On-line multiplication in real and complex base
|
|
- Claud Crawford
- 5 years ago
- Views:
Transcription
1 On-line multiplication in real complex base Christiane Frougny LIAFA, CNRS UMR place Jussieu, Paris Cedex 05, France Université Paris 8 Christiane.Frougny@liafa.jussieu.fr Athasit Surarerks Computer Engineering Department Faculty of Engineering Chulalongkorn University Phayathai road, Bangkok 10330, Thail athasit@cp.eng.chula.ac.th Abstract Multiplication of two numbers represented in base is shown to be computable by an on-line algorithm when is a negative integer, a positive non-integer real number, or a complex number of the form Ô Ö, where Ö is a positive integer. 1 Introduction On-line arithmetic, introduced in [24], is a mode of computation where opers results flow through arithmetic units in a digit serial manner, starting with the most significant digit. To generate the first digit of the result, the Æ first digits of the opers are required. The integer Æ is called the delay of the algorithm. This technique allows the pipelining of different operations such as addition, multiplication division. It is also appropriate for the processing of real numbers having infinite expansions : it is well known that when multiplying two real numbers, only the left part of the result is significant. On-line arithmetic is used for special circuits such as in signal processing, for very long precision arithmetic. One of the interests of on-line computable functions is that they are continuous for the usual topology on the set of infinite sequences on a finite digit set. To be able to perform on-line computation, it is necessary to use a redundant number system, where a number may have more than one representation (see [24, 5]). An example of such a system is the so-called signed-digit number system. It is composed of an integer base a signed-digit set of the form, with ½. In this sytem addition can be performed in constant time in parallel [1, 4]. On-line multiplication is also feasible [24, 5]. Parallel addition is used internally in the multiplication algorithm. On-line algorithms for addition, subtraction, multiplication, division square-root in integer base are well studied, see [2, 6, 19]. In this paper we study the multiplication in base when is a negative integer, or a non-integer real number, or a complex number of the form Ô Ö. It is known that any real number can be represented in negative integer base without a sign [12, 13, 15], that, with a signed-digit set, addition is computable in constant time in parallel, is computable by an on-line finite state automaton [7]. We show that the on-line multiplication used in the signed-digit number system can be applied in negative base. Negative base is related to some complex number systems, see below. When the base is a real number ½, by the greedy algorithm of Rényi [23], one can compute a representation in base of any real number belonging to the interval ¼ ½, called its -expansion, where the digits are elements of the canonical digit set ¼ if is not an integer, or of ¼ ½ if is an integer. In such a representation, when is not an integer, not all the patterns of digits are allowed (see [21] for instance). For instance in base ½ Ôµ Ôthe golden ratio, the - expansion of the number Ü is ½¼¼½¼¼¼. The pattern ½½ is forbidden. Different -representations of Ü are ¼½½½¼¼¼, or ½¼¼ ¼½µ ¼½µ ¼½µ for instance. This system is thus naturally redundant. Representation of numbers in non-integer base is encountered for instance in coding theory, see [10], in the modelization of quasicrystals, see [3]. In [8] we have studied the problem of the conversion in a real base from a digit set ¼ with to the canonical digit set, without changing the numerical value. Addition multiplication by a fixed positive integer are particular cases of digit set conversion. We have proved that the digit set conversion is on-line computable. 1
2 Moreover, if the base is a Pisot number 1 this conversion is realizable by an on-line finite automaton. This means that in the Pisot case, digit set conversion needs only a finite storage memory, independent of the size of the data. However, addition is not computable in constant time in parallel. In this work, we prove that multiplication of real numbers represented in real base is on-line computable with a certain delay explicitly computed. Our algorithm can be applied to the particular case that is an integer. With digit set ¼, this is the Carry- Save representation. The delay of our on-line multiplication algorithm in the Carry-Save representation is greater than the delay of on-line multiplication in the signed-digit representation, but the Carry-Save representation takes less memory. We then consider the Knuth complex number system, which is composed of the base Ô Ö, with Ö an integer, canonical digit set ¼ Ö ½. Every complex number has a representation in this system [12]. This allows a unified treatment of the real imaginary parts of a complex number. We show that in the Knuth number system with a signed-digit set, with Ö Ö ½, multiplication is on-line computable. It is known that addition is computable in constant time in parallel, is computable by an on-line finite state automaton [7]. The case together with the signed-digit set, has been considered in [17, 16] with practical applications. Other complex numeration systems have been considered. For instance the Penney complex number system consists of the complex base ½ the canonical digit set ¼ ½. Every complex number is representable in this system, the representation is unique finite for the Gaussian integers [22]. It is shown in [25] that in base ½ with signed-digit set ½ ¼ ½ multiplication is online computable. The techniques are different from the ones used in the Knuth number system. 2 Preliminaries 2.1 On-line computability Let be two finite digit sets, denote by Æ the set of infinite sequences of elements of. Let ³ Æ Æ µ ½ µ ½ The function ³ is said to be on-line computable with delay Æ if there exists a natural number Æ such that, for each ½ there exists a function Æ such that 1 A Pisot number is an algebraic integer such that its algebraic conjugates are strictly less than ½ in modulus. The golden ratio the natural integers are Pisot numbers. ½ Æ µ, where Æ denotes the set of sequences of length Æ of elements of. This definition extends readily to functions of several variables. It is well known that some functions are not on-line computable, like addition in the binary system with canonical digit set ¼ ½. Addition is considered as a conversion from ¼ ½ to ¼ ½. Denote by Ú the