www.sienepublishinggroup.om/j/ajam doi: 10.11648/j.ajam.20160404.13 ISSN: 2330-0043 (Print); ISSN: 2330-006X (Online) Effiient Priing of

More information

Ranking dynamics and volatility. Ronald Rousseau KU Leuven & Antwerp University, Belgium

Ranking dynamics and volatility. Ronald Rousseau KU Leuven & Antwerp University, Belgium Ranking dynamis and volatility Ronald Rousseau KU Leuven & Antwerp University, Belgium ronald.rousseau@kuleuven.be Joint work with Carlos Garía-Zorita, Sergio Marugan Lazaro and Elias Sanz-Casado Department

More information

Class Notes: Week 6. Multinomial Outcomes

Class Notes: Week 6. Multinomial Outcomes Ronald Hek Class Notes: Week 6 1 Class Notes: Week 6 Multinomial Outomes For the next ouple of weeks or so, we will look at models where there are more than two ategories of outomes. Multinomial logisti

More information

ECE 586GT: Problem Set 1: Problems and Solutions Analysis of static games

ECE 586GT: Problem Set 1: Problems and Solutions Analysis of static games University of Illinois Fall 2018 ECE 586GT: Problem Set 1: Problems and Solutions Analysis of static games Due: Tuesday, Sept. 11, at beginning of class Reading: Course notes, Sections 1.1-1.4 1. [A random

More information

Structural Induction

Structural Induction Structural Induction Jason Filippou CMSC250 @ UMCP 07-05-2016 Jason Filippou (CMSC250 @ UMCP) Structural Induction 07-05-2016 1 / 26 Outline 1 Recursively defined structures 2 Proofs Binary Trees Jason

More information

Availability Analysis with Opportunistic Maintenance of a Two Component Deteriorating System

Availability Analysis with Opportunistic Maintenance of a Two Component Deteriorating System Analysis with Maintenane of a Two Component Deteriorating System Joel P. Varghese and Girish Kumar Abstrat This paper desribes the opportunisti maintenane model for availability analysis of two omponent

More information

See separate instructions. Your first name and initial. Your social security number John Smith Applied For

See separate instructions. Your first name and initial. Your social security number John Smith Applied For Form () 40 U.S. Individual Inome Tax Return 2016 OMB No. 1545-0074 Attah Form(s) W-2 here. Also attah Forms W-2G and -R if tax was withheld. 6001-30-16 1 2 3 IRS Use Only - Do not write or staple in this

More information

i e SD No.2015/0206 PAYMENT SERVICES REGULATIONS 2015

i e SD No.2015/0206 PAYMENT SERVICES REGULATIONS 2015 i e SD No.2015/0206 PAYMENT SERVICES REGULATIONS 2015 Payment Servies Regulations 2015 Index PAYMENT SERVICES REGULATIONS 2015 Index Regulation Page PART 1 INTRODUCTION 7 1 Title... 7 2 Commenement...

More information

Lecture 2: The Simple Story of 2-SAT

Lecture 2: The Simple Story of 2-SAT 0510-7410: Topics in Algorithms - Random Satisfiability March 04, 2014 Lecture 2: The Simple Story of 2-SAT Lecturer: Benny Applebaum Scribe(s): Mor Baruch 1 Lecture Outline In this talk we will show that

More information

Decision-making Method for Low-rent Housing Construction Investment. Wei Zhang*, Liwen You

Decision-making Method for Low-rent Housing Construction Investment. Wei Zhang*, Liwen You 5th International Conferene on Civil Enineerin and Transportation (ICCET 5) Deision-makin Method for Low-rent Housin Constrution Investment Wei Zhan*, Liwen You University of Siene and Tehnoloy Liaonin,

More information

Exempt Organization Business Income Tax Return

Exempt Organization Business Income Tax Return Form Department of the Treasury Internal Revenue Servie A For alendar year 015 or other tax year eginning, and ending. Information aout Form 0-T and its instrutions is availale at www.irs.gov/form0t. Do

More information

Using the Average of the Extreme Values of a Triangular Distribution for a Transformation, and Its Approximant via the Continuous Uniform Distribution

