Graphs with at most two trees in a forest building process

Size: px
Start display at page:

Download "Graphs with at most two trees in a forest building process"

Transcription

1 Grphs with t most two trees in forest uilding process rxiv: v [mth.co] 4 Fe 208 Steve Butler Mis Hmnk Mrie Hrdt Astrct Given grph, we cn form spnning forest y first sorting the edges in some order, nd then only keep edges incident to vertex which is not incident to ny previous edge. The resulting forest is dependent on the ordering of the edges, nd so we cn sk, for exmple, how likely is it for the process to produce grph with k trees. We look t ll grphs which cn produce t most two trees in this process nd determine the proilities of hving either one or two trees. From this we construct infinite fmilies of grphs which re non-isomorphic ut produce the sme proilities. Introduction We consider the following forest uilding process:. Tke ll of the edges of the grph, remove them nd sort them in some order. 2. Go through the edges nd only put those edges ck in which connects to some vertex not previously seen y ny edge. From this, we must end up with forest (or grph without cycles since we cn never dd n edge tht closes cycle. As n exmple, in Figure we list ll 24 different wys to order the edges nd group them sed on the resulting forest formed. We will consider the prolem: How mny different edge orderings produce given numer, sy k, of trees in the resulting grph. Equivlently, wht is the proility tht if we tke rndom ordering of the edges, we produce forest with k trees. We will let P(G,k denote this proility. From Figure, we see tht P(G, 5 nd P(G,2 (note tht 6 6 the proilities need to sum to. This process ws implicitly used in pper of Butler et l. [2] for the complete grph, nd explicitly introduced in pper y Berikkyzy et l. [] where some sic properties were estlished nd the proilities for complete iprtite grphs were determined. We summrize these results here. Deprtment of Mthemtics, Iow Stte University, Ames, IA 500 USA {utler,hmnk,hrdtme}@istte.edu

2 e e 2 e 3 e 4 e e 2 e 3 e 4 e e 2 e 3 e 4 e e 2 e 3 e 4 (e,e 2,e 4,e 3 (e,e 2,e 3,e 4 (e,e 3,e 4,e 2 (e,e 4,e 2,e 3 (e 2,e,e 4,e 3 (e,e 3,e 2,e 4 (e 3,e,e 4,e 2 (e,e 4,e 3,e 2 (e 2,e 4,e,e 3 (e 2,e,e 3,e 4 (e 3,e 4,e,e 2 (e 4,e,e 2,e 3 (e 2,e 4,e 3,e (e 2,e 3,e,e 4 (e 3,e 4,e 2,e (e 4,e,e 3,e 2 (e 4,e 2,e,e 3 (e 2,e 3,e 4,e (e 4,e 3,e,e 2 (e 4,e 2,e 3,e (e 3,e,e 2,e 4 (e 4,e 3,e 2,e (e 3,e 2,e,e 4 (e 3,e 2,e 4,e Figure : The results from different edge orderings of the pw grph. Theorem (Butler et l. [2]. We hve P(K n,k ( n n 2k,k,k ( 2n 2 n 2 n 2k. Theorem 2 (Berikkyzy et l. []. We hve P(K s,t,k (s+t( s t k( k st ( s+t. s For smll grphs (t most 5 vertices, the proilities re given in Berikkyzy et l. []. There re few instnces where two grphs would hve the sme proilities for ll k listed, nd most of those were edge-trnsitive grphs. More generlly, the following ws oserved. Oservtion (Berikkyzy et l. []. If G is n edge-trnsitive grph with minimum degree of t lest 2 nd e is ny edge, then we hve P(G,k P(G e,k for ll k. In essence, this follows y noting tht the lst edge in n ordering is never kept, nd y symmetry every edge is the lst edge in n ordering eqully often. The gol of this note is to compute the proilities for more fmilies of grphs, nmely grphswhich cnproduce tmost two trees in theforest uilding process. Using this, we will produce infinitely mny exmples of non-isomorphic grphs G nd H where the proilities gree nd neither G or H re edge-trnsitive. 2 Grphs with t most two trees We re interested in exploring the grphs which cn produce t most two trees in the forest uilding process. Equivlently, this sttes tht there re t most two disjoint edges in the grph (disjoint in the sense tht they shre no vertex. Proposition. The only non-empty grphs without isolted vertices, which contin no pir of disjoint edges, re str grphs (K,n nd the tringle grph (K 3. Proof. If the grph is not connected, then tking one edge from two different components gives two disjoint edges. So we my ssume the grph is connected. 2