infinite concatenation ÚÚÚ, by Ú Ò the word Ú concatenated Ò times. Since ¼½ Ò ¼ µ ½¼ ¼½ Ò ¼ µ ¼½ Ò ¼ for any Ò ½, one sees that the most significant digit of the result depends on the least significant digits of the input. Recall that a distance can be defined on Æ as follows: let Ú Ú µ ½ Û Û µ ½ be in Æ, Ú Ûµ Ö where Ö ÑÒ Ú Û if Ú Û, Ú Ûµ ¼ otherwise. The set Æ is then a compact metric space. This topology is equivalent to the product topology. Then any function from Æ to Æ which is on-line computable with delay Æ is Æ -Lipschitz, is thus uniformly continuous [8]. Let be a digit set. We say that multiplication is on-line computable with delay Æ in base on the digit set if there exists a function such that Æ Æ Æ Ü µ ½ Ý µ ½ µ Ô µ ½ Ô ½ ½ Ü ½ Ý which is on-line computable with delay Æ. Note that apriori, because of redundancy, the result of such a process is not unique, but the algorithms we shall consider later on are deterministic, thus compute a function. In the following, we will make the assumption that the opers begin with a run of Æ zeroes. This allows to ignore the delay inside the computation. 2.2 Number representation A survey on numeration systems can be found in [14, Chapter 7]. Let be a finite digit set of real or complex digits let be a real or complex number such that ½. A -representation of a real or complex number Ü with digits in is a finite or a right infinite sequence Ü µ Ò with Ü such that Ü È ½ Ò Ü. It is denoted by Ü Ò Ü ¼ Ü ½Ü µ In this paper we consider only representations of the form Ü µ ½ Æ representing a number Ü equal to Ƚ Ü. When a representation ends with infinitely many zeroes, it is said to be finite, the zeroes are usually omitted. 2
3 2.3 Signed-digit number system The base is a positive integer ½. With a signed-digit set of the form Ë, ½ the representation is redundant addition can be performed in constant time in parallel, is computable by an on-line finite automaton, [1, 4, 19]. 2.4 Negative base numeration systems Let the base be a negative integer ½. It is well known (see [12, 13, 15]) that any real number can be represented without a sign in base with digits from the canonical digit set ¼ ½. With a signed-digit set of the form Ì, with ½ the representation is redundant addition can be performed in constant time in parallel, is computable by an on-line finite automaton [7]. 2.5 Representations in real base Let be a real number ½, generally not an integer. Any real number Ü ¼ ½ can be represented in base by the following greedy algorithm, [23] : denote by by the integral part the fractional part of a number. Let Ö ¼ Ü È for ½ let Ü Ö ½ Ö Ö ½. Thus Ü Ü ½, where the digits Ü are elements of the canonical digit set ¼ if Æ, ¼ ½ otherwise. The sequence Ü µ ½ of Æ is called the -expansion of Ü. When is not an integer, a number Ü may have several different -representations on : this system is naturally redundant. The -expansion obtained by the greedy algorithm is the greatest one in the lexicographic order. It is shown in [8] that addition in real base is on-line computable. When the base is a Pisot number, addition is computable by an on-line finite automaton. 