Using the Average of the Extreme Values of a Triangular Distribution for a Transformation, and Its Approximant via the Continuous Uniform Distribution British Journal of Mathematis & Computer Siene 4(4):., 014 ISSN: 31-0851 SCIENCEDOMAIN international www.sienedomain.org Using the Average of the Extreme Values of a Triangular Distribution for a Transformation,

More information

The suffix binary search tree and suffix AVL tree

The suffix binary search tree and suffix AVL tree Journal of Discrete Algorithms 1 (2003) 387 408 www.elsevier.com/locate/jda The suffix binary search tree and suffix AVL tree Robert W. Irving, Lorna Love Department of Computing Science, University of

More information

A GENERALIZED MARTINGALE BETTING STRATEGY

A GENERALIZED MARTINGALE BETTING STRATEGY DAVID K. NEAL AND MICHAEL D. RUSSELL Astract. A generalized martingale etting strategy is analyzed for which ets are increased y a factor of m 1 after each loss, ut return to the initial et amount after

More information

Lecture 14: Basic Fixpoint Theorems (cont.)

Lecture 14: Basic Fixpoint Theorems (cont.) Lecture 14: Basic Fixpoint Theorems (cont) Predicate Transformers Monotonicity and Continuity Existence of Fixpoints Computing Fixpoints Fixpoint Characterization of CTL Operators 1 2 E M Clarke and E

More information

Optional Section: Continuous Probability Distributions

Optional Section: Continuous Probability Distributions 6 Optional Setion: Continuous Probability Distributions 6.5 The Normal Approximation to the Binomial Distribution For eah retangle, the width is 1 and the height is equal to the probability assoiated with

More information

arxiv: v1 [cs.cv] 11 Nov 2015

arxiv: v1 [cs.cv] 11 Nov 2015 A Continuous Max-Flow Approah to Cyli Field Reonstrution John S.H. Baxter a,b, Jonathan MLeod a,b, and Terry M. Peters a,b a Robarts Researh Institute, London, Ontario, Canada; b Western University, London,

More information

Applied Mathematics Letters

Applied Mathematics Letters Applied Mathematics Letters 23 (2010) 286 290 Contents lists available at ScienceDirect Applied Mathematics Letters journal homepage: wwwelseviercom/locate/aml The number of spanning trees of a graph Jianxi

More information

A d-step Approach for Distinct Squares in Strings

A d-step Approach for Distinct Squares in Strings A -step Approach for Distinct Squares in Strings Mei Jiang Joint work with Antoine Deza an Frantisek Franek Department of Computing an Software McMaster University LSD & LAW, Feb 2011 Outline 1 Introuction

More information

Wilf-equivalence on k-ary words, compositions, and parking functions

Wilf-equivalence on k-ary words, compositions, and parking functions Wilf-equivalene on k-ary ords, ompositions, and parking funtions Vít Jelínek Department of Applied Mathematis, Charles University, Prague jelinek@kam.mff.uni.z Toufik Mansour Department of Mathematis,

More information

NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE INTRODUCTION 1. FIBONACCI TREES

NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE INTRODUCTION 1. FIBONACCI TREES 0#0# NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE Shizuoka University, Hamamatsu, 432, Japan (Submitted February 1982) INTRODUCTION Continuing a previous paper [3], some new observations

More information

4 Martingales in Discrete-Time

4 Martingales in Discrete-Time 4 Martingales in Discrete-Time Suppose that (Ω, F, P is a probability space. Definition 4.1. A sequence F = {F n, n = 0, 1,...} is called a filtration if each F n is a sub-σ-algebra of F, and F n F n+1

More information

2019 New Employee Enrollment

2019 New Employee Enrollment 2019 New Employee ment Offie use only Approved by: Approved date: Effetive date: See the Summary Plan Desription for more information on benefits at www.oregon.gov/oha/pebb. Submit ompleted form to your

More information

Arborescent Architecture for Decentralized Supervisory Control of Discrete Event Systems

