Communication Amid Uncertainty

Size: px
Start display at page:

Download "Communication Amid Uncertainty"

Transcription

1 Communication Amid Uncertainty Madhu Sudan Harvard University Based on joint works with Brendan Juba, Oded Goldreich, Adam Kalai, Sanjeev Khanna, Elad Haramaty, Jacob Leshno, Clement Canonne, Venkatesan Guruswami, Badih Ghazi, Pritish Kamath, Ilan Komargodski and Pravesh Kothari. May 10, 2016 MIT TOC: Communication Amid Uncertainty 1 of 28

2 Obligatory Sales Pitch Most of communication theory [a la Shannon, Hamming]: Built around sender and receiver perfectly synchronized. Most Human communication does not assume perfect synchronization. And increasingly device-device communication can also not rely on this. Can we build a mathematical theory of imperfectly synchronized communication? What are questions/answers? May 10, 2016 MIT TOC: Communication Amid Uncertainty 2 of 28

3 Context in Communication In most forms of communication: Sender + Receiver share (huuuge) context In human comm: Language, news, Social In computer comm: Protocols, Codes, Distributions Helps compress communication Perfectly shared Can be abstracted away. Imperfectly shared What is the cost? How to study? May 10, 2016 MIT TOC: Communication Amid Uncertainty 3 of 28

4 Communication Complexity The model xx (with shared randomness) ff: xx, yy Σ RR = $$$ yy Alice Usually studied for lower bounds. This talk: CC as +ve model. Bob CCCC ff = # bits exchanged by best protocol ff(xx, yy) w.p. 2/3 May 10, 2016 MIT TOC: Communication Amid Uncertainty 4 of 28

5 Aside: Easy CC Problems [Ghazi,Kamath,S 15] Problems with large inputs and small communication? Equality testing: Protocol: EEEE xx, yy = 1 xx = yy; CCCC EEEE Fix = OO ECC 1 EE: 0,1 nn 0,1 NN ; Shared randomness: ii NN ; xx = (xx HH kk xx, yy = 1 Δ xx, yy kk; CCCC HH kk Exchange pppppppp = OO(kk kk Protocol: 1,, xx nn ) logeekk) xx[huang ii yy, EE= yyyy ii ; etal.] 1,, yy nn Accept Use common iff EE xx randomness ii = EE yy ii. kk xx, yy = 1 wt xx, wt yy kk & to ii hash ss. tt. xx nn ii = yy [kk xx, ii = 2 1. ] yy xx ii yy ii Hamming distance: Small set intersection: CCCC kk = OO(kk) [Håstad Wigderson] Gap (Real) Inner Product: Main Insight: Unstated xx, yy Rphilosophical nn ; xx 2, yy 2 = 1; contribution If GGof CC NN a 0,1la nn Yao:, then Communication GGGGPP cc,ss xx, yy = 1 with if xx, a yy focus cc; = ( only 0 if xx, yy ss; EEneed GG, xx to GG, determine yy = xx, yy ff xx, yy ) can be more effective 1 (shorter than xx, HH xx, HH yy, II(xx; yy) ) CCCC GGGGPP cc,ss = OO 2 ; [Alon, Matias, Szegedy] cc ss ii May 10, 2016 MIT TOC: Communication Amid Uncertainty 5 of 28

6 Modelling Shared Context + Imperfection Many possibilities. Ongoing effort. Alice+Bob may have estimates of xx and yy. More generally: xx, yy correlated. Knowledge of ff function Bob wants to compute may not be exactly known to Alice! Shared randomness Alice + Bob may not have identical copies May 10, 2016 MIT TOC: Communication Amid Uncertainty 6 of 28

7 Part 1: Uncertain Compression May 10, 2016 MIT TOC: Communication Amid Uncertainty 7 of 28

8 Classical (One-Shot) Compression Sender and Receiver have distribution PP [NN] Sender/Receiver agree on Encoder/Decoder EE/DD Sender gets XX [NN] ; Sends EE XX Receiver gets YY = EE(XX) ; Decodes XX = DD YY Requirement: XX = XX (always) Performance: EE XX PP EE XX Trivial Solution: EE XX PP EE XX = log NN Huffman Coding: Achieves EE XX PP EE XX HH PP + 1 May 10, 2016 MIT TOC: Communication Amid Uncertainty 8 of 28

9 The (Uncertain Compression) problem Design encoding/decoding schemes (EE/DD) s.t.: Sender has distribution PP NN Receiver has distribution QQ [NN] Sender gets XX [NN] ; Sends EE(PP, XX) to receiver. Receiver gets YY = EE(PP, XX); Decodes XX = DD(QQ, YY) Want: XX = XX (provided PP, QQ close), While minimizing EEPP XX PP xx [ EE PP, XX ] Δ PP, QQ Δ if log Δ for all xx QQ xx [Juba,Kalai,Khanna,S. 11] Motivation: Models natural communication? May 10, 2016 MIT TOC: Communication Amid Uncertainty 9 of 28

10 Solution (variant of Arith. Coding) Uses shared randomness: Sender+Receiver rr 0,1 Use rr to define sequences dictionary rr 1 1, rr 1 2, rr 1 3, rr 2 1, rr 2 2, rr 2 3, rr NN 1, rr NN 2, rr NN 3, Analysis: EE rr LL = 2Δ + log 1 PP(xx) EE xx,rr LL = 2Δ + HH(PP) Sender sends prefix of rr xx [1 LL] as encoding of xx Receiver outputs argmax zz QQ zz rr zz 1 LL = rr xx [1 LL] Want: LL rr zz 1 LL = rr xx 1 LL QQ zz < QQ xx ; (QQ zz > QQ xx rr zz 1 LL rr xx [1 LL]) (PP zz > 4 Δ PP xx rr zz 1 LL rr xx [1 LL]) May 10, 2016 MIT TOC: Communication Amid Uncertainty 10 of 28

11 Implications Coding scheme reflects the nature of human communication (extend messages till they feel unambiguous). Reflects tension between ambiguity resolution and compression. Larger the ((estimated) gap in context), larger the encoding length. Entropy is still a valid measure! The shared randomness assumption A convenient starting point for discussion But is dictionary independent of context? This is problematic. May 10, 2016 MIT TOC: Communication Amid Uncertainty 11 of 28