2.6 Knuth number system Here the base is a complex number of the form Ô Ö, where Ö is an integer. Any complex number is representable in base with digits in the canonical digit set ¼ Ö ½ (see [12, 11, 9]). If Ö is a square then every Gaussian integer has a unique finite representation of the form ¼ ½,. Since Ö, we have Þ Thus, ½ ½ Öµ Ô Ö ¼ Þµ Ü ½ Öµ ½ Öµ ½ Þµ Ý Ô Ö ¼ ½ Öµ ½ So the -representation of Þ can be obtained by intertwinning the Öµ-representation of Ü the Öµrepresentation of Ý Ô Ö. Most studied cases are ¼, strongly related to base, Ô ¼ ½ ([12, 13, 20, 17, 16]). With a signed-digit set of the form Ê, Ö Ö ½, addition is computable in constant time in parallel, is computable by an on-line finite state automaton [7]. 3 On-line multiplication algorithm in integer base 3.1 Classical on-line multiplication algorithm First we recall the classical algorithm for on-line multiplication in the signed-digit number system, see [24, 5]. We give our own presentation. THEOREM 1 Multiplication of two numbers represented in integer base ½ with digits in Ë, ½, is computable by an on-line algorithm with delay Æ, where Æ is the smallest positive integer such that Æ ½µ ½ (1) Proof. Denote by the partial sum È ½ Ü ( respectively È ), denote by round(þ) the closest integer to Þ Classical on-line multiplication algorithm Å Ë. Input: two sequences Ü Ü µ ½ Ý Ý µ ½ of Ë Æ such that Ü ½ Ü Æ ¼ Ý ½ Ý Æ ¼. Output: a sequence Ô Ô µ ½ of Ë Æ such that Ƚ Ô È ½ Ü È ½ Ý begin 1. Ô ½ ¼,..., Ô Æ ¼ 2. Ï Æ ¼ 3. Æ ½ 4. while Æ ½ do 5. Ï Ï ½ Ô ½ µ Ý Ü ½ 6. Ô round Ï µ 7. ½ end First let us prove by induction that for any Æ Ï È ½ 3
4 By Line 5 of the algorithm, Ï ½ Ï ½ Ô ½ µ Ý Ü ½ µ By induction hypothesis, Ï ½ ½ È ½ Ô ½ Ý Ü ½ µ, the result follows from the fact that ½ Ü, the similar relations for È. Thus at step Ò Æ, Ò Ò Ò Ï Ò È Ò ½ Ò Ï Ò Ô Ò µ È Ò. Since Ï Ò Ô Ò ½, Ò Ò È Ò Ò the algorithm is convergent. The sequence Ô ½ Ô Ò is a -representation of the most significant half of the product Ò Ò. Now it remains to prove that the digits Ô s computed in Line 6 of the algorithm are in the digit set Ë. It is enough to show that Ï ½. From Line 5 the fact that ½ are less than follows that Æ ½µ Ï Æ ½µ ½ by (1). Note that additions multiplications by a digit in Line 5 are performed in constant time in parallel. COROLLARY 1 The delay Æ for Algorithm Å Ë takes the following values. If ½, Æ. If, Æ. If then Æ. If if ½, Æ ½. 3.2 On-line multiplication in negative base Now we consider the case where the base is a negative integer ½ the digit set is Ì, ½. PROPOSITION 1 Multiplication of two numbers represented in negative base ½ digit set Ì, ½, is computable by the classical on-line algorithm Å Ë with delay Æ, where Æ is the smallest positive integer such that Æ ½µ ½ (2) Proof. At step Ò Æ of the algorithm we get that Ò Ò È Ò Ò Ï Ò Ô Ò µ. Since Ï Ò Ô Ò ½, Ò Ò È Ò Ò To show that Ô is in Ì, we have to show that Ï ½. From Line 5 the fact that ½ are less than Æ ½µ by (2). follows that Ï Æ ½µ ½ 4 On-line multiplication in real base Let ¼ be a digit set containing, that is,. THEOREM 2 Multiplication of two numbers represented in base with digits in is computable by an on-line algorithm with delay Æ, where Æ is the smallest positive integer such that Æ ½ (3) ½µ Proof. Clearly a number Æ satisfying (3) exists, because. Real base on-line multiplication algorithm ÅÊ. Input: two sequences Ü Ü µ ½ Ý Ý µ ½ of Æ such that Ü ½ Ü Æ ¼ Ý ½ Ý Æ ¼ 2. Output: a sequence Ô Ô µ ½ of Æ such that Ƚ Ô È ½ Ü È ½ Ý begin 1. Ô ½ ¼,..., Ô Æ ¼ 2. Ï Æ ¼ 3. Æ ½ 4. while Æ ½ do 5. Ï Ï ½ Ô ½ µ Ý Ü ½ 6. Ô Ï 7. ½ end As above, at step Ò Æ, Ò Ò È Ò Ò Ï Ò Ô Ò µ. Since ¼ Ï Ò Ô Ò ½ we get ¼ Ò Ò È Ò Ò the algorithm is convergent. It remains to prove that the Ô s are in, i.e. ¼ Ô. It is enough to show that Ï ½. From Line 5 the fact that ½ are less than by (3). Ï Æ ½µ Æ ½µ ½ follows that 2 This implies that È ½ Ü È ½ Ý are in ¼ ½. 4