Arborescent Architecture for Decentralized Supervisory Control of Discrete Event Systems Arborescent Architecture for Decentralized Supervisory Control of Discrete Event Systems Ahmed Khoumsi and Hicham Chakib Dept. Electrical & Computer Engineering, University of Sherbrooke, Canada Email:

More information

Finding Equilibria in Games of No Chance

Finding Equilibria in Games of No Chance Finding Equilibria in Games of No Chance Kristoffer Arnsfelt Hansen, Peter Bro Miltersen, and Troels Bjerre Sørensen Department of Computer Science, University of Aarhus, Denmark {arnsfelt,bromille,trold}@daimi.au.dk

More information

CATEGORICAL SKEW LATTICES

CATEGORICAL SKEW LATTICES CATEGORICAL SKEW LATTICES MICHAEL KINYON AND JONATHAN LEECH Abstract. Categorical skew lattices are a variety of skew lattices on which the natural partial order is especially well behaved. While most

More information

Midyear Change Life Event

Midyear Change Life Event Midyear Change Life Event Approved by: Approved date: Offie use only Effetive date: See the Summary Plan Desription for more information on benefits at www.oregon.gov/oha/pebb. Contat information (You

More information

Economics 602 Macroeconomic Theory and Policy Problem Set 4 Suggested Solutions Professor Sanjay Chugh Summer 2010

Economics 602 Macroeconomic Theory and Policy Problem Set 4 Suggested Solutions Professor Sanjay Chugh Summer 2010 Department of Applied Eonomis Johns Hopkins University Eonomis 6 Maroeonomi Theory and Poliy Prolem Set 4 Suggested Solutions Professor Sanjay Chugh Summer Optimal Choie in the Consumption-Savings Model

More information

Free Space Path Loss of UWB Communications

Free Space Path Loss of UWB Communications Free Spae Path Loss of UWB Communiations Pihaya Supanakoon 1, Sathit Aroonpraparat 1, Sathaporn Promwong 1 and Jun-ihi Takada 1 Department of Information Engineering, Faulty of Engineering, King Mongkut

More information

IEOR E4004: Introduction to OR: Deterministic Models

IEOR E4004: Introduction to OR: Deterministic Models IEOR E4004: Introduction to OR: Deterministic Models 1 Dynamic Programming Following is a summary of the problems we discussed in class. (We do not include the discussion on the container problem or the

More information

Statistics, Measures of Central Tendency I

Statistics, Measures of Central Tendency I Statistics, Measures of Central Tendency I We are considering a random variable X with a probability distribution which has some parameters. We want to get an idea what these parameters are. We perfom

More information

Social Security Legislation (Benefits) (Application) Order 2017 SOCIAL SECURITY LEGISLATION (BENEFITS) (APPLICATION) ORDER 2017

Social Security Legislation (Benefits) (Application) Order 2017 SOCIAL SECURITY LEGISLATION (BENEFITS) (APPLICATION) ORDER 2017 Soial Seurity Legislation (Benefits) (Appliation) Order 2017 Index SOCIAL SECURITY LEGISLATION (BENEFITS) (APPLICATION) ORDER 2017 Index Artile Page 1 Title... 3 2 Commenement... 3 3 Interpretation...

More information

arxiv: v1 [math.co] 31 Mar 2009

arxiv: v1 [math.co] 31 Mar 2009 A BIJECTION BETWEEN WELL-LABELLED POSITIVE PATHS AND MATCHINGS OLIVIER BERNARDI, BERTRAND DUPLANTIER, AND PHILIPPE NADEAU arxiv:0903.539v [math.co] 3 Mar 009 Abstract. A well-labelled positive path of

More information

1 Manipulation for binary voters

1 Manipulation for binary voters STAT 206A: Soil Choie nd Networks Fll 2010 Mnipultion nd GS Theorem Otoer 21 Leturer: Elhnn Mossel Srie: Kristen Woyh In this leture we over mnipultion y single voter: whether single voter n lie out his

More information

AVL Trees. The height of the left subtree can differ from the height of the right subtree by at most 1.