12 Deterministic Compression: Challenge Say Alice and Bob have rankings of N movies. Rankings = bijections ππ, σσ NN NN ππ ii = rank of i th movie in Alice s ranking. Further suppose they know rankings are close. ii NN : ππ ii σσ ii 2. Bob wants to know: Is ππ 1 1 = σσ 1 1 How many bits does Alice need to send (noninteractively). With shared randomness OO(1) Deterministically? With Elad Haramaty: OO(log nn) OO 1? OO(log NN)? OO(log log log NN)? May 10, 2016 MIT TOC: Communication Amid Uncertainty 12 of 28

13 Open Questions (Compression) Best Deterministic Uncertain Compression? Best known: O HH PP + log log NN Dependence on NN? Leading constant? Does Private Randomness help? Can we do OO HH PP + log log log NN? Movie ranking problem: Dependence on NN necessary? Compression length w. Det/Priv. Randomness grows with NN May 10, 2016 MIT TOC: Communication Amid Uncertainty 13 of 28

14 Part 2: Imperfectly Shared Randomness May 10, 2016 MIT TOC: Communication Amid Uncertainty 14 of 28

15 Model: Imperfectly Shared Randomness Alice rr ; and Bob ss where rr, ss = i.i.d. sequence of correlated pairs rr ii, ss ii ii ; rr ii, ss ii { 1, +1}; EE rr ii = EE ss ii = 0; EE rr ii ss ii = ρρ 0. Notation: iiiirr ρρ (ff) = cc of ff with ρρ-correlated bits. cccc(ff): Perfectly Shared Randomness cc. pppppppp ff : cc with PRIVate randomness Starting point: for Boolean functions ff cccc ff iiiirr ρρ ff pppppppp ff cccc ff + log nn What if cccc ff log nn? E.g. cccc ff = OO(1) = iiiirr 1 ff = iiiirr 0 ff ρρ ττ iiiirr ρρ ff iiiirr ττ ff May 10, 2016 MIT TOC: Communication Amid Uncertainty 15 of 28

16 Imperfectly Shared Randomness: Results Model first studied by [Bavarian,Gavinsky,Ito 14] ( Independently and earlier ). Their focus: Simultaneous Communication; general models of correlation. They show iiiiii Equality = OO 1 (among other things) Our Results:[Canonne,Guruswami,Meka,S 15] Generally: cccc ff kk iiiiii ff 2 kk Converse: ff with cccc ff kk & iiiiii ff 2 kk May 10, 2016 MIT TOC: Communication Amid Uncertainty 16 of 28

17 Equality Testing (our proof) Key idea: Think inner products. Encode xx XX = EE(xx);yy YY = EE yy ;XX, YY 1, +1 NN xx = yy XX, YY = NN xx yy XX, YY NN/2 Estimating inner products: Building on sketching protocols Alice: Picks Gaussians GG 1, GG tt R NN, Sends ii tt maximizing GG ii, XX to Bob. Bob: Accepts iff GG ii, YY 0 Analysis: OO ρρ (1) bits suffice if GG ρρ GG Gaussian Protocol May 10, 2016 MIT TOC: Communication Amid Uncertainty 17 of 28

18 General One-Way Communication Idea: All communication Inner Products (For now: Assume one-way-cc ff kk) For each random string RR Alice s message = ii RR 2 kk Bob s output = ff RR (ii RR ) where ff RR : 2 kk 0,1 W.p. 2 3 over RR, ff RR ii RR is the right answer. May 10, 2016 MIT TOC: Communication Amid Uncertainty 18 of 28

19 General One-Way Communication For each random string RR Alice s message = ii RR 2 kk Bob s output = ff RR (ii RR ) where ff RR : 2 kk 0,1 W.p. 2 3, ff RR ii RR is the right answer. Vector representation: ii RR xx RR 0,1 2kk (unit coordinate vector) ff RR yy RR 0,1 2kk (truth table of ff RR ). ff RR ii RR = xx RR, yy RR ; Acc. Prob. XX, YY ; XX = xx RR RR ; YY = yy RR RR Gaussian protocol estimates inner products of unit vectors to within ±εε with OO ρρ 1 εε 2 communication. May 10, 2016 MIT TOC: Communication Amid Uncertainty 19 of 28

20 Two-way communication Still decided by inner products. Simple lemma: KK AA kk, KK BB kk R 2kk convex, that describe private coin k-bit comm. strategies for Alice, Bob s.t. accept prob. of ππ AA KK AA kk, ππ BB KK BB kk equals ππ AA, ππ BB Putting things together: Theorem: cccc ff kk iiiiii ff OO ρρ (2 kk ) May 10, 2016 MIT TOC: Communication Amid Uncertainty 20 of 28

21 The Tightness Example Sparse Gap Inner Product: Alice xx 0,1 nn ; wt xx 2 kk nn (Sparse) Bob yy 1,1 nn ; Decide: xx, yy.9 2 kk nn or xx, yy 0 Shared randomness protocol: Alice communicates random bit ii s. t. xx ii = 1 Bob outputs yy ii Lower bound: Invariance principle, Gap Hamming Distance May 10, 2016 MIT TOC: Communication Amid Uncertainty 21 of 28

22 Open Questions (I.S.R.) Exponential gap for total function? ff: 0,1 nn 0,1 nn 0,1, with cccc ff kk, & iiiiii cccc ff 2 kk Level of correlation? ff: 0,1 nn 0,1 nn 0,1,?, with iiiirr.9 ff kk, & iiiirr.1 ff 2 kk Does interaction help if randomness is not perfectly shared? May 10, 2016 MIT TOC: Communication Amid Uncertainty 22 of 28

23 Part 3: Uncertain Functionality May 10, 2016 MIT TOC: Communication Amid Uncertainty 23 of 28

24 Model Bob wishes to compute ff(xx, yy); Alice knows gg ff; Alice, Bob given gg, ff explicitly. (Input size ~ 2 nn ) Modelling Questions: What is? Is it reasonable to expect to compute ff xx, yy? Answers: E.g., ff xx, yy = ff xx? Can t compute ff xx, yy without communicating xx Assume xx, yy 0,1 nn 0,1 nn uniformly. ff δδ gg if δδ ff, gg δδ. Suffices to compute h xx, yy for h εε ff May 10, 2016 MIT TOC: Communication Amid Uncertainty 24 of 28

