On-line multiplication in real and complex base

Size: px
Start display at page:

Download "On-line multiplication in real and complex base"

Transcription

1 On-line multiplication in real complex base Christiane Frougny LIAFA, CNRS UMR place Jussieu, Paris Cedex 05, France Université Paris 8 Christiane.Frougny@liafa.jussieu.fr Athasit Surarerks Computer Engineering Department Faculty of Engineering Chulalongkorn University Phayathai road, Bangkok 10330, Thail athasit@cp.eng.chula.ac.th Abstract Multiplication of two numbers represented in base is shown to be computable by an on-line algorithm when is a negative integer, a positive non-integer real number, or a complex number of the form Ô Ö, where Ö is a positive integer. 1 Introduction On-line arithmetic, introduced in [24], is a mode of computation where opers results flow through arithmetic units in a digit serial manner, starting with the most significant digit. To generate the first digit of the result, the Æ first digits of the opers are required. The integer Æ is called the delay of the algorithm. This technique allows the pipelining of different operations such as addition, multiplication division. It is also appropriate for the processing of real numbers having infinite expansions : it is well known that when multiplying two real numbers, only the left part of the result is significant. On-line arithmetic is used for special circuits such as in signal processing, for very long precision arithmetic. One of the interests of on-line computable functions is that they are continuous for the usual topology on the set of infinite sequences on a finite digit set. To be able to perform on-line computation, it is necessary to use a redundant number system, where a number may have more than one representation (see [24, 5]). An example of such a system is the so-called signed-digit number system. It is composed of an integer base a signed-digit set of the form, with ½. In this sytem addition can be performed in constant time in parallel [1, 4]. On-line multiplication is also feasible [24, 5]. Parallel addition is used internally in the multiplication algorithm. On-line algorithms for addition, subtraction, multiplication, division square-root in integer base are well studied, see [2, 6, 19]. In this paper we study the multiplication in base when is a negative integer, or a non-integer real number, or a complex number of the form Ô Ö. It is known that any real number can be represented in negative integer base without a sign [12, 13, 15], that, with a signed-digit set, addition is computable in constant time in parallel, is computable by an on-line finite state automaton [7]. We show that the on-line multiplication used in the signed-digit number system can be applied in negative base. Negative base is related to some complex number systems, see below. When the base is a real number ½, by the greedy algorithm of Rényi [23], one can compute a representation in base of any real number belonging to the interval ¼ ½, called its -expansion, where the digits are elements of the canonical digit set ¼ if is not an integer, or of ¼ ½ if is an integer. In such a representation, when is not an integer, not all the patterns of digits are allowed (see [21] for instance). For instance in base ½ Ôµ Ôthe golden ratio, the - expansion of the number Ü is ½¼¼½¼¼¼. The pattern ½½ is forbidden. Different -representations of Ü are ¼½½½¼¼¼, or ½¼¼ ¼½µ ¼½µ ¼½µ for instance. This system is thus naturally redundant. Representation of numbers in non-integer base is encountered for instance in coding theory, see [10], in the modelization of quasicrystals, see [3]. In [8] we have studied the problem of the conversion in a real base from a digit set ¼ with to the canonical digit set, without changing the numerical value. Addition multiplication by a fixed positive integer are particular cases of digit set conversion. We have proved that the digit set conversion is on-line computable. 1

2 Moreover, if the base is a Pisot number 1 this conversion is realizable by an on-line finite automaton. This means that in the Pisot case, digit set conversion needs only a finite storage memory, independent of the size of the data. However, addition is not computable in constant time in parallel. In this work, we prove that multiplication of real numbers represented in real base is on-line computable with a certain delay explicitly computed. Our algorithm can be applied to the particular case that is an integer. With digit set ¼, this is the Carry- Save representation. The delay of our on-line multiplication algorithm in the Carry-Save representation is greater than the delay of on-line multiplication in the signed-digit representation, but the Carry-Save representation takes less memory. We then consider the Knuth complex number system, which is composed of the base Ô Ö, with Ö an integer, canonical digit set ¼ Ö ½. Every complex number has a representation in this system [12]. This allows a unified treatment of the real imaginary parts of a complex number. We show that in the Knuth number system with a signed-digit set, with Ö Ö ½, multiplication is on-line computable. It is known that addition is computable in constant time in parallel, is computable by an on-line finite state automaton [7]. The case together with the signed-digit set, has been considered in [17, 16] with practical applications. Other complex numeration systems have been considered. For instance the Penney complex number system consists of the complex base ½ the canonical digit set ¼ ½. Every complex number is representable in this system, the representation is unique finite for the Gaussian integers [22]. It is shown in [25] that in base ½ with signed-digit set ½ ¼ ½ multiplication is online computable. The techniques are different from the ones used in the Knuth number system. 2 Preliminaries 2.1 On-line computability Let be two finite digit sets, denote by Æ the set of infinite sequences of elements of. Let ³ Æ Æ µ ½ µ ½ The function ³ is said to be on-line computable with delay Æ if there exists a natural number Æ such that, for each ½ there exists a function Æ such that 1 A Pisot number is an algebraic integer such that its algebraic conjugates are strictly less than ½ in modulus. The golden ratio the natural integers are Pisot numbers. ½ Æ µ, where Æ denotes the set of sequences of length Æ of elements of. This definition extends readily to functions of several variables. It is well known that some functions are not on-line computable, like addition in the binary system with canonical digit set ¼ ½. Addition is considered as a conversion from ¼ ½ to ¼ ½. Denote by Ú the infinite concatenation ÚÚÚ, by Ú Ò the word Ú concatenated Ò times. Since ¼½ Ò ¼ µ ½¼ ¼½ Ò ¼ µ ¼½ Ò ¼ for any Ò ½, one sees that the most significant digit of the result depends on the least significant digits of the input. Recall that a distance can be defined on Æ as follows: let Ú Ú µ ½ Û Û µ ½ be in Æ, Ú Ûµ Ö where Ö ÑÒ Ú Û if Ú Û, Ú Ûµ ¼ otherwise. The set Æ is then a compact metric space. This topology is equivalent to the product topology. Then any function from Æ to Æ which is on-line computable with delay Æ is Æ -Lipschitz, is thus uniformly continuous [8]. Let be a digit set. We say that multiplication is on-line computable with delay Æ in base on the digit set if there exists a function such that Æ Æ Æ Ü µ ½ Ý µ ½ µ Ô µ ½ Ô ½ ½ Ü ½ Ý which is on-line computable with delay Æ. Note that apriori, because of redundancy, the result of such a process is not unique, but the algorithms we shall consider later on are deterministic, thus compute a function. In the following, we will make the assumption that the opers begin with a run of Æ zeroes. This allows to ignore the delay inside the computation. 2.2 Number representation A survey on numeration systems can be found in [14, Chapter 7]. Let be a finite digit set of real or complex digits let be a real or complex number such that ½. A -representation of a real or complex number Ü with digits in is a finite or a right infinite sequence Ü µ Ò with Ü such that Ü È ½ Ò Ü. It is denoted by Ü Ò Ü ¼ Ü ½Ü µ In this paper we consider only representations of the form Ü µ ½ Æ representing a number Ü equal to Ƚ Ü. When a representation ends with infinitely many zeroes, it is said to be finite, the zeroes are usually omitted. 2