AVL Trees. The height of the left subtree can differ from the height of the right subtree by at most 1. AVL Trees In order to have a worst case running time for insert and delete operations to be O(log n), we must make it impossible for there to be a very long path in the binary search tree. The first balanced

More information

Distributed Function Calculation via Linear Iterations in the Presence of Malicious Agents Part I: Attacking the Network

Distributed Function Calculation via Linear Iterations in the Presence of Malicious Agents Part I: Attacking the Network 8 American Control Conference Westin Seattle Hotel, Seattle, Washington, USA June 11-13, 8 WeC34 Distributed Function Calculation via Linear Iterations in the Presence of Malicious Agents Part I: Attacking

More information

Oracle. Sales Cloud Getting Started with Consumer Goods Implementation. Release 13 (update 18A)

Oracle. Sales Cloud Getting Started with Consumer Goods Implementation. Release 13 (update 18A) Orale Sales Cloud Getting Started with Consumer Goods Implementation Release 13 (update 18A) Orale Sales Cloud Release 13 (update 18A) Part Number E94725-02 Copyright 2011-2018, Orale and/or its affiliates.

More information

UNIT VI TREES. Marks - 14

UNIT VI TREES. Marks - 14 UNIT VI TREES Marks - 14 SYLLABUS 6.1 Non-linear data structures 6.2 Binary trees : Complete Binary Tree, Basic Terms: level number, degree, in-degree and out-degree, leaf node, directed edge, path, depth,

More information

ADAPTIVE SIMULATION BUDGET ALLOCATION FOR DETERMINING THE BEST DESIGN. Qi Fan Jiaqiao Hu

ADAPTIVE SIMULATION BUDGET ALLOCATION FOR DETERMINING THE BEST DESIGN. Qi Fan Jiaqiao Hu Proceedings of the 013 Winter Simulation Conference R. Pasupathy, S.-H. Kim, A. Tol, R. Hill, and M. E. Kuhl, eds. ADAPTIVE SIMULATIO BUDGET ALLOCATIO FOR DETERMIIG THE BEST DESIG Qi Fan Jiaqiao Hu Department

More information

FOREST CITY INDUSTRIAL PARK FIN AN CIAL RETURNS EXECUTIVE SUMMARY

FOREST CITY INDUSTRIAL PARK FIN AN CIAL RETURNS EXECUTIVE SUMMARY FOREST CITY INDUSTRIAL PARK FIN AN CIAL RETURNS EXECUTIVE SUMMARY The City of London is engagedl in industrial land development for the sole purpose of fostering eonomi growth. The dynamis of industrial

More information

Mathematical Annex 5 Models with Rational Expectations

Mathematical Annex 5 Models with Rational Expectations George Alogoskoufis, Dynamic Macroeconomic Theory, 2015 Mathematical Annex 5 Models with Rational Expectations In this mathematical annex we examine the properties and alternative solution methods for

More information

VI. Continuous Probability Distributions

VI. Continuous Probability Distributions VI. Continuous Proaility Distriutions A. An Important Definition (reminder) Continuous Random Variale - a numerical description of the outcome of an experiment whose outcome can assume any numerical value

More information

Notes on the symmetric group

Notes on the symmetric group Notes on the symmetric group 1 Computations in the symmetric group Recall that, given a set X, the set S X of all bijections from X to itself (or, more briefly, permutations of X) is group under function

More information

Certificate of Foreign Intermediary, Foreign Flow-Through Entity, or Certain U.S. Branches for United States Tax Withholding and Reporting

Certificate of Foreign Intermediary, Foreign Flow-Through Entity, or Certain U.S. Branches for United States Tax Withholding and Reporting Form W-8MY (Rev. Septemer 2016) Department of the Treasury nternal Revenue Servie Do not use this form for: A A A Certifiate of Foreign ntermediary, Foreign Flow-Through Entity, or Certain U.S. Branhes

More information

Laurence Boxer and Ismet KARACA

Laurence Boxer and Ismet KARACA THE CLASSIFICATION OF DIGITAL COVERING SPACES Laurence Boxer and Ismet KARACA Abstract. In this paper we classify digital covering spaces using the conjugacy class corresponding to a digital covering space.