25 Results - 1 Thm [Ghazi,Komargodski,Kothari,S.]: ff, gg, μμ s.t. cc 1wwwwww μμ,.1 ff, cc 1wwwwww μμ,.1 gg = 1 and δδ μμ ff, gg = oo(1); but uncertain communication = Ω( nn); Thm [GKKS]: But not if xx yy (in 1-way setting). (2-way, even 2-round, open!) Main Idea: Canonical 1-way protocol for ff: Alice + Bob share random yy 1, yy mm 0,1 nn. Alice sends ff xx, yy 1,, ff xx, yy mm to Bob. Protocol used previously but not as canonical. Canonical protocol robust when ff gg. May 10, 2016 MIT TOC: Communication Amid Uncertainty 25 of 28

26 Open Questions (Uncertain Functionality) What happens when xx, yy correlated? [Ghazi-S.] functions where cc grows with II(xx; yy) Exact dependence? Is II xx; yy right measure? What happens to communication with multiple rounds? Two rounds? What is the right task that captures uncertainty in natural communication? May 10, 2016 MIT TOC: Communication Amid Uncertainty 26 of 28

27 Conclusions Positive view of communication complexity: Communication with a focus can be effective! Context Important: New layer of uncertainty. New notion of scale (context LARGE) Importance of oo(log nn) additive factors. Many uncertain problems can be solved without resolving the uncertainty (which is a good thing) Many open directions+questions May 10, 2016 MIT TOC: Communication Amid Uncertainty 27 of 28

28 Thank You! May 10, 2016 MIT TOC: Communication Amid Uncertainty 28 of 28

Communication Amid Uncertainty

Communication Amid Uncertainty Communication Amid Uncertainty Madhu Sudan Harvard University Based on joint works with Brendan Juba, Oded Goldreich, Adam Kalai, Sanjeev Khanna, Elad Haramaty, Jacob Leshno, Clement Canonne, Venkatesan

More information

Imperfectly Shared Randomness in Communication

Imperfectly Shared Randomness in Communication Imperfectly Shared Randomness in Communication Madhu Sudan Harvard Joint work with Clément Canonne (Columbia), Venkatesan Guruswami (CMU) and Raghu Meka (UCLA). 11/16/2016 UofT: ISR in Communication 1

More information

Bayesian Methods: Naïve Bayes

Bayesian Methods: Naïve Bayes Bayesian Methods: Naïve Bayes Nicholas Ruozzi University of Texas at Dallas based on the slides of Vibhav Gogate Last Time Parameter learning Learning the parameter of a simple coin flipping model Prior

More information

SNARKs with Preprocessing. Eran Tromer

SNARKs with Preprocessing. Eran Tromer SNARKs with Preprocessing Eran Tromer BIU Winter School on Verifiable Computation and Special Encryption 4-7 Jan 206 G: Someone generates and publishes a common reference string P: Prover picks NP statement

More information

Mixture Models & EM. Nicholas Ruozzi University of Texas at Dallas. based on the slides of Vibhav Gogate

Mixture Models & EM. Nicholas Ruozzi University of Texas at Dallas. based on the slides of Vibhav Gogate Mixture Models & EM Nicholas Ruozzi University of Texas at Dallas based on the slides of Vibhav Gogate Previously We looked at -means and hierarchical clustering as mechanisms for unsupervised learning

More information

Logistic Regression. Hongning Wang

Logistic Regression. Hongning Wang Logistic Regression Hongning Wang CS@UVa Today s lecture Logistic regression model A discriminative classification model Two different perspectives to derive the model Parameter estimation CS@UVa CS 6501:

More information

Decision Trees. Nicholas Ruozzi University of Texas at Dallas. Based on the slides of Vibhav Gogate and David Sontag

Decision Trees. Nicholas Ruozzi University of Texas at Dallas. Based on the slides of Vibhav Gogate and David Sontag Decision Trees Nicholas Ruozzi University of Texas at Dallas Based on the slides of Vibhav Gogate and David Sontag Announcements Course TA: Hao Xiong Office hours: Friday 2pm-4pm in ECSS2.104A1 First homework

More information

ECO 745: Theory of International Economics. Jack Rossbach Fall Lecture 6

ECO 745: Theory of International Economics. Jack Rossbach Fall Lecture 6 ECO 745: Theory of International Economics Jack Rossbach Fall 2015 - Lecture 6 Review We ve covered several models of trade, but the empirics have been mixed Difficulties identifying goods with a technological

More information

Operational Risk Management: Preventive vs. Corrective Control

Operational Risk Management: Preventive vs. Corrective Control Operational Risk Management: Preventive vs. Corrective Control Yuqian Xu (UIUC) July 2018 Joint Work with Lingjiong Zhu and Michael Pinedo 1 Research Questions How to manage operational risk? How does

More information

Tie Breaking Procedure

Tie Breaking Procedure Ohio Youth Basketball Tie Breaking Procedure The higher seeded team when two teams have the same record after completion of pool play will be determined by the winner of their head to head competition.

More information

Attacking and defending neural networks. HU Xiaolin ( 胡晓林 ) Department of Computer Science and Technology Tsinghua University, Beijing, China

Attacking and defending neural networks. HU Xiaolin ( 胡晓林 ) Department of Computer Science and Technology Tsinghua University, Beijing, China Attacking and defending neural networks HU Xiaolin ( 胡晓林 ) Department of Computer Science and Technology Tsinghua University, Beijing, China Outline Background Attacking methods Defending methods 2 AI

More information

Conservation of Energy. Chapter 7 of Essential University Physics, Richard Wolfson, 3 rd Edition

Conservation of Energy. Chapter 7 of Essential University Physics, Richard Wolfson, 3 rd Edition Conservation of Energy Chapter 7 of Essential University Physics, Richard Wolfson, 3 rd Edition 1 Different Types of Force, regarding the Work they do. gravity friction 2 Conservative Forces BB WW cccccccc

More information

Combining Experimental and Non-Experimental Design in Causal Inference

Combining Experimental and Non-Experimental Design in Causal Inference Combining Experimental and Non-Experimental Design in Causal Inference Kari Lock Morgan Department of Statistics Penn State University Rao Prize Conference May 12 th, 2017 A Tribute to Don Design trumps