3 Ifthegrphhstwo disjoint edges, thenwecnconnect thesetogether ypth, creting pth of length t lest four. Conversely, if the grph hs pth of length t lest four, then it must contin two disjoint edges. So we cn conclude the longest pth is pth with t most three vertices. If the longest pth hs two vertices, then the grph is K 2. If the longest pth hs three vertices nd the ends of the pth re not lefs then it must e tht the ends connect nd form tringle. Since the pw grph hs two disjoint edges, this cn only hppen if the grph is K 3. Finlly, if we re not tringle nd don t hve pth of length four (nd hence no cycles, then it must e tht we re str. Proposition 2. If grph without isolted vertices hs vertex v of degree t lest five nd contins no set of three disjoint edges, then deleting v nd ll incident edges, nd removing ny isolted vertices results in either n empty grph, str, or K 3. Proof. Let v e vertex of degree t lest 5 in the grph. Suppose tht the resulting grph from deleting the vertex v nd ll incident edges, nd removing ny isolted vertices is not the empty grph, str, or K 3. Proposition sttes tht the only non-empty grphs without isolted vertices, tht contin no set of two disjoint edges, is the str grph nd K 3. Thus the resulting grph will contin t lest two disjoint edges. Cll these edges e nd e 2 ; note neither of these edges re incident to v. At most four edges incident to v re lso incident to the edges e nd e 2. Since v hs degree t lest 5, this leves t lest one edge, e 3, tht is connected to v nd not incident to e or e 2. Thus the originl grph contins set of three disjoint edges. Finlly, we oserve tht if ll the degrees re ounded nd the grph is connected, then s n gets lrge, the dimeter must lso grow which forces three disjoint edges. Puttingthislltogether, weseethtfornlrgeenough(infct, n 6theonlyconnected grphs which produce t most two trees, nd re not strs, re the following five fmilies. GS,,c The strs K,+ nd K,+c which hve leves glued together. (Glued strs. GS +,,c The strs K,+ nd K,+c which hve leves glued together nd the centers joined y n edge. (Glued strs with n edge. Pw The pw grph with leves ppended to the vertex of degree. Di The dimond grph ( four-cycle with n extr edge with leves ppended to one of the vertices of degree 2. (K 4 The complete grph on four vertices with leves ppended to one of the vertices. Note tht the first two of these correspond to Proposition 2 where the remining grph is str; nd the lst three of these correspond to Proposition 2 where the remining grph is K 3. These grphs re shown in Figure 2. 3

4 c c ( GS,,c ( GS +,,c (c Pw (d Di (e (K 4 Figure 2: The five fmilies of grphs. 3 Computing proilities for the fmilies We now turn our ttention to computing the proilities tht grph ends in one or two trees in the forest uilding process. We cn find these proilities y noting tht if there re m edges in the grph, then the proility tht we end with two trees is {rerrngements with two trees} P(G,2. m! We will focus on counting the rerrngements which produce two trees. Prticulrly, we wnt to count rerrngements where t some point n edge occurs, not t the strt, nd involves two vertices which hve not een previously seen. Sincewewillecountingrerrngements, wewillfinditusefultoknowhowtomnipulte inomil coefficients. Recll tht ( n k n! is the numer of wys to choose k elements k!(n k! (in our cse this will usully e loctions out of n n element set. There re mny inomil coefficient identities (see Grhm, Knuth, nd Ptshnik [3, Ch. 5] for good introduction; we will need to mke repeted use of the following well-known result. Proposition 3. We hve ( ( l j q +j m n j ( l+q + m+n+ ( where the sum rnges over ll vlues where the summnds re nonzero. Theorem 3. We hve the following proilities. P(GS,,c, P(GS +,,c, (+c+(+c + (++(+ 2+c+2 (+c+(+c (++( c+ Proof. Since P(GS,,c,+P(GS,,c,2, we cn focus on computing the proility of resulting in two trees. We now clim 4

5 P(GS,,c,2 + c ( ( j i (i+j!(+c i(+2+c i j! (+2+c! ( c ( j i (i+j!(+ i(+2+c i j! (+2+c! +c +2+c + +2+c. (2 This comes from the two cses, nmely where our first edge initilly comes from the top hlf (i.e., edges coming from the str K,+, nd where our first edge initilly comes from the ottom hlf (i.e., edges coming from the str K,+c. We focus on the top hlf cse, s the ottom hlf follows y n identicl rgument y interchnging the roles of nd c. Determining if we hve two trees comes down to wht hppens when we pick our first edge from the str K,+c. We look t ll wys tht this occurs y first picking edges from K,+ nd then considering wht hppens when we pick our edge from K,+c. In prticulr, we will pick j edges from the lef vertices nd i edges from the gluing vertices. We now run over ll possiilities for i nd j. For ech choice of edges we now consider ll possile ordering s follows: ( j corresponds to which of the j edges mong the were chosen. ( i corresponds to which of the i edges mong the were chosen. (i+j! indictes how mny wys to order these i+j edges (note tht these i+j edges re ll of the initil edges. ( + c i indictes how mny edges disjoint from the ones ove re ville to choose, if we wnt to crete two trees. (+2+c i j! is the numer of wys to rerrnge the remining edges. This gives ll orderings of edges possile, to get the proility we now divide y the totl numer of orderings which is (+2+c!. Note tht in the summtion we need to correct for i 0, j 0 which does not fll into the cse where the first edge is from the top. So we sutrct this term off t the end, which gives the +c term t the end. +2+c To now simplify these sums we cn repetedly pply (. So we hve the following. ( ( j i (i+j!(+c i(+2+c i j!!! j!( j! i!( i!!!(+c i (+2+c!( i! (+2+c! (i+j!(+c i(+2+c i j!!!(+c i(2+c i! (+2+c!( i! (+2+c! (i+j!(+2+c i j! i!j! ( j! 5 (i+j!(+2+c i j! i!j! ( j!(2+c i!