More information

SAMPLE CHAPTERS UNESCO EOLSS INVESTMENT MODELS. Ulrich Rieder University of Ulm, Germany

SAMPLE CHAPTERS UNESCO EOLSS INVESTMENT MODELS. Ulrich Rieder University of Ulm, Germany INVESMEN MODELS Ulrih Rieder University of Ulm, Germany Keywords: meanvariane ortfolio seletion, Markowitz model, minimum variane ortfolio, twofund searation, HARAutility, BlakSholes model, stohasti dynami

More information

Number, street, and room or suite no. (If a P.O. box, see page 5 of instructions.) C Date incorporated

Number, street, and room or suite no. (If a P.O. box, see page 5 of instructions.) C Date incorporated Form 0-L Department of the Treasury Internal Revenue Servie A Inome Dedutions (See instrutions for limitations on dedutions.) Tax and Payments (See page of instrutions) Chek if: () Consolidated return

More information

Economics 325 Intermediate Macroeconomic Analysis Practice Problem Set 1 Suggested Solutions Professor Sanjay Chugh Spring 2011

Economics 325 Intermediate Macroeconomic Analysis Practice Problem Set 1 Suggested Solutions Professor Sanjay Chugh Spring 2011 Department of Eonomis Universit of Marland Eonomis 35 Intermediate Maroeonomi Analsis Pratie Problem Set Suggested Solutions Professor Sanja Chugh Spring 0. Partial Derivatives. For eah of the following

More information

Copyright 1973, by the author(s). All rights reserved.

Copyright 1973, by the author(s). All rights reserved. Copyright 1973, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are

More information

Strategic Dynamic Sourcing from Competing Suppliers: The Value of Commitment

Strategic Dynamic Sourcing from Competing Suppliers: The Value of Commitment Strategi Dynami Souring from Competing Suppliers: The Value of Commitment Cuihong Li Laurens G. Debo Shool of Business, University of Connetiut, Storrs, CT0669 Tepper Shool of Business, Carnegie Mellon

More information

Economics 2202 (Section 05) Macroeconomic Theory Practice Problem Set 3 Suggested Solutions Professor Sanjay Chugh Fall 2014

Economics 2202 (Section 05) Macroeconomic Theory Practice Problem Set 3 Suggested Solutions Professor Sanjay Chugh Fall 2014 Department of Eonomis Boston College Eonomis 2202 (Setion 05) Maroeonomi Theory Pratie Problem Set 3 Suggested Solutions Professor Sanjay Chugh Fall 2014 1. Interation of Consumption Tax and Wage Tax.

More information

Tug of War Game. William Gasarch and Nick Sovich and Paul Zimand. October 6, Abstract

Tug of War Game. William Gasarch and Nick Sovich and Paul Zimand. October 6, Abstract Tug of War Game William Gasarch and ick Sovich and Paul Zimand October 6, 2009 To be written later Abstract Introduction Combinatorial games under auction play, introduced by Lazarus, Loeb, Propp, Stromquist,

More information

Certificate of Foreign Intermediary, Foreign Flow-Through Entity, or Certain U.S. Branches for United States Tax Withholding and Reporting

Certificate of Foreign Intermediary, Foreign Flow-Through Entity, or Certain U.S. Branches for United States Tax Withholding and Reporting Form W-8MY (Rev. June 2017) Department of the Treasury nternal Revenue Servie Do not use this form for: A Certifiate of Foreign ntermediary, Foreign Flow-Through Entity, or Certain U.S. Branhes for United

More information

Homework #4. CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class

Homework #4. CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class Homework #4 CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class o Grades depend on neatness and clarity. o Write your answers with enough detail about your approach and concepts

More information

TOTAL PART 1 / 50 TOTAL PART 2 / 50

TOTAL PART 1 / 50 TOTAL PART 2 / 50 Department of Eonomis University of Maryland Eonomis 35 Intermediate Maroeonomi Analysis Midterm Exam Suggested Solutions Professor Sanjay Chugh Fall 009 NAME: Eah problem s total number of points is shown

More information

Handout 4: Deterministic Systems and the Shortest Path Problem

Handout 4: Deterministic Systems and the Shortest Path Problem SEEM 3470: Dynamic Optimization and Applications 2013 14 Second Term Handout 4: Deterministic Systems and the Shortest Path Problem Instructor: Shiqian Ma January 27, 2014 Suggested Reading: Bertsekas