More information

Pre-Kindergarten 2017 Summer Packet. Robert F Woodall Elementary

Pre-Kindergarten 2017 Summer Packet. Robert F Woodall Elementary Pre-Kindergarten 2017 Summer Packet Robert F Woodall Elementary In the fall, on your child s testing day, please bring this packet back for a special reward that will be awarded to your child for completion

More information

Lecture 5. Optimisation. Regularisation

Lecture 5. Optimisation. Regularisation Lecture 5. Optimisation. Regularisation COMP90051 Statistical Machine Learning Semester 2, 2017 Lecturer: Andrey Kan Copyright: University of Melbourne Iterative optimisation Loss functions Coordinate

More information

Coaches, Parents, Players and Fans

Coaches, Parents, Players and Fans P.O. Box 865 * Lancaster, OH 43130 * 740-808-0380 * www.ohioyouthbasketball.com Coaches, Parents, Players and Fans Sunday s Championship Tournament in Boys Grades 5th thru 10/11th will be conducted in

More information

Special Topics: Data Science

Special Topics: Data Science Special Topics: Data Science L Linear Methods for Prediction Dr. Vidhyasaharan Sethu School of Electrical Engineering & Telecommunications University of New South Wales Sydney, Australia V. Sethu 1 Topics

More information

ISyE 6414 Regression Analysis

ISyE 6414 Regression Analysis ISyE 6414 Regression Analysis Lecture 2: More Simple linear Regression: R-squared (coefficient of variation/determination) Correlation analysis: Pearson s correlation Spearman s rank correlation Variable

More information

knn & Naïve Bayes Hongning Wang

knn & Naïve Bayes Hongning Wang knn & Naïve Bayes Hongning Wang CS@UVa Today s lecture Instance-based classifiers k nearest neighbors Non-parametric learning algorithm Model-based classifiers Naïve Bayes classifier A generative model

More information

Analysis of Gini s Mean Difference for Randomized Block Design

Analysis of Gini s Mean Difference for Randomized Block Design American Journal of Mathematics and Statistics 2015, 5(3): 111-122 DOI: 10.5923/j.ajms.20150503.02 Analysis of Gini s Mean Difference for Randomized Block Design Elsayed A. H. Elamir Department of Statistics

More information

Course 495: Advanced Statistical Machine Learning/Pattern Recognition

Course 495: Advanced Statistical Machine Learning/Pattern Recognition Course 495: Advanced Statistical Machine Learning/Pattern Recognition Lectures: Stefanos Zafeiriou Goal (Lectures): To present modern statistical machine learning/pattern recognition algorithms. The course

More information

Physical Design of CMOS Integrated Circuits

Physical Design of CMOS Integrated Circuits Physical Design of CMOS Integrated Circuits Dae Hyun Kim EECS Washington State University References John P. Uyemura, Introduction to VLSI Circuits and Systems, 2002. Chapter 5 Goal Understand how to physically

More information

CS145: INTRODUCTION TO DATA MINING

CS145: INTRODUCTION TO DATA MINING CS145: INTRODUCTION TO DATA MINING 3: Vector Data: Logistic Regression Instructor: Yizhou Sun yzsun@cs.ucla.edu October 9, 2017 Methods to Learn Vector Data Set Data Sequence Data Text Data Classification

More information

CS249: ADVANCED DATA MINING

CS249: ADVANCED DATA MINING CS249: ADVANCED DATA MINING Linear Regression, Logistic Regression, and GLMs Instructor: Yizhou Sun yzsun@cs.ucla.edu April 24, 2017 About WWW2017 Conference 2 Turing Award Winner Sir Tim Berners-Lee 3

More information

Operations on Radical Expressions; Rationalization of Denominators

Operations on Radical Expressions; Rationalization of Denominators 0 RD. 1 2 2 2 2 2 2 2 Operations on Radical Expressions; Rationalization of Denominators Unlike operations on fractions or decimals, sums and differences of many radicals cannot be simplified. For instance,

More information

Functions of Random Variables & Expectation, Mean and Variance

Functions of Random Variables & Expectation, Mean and Variance Functions of Random Variables & Expectation, Mean and Variance Kuan-Yu Chen ( 陳冠宇 ) @ TR-409, NTUST Functions of Random Variables 1 Given a random variables XX, one may generate other random variables

More information

R * : EQUILIBRIUM INTEREST RATE. Yuriy Gorodnichenko UC Berkeley

R * : EQUILIBRIUM INTEREST RATE. Yuriy Gorodnichenko UC Berkeley R * : EQUILIBRIUM INTEREST RATE Yuriy Gorodnichenko UC Berkeley What is common across the following: Working of a black box device WHAT DO WE KNOW ABOUT R *? Location of black holes in the universe Equilibrium

More information

Jasmin Smajic 1, Christian Hafner 2, Jürg Leuthold 2, March 16, 2015 Introduction to Finite Element Method (FEM) Part 1 (2-D FEM)

Jasmin Smajic 1, Christian Hafner 2, Jürg Leuthold 2, March 16, 2015 Introduction to Finite Element Method (FEM) Part 1 (2-D FEM) Jasmin Smajic 1, Christian Hafner 2, Jürg Leuthold 2, March 16, 2015 Introduction to Finite Element Method (FEM) Part 1 (2-D FEM) 1 HSR - University of Applied Sciences of Eastern Switzerland Institute

More information

115th Vienna International Rowing Regatta & International Masters Meeting. June 15 to June 17, 2018

115th Vienna International Rowing Regatta & International Masters Meeting. June 15 to June 17, 2018 115th Vienna International Rowing Regatta & International Masters Meeting Conducted by the Vienna Rowing Association An event forming part of the Austrian Club Championships 2018 (ÖVM 2018) June 15 to

More information

Full Name: Period: Heredity EOC Review

Full Name: Period: Heredity EOC Review Full Name: Period: 1 4 5 6 7 Heredity EOC Review Directions: For each genotype below, indicate whether it is a heterozygous (write: He) OR homozygous (write: Ho). 1. Tt BB DD ff tt dd dd Ff TT Bb bb FF