5 Ô EXAMPLE 1 Let ³ ½ µ be the golden ratio. Then the canonical digit set is ³ ¼ ½. Multiplication on ³ is on-line computable with delay Æ by (3). This delay does not seem to be optimal, we conjecture that is optimal. We give in Table 1 below the detail of a computation with Ü Ý.¼ ½¼½¼½. The numerical value of Ü is equal to ³ ³ ½ ³ ³ µ. The result is Ô.¼ ½¼ ½¼½¼¼¼½¼¼¼¼½. Computations are represented in base ³, in a symbolic way. Ï µ ³ Ô 6.¼¼¼¼¼½ ¼ 7.¼¼¼¼½ ¼ 8.¼¼½¼¼¼½¼¼½ ¼ 9.¼½¼¼¼½¼¼½ ¼ 10.½¼½¼¼¼½¼¼¼¼½ ¼ 11 ½.¼½¼¼¼½¼¼¼¼½ ½ 12.½¼¼¼½¼¼¼¼½ ¼ 13 ½.¼¼¼½¼¼¼¼½ ½ 14.¼¼½¼¼¼¼½ ¼ 15.¼½¼¼¼¼½ ¼ 16.½¼¼¼¼½ ¼ 17 ½.¼¼¼¼½ ½ 18.¼¼¼½ ¼ 19.¼¼½ ¼ 20.¼½ ¼ 21.½ ¼ 22 ½.¼ ½ 23.¼ ¼ Table 1. On-line multiplication in base ³ with delay 5 Note that the result is not the greedy -expansion in general. For instance with Ü.¼ ½¼½¼¼½¼½¼½¼½¼½ Ý.¼ ¼½¼½¼¼½¼½¼½¼½¼½, Algorithm ÅÊ gives the result Ô.¼ ½½ ½¼½¼¼¼¼½½¼¼¼¼½¼½¼¼¼½¼¼½, which contains the forbidden pattern ½½. Ô EXAMPLE 2 Let µ be the square of the golden ratio. Then the canonical digit set is ¼ ½. Multiplication on is on-line computable with delay Æ. This delay is optimal for our algorithm : suppose that the delay is achievable, take Ü Ý.¼¼. The result given by Algorithm ÅÊ would then be Ô.¼¼¼½¼ ¼½¼½½¼½½ which is not on the alphabet. 5 Carry-Save versus Signed-Digit In this section is an integer ½. Take ¼, then the representation on is redundant. We call it the Carry-Save representation, because it is used in computer arithmetic under that name in the case that for internal additions in multipliers, see [18]. By the real base algorithm ÅÊ, multiplication in base 2 on ¼ ½ is on-line computable with delay Æ. This delay is optimal, as shown by the following example. Suppose that the delay is 2, take Ü ¼¼ Ý ¼¼½. The result computed by the algorithm would be equal to Ô ¼¼¼½ ¼½. If, multiplication on ¼ is on-line computable with the optimal delay Æ. Relation (3) is never satisfied for integer ½, which is not surprising because it is known that multiplication in integer base on the canonical digit set is not on-line computable. Internal additions multiplications by a digit in Algorithm ÅÊ can be performed in parallel when is an integer. This is well known when. We give below the algorithm for addition in the general case. PROPOSITION 2 Addition in the Carry-Save representation can be performed in constant time in parallel. Proof. Input: Ü Ò ½ Ü ¼ Ý Ò ½ Ý ¼ with Ü Ý in ¼ for ¼ Ò ½. Output: Ò ¼ with in such that Ü Ý ¼Ò ¼Ò ½ ¼Ò ½ begin 1. In parallel for ¼ Ò ½ do 2. Þ Ü Ý 3. if Þ then ½ ; Ö ¼ 4. if Þ ½ then if Þ ½ then ½ ; Ö ½ else ½ ½; Ö ½ 5. if Þ ( ½) then ½ ½; Ö 6. if Þ then ½ ½; Ö ¼ 7. if Þ ½ then if Þ ½ then ½ ½; Ö ½ else ½ ¼; Ö ½ 8. if ¼ Þ then ½ ¼; Ö Þ 9. Ö 10. Ò Ò end Clearly, Ü Ý ¼Ò ¼Ò ½ ¼Ò ½ 5