6 !!(+c i(2+c i! (+2+c!( i!!!(+c i(2+c i! (+2+c!( i! ( ( i+j +2+c i j i 2+c i ( +2+c 2+c!!(+c i(2+c i! (+2+c! (+2+c!( i! (2+c!!!(+c i(2+c i! ( i!(2+c!!(+c! (2+c! (2+c i! ( i!(+c! (+c i!(+c! ( ( ( 2+c i i ( ( 2+c i i (+c (2+c! +c 0 +c!(+c! ( ( ( 2+c 2+c (+c (2+c! +c +c+!(+c! ( (+c (2+c! (2+c! (+c!! (2+c! (+c+!(! (+c+(+c By similr process, the other doule sum ecomes c ( c ( j i (i+j!(+ i(+2+c i j! (+2+c! (++(+. Now replcing the doule sums y these simplified expressions we hve ( P(GS,,c,2 Finlly we note (+c+(+c P(GS,,c, P(GS,,c,2 +c ( +2+c + (++( c (+c+(+c (++(+. (+c+(+c + (++(+, estlishing the result for GS,,c. The result for P(GS +,,c,2 follows y similr rgument, the only difference eing the dditionl edge which cnnot e used in order to result in two trees. So (2 would now ecome 6

7 P(GS +,,c,2 + ( ( j i (i+j!(+c i(+2+c i j! c ( c ( j i (+2+c+! (i+j!(+ i(+2+c i j! (+2+c+! The rest of the rgument works in the sme wy s efore. Theorem 4. We hve the following proilities. P(Pw, P(Di, P((K 4, c +2+c c+. Proof. We will gin compute the proility tht there re two trees in the process. However, in these cses there re mny more possiilities to consider. To simplify the sitution, we mke the following oservtion: Every edge which is lef in the originl grph will lwys e kept in the forest uilding process. This indictes if there re multiple leves off of single vertex v, then we only need to know when the first lef ws chosen. This is ecuse, y the first lef, v will hve een seen y some edge. So we now represent the remining grphs from Figure 2, s shown in Figure 3, where corresponds to ll of the leves condensed down; nd the remining edges re leled s indicted with ech lel other thn corresponding to single edge. c d d c c d e f e f e g Pw Di (K 4 Figure 3: The remining three grphs with the leves collpsed to single edge. For ech grph, we now look t ll possile wys to strt selecting edges nd end with pir of disjoint edges. We lso find the proility of strting our selection in prticulr wy. Recll tht n edge mrked corresponds to different edges, nd so until we select tht edge, we ssume ll of them hven t een seen nd re ville for picking; fter selection y the oservtion, we cn ssume they hve ll een seen. (In other words, it is only the reltive ordering of the different types of edges tht mtter. For the pw grph, we hve the possiilities shown in Tle (the first column indictes every possile sequence of choices of edges until two trees re formed, while the second 7

8 Strt of edge orderings resulting in 2 trees Proilities of n ordering c, d, e +4 4 e, e c, d, e e e cd, ce, dc, de, ed, ec ced, cde, dce, dec, ecd, edc Tle : Proilities ssocited with Pw. column indictes the proility of ny one of those sequence of choices eing mde. If we now sum ll of these proilities together, we get P(Pw, , estlishing the result (recll tht P(Pw,+P(Pw,2. The results for the remining two grphs re estlished in the sme wy nd the corresponding proilities re given in Tles 2 nd 3. 4 Exmples of grphs with the sme proilities Using the formuls from the theorems in the preceding section, we cn now compute the proilities for lrge numer of these grphs efficiently. In prticulr, we exmined ll grphs up through five hundred vertices in these fmilies, nd discovered severl exmples of fmilies of non-isomorphic grphs which produce the sme proilities. Proposition 4. Given s,t with s dividing into 2t(t+, let r 2t(t+. Then we hve s for ll k P(GS r+3t+,s,t,k P(GS t,r+s+2t+,t,k P(GS 3t+s+,r,t,k. This immeditely follows y pplying the formuls for the proilities from Theorem 3. Proposition 5. Given t, then we hve for ll k P(GS 5t+3,t,2t,k P(GS 5t+,t+,2t+,k. This lso immeditely follows y pplying the formuls for proilities from Theorem 3. We note tht there were mny other exmples of pirs of glued str grphs which re not 8

9 Strt of edge orderings resulting in 2 trees Proilities of n ordering d, e, f +5 5 f, ce, ec, f d, e, f f, ce f, ce de, df, ed, ef, fd, fe def, dfe, edf, efd, fde, fed Tle 2: Proilities ssocited with Di. Strt of edge orderings resulting in 2 trees Proilities of n ordering e, f, g +6 6 f, ce, dg, ec, f, gd e, f, g f, dg, ce f, dg, ce ef, eg, fe, fg, ge, gf efg, egf, feg, fge, gef, gfe Tle 3: Proilities ssocited with (K 4. 9