More information

Introduction to Genetics

Introduction to Genetics Name: Introduction to Genetics Keystone Assessment Anchor: BIO.B.2.1.1: Describe and/or predict observed patterns of inheritance (i.e. dominant, recessive, co-dominance, incomplete dominance, sex-linked,

More information

NEUE DONAU / VIENNA. June 24 to 26,

NEUE DONAU / VIENNA. June 24 to 26, 114th VIENNA INTERNATIONAL ROWING REGATTA & MASTERS TRIAL NEUE DONAU / VIENNA June 24 to 26, 2017 www.ruderverband.wien Wiener Ruderverband 2 114th Vienna International Rowing Regatta Conducted by the

More information

The Mathematics of Gambling

The Mathematics of Gambling The Mathematics of Gambling with Related Applications Madhu Advani Stanford University April 12, 2014 Madhu Advani (Stanford University) Mathematics of Gambling April 12, 2014 1 / 23 Gambling Gambling:

More information

Product Decomposition in Supply Chain Planning

Product Decomposition in Supply Chain Planning Mario R. Eden, Marianthi Ierapetritou and Gavin P. Towler (Editors) Proceedings of the 13 th International Symposium on Process Systems Engineering PSE 2018 July 1-5, 2018, San Diego, California, USA 2018

More information

What is Restrained and Unrestrained Pipes and what is the Strength Criteria

What is Restrained and Unrestrained Pipes and what is the Strength Criteria What is Restrained and Unrestrained Pipes and what is the Strength Criteria Alex Matveev, September 11, 2018 About author: Alex Matveev is one of the authors of pipe stress analysis codes GOST 32388-2013

More information

NATIONAL FEDERATION RULES B. National Federation Rules Apply with the following TOP GUN EXCEPTIONS

NATIONAL FEDERATION RULES B. National Federation Rules Apply with the following TOP GUN EXCEPTIONS TOP GUN COACH PITCH RULES 8 & Girls Division Revised January 11, 2018 AGE CUT OFF A. Age 8 & under. Cut off date is January 1st. Player may not turn 9 before January 1 st. Please have Birth Certificates

More information

My ABC Insect Discovery Book

My ABC Insect Discovery Book Act i vi t ypack I ns ectabcs I nt hi spac k: ABCASLSi gnfl as hcar ds I ns ec tabcac t i v i t y SongL y r i c s AndMor e! Ac i t i v i ess uppor ts i gnsandc onc ept st aughti n Rac hel&t het r eesc

More information

Lecture 10. Support Vector Machines (cont.)

Lecture 10. Support Vector Machines (cont.) Lecture 10. Support Vector Machines (cont.) COMP90051 Statistical Machine Learning Semester 2, 2017 Lecturer: Andrey Kan Copyright: University of Melbourne This lecture Soft margin SVM Intuition and problem

More information

Chapter 10 Aggregate Demand I: Building the IS LM Model

Chapter 10 Aggregate Demand I: Building the IS LM Model Chapter 10 Aggregate Demand I: Building the IS LM Model Zhengyu Cai Ph.D. Institute of Development Southwestern University of Finance and Economics All rights reserved http://www.escience.cn/people/zhengyucai/index.html

More information

Jamming phenomena of self-driven particles

Jamming phenomena of self-driven particles Jamming phenomena of self-driven particles Pedestrian Outflow and Obstacle Walking with Slow Rhythm Daichi Yanagisawa, RCAST, UTokyo Pedestrian Outflow and Obstacle Phys. Rev. E, 76(6), 061117, 2007 Phys.

More information

TSP at isolated intersections: Some advances under simulation environment

TSP at isolated intersections: Some advances under simulation environment TSP at isolated intersections: Some advances under simulation environment Zhengyao Yu Vikash V. Gayah Eleni Christofa TESC 2018 December 5, 2018 Overview Motivation Problem introduction Assumptions Formation

More information

Simplifying Radical Expressions and the Distance Formula

Simplifying Radical Expressions and the Distance Formula 1 RD. Simplifying Radical Expressions and the Distance Formula In the previous section, we simplified some radical expressions by replacing radical signs with rational exponents, applying the rules of

More information

Support Vector Machines: Optimization of Decision Making. Christopher Katinas March 10, 2016

Support Vector Machines: Optimization of Decision Making. Christopher Katinas March 10, 2016 Support Vector Machines: Optimization of Decision Making Christopher Katinas March 10, 2016 Overview Background of Support Vector Machines Segregation Functions/Problem Statement Methodology Training/Testing

More information

Abstract In this paper, the author deals with the properties of circumscribed ellipses of convex quadrilaterals, using tools of parallel projective tr

Abstract In this paper, the author deals with the properties of circumscribed ellipses of convex quadrilaterals, using tools of parallel projective tr Study on the Properties of Circumscribed Ellipses of Convex Quadrilaterals Author: Yixi Shen Mentors: Zhongyuan Dai; Yijun Yao No. High School of East China Normal University Shanghai, China December,

More information

Use of Auxiliary Variables and Asymptotically Optimum Estimators in Double Sampling

Use of Auxiliary Variables and Asymptotically Optimum Estimators in Double Sampling International Journal of Statistics and Probability; Vol. 5, No. 3; May 2016 ISSN 1927-7032 E-ISSN 1927-7040 Published by Canadian Center of Science and Education Use of Auxiliary Variables and Asymptotically

More information

Grade K-1 WRITING Traffic Safety Cross-Curriculum Activity Workbook

Grade K-1 WRITING Traffic Safety Cross-Curriculum Activity Workbook Grade K-1 WRITING Tra fic Safety Cross-Curriculum Activity Workbook Note to Teachers The AAA Traffic Safety Education Materials present essential safety concepts to students in Kindergarten through fifth

More information

The Simple Linear Regression Model ECONOMETRICS (ECON 360) BEN VAN KAMMEN, PHD

The Simple Linear Regression Model ECONOMETRICS (ECON 360) BEN VAN KAMMEN, PHD The Simple Linear Regression Model ECONOMETRICS (ECON 360) BEN VAN KAMMEN, PHD Outline Definition. Deriving the Estimates. Properties of the Estimates. Units of Measurement and Functional Form. Expected

More information

INTRODUCTION Microfilm copy of the Draper Collection of manuscripts. Originals located at the State Historical Society of Wisconsin.