More information

Short Form 990-EZ Return of Organization Exempt From Income Tax

Short Form 990-EZ Return of Organization Exempt From Income Tax Form B G I J K Short Form 990-EZ Return of Organization Exempt From Inome Tax 2014 Under setion 501(), 527, or 4947(a)(1) of the Internal Revenue Code (exept private foundations) Do not enter soial seurity

More information

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Department of Computer Science, University of Toronto, shlomoh,szeider@cs.toronto.edu Abstract.

More information

Department of Economics. and. Institute for Policy Analysis. University oftoronto. Toronto, Canada M5S 1A1 WORKING PAPER NUMBER UT-ECIPA-PETERS-97-02

Department of Economics. and. Institute for Policy Analysis. University oftoronto. Toronto, Canada M5S 1A1 WORKING PAPER NUMBER UT-ECIPA-PETERS-97-02 Department of Eonomis and Institute for Poliy Analysis University oftoronto 15 St. George St. Toronto, Canada M5S 1A1 WORKIG PAPER UMBER UT-ECIPA-PETERS-97-2 Surplus Extration and Competition Mihael Peters

More information

Provably Near-Optimal Sampling-Based Policies for Stochastic Inventory Control Models

Provably Near-Optimal Sampling-Based Policies for Stochastic Inventory Control Models Provaly Near-Optimal Sampling-Based Policies for Stochastic Inventory Control Models Retsef Levi Sloan School of Management, MIT, Camridge, MA, 02139, USA email: retsef@mit.edu Roin O. Roundy School of

More information

Lecture 5: Tuesday, January 27, Peterson s Algorithm satisfies the No Starvation property (Theorem 1)

Lecture 5: Tuesday, January 27, Peterson s Algorithm satisfies the No Starvation property (Theorem 1) Com S 611 Spring Semester 2015 Advanced Topics on Distributed and Concurrent Algorithms Lecture 5: Tuesday, January 27, 2015 Instructor: Soma Chaudhuri Scribe: Nik Kinkel 1 Introduction This lecture covers

More information

Dynamic Pricing of Di erentiated Products

Dynamic Pricing of Di erentiated Products Dynami Priing of Di erentiated Produts Rossitsa Kotseva and Nikolaos Vettas August 6, 006 Abstrat We examine the dynami priing deision of a rm faing random demand while selling a xed stok of two di erentiated

More information

Smoothed Analysis of Binary Search Trees

Smoothed Analysis of Binary Search Trees Smoothed Analysis of Binary Search Trees Bodo Manthey and Rüdiger Reischuk Universität zu Lübeck, Institut für Theoretische Informatik Ratzeburger Allee 160, 23538 Lübeck, Germany manthey/reischuk@tcs.uni-luebeck.de

More information

Optimal Partitioning for Dual Pivot Quicksort

Optimal Partitioning for Dual Pivot Quicksort Optimal Partitioning for Dual Pivot Quicksort Martin Aumüller, Martin Dietzfelbinger Technische Universität Ilmenau, Germany ICALP 2013 Riga, July 12, 2013 M. Aumüller Optimal Partitioning for Dual Pivot

More information

Equivalence Nucleolus for Partition Function Games

Equivalence Nucleolus for Partition Function Games Equivalence Nucleolus for Partition Function Games Rajeev R Tripathi and R K Amit Department of Management Studies Indian Institute of Technology Madras, Chennai 600036 Abstract In coalitional game theory,

More information

CSE 21 Winter 2016 Homework 6 Due: Wednesday, May 11, 2016 at 11:59pm. Instructions

CSE 21 Winter 2016 Homework 6 Due: Wednesday, May 11, 2016 at 11:59pm. Instructions CSE 1 Winter 016 Homework 6 Due: Wednesday, May 11, 016 at 11:59pm Instructions Homework should be done in groups of one to three people. You are free to change group members at any time throughout the

More information

Short Form Return of Organization Exempt From Income Tax

Short Form Return of Organization Exempt From Income Tax Form 990-EZ Short Form Return of Organization Exempt From Inome Tax Under setion 501, 527, or 4947(1) of the Internal Revenue Code (exept private foundations) OMB 1545-1150 2015 Department of the Treasury

More information

SAT and DPLL. Introduction. Preliminaries. Normal forms DPLL. Complexity. Espen H. Lian. DPLL Implementation. Bibliography.