10 Figure 4: Exmples of set of three grphs with the sme proilities from Proposition 4. In this cse s t. explined y Propositions 4 nd 5. A complete chrcteriztion of ll such pirs of glued strs remins elusive. Looking eyond glued strs, we found very few pirs of grphs with the sme proilities nd the results do not seem to fit ny ptterns. As n exmple, ll pirs of grphs from the GS +,,c fmily up through 500 vertices with the sme proilities re listed elow (it is possile tht this is complete list for this fmily. 5 Conclusion P(GS + 7,3,9,k P(GS+ 0,9,0,k P(GS + 28,5,9,k P(GS+ 26,8,8,k P(GS + 03,5,48,k P(GS+ 63,7,32,k P(GS + 95,23,53,k P(GS+ 53,66,52,k We found the proilities for ll connected grphs which cn form t most two trees in this forest uilding process. A nturl next step is to consider grphs with t most three trees. As n exmple, two pirs of grphs with t most three trees nd mtching proilities re given in Figure 5. This is suggestive tht these re the strt of n infinite fmily of such grphs, ut we hve not yet estlished this. One difficulty is tht unlike the sitution for two trees where only one proility needed to e computed (since the proilities sum to one, this requires tht two proilities e computed. References [] Zhnr Berikkyzy, Steve Butler, Jy Cummings, Kristin Heysse, Pul Horn, Ruth Luo, nd Brent Morn, A forest uilding process on simple grphs, Discrete Mthemtics 34 (208, [2] Steve Butler, Fn Chung, Jy Cummings, nd Ron Grhm, Edge flipping in the complete grph, Advnces in Applied Mthemtics 69 (205, [3] Ronld L. Grhm, Donld E. Knuth, nd Oren Ptshnik, Concrete Mthemtics, second edition, Addison-Wesley,

11 P(G, P(G, P(G, P(G, P(G, P(G, Figure 5: Two pirs of grphs with t most three trees nd producing the sme proilities.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig CS311H: Discrete Mthemtics Grph Theory IV Instructor: Işıl Dillig Instructor: Işıl Dillig, CS311H: Discrete Mthemtics Grph Theory IV 1/25 A Non-plnr Grph Regions of Plnr Grph The plnr representtion of

More information

F. R. K. Chung y. University ofpennsylvania. Philadelphia, Pennsylvania R. L. Graham. AT&T Labs - Research. March 2,1997.

F. R. K. Chung y. University ofpennsylvania. Philadelphia, Pennsylvania R. L. Graham. AT&T Labs - Research. March 2,1997. Forced convex n-gons in the plne F. R. K. Chung y University ofpennsylvni Phildelphi, Pennsylvni 19104 R. L. Grhm AT&T Ls - Reserch Murry Hill, New Jersey 07974 Mrch 2,1997 Astrct In seminl pper from 1935,

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

Pointwise convergence need not behave well with respect to standard properties such as continuity.

Pointwise convergence need not behave well with respect to standard properties such as continuity. Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples

More information

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl

More information

10.5 Graphing Quadratic Functions

10.5 Graphing Quadratic Functions 0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions

More information

A dual of the rectangle-segmentation problem for binary matrices

A dual of the rectangle-segmentation problem for binary matrices A dul of the rectngle-segmenttion prolem for inry mtrices Thoms Klinowski Astrct We consider the prolem to decompose inry mtrix into smll numer of inry mtrices whose -entries form rectngle. We show tht

More information

MTH 146 Conics Supplement

MTH 146 Conics Supplement 105- Review of Conics MTH 146 Conics Supplement In this section we review conics If ou ne more detils thn re present in the notes, r through section 105 of the ook Definition: A prol is the set of points

More information

COMBINATORIAL PATTERN MATCHING

COMBINATORIAL PATTERN MATCHING COMBINATORIAL PATTERN MATCHING Genomic Repets Exmple of repets: ATGGTCTAGGTCCTAGTGGTC Motivtion to find them: Genomic rerrngements re often ssocited with repets Trce evolutionry secrets Mny tumors re chrcterized

More information

Definition of Regular Expression

Definition of Regular Expression Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll

More information

Dr. D.M. Akbar Hussain

Dr. D.M. Akbar Hussain Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence

More information

Section 3.1: Sequences and Series

Section 3.1: Sequences and Series Section.: Sequences d Series Sequences Let s strt out with the definition of sequence: sequence: ordered list of numbers, often with definite pttern Recll tht in set, order doesn t mtter so this is one

More information

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries Tries Yufei To KAIST April 9, 2013 Y. To, April 9, 2013 Tries In this lecture, we will discuss the following exct mtching prolem on strings. Prolem Let S e set of strings, ech of which hs unique integer

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Adm Sheffer. Office hour: Tuesdys 4pm. dmsh@cltech.edu TA: Victor Kstkin. Office hour: Tuesdys 7pm. 1:00 Mondy, Wednesdy, nd Fridy. http://www.mth.cltech.edu/~2014-15/2term/m006/

More information

Typing with Weird Keyboards Notes

Typing with Weird Keyboards Notes Typing with Weird Keyords Notes Ykov Berchenko-Kogn August 25, 2012 Astrct Consider lnguge with n lphet consisting of just four letters,,,, nd. There is spelling rule tht sys tht whenever you see n next

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

ZZ - Advanced Math Review 2017

ZZ - Advanced Math Review 2017 ZZ - Advnced Mth Review Mtrix Multipliction Given! nd! find the sum of the elements of the product BA First, rewrite the mtrices in the correct order to multiply The product is BA hs order x since B is

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

CS481: Bioinformatics Algorithms

CS481: Bioinformatics Algorithms CS481: Bioinformtics Algorithms Cn Alkn EA509 clkn@cs.ilkent.edu.tr http://www.cs.ilkent.edu.tr/~clkn/teching/cs481/ EXACT STRING MATCHING Fingerprint ide Assume: We cn compute fingerprint f(p) of P in

More information

Suffix trees, suffix arrays, BWT

Suffix trees, suffix arrays, BWT ALGORITHMES POUR LA BIO-INFORMATIQUE ET LA VISUALISATION COURS 3 Rluc Uricru Suffix trees, suffix rrys, BWT Bsed on: Suffix trees nd suffix rrys presenttion y Him Kpln Suffix trees course y Pco Gomez Liner-Time

More information

CSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011

CSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011 CSCI 3130: Forml Lnguges nd utomt Theory Lecture 12 The Chinese University of Hong Kong, Fll 2011 ndrej Bogdnov In progrmming lnguges, uilding prse trees is significnt tsk ecuse prse trees tell us the

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

Notes for Graph Theory

Notes for Graph Theory Notes for Grph Theory These re notes I wrote up for my grph theory clss in 06. They contin most of the topics typiclly found in grph theory course. There re proofs of lot of the results, ut not of everything.