INTRODUCTION Microfilm copy of the Draper Collection of manuscripts. Originals located at the State Historical Society of Wisconsin. C Draper, Lyman Copeland, Collection, 1735-1815 2964 136 rolls of microfilm RESTRICTED MICROFILM This collection is available at The State Historical Society of Missouri. If you would like more information,

More information

Minimum Mean-Square Error (MMSE) and Linear MMSE (LMMSE) Estimation

Minimum Mean-Square Error (MMSE) and Linear MMSE (LMMSE) Estimation Minimum Mean-Square Error (MMSE) and Linear MMSE (LMMSE) Estimation Outline: MMSE estimation, Linear MMSE (LMMSE) estimation, Geometric formulation of LMMSE estimation and orthogonality principle. Reading:

More information

CT4510: Computer Graphics. Transformation BOCHANG MOON

CT4510: Computer Graphics. Transformation BOCHANG MOON CT4510: Computer Graphics Transformation BOCHANG MOON 2D Translation Transformations such as rotation and scale can be represented using a matrix M ee. gg., MM = SSSS xx = mm 11 xx + mm 12 yy yy = mm 21

More information

graphic standards manual Mountain States Health Alliance

graphic standards manual Mountain States Health Alliance manual Mountain States mountain states health alliance Bringing Loving Care to Health Care Table of Contents 4 5 6 7 9 -- Why do we need? Brandmark Specifications Brandmark Color Palette Corporate Typography

More information

NCSS Statistical Software

NCSS Statistical Software Chapter 256 Introduction This procedure computes summary statistics and common non-parametric, single-sample runs tests for a series of n numeric, binary, or categorical data values. For numeric data,

More information

INSTALLING THE PROWLER 13 RUDDER

INSTALLING THE PROWLER 13 RUDDER INSTALLING THE PROWLER 13 RUDDER Parts Included: Steering Parts: Foot Rail Parts: Rudder Parts: Retraction Parts: 4 Rubber 2 Rail Assemblies Rudder Body 1 Rudder Retraction Grommets (includes steering

More information

Name: Grade: LESSON ONE: Home Row

Name: Grade: LESSON ONE: Home Row LESSON ONE: Home Row asdfjkl; asdfjkl; asdfjkl; aa ss dd ff jj kk ll ;; aa ss dd ff jj kk ll ;; aa ss dd ff jj kk ll ;; aa ss dd ff jj kk ll ;; aa ss dd ff jj kk ll ;; aa ss dd ff jj kk ll ;; aa ss dd

More information

Genetics and Inheritance

Genetics and Inheritance + Genetics and Inheritance + Intro to Genetics Every living thing plant or animal, microbe or human being has a set of characteristics inherited from its parent or parents. Your DNA holds the genetic code

More information

Machine Learning Application in Aviation Safety

Machine Learning Application in Aviation Safety Machine Learning Application in Aviation Safety Surface Safety Metric MOR Classification Presented to: By: Date: ART Firdu Bati, PhD, FAA September, 2018 Agenda Surface Safety Metric (SSM) development

More information

Job Description World Under-24 Ultimate Championships Tournament Director

Job Description World Under-24 Ultimate Championships Tournament Director Job Description World Under-24 Ultimate Championships Tournament Director Summary The Tournament Director (TD) shall be responsible to the AFDA for all matters that concern the planning, organization,

More information

A Class of Regression Estimator with Cum-Dual Ratio Estimator as Intercept

A Class of Regression Estimator with Cum-Dual Ratio Estimator as Intercept International Journal of Probability and Statistics 015, 4(): 4-50 DOI: 10.593/j.ijps.015040.0 A Class of Regression Estimator with Cum-Dual Ratio Estimator as Intercept F. B. Adebola 1, N. A. Adegoke

More information

Addition and Subtraction of Rational Expressions

Addition and Subtraction of Rational Expressions RT.3 Addition and Subtraction of Rational Expressions Many real-world applications involve adding or subtracting algebraic fractions. Similarly as in the case of common fractions, to add or subtract algebraic

More information

8. International Matchplay-Trophy 2017 Golfclub Sinsheim

8. International Matchplay-Trophy 2017 Golfclub Sinsheim 8. International Matchplay-Trophy 2017 Golfclub Sinsheim Entrance fee: EUR 180,The entrance fee has to be paid by remittance with the ceremony of entry. Participants from abroad have to transfer the entrance

More information

Midterm Exam 1, section 2. Thursday, September hour, 15 minutes

Midterm Exam 1, section 2. Thursday, September hour, 15 minutes San Francisco State University Michael Bar ECON 312 Fall 2018 Midterm Exam 1, section 2 Thursday, September 27 1 hour, 15 minutes Name: Instructions 1. This is closed book, closed notes exam. 2. You can

More information

Inverting a Batting Average - an Application of Continued Fractions (Preliminary Version)

Inverting a Batting Average - an Application of Continued Fractions (Preliminary Version) Inverting a Batting Average - an Application of Continued Fractions (Preliminary Version) Allen Back August 30, 2000 Contents Introduction and Motivation 2 Continued Fractions 2 2. Comparison of Two Numbers

More information

Tie Breaking Procedure

Tie Breaking Procedure Ohio Youth Basketball Tie Breaking Procedure The higher seeded team when two teams have the same record after completion of pool play will be determined by the winner of their head to head competition.

More information

COMP Intro to Logic for Computer Scientists. Lecture 13

COMP Intro to Logic for Computer Scientists. Lecture 13 COMP 1002 Intro to Logic for Computer Scientists Lecture 13 B 5 2 J Admin stuff Assignments schedule? Split a2 and a3 in two (A2,3,4,5), 5% each. A2 due Feb 17 th. Midterm date? March 2 nd. No office hour

More information

Florida from A-Z. Private use only Kelli

Florida from A-Z.  Private use only Kelli Florida from A-Z www.adventurezinchildrearing.com Kelli Becton @AdventurZNchild Private use only copyright @AdventurezinChilcRearing Table of Contents Aa is for Alligator.........................................................