3 2.3 Signed-digit number system The base is a positive integer ½. With a signed-digit set of the form Ë, ½ the representation is redundant addition can be performed in constant time in parallel, is computable by an on-line finite automaton, [1, 4, 19]. 2.4 Negative base numeration systems Let the base be a negative integer ½. It is well known (see [12, 13, 15]) that any real number can be represented without a sign in base with digits from the canonical digit set ¼ ½. With a signed-digit set of the form Ì, with ½ the representation is redundant addition can be performed in constant time in parallel, is computable by an on-line finite automaton [7]. 2.5 Representations in real base Let be a real number ½, generally not an integer. Any real number Ü ¼ ½ can be represented in base by the following greedy algorithm, [23] : denote by by the integral part the fractional part of a number. Let Ö ¼ Ü È for ½ let Ü Ö ½ Ö Ö ½. Thus Ü Ü ½, where the digits Ü are elements of the canonical digit set ¼ if Æ, ¼ ½ otherwise. The sequence Ü µ ½ of Æ is called the -expansion of Ü. When is not an integer, a number Ü may have several different -representations on : this system is naturally redundant. The -expansion obtained by the greedy algorithm is the greatest one in the lexicographic order. It is shown in [8] that addition in real base is on-line computable. When the base is a Pisot number, addition is computable by an on-line finite automaton. 2.6 Knuth number system Here the base is a complex number of the form Ô Ö, where Ö is an integer. Any complex number is representable in base with digits in the canonical digit set ¼ Ö ½ (see [12, 11, 9]). If Ö is a square then every Gaussian integer has a unique finite representation of the form ¼ ½,. Since Ö, we have Þ Thus, ½ ½ Öµ Ô Ö ¼ Þµ Ü ½ Öµ ½ Öµ ½ Þµ Ý Ô Ö ¼ ½ Öµ ½ So the -representation of Þ can be obtained by intertwinning the Öµ-representation of Ü the Öµrepresentation of Ý Ô Ö. Most studied cases are ¼, strongly related to base, Ô ¼ ½ ([12, 13, 20, 17, 16]). With a signed-digit set of the form Ê, Ö Ö ½, addition is computable in constant time in parallel, is computable by an on-line finite state automaton [7]. 3 On-line multiplication algorithm in integer base 3.1 Classical on-line multiplication algorithm First we recall the classical algorithm for on-line multiplication in the signed-digit number system, see [24, 5]. We give our own presentation. THEOREM 1 Multiplication of two numbers represented in integer base ½ with digits in Ë, ½, is computable by an on-line algorithm with delay Æ, where Æ is the smallest positive integer such that Æ ½µ ½ (1) Proof. Denote by the partial sum È ½ Ü ( respectively È ), denote by round(þ) the closest integer to Þ Classical on-line multiplication algorithm Å Ë. Input: two sequences Ü Ü µ ½ Ý Ý µ ½ of Ë Æ such that Ü ½ Ü Æ ¼ Ý ½ Ý Æ ¼. Output: a sequence Ô Ô µ ½ of Ë Æ such that Ƚ Ô È ½ Ü È ½ Ý begin 1. Ô ½ ¼,..., Ô Æ ¼ 2. Ï Æ ¼ 3. Æ ½ 4. while Æ ½ do 5. Ï Ï ½ Ô ½ µ Ý Ü ½ 6. Ô round Ï µ 7. ½ end First let us prove by induction that for any Æ Ï È ½ 3

4 By Line 5 of the algorithm, Ï ½ Ï ½ Ô ½ µ Ý Ü ½ µ By induction hypothesis, Ï ½ ½ È ½ Ô ½ Ý Ü ½ µ, the result follows from the fact that ½ Ü, the similar relations for È. Thus at step Ò Æ, Ò Ò Ò Ï Ò È Ò ½ Ò Ï Ò Ô Ò µ È Ò. Since Ï Ò Ô Ò ½, Ò Ò È Ò Ò the algorithm is convergent. The sequence Ô ½ Ô Ò is a -representation of the most significant half of the product Ò Ò. Now it remains to prove that the digits Ô s computed in Line 6 of the algorithm are in the digit set Ë. It is enough to show that Ï ½. From Line 5 the fact that ½ are less than follows that Æ ½µ Ï Æ ½µ ½ by (1). Note that additions multiplications by a digit in Line 5 are performed in constant time in parallel. COROLLARY 1 The delay Æ for Algorithm Å Ë takes the following values. If ½, Æ. If, Æ. If then Æ. If if ½, Æ ½. 3.2 On-line multiplication in negative base Now we consider the case where the base is a negative integer ½ the digit set is Ì, ½. PROPOSITION 1 Multiplication of two numbers represented in negative base ½ digit set Ì, ½, is computable by the classical on-line algorithm Å Ë with delay Æ, where Æ is the smallest positive integer such that Æ ½µ ½ (2) Proof. At step Ò Æ of the algorithm we get that Ò Ò È Ò Ò Ï Ò Ô Ò µ. Since Ï Ò Ô Ò ½, Ò Ò È Ò Ò To show that Ô is in Ì, we have to show that Ï ½. From Line 5 the fact that ½ are less than Æ ½µ by (2). follows that Ï Æ ½µ ½ 4 On-line multiplication in real base Let ¼ be a digit set containing, that is,. THEOREM 2 Multiplication of two numbers represented in base with digits in is computable by an on-line algorithm with delay Æ, where Æ is the smallest positive integer such that Æ ½ (3) ½µ Proof. Clearly a number Æ satisfying (3) exists, because. Real base on-line multiplication algorithm ÅÊ. Input: two sequences Ü Ü µ ½ Ý Ý µ ½ of Æ such that Ü ½ Ü Æ ¼ Ý ½ Ý Æ ¼ 2. Output: a sequence Ô Ô µ ½ of Æ such that Ƚ Ô È ½ Ü È ½ Ý begin 1. Ô ½ ¼,..., Ô Æ ¼ 2. Ï Æ ¼ 3. Æ ½ 4. while Æ ½ do 5. Ï Ï ½ Ô ½ µ Ý Ü ½ 6. Ô Ï 7. ½ end As above, at step Ò Æ, Ò Ò È Ò Ò Ï Ò Ô Ò µ. Since ¼ Ï Ò Ô Ò ½ we get ¼ Ò Ò È Ò Ò the algorithm is convergent. It remains to prove that the Ô s are in, i.e. ¼ Ô. It is enough to show that Ï ½. From Line 5 the fact that ½ are less than by (3). Ï Æ ½µ Æ ½µ ½ follows that 2 This implies that È ½ Ü È ½ Ý are in ¼ ½. 4