6 One has to prove that the digits s are elements of. Since ½ Ö ½ ¼ then ½ ½. The case ½ can happen only if Ö ½ ¼, which is impossible. The case ½ can happen only if Ö ½, which is impossible as well. The delay for multiplication in the signed-digit representation is better than in the Carry-Save representation, but note that the digit-set in the signed-digit representation has cardinality ½, to be compared to card µ ½, the digits in being nonnegative take less memory to be stored. 6 On-line multiplication in the Knuth complex number system THEOREM 3 Multiplication of two complex numbers represented in base Ô Ö, with Ö an integer, digit set Ê, Ö Ö ½, is computable by an on-line algorithm with delay Æ, where Æ is the smallest odd integer such that Ö Ö Æ ½ ½ Ö (4) ½µ Proof. On-line multiplication algorithm Å. Input: two sequences Ü Ü µ ½ Ý Ý µ ½ of Ê Æ such that Ü ½ Ü Æ ¼ Ý ½ Ý Æ ¼. Output: a sequence Ô Ô µ ½ of Ê Æ such that Ƚ Ô È ½ Ü È ½ Ý begin 1. Ô ½ ¼,..., Ô Æ ¼ 2. Ï Æ ¼ 3. Æ ½ 4. while Æ ½ do 5. Ï Ï ½ Ô ½ µ Ý Ü ½ 6. Ô Ò Ï µµ Ï µ ½ 7. ½ end The digit Ô will belong to Ê if Ï µ ½. By Line 6, for all, Ï Ô µ ½ Ï Ô µ Ï µ. Thus, by Line 5, Ï µ Ô Ö Ï ½ µ µ ½ µ Ô Ö Ï µ µ ½ µ First suppose that Æ is odd. Then µ Ö Æ ½ Ö ½µ µ Ô Ö Ö Æ ½ Ö ½µ the same holds true for ½. Thus Ï µ Ö Ö Æ ½ Ö ½µ ½ by (4). Suppose now that a better even delay Æ ¼ could be achieved. Then thus This delay will work if µ µ Ô Ö Ö Æ¼ Ö ½µ Ö Æ¼ Ö ½µ Ï µ Ö Ö ½µ Ö Æ¼ Ö ½µ Ö Ö ½µ ½ Ö Æ¼ Ö (5) ½µ Suppose that the delay in (4) is of the form Æ ½ the delay in (5) is of the form Æ ¼ ¼, set Ö ½µ ½ Öµ Then is the smallest positive integer such that ÐÓ µ ÐÓ Öµ ¼ is the smallest positive integer such that obviously ¼. Since for Ò Æ Ï Ò ¼ ÐÓ Ö ½µµ ÐÓ Öµ Ò Ò È Ò Ò Ï Ò Ô Ò µ Ï Ò Ô Ò µ ½ Ô Ö Ô Ò µ Ï Ò µ ÔÖ Ö Æ ½ Ö ½µ the algorithm is convergent, Ô ½ Ô Ò is a - representation of the most significant half of Ò Ò. 6
7 COROLLARY 2 The delay Æ for Algorithm Å takes the following values. If Ö ½, Æ. If Ö or Ö Ö ½ then Æ. If Ö ½¼ then Æ. In the other cases, for Ö ½¼ the delay is Æ. EXAMPLE 3 Let Ê ½ ¼ ½. By Corollary 2 the delay Æ is equal to 5. Let Ü.¼ ½¼½¼½ Ý.¼ ½½¼¼½½. The result is Ô.¼ ½¼ ½½½½ ½½ ½ ½ ½. Ï µ Ô 6.¼¼¼¼¼½ ¼ 7.¼¼¼½½½ ¼ 8.¼¼½½½ ¼ 9.¼½½½ ½½ ¼ 10.½½½½¼¼¼¼ ½ ¼ 11 ½.½½½¼½¼ ½ 12 ½.½½ ½½ ½ ½ ½ ½ ½½ ½ 13 ½.½ ½½ ½ ½ ½ ½ ½½ ½ 14 ½. ½½ ½ ½ ½ ½ ½½ ½ 15 ½.½ ½ ½ ½ ½ ½½ ½ 16 ½.½½½½½½ ½ 17 ½. ½ ½ ½ ½½ ½ 18. ½ ½ ½ ½½ 19 ½.½½½½ ½ 20 ½. ½ ½½ ½ Table 2. On-line multiplication in base with delay 5 Acknowledgements We are pleased to thank the anonymous referee who indicated us references [17] [16]. References [1] A. Avizienis, Signed-digit number representations for fast parallel arithmetic. IRE Transactions on electronic computers 10 (1961), [2] J.-C. Bajard, J. Duprat, S. Kla J.-M. Muller, Some operators for on-line radix 2 computations. J. of Parallel Distributed Computing 22 (1994), [3] Č. Burdík, Ch. Frougny, J.-P. Gazeau R. Krejcar, Beta-integers as natural counting systems for quasicrystals. J. of Physics A: Math. Gen. 31 (1998), [4] C.Y. Chow J.E. Robertson, Logical design of a redundant binary adder. Proc. 4th Symposium on Computer Arithmetic, I.E.E.E. Computer Society Press (1978), [5] M.D. Ercegovac, On-line arithmetic: An overview. Real time Signal Processing VII SPIE 495 (1984), [6] M.D. Ercegovac, An on-line square-rooting algorithm. Proc. 4th Symposium on Computer Arithmetic, I.E.E.E. Computer Society Press (1978). [7] Ch. Frougny, On-line