More information

Holly Burns. Publisher Mary D. Smith, M.S. Ed. Author

Holly Burns. Publisher Mary D. Smith, M.S. Ed. Author Editor Jenni Corcoran, M.Ed. Illustrator Renée Christine Yates Editorial Project Manager Mara Ellen Guckian Cover rtist Denise auer Managing Editor Ina Massler Levin, M.. Creative Director Karen J. Goldfluss,

More information

Satoshi Yoshida and Takuya Kida Graduate School of Information Science and Technology, Hokkaido University

Satoshi Yoshida and Takuya Kida Graduate School of Information Science and Technology, Hokkaido University Satoshi Yoshida and Takuya Kida Graduate School of Information Science and Technology, Hokkaido University ompressed Pattern Matching ompressed Data Search Directly 0000 000000 Program Searching on ompressed

More information

Report for Experiment #11 Testing Newton s Second Law On the Moon

Report for Experiment #11 Testing Newton s Second Law On the Moon Report for Experiment #11 Testing Newton s Second Law On the Moon Neil Armstrong Lab partner: Buzz Aldrin TA: Michael Collins July 20th, 1969 Abstract In this experiment, we tested Newton s second law

More information

Fun with Folding. led by Thomas Clark. October 7, Take a strip of paper, fold it in half, and make a good crease at the midpoint position.

Fun with Folding. led by Thomas Clark. October 7, Take a strip of paper, fold it in half, and make a good crease at the midpoint position. Preliminary Folding Investigation Fun with Folding led by Thomas Clark October 7, 2014 1. Take a strip of paper, fold it in half, and make a good crease at the midpoint position. 2. Open up the strip,

More information

4. Please Do Break the Crystal

4. Please Do Break the Crystal 4. Please Do Break the Crystal Tell the broken plate you are sorry. Mary Robertson. Programming constructs and algorithmic paradigms covered in this puzzle: Break statements, radix representations. You

More information

EE582 Physical Design Automation of VLSI Circuits and Systems

EE582 Physical Design Automation of VLSI Circuits and Systems EE Prof. Dae Hyun Kim School of Electrical Engineering and Computer Science Washington State University Routing Grid Routing Grid Routing Grid Routing Grid Routing Grid Routing Lee s algorithm (Maze routing)

More information

Residual Finite States Automata

Residual Finite States Automata Residual Finite States Automata François Denis LIF, CMI, Université de Provence, Marseille Aurélien Lemay, Alain Terlutte Ý GRAPPA-LIFL, Université de Lille I January 7, 2002 Abstract We define a new variety

More information

ISyE 6414: Regression Analysis

ISyE 6414: Regression Analysis ISyE 6414: Regression Analysis Lectures: MWF 8:00-10:30, MRDC #2404 Early five-week session; May 14- June 15 (8:00-9:10; 10-min break; 9:20-10:30) Instructor: Dr. Yajun Mei ( YA_JUNE MAY ) Email: ymei@isye.gatech.edu;

More information

Queue analysis for the toll station of the Öresund fixed link. Pontus Matstoms *

Queue analysis for the toll station of the Öresund fixed link. Pontus Matstoms * Queue analysis for the toll station of the Öresund fixed link Pontus Matstoms * Abstract A new simulation model for queue and capacity analysis of a toll station is presented. The model and its software

More information

New Class of Almost Unbiased Modified Ratio Cum Product Estimators with Knownparameters of Auxiliary Variables

New Class of Almost Unbiased Modified Ratio Cum Product Estimators with Knownparameters of Auxiliary Variables Journal of Mathematics and System Science 7 (017) 48-60 doi: 10.1765/159-591/017.09.00 D DAVID PUBLISHING New Class of Almost Unbiased Modified Ratio Cum Product Estimators with Knownparameters of Auxiliary

More information

San Francisco State University ECON 560 Summer Midterm Exam 2. Monday, July hour 15 minutes

San Francisco State University ECON 560 Summer Midterm Exam 2. Monday, July hour 15 minutes San Francisco State University Michael Bar ECON 560 Summer 2018 Midterm Exam 2 Monday, July 30 1 hour 15 minutes Name: Instructions 1. This is closed book, closed notes exam. 2. No calculators or electronic

More information

Scoil Rince Ní Bhrogáin

Scoil Rince Ní Bhrogáin Scoil Rince Ní Bhrogáin Presents the Omagh Championships On Saturday 10 th and Sunday 11 th February 2018 In St Joseph s Hall, Omagh Adjudicators: Ms.Yvonne Cannon Ms Michelle Lee Ms. Gabrielle Lynam Ms.

More information

INTRODUCTION TO PATTERN RECOGNITION

INTRODUCTION TO PATTERN RECOGNITION INTRODUCTION TO PATTERN RECOGNITION 3 Introduction Our ability to recognize a face, to understand spoken words, to read handwritten characters all these abilities belong to the complex processes of pattern

More information

Time and synchronization

Time and synchronization Time and synchronization ( There s never enough time ) Today s outline Global Time Time in distributed systems A baseball example Synchronizing real clocks Cristian s algorithm The Berkeley Algorithm Network

More information

Time and synchronization. ( There s never enough time )

Time and synchronization. ( There s never enough time ) Time and synchronization ( There s never enough time ) Today s outline Global Time Time in distributed systems A baseball example Synchronizing real clocks Cristian s algorithm The Berkeley Algorithm Network

More information

Polynomial DC decompositions

Polynomial DC decompositions Polynomial DC decompositions Georgina Hall Princeton, ORFE Joint work with Amir Ali Ahmadi Princeton, ORFE 7/31/16 DIMACS Distance geometry workshop 1 Difference of convex (dc) programming Problems of

More information

Configurable Test-Goal Set Partitioning for Directed Multi- Goal Test Generation

Configurable Test-Goal Set Partitioning for Directed Multi- Goal Test Generation Configurable Test-Goal Set Partitioning for Directed Multi- Goal Test Generation Malte Lochau (TU Darmstadt) Joint work with: Sven Apel, Johannes Bürdek, Dirk Beyer, Andreas Holzer, Andreas Stahlbauer

More information

Non-Interactive Secure Computation Based on Cut-and-Choose

Non-Interactive Secure Computation Based on Cut-and-Choose Non-Interactive Secure Computation Based on Cut-and-Choose Arash Afshar, Payman Mohassel, Benny Pinkas, and Ben Riva May 14, 2014 Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based

More information

New Numerical Schemes for the Solution of Slightly Stiff Second Order Ordinary Differential Equations