5 Ô EXAMPLE 1 Let ³ ½ µ be the golden ratio. Then the canonical digit set is ³ ¼ ½. Multiplication on ³ is on-line computable with delay Æ by (3). This delay does not seem to be optimal, we conjecture that is optimal. We give in Table 1 below the detail of a computation with Ü Ý.¼ ½¼½¼½. The numerical value of Ü is equal to ³ ³ ½ ³ ³ µ. The result is Ô.¼ ½¼ ½¼½¼¼¼½¼¼¼¼½. Computations are represented in base ³, in a symbolic way. Ï µ ³ Ô 6.¼¼¼¼¼½ ¼ 7.¼¼¼¼½ ¼ 8.¼¼½¼¼¼½¼¼½ ¼ 9.¼½¼¼¼½¼¼½ ¼ 10.½¼½¼¼¼½¼¼¼¼½ ¼ 11 ½.¼½¼¼¼½¼¼¼¼½ ½ 12.½¼¼¼½¼¼¼¼½ ¼ 13 ½.¼¼¼½¼¼¼¼½ ½ 14.¼¼½¼¼¼¼½ ¼ 15.¼½¼¼¼¼½ ¼ 16.½¼¼¼¼½ ¼ 17 ½.¼¼¼¼½ ½ 18.¼¼¼½ ¼ 19.¼¼½ ¼ 20.¼½ ¼ 21.½ ¼ 22 ½.¼ ½ 23.¼ ¼ Table 1. On-line multiplication in base ³ with delay 5 Note that the result is not the greedy -expansion in general. For instance with Ü.¼ ½¼½¼¼½¼½¼½¼½¼½ Ý.¼ ¼½¼½¼¼½¼½¼½¼½¼½, Algorithm ÅÊ gives the result Ô.¼ ½½ ½¼½¼¼¼¼½½¼¼¼¼½¼½¼¼¼½¼¼½, which contains the forbidden pattern ½½. Ô EXAMPLE 2 Let µ be the square of the golden ratio. Then the canonical digit set is ¼ ½. Multiplication on is on-line computable with delay Æ. This delay is optimal for our algorithm : suppose that the delay is achievable, take Ü Ý.¼¼. The result given by Algorithm ÅÊ would then be Ô.¼¼¼½¼ ¼½¼½½¼½½ which is not on the alphabet. 5 Carry-Save versus Signed-Digit In this section is an integer ½. Take ¼, then the representation on is redundant. We call it the Carry-Save representation, because it is used in computer arithmetic under that name in the case that for internal additions in multipliers, see [18]. By the real base algorithm ÅÊ, multiplication in base 2 on ¼ ½ is on-line computable with delay Æ. This delay is optimal, as shown by the following example. Suppose that the delay is 2, take Ü ¼¼ Ý ¼¼½. The result computed by the algorithm would be equal to Ô ¼¼¼½ ¼½. If, multiplication on ¼ is on-line computable with the optimal delay Æ. Relation (3) is never satisfied for integer ½, which is not surprising because it is known that multiplication in integer base on the canonical digit set is not on-line computable. Internal additions multiplications by a digit in Algorithm ÅÊ can be performed in parallel when is an integer. This is well known when. We give below the algorithm for addition in the general case. PROPOSITION 2 Addition in the Carry-Save representation can be performed in constant time in parallel. Proof. Input: Ü Ò ½ Ü ¼ Ý Ò ½ Ý ¼ with Ü Ý in ¼ for ¼ Ò ½. Output: Ò ¼ with in such that Ü Ý ¼Ò ¼Ò ½ ¼Ò ½ begin 1. In parallel for ¼ Ò ½ do 2. Þ Ü Ý 3. if Þ then ½ ; Ö ¼ 4. if Þ ½ then if Þ ½ then ½ ; Ö ½ else ½ ½; Ö ½ 5. if Þ ( ½) then ½ ½; Ö 6. if Þ then ½ ½; Ö ¼ 7. if Þ ½ then if Þ ½ then ½ ½; Ö ½ else ½ ¼; Ö ½ 8. if ¼ Þ then ½ ¼; Ö Þ 9. Ö 10. Ò Ò end Clearly, Ü Ý ¼Ò ¼Ò ½ ¼Ò ½ 5

6 One has to prove that the digits s are elements of. Since ½ Ö ½ ¼ then ½ ½. The case ½ can happen only if Ö ½ ¼, which is impossible. The case ½ can happen only if Ö ½, which is impossible as well. The delay for multiplication in the signed-digit representation is better than in the Carry-Save representation, but note that the digit-set in the signed-digit representation has cardinality ½, to be compared to card µ ½, the digits in being nonnegative take less memory to be stored. 6 On-line multiplication in the Knuth complex number system THEOREM 3 Multiplication of two complex numbers represented in base Ô Ö, with Ö an integer, digit set Ê, Ö Ö ½, is computable by an on-line algorithm with delay Æ, where Æ is the smallest odd integer such that Ö Ö Æ ½ ½ Ö (4) ½µ Proof. On-line multiplication algorithm Å. Input: two sequences Ü Ü µ ½ Ý Ý µ ½ of Ê Æ such that Ü ½ Ü Æ ¼ Ý ½ Ý Æ ¼. Output: a sequence Ô Ô µ ½ of Ê Æ such that Ƚ Ô È ½ Ü È ½ Ý begin 1. Ô ½ ¼,..., Ô Æ ¼ 2. Ï Æ ¼ 3. Æ ½ 4. while Æ ½ do 5. Ï Ï ½ Ô ½ µ Ý Ü ½ 6. Ô Ò Ï µµ Ï µ ½ 7. ½ end The digit Ô will belong to Ê if Ï µ ½. By Line 6, for all, Ï Ô µ ½ Ï Ô µ Ï µ. Thus, by Line 5, Ï µ Ô Ö Ï ½ µ µ ½ µ Ô Ö Ï µ µ ½ µ First suppose that Æ is odd. Then µ Ö Æ ½ Ö ½µ µ Ô Ö Ö Æ ½ Ö ½µ the same holds true for ½. Thus Ï µ Ö Ö Æ ½ Ö ½µ ½ by (4). Suppose now that a better even delay Æ ¼ could be achieved. Then thus This delay will work if µ µ Ô Ö Ö Æ¼ Ö ½µ Ö Æ¼ Ö ½µ Ï µ Ö Ö ½µ Ö Æ¼ Ö ½µ Ö Ö ½µ ½ Ö Æ¼ Ö (5) ½µ Suppose that the delay in (4) is of the form Æ ½ the delay in (5) is of the form Æ ¼ ¼, set Ö ½µ ½ Öµ Then is the smallest positive integer such that ÐÓ µ ÐÓ Öµ ¼ is the smallest positive integer such that obviously ¼. Since for Ò Æ Ï Ò ¼ ÐÓ Ö ½µµ ÐÓ Öµ Ò Ò È Ò Ò Ï Ò Ô Ò µ Ï Ò Ô Ò µ ½ Ô Ö Ô Ò µ Ï Ò µ ÔÖ Ö Æ ½ Ö ½µ the algorithm is convergent, Ô ½ Ô Ò is a - representation of the most significant half of Ò Ò. 6