More information

Lily Yen and Mogens Hansen

Lily Yen and Mogens Hansen SKOLID / SKOLID No. 8 Lily Yen nd Mogens Hnsen Skolid hs joined Mthemticl Myhem which is eing reformtted s stnd-lone mthemtics journl for high school students. Solutions to prolems tht ppered in the lst

More information

The Complexity of Nonrepetitive Coloring

The Complexity of Nonrepetitive Coloring The Complexity of Nonrepetitive Coloring Dániel Mrx Institut für Informtik Humoldt-Universitt zu Berlin dmrx@informtik.hu-erlin.de Mrcus Schefer Deprtment of Computer Science DePul University mschefer@cs.depul.edu

More information

9 Graph Cutting Procedures

9 Graph Cutting Procedures 9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

CS201 Discussion 10 DRAWTREE + TRIES

CS201 Discussion 10 DRAWTREE + TRIES CS201 Discussion 10 DRAWTREE + TRIES DrwTree First instinct: recursion As very generic structure, we could tckle this problem s follows: drw(): Find the root drw(root) drw(root): Write the line for the

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

Compilers Spring 2013 PRACTICE Midterm Exam

Compilers Spring 2013 PRACTICE Midterm Exam Compilers Spring 2013 PRACTICE Midterm Exm This is full length prctice midterm exm. If you wnt to tke it t exm pce, give yourself 7 minutes to tke the entire test. Just like the rel exm, ech question hs

More information

Algorithm Design (5) Text Search

Algorithm Design (5) Text Search Algorithm Design (5) Text Serch Tkshi Chikym School of Engineering The University of Tokyo Text Serch Find sustring tht mtches the given key string in text dt of lrge mount Key string: chr x[m] Text Dt:

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Instructor: Adm Sheffer. TA: Cosmin Pohot. 1pm Mondys, Wednesdys, nd Fridys. http://mth.cltech.edu/~2015-16/2term/m006/ Min ook: Introduction to Grph

More information

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search.

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search. CS 88: Artificil Intelligence Fll 00 Lecture : A* Serch 9//00 A* Serch rph Serch Tody Heuristic Design Dn Klein UC Berkeley Multiple slides from Sturt Russell or Andrew Moore Recp: Serch Exmple: Pncke

More information

Grade 7/8 Math Circles Geometric Arithmetic October 31, 2012

Grade 7/8 Math Circles Geometric Arithmetic October 31, 2012 Fculty of Mthemtics Wterloo, Ontrio N2L 3G1 Grde 7/8 Mth Circles Geometric Arithmetic Octoer 31, 2012 Centre for Eduction in Mthemtics nd Computing Ancient Greece hs given irth to some of the most importnt

More information

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html

More information

UNIVERSITY OF EDINBURGH COLLEGE OF SCIENCE AND ENGINEERING SCHOOL OF INFORMATICS INFORMATICS 1 COMPUTATION & LOGIC INSTRUCTIONS TO CANDIDATES

UNIVERSITY OF EDINBURGH COLLEGE OF SCIENCE AND ENGINEERING SCHOOL OF INFORMATICS INFORMATICS 1 COMPUTATION & LOGIC INSTRUCTIONS TO CANDIDATES UNIVERSITY OF EDINBURGH COLLEGE OF SCIENCE AND ENGINEERING SCHOOL OF INFORMATICS INFORMATICS COMPUTATION & LOGIC Sturdy st April 7 : to : INSTRUCTIONS TO CANDIDATES This is tke-home exercise. It will not

More information

Suffix Tries. Slides adapted from the course by Ben Langmead

Suffix Tries. Slides adapted from the course by Ben Langmead Suffix Tries Slides dpted from the course y Ben Lngmed en.lngmed@gmil.com Indexing with suffixes Until now, our indexes hve een sed on extrcting sustrings from T A very different pproch is to extrct suffixes

More information

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. Example: Pancake Problem. Example: Pancake Problem

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. Example: Pancake Problem. Example: Pancake Problem Announcements Project : erch It s live! Due 9/. trt erly nd sk questions. It s longer thn most! Need prtner? Come up fter clss or try Pizz ections: cn go to ny, ut hve priority in your own C 88: Artificil

More information

CSCE 531, Spring 2017, Midterm Exam Answer Key

CSCE 531, Spring 2017, Midterm Exam Answer Key CCE 531, pring 2017, Midterm Exm Answer Key 1. (15 points) Using the method descried in the ook or in clss, convert the following regulr expression into n equivlent (nondeterministic) finite utomton: (

More information

Presentation Martin Randers

Presentation Martin Randers Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes

More information

Lesson 4.4. Euler Circuits and Paths. Explore This

Lesson 4.4. Euler Circuits and Paths. Explore This Lesson 4.4 Euler Ciruits nd Pths Now tht you re fmilir with some of the onepts of grphs nd the wy grphs onvey onnetions nd reltionships, it s time to egin exploring how they n e used to model mny different

More information

1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers?