New Numerical Schemes for the Solution of Slightly Stiff Second Order Ordinary Differential Equations American Journal of Computational and Applied Mathematics 24, 4(6): 239-246 DOI:.5923/j.ajcam.2446.7 New Numerical Schemes for the Solution of Slightly Stiff Second Order Ordinary Differential Equations

More information

Distributed Systems [Fall 2013]

Distributed Systems [Fall 2013] Distributed Systems [Fall 2013] Lec 7: Time and Synchronization Slide acks: Dave Andersen, Randy Bryant (http://www.cs.cmu.edu/~dga/15-440/f11/lectures/09-time+synch.pdf) 1 Any Questions for HW 2? Deadline

More information

Yuan-Yun Lin 1 and Michael T. Myers 1 Search and Discovery Article #70299 (2017)** Abstract. References Cited

Yuan-Yun Lin 1 and Michael T. Myers 1 Search and Discovery Article #70299 (2017)** Abstract. References Cited PS Impact of Non-Linear Transport Properties on Low Permeability Measurements* Yuan-Yun Lin and Michael T. Myers Search and Discovery Article #799 (7)** Posted October 3, 7 *Adapted from poster presentation

More information

Collision Avoidance System using Common Maritime Information Environment.

Collision Avoidance System using Common Maritime Information Environment. TEAM 2015, Oct. 12-15, 2015, Vladivostok, Russia Collision Avoidance System using Common Maritime Information Environment. Petrov Vladimir Alekseevich, the ass.professor, Dr. Tech. e-mail: petrov@msun.ru

More information

Stealthy Attacks with Insider Information: A Game Theoretic Model with Asymmetric Feedback

Stealthy Attacks with Insider Information: A Game Theoretic Model with Asymmetric Feedback Stealthy Attacks with Insider Information: A Game Theoretic Model with Asymmetric Feedback Xiaotao Feng, Zizhan Zheng, Derya Cansever, Ananthram Swami and Prasant Mohapatra Department of Electrical and

More information

GOLOMB Compression Technique For FPGA Configuration

GOLOMB Compression Technique For FPGA Configuration GOLOMB Compression Technique For FPGA Configuration P.Hema Assistant Professor,EEE Jay Shriram Group Of Institutions ABSTRACT Bit stream compression is important in reconfigurable system design since it

More information

World Eight Ball Pool Federation Rules Unabridged Version Issued January 2009 An abridged version of the latest rules may be downloaded here (pdf)

World Eight Ball Pool Federation Rules Unabridged Version Issued January 2009 An abridged version of the latest rules may be downloaded here (pdf) World Eight Ball Pool Federation Rules Unabridged Version Issued January 2009 An abridged version of the latest rules may be downloaded here (pdf) THE RACK The Playing Rules are the copyright of the World

More information

Recycling Bits in LZ77-Based Compression

Recycling Bits in LZ77-Based Compression SETIT 2005 3 rd International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March 27-31, 2005 TUNISIA Recycling Bits in LZ77-Based Compression Danny Dubé * and

More information

Knot Theory Week 2: Tricolorability

Knot Theory Week 2: Tricolorability Knot Theory Week 2: Tricolorability Xiaoyu Qiao, E. L. January 20, 2015 A central problem in knot theory is concerned with telling different knots apart. We introduce the notion of what it means for two

More information

DESIGN AND ANALYSIS OF ALGORITHMS (DAA 2017)

DESIGN AND ANALYSIS OF ALGORITHMS (DAA 2017) DESIGN AND ANALYSIS OF ALGORITHMS (DAA 2017) Veli Mäkinen 12/05/2017 1 COURSE STRUCTURE 7 weeks: video lecture -> demo lecture -> study group -> exercise Video lecture: Overview, main concepts, algorithm

More information

Exploring Braids through Dance: The Waves of Tory Problem

Exploring Braids through Dance: The Waves of Tory Problem Bridges 2012: Mathematics, Music, Art, Architecture, Culture Exploring Braids through Dance: The Waves of Tory Problem Andrea Hawksley RelateIQ 1326 Hoover St. #3 Menlo Park, CA 94025 USA hawksley@gmail.com

More information

Introduction to Pattern Recognition

Introduction to Pattern Recognition Introduction to Pattern Recognition Jason Corso SUNY at Buffalo 12 January 2009 J. Corso (SUNY at Buffalo) Introduction to Pattern Recognition 12 January 2009 1 / 28 Pattern Recognition By Example Example:

More information

THURSDAY, October 4, :00 AM... PARKING BEGINS 12:00 PM... TECH AND REGISTRATION OPEN

THURSDAY, October 4, :00 AM... PARKING BEGINS 12:00 PM... TECH AND REGISTRATION OPEN SCHEDULE OF EVENTS NOTE: The Summit Division Championship Weekend is a 4 day event, starting on Thursday, October 4th and scheduled to run through Sunday, October 7th. The schedule listed below is a tentative

More information

ORF 201 Computer Methods in Problem Solving. Final Project: Dynamic Programming Optimal Sailing Strategies

ORF 201 Computer Methods in Problem Solving. Final Project: Dynamic Programming Optimal Sailing Strategies Princeton University Department of Operations Research and Financial Engineering ORF 201 Computer Methods in Problem Solving Final Project: Dynamic Programming Optimal Sailing Strategies Due 11:59 pm,

More information

A microscopic view. Solid rigid body. Liquid. Fluid. Incompressible. Gas. Fluid. compressible

A microscopic view. Solid rigid body. Liquid. Fluid. Incompressible. Gas. Fluid. compressible Hello! I m Chris Blake, your lecturer for the rest of semester We ll cover: fluid motion, thermal physics, electricity, revision MASH centre in AMDC 503-09.30-16.30 daily My consultation hours: Tues 10.30-12.30

More information

Existence of Nash Equilibria

Existence of Nash Equilibria Existence of Nash Equilibria Before we can prove the existence, we need to remind you of the fixed point theorem: Kakutani s Fixed Point Theorem: Consider X R n a compact convex set and a function f: X

More information

DNS Study on Three Vortex Identification Methods

DNS Study on Three Vortex Identification Methods Γ DNS Study on Three Vortex Identification Methods Yinlin Dong Yong Yang Chaoqun Liu Technical Report 2016-07 http://www.uta.edu/math/preprint/ DNS Study on Three Vortex Identification Methods Yinlin Dong

More information