7 COROLLARY 2 The delay Æ for Algorithm Å takes the following values. If Ö ½, Æ. If Ö or Ö Ö ½ then Æ. If Ö ½¼ then Æ. In the other cases, for Ö ½¼ the delay is Æ. EXAMPLE 3 Let Ê ½ ¼ ½. By Corollary 2 the delay Æ is equal to 5. Let Ü.¼ ½¼½¼½ Ý.¼ ½½¼¼½½. The result is Ô.¼ ½¼ ½½½½ ½½ ½ ½ ½. Ï µ Ô 6.¼¼¼¼¼½ ¼ 7.¼¼¼½½½ ¼ 8.¼¼½½½ ¼ 9.¼½½½ ½½ ¼ 10.½½½½¼¼¼¼ ½ ¼ 11 ½.½½½¼½¼ ½ 12 ½.½½ ½½ ½ ½ ½ ½ ½½ ½ 13 ½.½ ½½ ½ ½ ½ ½ ½½ ½ 14 ½. ½½ ½ ½ ½ ½ ½½ ½ 15 ½.½ ½ ½ ½ ½ ½½ ½ 16 ½.½½½½½½ ½ 17 ½. ½ ½ ½ ½½ ½ 18. ½ ½ ½ ½½ 19 ½.½½½½ ½ 20 ½. ½ ½½ ½ Table 2. On-line multiplication in base with delay 5 Acknowledgements We are pleased to thank the anonymous referee who indicated us references [17] [16]. References [1] A. Avizienis, Signed-digit number representations for fast parallel arithmetic. IRE Transactions on electronic computers 10 (1961), [2] J.-C. Bajard, J. Duprat, S. Kla J.-M. Muller, Some operators for on-line radix 2 computations. J. of Parallel Distributed Computing 22 (1994), [3] Č. Burdík, Ch. Frougny, J.-P. Gazeau R. Krejcar, Beta-integers as natural counting systems for quasicrystals. J. of Physics A: Math. Gen. 31 (1998), [4] C.Y. Chow J.E. Robertson, Logical design of a redundant binary adder. Proc. 4th Symposium on Computer Arithmetic, I.E.E.E. Computer Society Press (1978), [5] M.D. Ercegovac, On-line arithmetic: An overview. Real time Signal Processing VII SPIE 495 (1984), [6] M.D. Ercegovac, An on-line square-rooting algorithm. Proc. 4th Symposium on Computer Arithmetic, I.E.E.E. Computer Society Press (1978). [7] Ch. Frougny, On-line finite automata for addition in some numeration systems. Theoretical Informatics Applications 33 (1999), [8] Ch. Frougny, On-line digit set conversion in real base. Theoret. Comp. Sci. 292 (2003), [9] W. Gilbert, Radix representations of quadratic fields. J. Math. Anal. Appl. 83 (1981), [10] W.H. Kautz, Fibonacci codes for synchronization control. I.E.E.E. Trans. Infor. Th. 11 (1965), [11] I. Kátai J. Szabó, Canonical number systems. Acta Sci. Math. 37 (1975), [12] D.E. Knuth, An imaginary number system. C.A.C.M. 3 (1960), [13] D.E. Knuth, The Art of Computer Programming, vol. 2: Seminumerical Algorithms, 2nd ed., Addison- Wesley, [14] M. Lothaire, Algebraic Combinatorics on Words, Cambridge University Press, [15] D.W. Matula, Basic Digit Sets for Radix Representation. J.A.C.M. 29 (1982), [16] R. McIlhenny, Complex number on-line arithmetic for reconfigurable hardware : algorithms, implementations, applications. PhD Dissertation, Computer Science Department, UCLA, [17] R. McIlhenny M.D. Ercegovac, On-line algorithms for complex number arithmetic. Proc. 32nd Asilomar Conference on Signals, Systems, Computers (1998). [18] J.-M. Muller, Arithmétique des ordinateurs, Masson, [19] J.-M. Muller, Some characterizations of functions computable in on-line arithmetic. I.E.E.E. Trans. on Computers 43 (1994),

8 [20] A.M. Nielsen J.-M. Muller, Borrow-Save Adders for Real Complex Number Systems. In Proceedings of the Conference Real Numbers Computers, Marseilles, 1996, [21] W. Parry, On the -expansions of real numbers. Acta Math. Acad. Sci. Hungar. 11 (1960), [22] W. Penney, A binary system for complex numbers. J.A.C.M. 12 (1965), [23] A. Rényi, Representations for real numbers their ergodic properties. Acta Math. Acad. Sci. Hungar. 8 (1957), [24] K.S. Trivedi M.D. Ercegovac, On-line algorithms for division multiplication. I.E.E.E. Trans. on Computers C 26 (1977), [25] A. Surarerks, On-line arithmetics in real complex base. Ph.D. Dissertation, University Paris 6, LIAFA report 2001/06, june

On-line multiplication in real and complex base

On-line multiplication in real and complex base ) On-line multiplication in real complex base Christiane Frougny LIAFA, CNS UM 708 2 place Jussieu, 75251 Paris Cedex 05, France Université Paris 8 ChristianeFrougny@liafajussieufr Athasit Surarerks Computer

More information

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.

More information

Scan Scheduling Specification and Analysis

Scan Scheduling Specification and Analysis Scan Scheduling Specification and Analysis Bruno Dutertre System Design Laboratory SRI International Menlo Park, CA 94025 May 24, 2000 This work was partially funded by DARPA/AFRL under BAE System subcontract

More information

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.

More information

Designing Networks Incrementally

Designing Networks Incrementally Designing Networks Incrementally Adam Meyerson Kamesh Munagala Ý Serge Plotkin Þ Abstract We consider the problem of incrementally designing a network to route demand to a single sink on an underlying

More information

Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms

Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms Roni Khardon Tufts University Medford, MA 02155 roni@eecs.tufts.edu Dan Roth University of Illinois Urbana, IL 61801 danr@cs.uiuc.edu

More information

A General Greedy Approximation Algorithm with Applications

A General Greedy Approximation Algorithm with Applications A General Greedy Approximation Algorithm with Applications Tong Zhang IBM T.J. Watson Research Center Yorktown Heights, NY 10598 tzhang@watson.ibm.com Abstract Greedy approximation algorithms have been

More information

SFU CMPT Lecture: Week 8

SFU CMPT Lecture: Week 8 SFU CMPT-307 2008-2 1 Lecture: Week 8 SFU CMPT-307 2008-2 Lecture: Week 8 Ján Maňuch E-mail: jmanuch@sfu.ca Lecture on June 24, 2008, 5.30pm-8.20pm SFU CMPT-307 2008-2 2 Lecture: Week 8 Universal hashing

More information

SFU CMPT Lecture: Week 9

SFU CMPT Lecture: Week 9 SFU CMPT-307 2008-2 1 Lecture: Week 9 SFU CMPT-307 2008-2 Lecture: Week 9 Ján Maňuch E-mail: jmanuch@sfu.ca Lecture on July 8, 2008, 5.30pm-8.20pm SFU CMPT-307 2008-2 2 Lecture: Week 9 Binary search trees

More information

THE DIVISION ALGORITHM IN COMPLEX BASES

THE DIVISION ALGORITHM IN COMPLEX BASES Can. Math. Bull. Vol. 39 (), 996 pp. 47 54 THE DIVISION ALGORITHM IN COMPLEX BASES WILLIAM J. GILBERT ABSTRACT. Complex numbers can be represented in positional notation using certain Gaussian integers

More information

Probabilistic analysis of algorithms: What s it good for?