1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers? 1.1 TEXAS ESSENTIAL KNOWLEDGE AND SKILLS Prepring for 2A.6.K, 2A.7.I Intervl Nottion nd Set Nottion Essentil Question When is it convenient to use set-uilder nottion to represent set of numers? A collection

More information

Intermediate Information Structures

Intermediate Information Structures CPSC 335 Intermedite Informtion Structures LECTURE 13 Suffix Trees Jon Rokne Computer Science University of Clgry Cnd Modified from CMSC 423 - Todd Trengen UMD upd Preprocessing Strings We will look t

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016 Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl

More information

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric

More information

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin

More information

CS 241 Week 4 Tutorial Solutions

CS 241 Week 4 Tutorial Solutions CS 4 Week 4 Tutoril Solutions Writing n Assemler, Prt & Regulr Lnguges Prt Winter 8 Assemling instrutions utomtilly. slt $d, $s, $t. Solution: $d, $s, nd $t ll fit in -it signed integers sine they re 5-it

More information

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών ΕΠΛ323 - Θωρία και Πρακτική Μταγλωττιστών Lecture 3 Lexicl Anlysis Elis Athnsopoulos elisthn@cs.ucy.c.cy Recognition of Tokens if expressions nd reltionl opertors if è if then è then else è else relop

More information

INTRODUCTION TO SIMPLICIAL COMPLEXES

INTRODUCTION TO SIMPLICIAL COMPLEXES INTRODUCTION TO SIMPLICIAL COMPLEXES CASEY KELLEHER AND ALESSANDRA PANTANO 0.1. Introduction. In this ctivity set we re going to introduce notion from Algebric Topology clled simplicil homology. The min

More information

CSCI 104. Rafael Ferreira da Silva. Slides adapted from: Mark Redekopp and David Kempe

CSCI 104. Rafael Ferreira da Silva. Slides adapted from: Mark Redekopp and David Kempe CSCI 0 fel Ferreir d Silv rfsilv@isi.edu Slides dpted from: Mrk edekopp nd Dvid Kempe LOG STUCTUED MEGE TEES Series Summtion eview Let n = + + + + k $ = #%& #. Wht is n? n = k+ - Wht is log () + log ()

More information

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012 Dynmic Progrmming Andres Klppenecker [prtilly bsed on slides by Prof. Welch] 1 Dynmic Progrmming Optiml substructure An optiml solution to the problem contins within it optiml solutions to subproblems.

More information

50 AMC LECTURES Lecture 2 Analytic Geometry Distance and Lines. can be calculated by the following formula:

50 AMC LECTURES Lecture 2 Analytic Geometry Distance and Lines. can be calculated by the following formula: 5 AMC LECTURES Lecture Anlytic Geometry Distnce nd Lines BASIC KNOWLEDGE. Distnce formul The distnce (d) between two points P ( x, y) nd P ( x, y) cn be clculted by the following formul: d ( x y () x )

More information

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center Resource Overview Quntile Mesure: Skill or Concept: 80Q Multiply two frctions or frction nd whole numer. (QT N ) Excerpted from: The Mth Lerning Center PO Box 99, Slem, Oregon 9709 099 www.mthlerningcenter.org

More information

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών. Lecture 3b Lexical Analysis Elias Athanasopoulos

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών. Lecture 3b Lexical Analysis Elias Athanasopoulos ΕΠΛ323 - Θωρία και Πρακτική Μταγλωττιστών Lecture 3 Lexicl Anlysis Elis Athnsopoulos elisthn@cs.ucy.c.cy RecogniNon of Tokens if expressions nd relnonl opertors if è if then è then else è else relop è

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

Simplifying Algebra. Simplifying Algebra. Curriculum Ready.

Simplifying Algebra. Simplifying Algebra. Curriculum Ready. Simplifying Alger Curriculum Redy www.mthletics.com This ooklet is ll out turning complex prolems into something simple. You will e le to do something like this! ( 9- # + 4 ' ) ' ( 9- + 7-) ' ' Give this

More information

MATH 2530: WORKSHEET 7. x 2 y dz dy dx =

MATH 2530: WORKSHEET 7. x 2 y dz dy dx = MATH 253: WORKSHT 7 () Wrm-up: () Review: polr coordintes, integrls involving polr coordintes, triple Riemnn sums, triple integrls, the pplictions of triple integrls (especilly to volume), nd cylindricl

More information

Implementing Automata. CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona

Implementing Automata. CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona Implementing utomt Sc 5 ompilers nd Systems Softwre : Lexicl nlysis II Deprtment of omputer Science University of rizon collerg@gmil.com opyright c 009 hristin ollerg NFs nd DFs cn e hrd-coded using this

More information

1 Quad-Edge Construction Operators

1 Quad-Edge Construction Operators CS48: Computer Grphics Hndout # Geometric Modeling Originl Hndout #5 Stnford University Tuesdy, 8 December 99 Originl Lecture #5: 9 November 99 Topics: Mnipultions with Qud-Edge Dt Structures Scribe: Mike

More information

such that the S i cover S, or equivalently S

such that the S i cover S, or equivalently S MATH 55 Triple Integrls Fll 16 1. Definition Given solid in spce, prtition of consists of finite set of solis = { 1,, n } such tht the i cover, or equivlently n i. Furthermore, for ech i, intersects i

More information

Lecture 7: Integration Techniques

Lecture 7: Integration Techniques Lecture 7: Integrtion Techniques Antiderivtives nd Indefinite Integrls. In differentil clculus, we were interested in the derivtive of given rel-vlued function, whether it ws lgeric, eponentil or logrithmic.