SAT and DPLL. Introduction. Preliminaries. Normal forms DPLL. Complexity. Espen H. Lian. DPLL Implementation. Bibliography. SAT and Espen H. Lian Ifi, UiO Implementation May 4, 2010 Espen H. Lian (Ifi, UiO) SAT and May 4, 2010 1 / 59 Espen H. Lian (Ifi, UiO) SAT and May 4, 2010 2 / 59 Introduction Introduction SAT is the problem

More information

The Government of the State of Israel and the Government of the Republi of Argentina, hereinafter referred to as the "Contrating Parties," DESIRING to

The Government of the State of Israel and the Government of the Republi of Argentina, hereinafter referred to as the Contrating Parties, DESIRING to AGREEMENT BETWEEN THE GOVERNMENT OF THE STATE OF ISRAEL AND.. THE GOVERNMENT OF THE REPUBLIC OF ARGENTINA FOR THE PROMOTION AND RECIPROCAL PROTECTION OF INVESTMENTS E if> The Government of the State of

More information

Problem Set 8 Topic BI: Externalities. a) What is the profit-maximizing level of output?

Problem Set 8 Topic BI: Externalities. a) What is the profit-maximizing level of output? Problem Set 8 Topi BI: Externalities 1. Suppose that a polluting firm s private osts are given by TC(x) = 4x + (1/100)x 2. Eah unit of output the firm produes results in external osts (pollution osts)

More information

Part I. Revenue. Operating and Administrative Expenses. For calendar year 2011 or tax year beginning, 2011, and ending, 20

Part I. Revenue. Operating and Administrative Expenses. For calendar year 2011 or tax year beginning, 2011, and ending, 20 Form 990-PF Department of the Treasury Internal Revenue Servie Return of Private Foundation or Setion 4947(a)(1) Nonexempt Charitale Trust Treated as a Private Foundation Note. The foundation may e ale

More information

State of New Mexico Participation Agreement for Deferred Compensation Plan

State of New Mexico Participation Agreement for Deferred Compensation Plan State of New Mexio Partiipation Agreement for Deferred Compensation Plan DC-4068 (06/2016) For help, please all 1-866-827-6639 www.newmexio457d.om 1 Things to Remember Please print Payroll Center/Plan

More information

arxiv: v1 [cs.gt] 4 Jun 2017

arxiv: v1 [cs.gt] 4 Jun 2017 Planning with Multiple Biases arxiv:1706.01062v1 [cs.gt] 4 Jun 2017 JON KLEINBERG, Cornell University SIGAL OREN, Ben-Gurion University of the Negev MANISH RAGHAVAN, Cornell University Recent work has

More information

Meld(Q 1,Q 2 ) merge two sets

Meld(Q 1,Q 2 ) merge two sets Priority Queues MakeQueue Insert(Q,k,p) Delete(Q,k) DeleteMin(Q) Meld(Q 1,Q 2 ) Empty(Q) Size(Q) FindMin(Q) create new empty queue insert key k with priority p delete key k (given a pointer) delete key

More information

Short Form 990-EZ Return of Organization Exempt From Income Tax

Short Form 990-EZ Return of Organization Exempt From Income Tax Form Short Form 990-EZ Return of Organization Exempt From Inome Tax 05 B Chek if appliale: G I J K Under setion 50(), 57, or 4947(a)() of the Internal Revenue Code (exept private foundations) Do not enter

More information

On the Optimality of a Family of Binary Trees

On the Optimality of a Family of Binary Trees On the Optimality of a Family of Binary Trees Dana Vrajitoru Computer and Information Sciences Department Indiana University South Bend South Bend, IN 46645 Email: danav@cs.iusb.edu William Knight Computer

More information