Probabilistic analysis of algorithms: What s it good for? Probabilistic analysis of algorithms: What s it good for? Conrado Martínez Univ. Politècnica de Catalunya, Spain February 2008 The goal Given some algorithm taking inputs from some set Á, we would like

More information

Online Facility Location

Online Facility Location Online Facility Location Adam Meyerson Abstract We consider the online variant of facility location, in which demand points arrive one at a time and we must maintain a set of facilities to service these

More information

Optimal Time Bounds for Approximate Clustering

Optimal Time Bounds for Approximate Clustering Optimal Time Bounds for Approximate Clustering Ramgopal R. Mettu C. Greg Plaxton Department of Computer Science University of Texas at Austin Austin, TX 78712, U.S.A. ramgopal, plaxton@cs.utexas.edu Abstract

More information

Computing optimal linear layouts of trees in linear time

Computing optimal linear layouts of trees in linear time Computing optimal linear layouts of trees in linear time Konstantin Skodinis University of Passau, 94030 Passau, Germany, e-mail: skodinis@fmi.uni-passau.de Abstract. We present a linear time algorithm

More information

1 Elementary number theory

1 Elementary number theory Math 215 - Introduction to Advanced Mathematics Spring 2019 1 Elementary number theory We assume the existence of the natural numbers and the integers N = {1, 2, 3,...} Z = {..., 3, 2, 1, 0, 1, 2, 3,...},

More information

On-line Algorithms for Complex Number Arithmetic

On-line Algorithms for Complex Number Arithmetic Online Algorithms for Complex Number Arithmetic Robert McIlhenny rmcilhen@csuclaedu Computer Science epartment University of California Los Angeles, CA 94 Miloš Ercegovac milos@csuclaedu Abstract A class

More information

Comparing Data Compression in Web-based Animation Models using Kolmogorov Complexity

Comparing Data Compression in Web-based Animation Models using Kolmogorov Complexity Comparing Data Compression in Web-based Animation Models using Kolmogorov Complexity Carlos A. P. Campani, Fernando Accorsi, Paulo Blauth Menezes and Luciana Porcher Nedel Abstract In the last few years,

More information

Approximation by NURBS curves with free knots

Approximation by NURBS curves with free knots Approximation by NURBS curves with free knots M Randrianarivony G Brunnett Technical University of Chemnitz, Faculty of Computer Science Computer Graphics and Visualization Straße der Nationen 6, 97 Chemnitz,

More information

On the Performance of Greedy Algorithms in Packet Buffering

On the Performance of Greedy Algorithms in Packet Buffering On the Performance of Greedy Algorithms in Packet Buffering Susanne Albers Ý Markus Schmidt Þ Abstract We study a basic buffer management problem that arises in network switches. Consider input ports,

More information

A Modality for Recursion

A Modality for Recursion A Modality for Recursion (Technical Report) March 31, 2001 Hiroshi Nakano Ryukoku University, Japan nakano@mathryukokuacjp Abstract We propose a modal logic that enables us to handle self-referential formulae,

More information

COUNTING THE NUMBER OF WINNING BINARY STRINGS IN THE 1-DIMENSIONAL SAME GAME. Department of Mathematics Oberlin College Oberlin OH 44074

COUNTING THE NUMBER OF WINNING BINARY STRINGS IN THE 1-DIMENSIONAL SAME GAME. Department of Mathematics Oberlin College Oberlin OH 44074 COUNTING THE NUMBER OF WINNING BINARY STRINGS IN THE 1-DIMENSIONAL SAME GAME CHRIS BURNS AND BENJAMIN PURCELL Department of Mathematics Oberlin College Oberlin OH 44074 Abstract. Ralf Stephan recently

More information

General properties of staircase and convex dual feasible functions

General properties of staircase and convex dual feasible functions General properties of staircase and convex dual feasible functions JÜRGEN RIETZ, CLÁUDIO ALVES, J. M. VALÉRIO de CARVALHO Centro de Investigação Algoritmi da Universidade do Minho, Escola de Engenharia

More information

The Global Standard for Mobility (GSM) (see, e.g., [6], [4], [5]) yields a

The Global Standard for Mobility (GSM) (see, e.g., [6], [4], [5]) yields a Preprint 0 (2000)?{? 1 Approximation of a direction of N d in bounded coordinates Jean-Christophe Novelli a Gilles Schaeer b Florent Hivert a a Universite Paris 7 { LIAFA 2, place Jussieu - 75251 Paris

More information

The Online Median Problem

The Online Median Problem The Online Median Problem Ramgopal R. Mettu C. Greg Plaxton November 1999 Abstract We introduce a natural variant of the (metric uncapacitated) -median problem that we call the online median problem. Whereas

More information

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PAUL BALISTER Abstract It has been shown [Balister, 2001] that if n is odd and m 1,, m t are integers with m i 3 and t i=1 m i = E(K n) then K n can be decomposed

More information

From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols

From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols Christian Scheideler Ý Berthold Vöcking Þ Abstract We investigate how static store-and-forward routing algorithms

More information

Expander-based Constructions of Efficiently Decodable Codes

Expander-based Constructions of Efficiently Decodable Codes Expander-based Constructions of Efficiently Decodable Codes (Extended Abstract) Venkatesan Guruswami Piotr Indyk Abstract We present several novel constructions of codes which share the common thread of

More information

To illustrate what is intended the following are three write ups by students. Diagonalization

To illustrate what is intended the following are three write ups by students. Diagonalization General guidelines: You may work with other people, as long as you write up your solution in your own words and understand everything you turn in. Make sure to justify your answers they should be clear

More information

Lecture 1. 1 Notation

Lecture 1. 1 Notation Lecture 1 (The material on mathematical logic is covered in the textbook starting with Chapter 5; however, for the first few lectures, I will be providing some required background topics and will not be

More information

Constructive floorplanning with a yield objective

Constructive floorplanning with a yield objective Constructive floorplanning with a yield objective Rajnish Prasad and Israel Koren Department of Electrical and Computer Engineering University of Massachusetts, Amherst, MA 13 E-mail: rprasad,koren@ecs.umass.edu

More information

CS321 Introduction To Numerical Methods

CS321 Introduction To Numerical Methods CS3 Introduction To Numerical Methods Fuhua (Frank) Cheng Department of Computer Science University of Kentucky Lexington KY 456-46 - - Table of Contents Errors and Number Representations 3 Error Types

More information

Mobile Agent Rendezvous in a Ring

Mobile Agent Rendezvous in a Ring Mobile Agent Rendezvous in a Ring Evangelos Kranakis Danny Krizanc Ý Nicola Santoro Cindy Sawchuk Abstract In the rendezvous search problem, two mobile agents must move along the Ò nodes of a network so

More information

in this web service Cambridge University Press

in this web service Cambridge University Press 978-0-51-85748- - Switching and Finite Automata Theory, Third Edition Part 1 Preliminaries 978-0-51-85748- - Switching and Finite Automata Theory, Third Edition CHAPTER 1 Number systems and codes This

More information

Lecture Notes on GRAPH THEORY Tero Harju

Lecture Notes on GRAPH THEORY Tero Harju Lecture Notes on GRAPH THEORY Tero Harju Department of Mathematics University of Turku FIN-20014 Turku, Finland e-mail: harju@utu.fi 2007 Contents 1 Introduction 2 1.1 Graphs and their plane figures.........................................