More information

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv Compression Outline 15-853:Algorithms in the Rel World Dt Compression III Introduction: Lossy vs. Lossless, Benchmrks, Informtion Theory: Entropy, etc. Proility Coding: Huffmn + Arithmetic Coding Applictions

More information

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the LR() nlysis Drwcks of LR(). Look-hed symols s eplined efore, concerning LR(), it is possile to consult the net set to determine, in the reduction sttes, for which symols it would e possile to perform reductions.

More information

CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona

CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona CSc 453 Compilers nd Systems Softwre 4 : Lexicl Anlysis II Deprtment of Computer Science University of Arizon collerg@gmil.com Copyright c 2009 Christin Collerg Implementing Automt NFAs nd DFAs cn e hrd-coded

More information

The Greedy Method. The Greedy Method

The Greedy Method. The Greedy Method Lists nd Itertors /8/26 Presenttion for use with the textook, Algorithm Design nd Applictions, y M. T. Goodrich nd R. Tmssi, Wiley, 25 The Greedy Method The Greedy Method The greedy method is generl lgorithm

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distriuted Systems Principles nd Prdigms Chpter 11 (version April 7, 2008) Mrten vn Steen Vrije Universiteit Amsterdm, Fculty of Science Dept. Mthemtics nd Computer Science Room R4.20. Tel: (020) 598 7784

More information

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1): Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters

More information

The Complexity of Nonrepetitive Coloring

The Complexity of Nonrepetitive Coloring The Complexity of Nonrepetitive Coloring Dániel Mrx Deprtment of Computer Science nd Informtion Theory Budpest University of Technology nd Econonomics Budpest H-1521, Hungry dmrx@cs.me.hu Mrcus Schefer

More information

Outline. Introduction Suffix Trees (ST) Building STs in linear time: Ukkonen s algorithm Applications of ST

Outline. Introduction Suffix Trees (ST) Building STs in linear time: Ukkonen s algorithm Applications of ST Suffi Trees Outline Introduction Suffi Trees (ST) Building STs in liner time: Ukkonen s lgorithm Applictions of ST 2 3 Introduction Sustrings String is ny sequence of chrcters. Sustring of string S is

More information

arxiv: v1 [math.co] 18 Sep 2015

arxiv: v1 [math.co] 18 Sep 2015 Improvements on the density o miml -plnr grphs rxiv:509.05548v [mth.co] 8 Sep 05 János Brát MTA-ELTE Geometric nd Algeric Comintorics Reserch Group rt@cs.elte.hu nd Géz Tóth Alréd Rényi Institute o Mthemtics,

More information

Single-Player and Two-Player Buttons & Scissors Games

Single-Player and Two-Player Buttons & Scissors Games Single-Plyer nd Two-Plyer Buttons & Scissors Gmes The MIT Fculty hs mde this rticle openly ville. Plese shre how this ccess enefits you. Your story mtters. Cittion As Pulished Pulisher Burke, Kyle, et

More information

Misrepresentation of Preferences

Misrepresentation of Preferences Misrepresenttion of Preferences Gicomo Bonnno Deprtment of Economics, University of Cliforni, Dvis, USA gfbonnno@ucdvis.edu Socil choice functions Arrow s theorem sys tht it is not possible to extrct from

More information

Section 10.4 Hyperbolas

Section 10.4 Hyperbolas 66 Section 10.4 Hyperbols Objective : Definition of hyperbol & hyperbols centered t (0, 0). The third type of conic we will study is the hyperbol. It is defined in the sme mnner tht we defined the prbol

More information

Lecture 8: Graph-theoretic problems (again)

Lecture 8: Graph-theoretic problems (again) COMP36111: Advned Algorithms I Leture 8: Grph-theoreti prolems (gin) In Prtt-Hrtmnn Room KB2.38: emil: iprtt@s.mn..uk 2017 18 Reding for this leture: Sipser: Chpter 7. A grph is pir G = (V, E), where V

More information

Information Retrieval and Organisation

Information Retrieval and Organisation Informtion Retrievl nd Orgnistion Suffix Trees dpted from http://www.mth.tu.c.il/~himk/seminr02/suffixtrees.ppt Dell Zhng Birkeck, University of London Trie A tree representing set of strings { } eef d

More information

Integration. September 28, 2017

Integration. September 28, 2017 Integrtion September 8, 7 Introduction We hve lerned in previous chpter on how to do the differentition. It is conventionl in mthemtics tht we re supposed to lern bout the integrtion s well. As you my

More information

SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES

SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES MARCELLO DELGADO Abstrct. The purpose of this pper is to build up the bsic conceptul frmework nd underlying motivtions tht will llow us to understnd ctegoricl

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl component

More information

12-B FRACTIONS AND DECIMALS

12-B FRACTIONS AND DECIMALS -B Frctions nd Decimls. () If ll four integers were negtive, their product would be positive, nd so could not equl one of them. If ll four integers were positive, their product would be much greter thn

More information

Network Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved

Network Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved Network Interconnection: Bridging CS 57 Fll 6 6 Kenneth L. Clvert All rights reserved The Prolem We know how to uild (rodcst) LANs Wnt to connect severl LANs together to overcome scling limits Recll: speed

More information

Greedy Algorithm. Algorithm Fall Semester

Greedy Algorithm. Algorithm Fall Semester Greey Algorithm Algorithm 0 Fll Semester Optimiztion prolems An optimiztion prolem is one in whih you wnt to fin, not just solution, ut the est solution A greey lgorithm sometimes works well for optimiztion

More information

Companion Mathematica Notebook for "What is The 'Equal Weight View'?"