More information

On Sequential Topogenic Graphs

On Sequential Topogenic Graphs Int. J. Contemp. Math. Sciences, Vol. 5, 2010, no. 36, 1799-1805 On Sequential Topogenic Graphs Bindhu K. Thomas, K. A. Germina and Jisha Elizabath Joy Research Center & PG Department of Mathematics Mary

More information

I-CONTINUITY IN TOPOLOGICAL SPACES. Martin Sleziak

I-CONTINUITY IN TOPOLOGICAL SPACES. Martin Sleziak I-CONTINUITY IN TOPOLOGICAL SPACES Martin Sleziak Abstract. In this paper we generalize the notion of I-continuity, which was defined in [1] for real functions, to maps on topological spaces. We study

More information

REGULAR GRAPHS OF GIVEN GIRTH. Contents

REGULAR GRAPHS OF GIVEN GIRTH. Contents REGULAR GRAPHS OF GIVEN GIRTH BROOKE ULLERY Contents 1. Introduction This paper gives an introduction to the area of graph theory dealing with properties of regular graphs of given girth. A large portion

More information

Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling

Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling Weizhen Mao Department of Computer Science The College of William and Mary Williamsburg, VA 23187-8795 USA wm@cs.wm.edu

More information

Properly Colored Paths and Cycles in Complete Graphs

Properly Colored Paths and Cycles in Complete Graphs 011 ¼ 9 È È 15 ± 3 ¾ Sept., 011 Operations Research Transactions Vol.15 No.3 Properly Colored Paths and Cycles in Complete Graphs Wang Guanghui 1 ZHOU Shan Abstract Let K c n denote a complete graph on

More information

Winning Positions in Simplicial Nim

Winning Positions in Simplicial Nim Winning Positions in Simplicial Nim David Horrocks Department of Mathematics and Statistics University of Prince Edward Island Charlottetown, Prince Edward Island, Canada, C1A 4P3 dhorrocks@upei.ca Submitted:

More information

Unit 7 Number System and Bases. 7.1 Number System. 7.2 Binary Numbers. 7.3 Adding and Subtracting Binary Numbers. 7.4 Multiplying Binary Numbers

Unit 7 Number System and Bases. 7.1 Number System. 7.2 Binary Numbers. 7.3 Adding and Subtracting Binary Numbers. 7.4 Multiplying Binary Numbers Contents STRAND B: Number Theory Unit 7 Number System and Bases Student Text Contents Section 7. Number System 7.2 Binary Numbers 7.3 Adding and Subtracting Binary Numbers 7.4 Multiplying Binary Numbers

More information

Boolean networks, local models, and finite polynomial dynamical systems

Boolean networks, local models, and finite polynomial dynamical systems Boolean networks, local models, and finite polynomial dynamical systems Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4500, Spring 2017

More information

Chapter Summary. Mathematical Induction Recursive Definitions Structural Induction Recursive Algorithms

Chapter Summary. Mathematical Induction Recursive Definitions Structural Induction Recursive Algorithms Chapter Summary Mathematical Induction Recursive Definitions Structural Induction Recursive Algorithms Section 5.1 Sec.on Summary Mathematical Induction Examples of Proof by Mathematical Induction Mistaken

More information

Simultaneous Optimization for Concave Costs: Single Sink Aggregation or Single Source Buy-at-Bulk

Simultaneous Optimization for Concave Costs: Single Sink Aggregation or Single Source Buy-at-Bulk Simultaneous Optimization for Concave Costs: Single Sink Aggregation or Single Source Buy-at-Bulk Ashish Goel Ý Stanford University Deborah Estrin Þ University of California, Los Angeles Abstract We consider

More information

Embedding a graph-like continuum in some surface

Embedding a graph-like continuum in some surface Embedding a graph-like continuum in some surface R. Christian R. B. Richter G. Salazar April 19, 2013 Abstract We show that a graph-like continuum embeds in some surface if and only if it does not contain

More information

Chapter 4. square sum graphs. 4.1 Introduction

Chapter 4. square sum graphs. 4.1 Introduction Chapter 4 square sum graphs In this Chapter we introduce a new type of labeling of graphs which is closely related to the Diophantine Equation x 2 + y 2 = n and report results of our preliminary investigations

More information

William Linz 1 Department of Mathematics, Texas A&M University, College Station, Texas

William Linz 1 Department of Mathematics, Texas A&M University, College Station, Texas #A59 INTEGERS 16 (016) r-completeness OF SEQUENCES OF POSITIVE INTEGERS William Linz 1 Department of Mathematics, Texas A&M University, College Station, Texas willdomath@tamu.edu Edna Jones Department

More information

AN ALGORITHM FOR A MINIMUM COVER OF A GRAPH

AN ALGORITHM FOR A MINIMUM COVER OF A GRAPH AN ALGORITHM FOR A MINIMUM COVER OF A GRAPH ROBERT Z. NORMAN1 AND MICHAEL O. RABIN2 Introduction. This paper contains two similar theorems giving conditions for a minimum cover and a maximum matching of

More information

Weighted Bit-Set Encodings for Redundant Digit Sets: Theory and Applications

Weighted Bit-Set Encodings for Redundant Digit Sets: Theory and Applications Proc. 36th Asilomar Conf. Signals, Systems, and Computers, Pacific Grove, CA, 2001 Nov. 4-7 Weighted Bit-Set Encodings for Redundant Digit Sets: Theory and Applications Ghassem Jaberipur Sharif Univ. of

More information

The strong chromatic number of a graph

The strong chromatic number of a graph The strong chromatic number of a graph Noga Alon Abstract It is shown that there is an absolute constant c with the following property: For any two graphs G 1 = (V, E 1 ) and G 2 = (V, E 2 ) on the same

More information

Response Time Analysis of Asynchronous Real-Time Systems

Response Time Analysis of Asynchronous Real-Time Systems Response Time Analysis of Asynchronous Real-Time Systems Guillem Bernat Real-Time Systems Research Group Department of Computer Science University of York York, YO10 5DD, UK Technical Report: YCS-2002-340

More information

A note on Prüfer-like coding and counting forests of uniform hypertrees

A note on Prüfer-like coding and counting forests of uniform hypertrees A note on Prüfer-like coding and counting forests of uniform hypertrees Christian Lavault Abstract The present note is designing encoding and decoding algorithms for a forest of rooted uniform hypertrees

More information

Imaginary Number Bases

Imaginary Number Bases Imaginary Number Bases Philip Herd arxiv:1701.04506v1 [math.ho] 17 Jan 2017 January 18, 2017 Abstract An expansion upon Donald Kunth s quarter-imaginary base system is introduced to handle any imaginary

More information

Paths partition with prescribed beginnings in digraphs: a Chvátal-Erdős condition approach.

Paths partition with prescribed beginnings in digraphs: a Chvátal-Erdős condition approach. Paths partition with prescribed beginnings in digraphs: a Chvátal-Erdős condition approach. S. Bessy, Projet Mascotte, CNRS/INRIA/UNSA, INRIA Sophia-Antipolis, 2004 route des Lucioles BP 93, 06902 Sophia-Antipolis

More information

Topology and Topological Spaces

Topology and Topological Spaces Topology and Topological Spaces Mathematical spaces such as vector spaces, normed vector spaces (Banach spaces), and metric spaces are generalizations of ideas that are familiar in R or in R n. For example,

More information

Math Introduction to Advanced Mathematics

Math Introduction to Advanced Mathematics Math 215 - Introduction to Advanced Mathematics Number Theory Fall 2017 The following introductory guide to number theory is borrowed from Drew Shulman and is used in a couple of other Math 215 classes.

More information

Treewidth and graph minors

Treewidth and graph minors Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under

More information

ON SWELL COLORED COMPLETE GRAPHS

ON SWELL COLORED COMPLETE GRAPHS Acta Math. Univ. Comenianae Vol. LXIII, (1994), pp. 303 308 303 ON SWELL COLORED COMPLETE GRAPHS C. WARD and S. SZABÓ Abstract. An edge-colored graph is said to be swell-colored if each triangle contains

More information

ISSN X (print) COMPACTNESS OF S(n)-CLOSED SPACES

ISSN X (print) COMPACTNESS OF S(n)-CLOSED SPACES Matematiqki Bilten ISSN 0351-336X (print) 41(LXVII) No. 2 ISSN 1857-9914 (online) 2017(30-38) UDC: 515.122.2 Skopje, Makedonija COMPACTNESS OF S(n)-CLOSED SPACES IVAN LONČAR Abstract. The aim of this paper

More information

Module 11. Directed Graphs. Contents

Module 11. Directed Graphs. Contents Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................

More information

A Residue Approach of the Finite Field Arithmetics

A Residue Approach of the Finite Field Arithmetics A Residue Approach of the Finite Field Arithmetics 1/20 A Residue Approach of the Finite Field Arithmetics JC Bajard LIRMM, CNRS UM2 161 rue Ada, 34392 Montpellier cedex 5, France A Residue Approach of

More information

Speeding Up Evaluation of Powers and Monomials

Speeding Up Evaluation of Powers and Monomials Speeding Up Evaluation of Powers and Monomials (Extended Abstract) Hatem M. Bahig and Hazem M. Bahig Computer Science Division, Department of Mathematics, Faculty of Science, Ain Shams University, Cairo,

More information

VHDL IMPLEMENTATION OF IEEE 754 FLOATING POINT UNIT

VHDL IMPLEMENTATION OF IEEE 754 FLOATING POINT UNIT VHDL IMPLEMENTATION OF IEEE 754 FLOATING POINT UNIT Ms. Anjana Sasidharan Student, Vivekanandha College of Engineering for Women, Namakkal, Tamilnadu, India. Abstract IEEE-754 specifies interchange and

More information

A digital pretopology and one of its quotients

A digital pretopology and one of its quotients Volume 39, 2012 Pages 13 25 http://topology.auburn.edu/tp/ A digital pretopology and one of its quotients by Josef Šlapal Electronically published on March 18, 2011 Topology Proceedings Web: http://topology.auburn.edu/tp/

More information

Optimum Alphabetic Binary Trees T. C. Hu and J. D. Morgenthaler Department of Computer Science and Engineering, School of Engineering, University of C

Optimum Alphabetic Binary Trees T. C. Hu and J. D. Morgenthaler Department of Computer Science and Engineering, School of Engineering, University of C Optimum Alphabetic Binary Trees T. C. Hu and J. D. Morgenthaler Department of Computer Science and Engineering, School of Engineering, University of California, San Diego CA 92093{0114, USA Abstract. We

More information

Generating edge covers of path graphs

Generating edge covers of path graphs Generating edge covers of path graphs J. Raymundo Marcial-Romero, J. A. Hernández, Vianney Muñoz-Jiménez and Héctor A. Montes-Venegas Facultad de Ingeniería, Universidad Autónoma del Estado de México,

More information

On-line Scheduling on Uniform Multiprocessors

On-line Scheduling on Uniform Multiprocessors On-line Scheduling on Uniform Multiprocessors Shelby Funk Ý Joël Goossens Þ Sanjoy Baruah Ý Ý University of North Carolina Chapel Hill, North Carolina funk,baruah@cs.unc.edu Þ Université Libre de Bruxelles

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

An exact algorithm for max-cut in sparse graphs

An exact algorithm for max-cut in sparse graphs An exact algorithm for max-cut in sparse graphs F. Della Croce a M. J. Kaminski b, V. Th. Paschos c a D.A.I., Politecnico di Torino, Italy b RUTCOR, Rutgers University c LAMSADE, CNRS UMR 7024 and Université

More information

Learning to Align Sequences: A Maximum-Margin Approach

Learning to Align Sequences: A Maximum-Margin Approach Learning to Align Sequences: A Maximum-Margin Approach Thorsten Joachims Department of Computer Science Cornell University Ithaca, NY 14853 tj@cs.cornell.edu August 28, 2003 Abstract We propose a discriminative

More information

DISCRETE MATHEMATICS

DISCRETE MATHEMATICS DISCRETE MATHEMATICS WITH APPLICATIONS THIRD EDITION SUSANNA S. EPP DePaul University THOIVISON * BROOKS/COLE Australia Canada Mexico Singapore Spain United Kingdom United States CONTENTS Chapter 1 The

More information

A Note on Karr s Algorithm

A Note on Karr s Algorithm A Note on Karr s Algorithm Markus Müller-Olm ½ and Helmut Seidl ¾ ½ FernUniversität Hagen, FB Informatik, LG PI 5, Universitätsstr. 1, 58097 Hagen, Germany mmo@ls5.informatik.uni-dortmund.de ¾ TU München,

More information

Efficient validation and construction of border arrays

Efficient validation and construction of border arrays Efficient validation and construction of border arrays Jean-Pierre Duval Thierry Lecroq Arnaud Lefebvre LITIS, University of Rouen, France, {Jean-Pierre.Duval,Thierry.Lecroq,Arnaud.Lefebvre}@univ-rouen.fr

More information

Key words. graph algorithms, chromatic number, circular arc graphs, induced cycles

Key words. graph algorithms, chromatic number, circular arc graphs, induced cycles SIAM J. COMPUT. Vol. 0, No. 0, pp. 000 000 c XXXX Society for Industrial and Applied Mathematics REVISITING TUCKER S ALGORITHM TO COLOR CIRCULAR ARC GRAPHS MARIO VALENCIA-PABON Abstract. The circular arc

More information

Disjoint directed cycles

Disjoint directed cycles Disjoint directed cycles Noga Alon Abstract It is shown that there exists a positive ɛ so that for any integer k, every directed graph with minimum outdegree at least k contains at least ɛk vertex disjoint

More information

ON LICT SIGRAPHS. Communicated by Dariush Kiani

ON LICT SIGRAPHS. Communicated by Dariush Kiani Transactions on Combinatorics ISSN (print): 2251-8657, ISSN (on-line): 2251-8665 Vol. 3 No. 4 (2014), pp. 11-18. c 2014 University of Isfahan www.combinatorics.ir www.ui.ac.ir ON LICT SIGRAPHS V. MATHAD

More information

Discrete Applied Mathematics. A revision and extension of results on 4-regular, 4-connected, claw-free graphs

Discrete Applied Mathematics. A revision and extension of results on 4-regular, 4-connected, claw-free graphs Discrete Applied Mathematics 159 (2011) 1225 1230 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam A revision and extension of results

More information

Words, Words, I Am So Sick of Words! Joseph Malkevitch Mathematics (York College)

Words, Words, I Am So Sick of Words! Joseph Malkevitch Mathematics (York College) Words, Words, I Am So Sick of Words! Joseph Malkevitch Mathematics (York College) What is mathematics about? The study of numbers. The study of shapes. But it should be viewed as: The study of patterns.