Companion Mathematica Notebook for What is The 'Equal Weight View'? Compnion Mthemtic Notebook for "Wht is The 'Equl Weight View'?" Dvid Jehle & Brnden Fitelson July 9 The methods used in this notebook re specil cses of more generl decision procedure

More information

From Dependencies to Evaluation Strategies

From Dependencies to Evaluation Strategies From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute

More information

Answer Key Lesson 6: Workshop: Angles and Lines

Answer Key Lesson 6: Workshop: Angles and Lines nswer Key esson 6: tudent Guide ngles nd ines Questions 1 3 (G p. 406) 1. 120 ; 360 2. hey re the sme. 3. 360 Here re four different ptterns tht re used to mke quilts. Work with your group. se your Power

More information

1.5 Extrema and the Mean Value Theorem

1.5 Extrema and the Mean Value Theorem .5 Extrem nd the Men Vlue Theorem.5. Mximum nd Minimum Vlues Definition.5. (Glol Mximum). Let f : D! R e function with domin D. Then f hs n glol mximum vlue t point c, iff(c) f(x) for ll x D. The vlue

More information

George Boole. IT 3123 Hardware and Software Concepts. Switching Algebra. Boolean Functions. Boolean Functions. Truth Tables

George Boole. IT 3123 Hardware and Software Concepts. Switching Algebra. Boolean Functions. Boolean Functions. Truth Tables George Boole IT 3123 Hrdwre nd Softwre Concepts My 28 Digitl Logic The Little Mn Computer 1815 1864 British mthemticin nd philosopher Mny contriutions to mthemtics. Boolen lger: n lger over finite sets

More information

LR Parsing, Part 2. Constructing Parse Tables. Need to Automatically Construct LR Parse Tables: Action and GOTO Table

LR Parsing, Part 2. Constructing Parse Tables. Need to Automatically Construct LR Parse Tables: Action and GOTO Table TDDD55 Compilers nd Interpreters TDDB44 Compiler Construction LR Prsing, Prt 2 Constructing Prse Tles Prse tle construction Grmmr conflict hndling Ctegories of LR Grmmrs nd Prsers Peter Fritzson, Christoph

More information

Angles. Angles. Curriculum Ready.

Angles. Angles. Curriculum Ready. ngles ngles urriculum Redy www.mthletics.com ngles mesure the mount of turn in degrees etween two lines tht meet t point. Mny gmes re sed on interpreting using ngles such s pool, snooker illirds. lck

More information

arxiv:math/ v2 [math.co] 28 Feb 2006

arxiv:math/ v2 [math.co] 28 Feb 2006 Chord Digrms nd Guss Codes for Grphs rxiv:mth/0508269v2 [mth.co] 28 Feb 2006 Thoms Fleming Deprtment of Mthemtics University of Cliforni, Sn Diego L Joll, C 92093-0112 tfleming@mth.ucsd.edu bstrct lke

More information

Summer Review Packet For Algebra 2 CP/Honors

Summer Review Packet For Algebra 2 CP/Honors Summer Review Pcket For Alger CP/Honors Nme Current Course Mth Techer Introduction Alger uilds on topics studied from oth Alger nd Geometr. Certin topics re sufficientl involved tht the cll for some review

More information

cisc1110 fall 2010 lecture VI.2 call by value function parameters another call by value example:

cisc1110 fall 2010 lecture VI.2 call by value function parameters another call by value example: cisc1110 fll 2010 lecture VI.2 cll y vlue function prmeters more on functions more on cll y vlue nd cll y reference pssing strings to functions returning strings from functions vrile scope glol vriles

More information

Lexical Analysis: Constructing a Scanner from Regular Expressions

Lexical Analysis: Constructing a Scanner from Regular Expressions Lexicl Anlysis: Constructing Scnner from Regulr Expressions Gol Show how to construct FA to recognize ny RE This Lecture Convert RE to n nondeterministic finite utomton (NFA) Use Thompson s construction

More information

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

10.2 Graph Terminology and Special Types of Graphs

10.2 Graph Terminology and Special Types of Graphs 10.2 Grph Terminology n Speil Types of Grphs Definition 1. Two verties u n v in n unirete grph G re lle jent (or neighors) in G iff u n v re enpoints of n ege e of G. Suh n ege e is lle inient with the

More information

Integration. October 25, 2016

Integration. October 25, 2016 Integrtion October 5, 6 Introduction We hve lerned in previous chpter on how to do the differentition. It is conventionl in mthemtics tht we re supposed to lern bout the integrtion s well. As you my hve

More information

The dictionary model allows several consecutive symbols, called phrases

The dictionary model allows several consecutive symbols, called phrases A dptive Huffmn nd rithmetic methods re universl in the sense tht the encoder cn dpt to the sttistics of the source. But, dpttion is computtionlly expensive, prticulrly when k-th order Mrkov pproximtion

More information