More information

1 Elementary number theory

1 Elementary number theory 1 Elementary number theory We assume the existence of the natural numbers and the integers N = {1, 2, 3,...} Z = {..., 3, 2, 1, 0, 1, 2, 3,...}, along with their most basic arithmetical and ordering properties.

More information

CMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes

CMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes Multiple-byte data CMSC 313 Lecture 03 big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes UMBC, CMSC313, Richard Chang 4-5 Chapter

More information

Online Scheduling for Sorting Buffers

Online Scheduling for Sorting Buffers Online Scheduling for Sorting Buffers Harald Räcke ½, Christian Sohler ½, and Matthias Westermann ¾ ½ Heinz Nixdorf Institute and Department of Mathematics and Computer Science Paderborn University, D-33102

More information

Disjoint Support Decompositions

Disjoint Support Decompositions Chapter 4 Disjoint Support Decompositions We introduce now a new property of logic functions which will be useful to further improve the quality of parameterizations in symbolic simulation. In informal

More information

A Residue Approach to the Finite Field Arithmetics

A Residue Approach to the Finite Field Arithmetics A Residue Approach to the Finite Field Arithmetics 1/23 A Residue Approach to the Finite Field Arithmetics JC Bajard LIRMM, CNRS UM2 161 rue Ada, 34392 Montpellier cedex 5, France CIRM 2009 A Residue Approach

More information

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF CHAPTER 4 ELEMENTARY NUMBER THEORY AND METHODS OF PROOF Copyright Cengage Learning. All rights reserved. SECTION 4.3 Direct Proof and Counterexample III: Divisibility Copyright Cengage Learning. All rights

More information

CSE 20 DISCRETE MATH. Winter

CSE 20 DISCRETE MATH. Winter CSE 20 DISCRETE MATH Winter 2017 http://cseweb.ucsd.edu/classes/wi17/cse20-ab/ Final exam The final exam is Saturday March 18 8am-11am. Lecture A will take the exam in GH 242 Lecture B will take the exam

More information

Chapter 3: Theory of Modular Arithmetic 1. Chapter 3: Theory of Modular Arithmetic

Chapter 3: Theory of Modular Arithmetic 1. Chapter 3: Theory of Modular Arithmetic Chapter 3: Theory of Modular Arithmetic 1 Chapter 3: Theory of Modular Arithmetic SECTION A Introduction to Congruences By the end of this section you will be able to deduce properties of large positive

More information

Information-Theoretic Private Information Retrieval: A Unified Construction (Extended Abstract)

Information-Theoretic Private Information Retrieval: A Unified Construction (Extended Abstract) Information-Theoretic Private Information Retrieval: A Unified Construction (Extended Abstract) Amos Beimel ½ and Yuval Ishai ¾ ¾ ½ Ben-Gurion University, Israel. beimel@cs.bgu.ac.il. DIMACS and AT&T Labs

More information

arxiv: v1 [math.na] 20 Jun 2014

arxiv: v1 [math.na] 20 Jun 2014 Iterative methods for the inclusion of the inverse matrix Marko D Petković University of Niš, Faculty of Science and Mathematics Višegradska 33, 18000 Niš, Serbia arxiv:14065343v1 [mathna 20 Jun 2014 Miodrag

More information

A 2-Approximation Algorithm for the Soft-Capacitated Facility Location Problem

A 2-Approximation Algorithm for the Soft-Capacitated Facility Location Problem A 2-Approximation Algorithm for the Soft-Capacitated Facility Location Problem Mohammad Mahdian Yinyu Ye Ý Jiawei Zhang Þ Abstract This paper is divided into two parts. In the first part of this paper,

More information

GRAPHS WITH 1-FACTORS

GRAPHS WITH 1-FACTORS proceedings of the american mathematical society Volume 42, Number 1, January 1974 GRAPHS WITH 1-FACTORS DAVID P. SUMNER Abstract. In this paper it is shown that if G is a connected graph of order 2n (n>

More information

Fast Broadcasting and Gossiping in Radio Networks

Fast Broadcasting and Gossiping in Radio Networks Fast Broadcasting and Gossiping in Radio Networks Marek Chrobak Leszek Ga sieniec Ý Wojciech Rytter Þ Abstract We establish an Ç Ò ÐÓ ¾ Òµ upper bound on the time for deterministic distributed broadcasting

More information

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF CHAPTER 4 ELEMENTARY NUMBER THEORY AND METHODS OF PROOF Copyright Cengage Learning. All rights reserved. SECTION 4.3 Direct Proof and Counterexample III: Divisibility Copyright Cengage Learning. All rights

More information

On the sum of graphic matroids Csongor György Csehi Supervisor: András Recski

On the sum of graphic matroids Csongor György Csehi Supervisor: András Recski On the sum of graphic matroids Csongor György Csehi Supervisor: András Recski BME 203.05.08. Abstract There is a conjecture that if the sum of graphic matroids is not graphic then it is nonbinary. Some

More information

Primes in Classes of the Iterated Totient Function

Primes in Classes of the Iterated Totient Function 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 11 (2008), Article 08.1.2 Primes in Classes of the Iterated Totient Function Tony D. Noe 14025 NW Harvest Lane Portland, OR 97229 USA noe@sspectra.com

More information

2 Computation with Floating-Point Numbers

2 Computation with Floating-Point Numbers 2 Computation with Floating-Point Numbers 2.1 Floating-Point Representation The notion of real numbers in mathematics is convenient for hand computations and formula manipulations. However, real numbers

More information

On expansive chaotic maps in G-spaces

On expansive chaotic maps in G-spaces International Journal of Applied Mathematical Research, 3 (3) (2014) 225-232 Science Publishing Corporation wwwsciencepubcocom/indexphp/ijamr doi: 1014419/ijamrv3i32286 Research Paper On expansive chaotic

More information

Stamp Foldings, Semi-meanders, and Open Meanders: Fast Generation Algorithms

Stamp Foldings, Semi-meanders, and Open Meanders: Fast Generation Algorithms Stamp Foldings, Semi-meanders, and Open Meanders: Fast Generation Algorithms J. Sawada R. Li Abstract By considering a permutation representation for stamp-foldings and semi-meanders we construct treelike

More information

A.1 Numbers, Sets and Arithmetic

A.1 Numbers, Sets and Arithmetic 522 APPENDIX A. MATHEMATICS FOUNDATIONS A.1 Numbers, Sets and Arithmetic Numbers started as a conceptual way to quantify count objects. Later, numbers were used to measure quantities that were extensive,

More information

Computing Integer Powers in Floating-Point Arithmetic

Computing Integer Powers in Floating-Point Arithmetic Computing Integer Powers in Floating-Point Arithmetic Peter Kornerup Vincent Lefèvre Jean-Michel Muller May 2007 This is LIP Research Report number RR2007-23 Ceci est le Rapport de Recherches numéro RR2007-23

More information

ON WIENER INDEX OF GRAPH COMPLEMENTS. Communicated by Alireza Abdollahi. 1. Introduction

ON WIENER INDEX OF GRAPH COMPLEMENTS. Communicated by Alireza Abdollahi. 1. Introduction Transactions on Combinatorics ISSN (print): 51-8657, ISSN (on-line): 51-8665 Vol. 3 No. (014), pp. 11-15. c 014 University of Isfahan www.combinatorics.ir www.ui.ac.ir ON WIENER INDEX OF GRAPH COMPLEMENTS

More information