finite automata for addition in some numeration systems. Theoretical Informatics Applications 33 (1999), [8] Ch. Frougny, On-line digit set conversion in real base. Theoret. Comp. Sci. 292 (2003), [9] W. Gilbert, Radix representations of quadratic fields. J. Math. Anal. Appl. 83 (1981), [10] W.H. Kautz, Fibonacci codes for synchronization control. I.E.E.E. Trans. Infor. Th. 11 (1965), [11] I. Kátai J. Szabó, Canonical number systems. Acta Sci. Math. 37 (1975), [12] D.E. Knuth, An imaginary number system. C.A.C.M. 3 (1960), [13] D.E. Knuth, The Art of Computer Programming, vol. 2: Seminumerical Algorithms, 2nd ed., Addison- Wesley, [14] M. Lothaire, Algebraic Combinatorics on Words, Cambridge University Press, [15] D.W. Matula, Basic Digit Sets for Radix Representation. J.A.C.M. 29 (1982), [16] R. McIlhenny, Complex number on-line arithmetic for reconfigurable hardware : algorithms, implementations, applications. PhD Dissertation, Computer Science Department, UCLA, [17] R. McIlhenny M.D. Ercegovac, On-line algorithms for complex number arithmetic. Proc. 32nd Asilomar Conference on Signals, Systems, Computers (1998). [18] J.-M. Muller, Arithmétique des ordinateurs, Masson, [19] J.-M. Muller, Some characterizations of functions computable in on-line arithmetic. I.E.E.E. Trans. on Computers 43 (1994),
8 [20] A.M. Nielsen J.-M. Muller, Borrow-Save Adders for Real Complex Number Systems. In Proceedings of the Conference Real Numbers Computers, Marseilles, 1996, [21] W. Parry, On the -expansions of real numbers. Acta Math. Acad. Sci. Hungar. 11 (1960), [22] W. Penney, A binary system for complex numbers. J.A.C.M. 12 (1965), [23] A. Rényi, Representations for real numbers their ergodic properties. Acta Math. Acad. Sci. Hungar. 8 (1957), [24] K.S. Trivedi M.D. Ercegovac, On-line algorithms for division multiplication. I.E.E.E. Trans. on Computers C 26 (1977), [25] A. Surarerks, On-line arithmetics in real complex base. Ph.D. Dissertation, University Paris 6, LIAFA report 2001/06, june
On-line multiplication in real and complex base
) On-line multiplication in real complex base Christiane Frougny LIAFA, CNS UM 708 2 place Jussieu, 75251 Paris Cedex 05, France Université Paris 8 ChristianeFrougny@liafajussieufr Athasit Surarerks Computer
More informationRSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.
RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.
More informationScan Scheduling Specification and Analysis
Scan Scheduling Specification and Analysis Bruno Dutertre System Design Laboratory SRI International Menlo Park, CA 94025 May 24, 2000 This work was partially funded by DARPA/AFRL under BAE System subcontract
More informationRSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.
RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.
More informationDesigning Networks Incrementally
Designing Networks Incrementally Adam Meyerson Kamesh Munagala Ý Serge Plotkin Þ Abstract We consider the problem of incrementally designing a network to route demand to a single sink on an underlying
More informationEfficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms
Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms Roni Khardon Tufts University Medford, MA 02155 roni@eecs.tufts.edu Dan Roth University of Illinois Urbana, IL 61801 danr@cs.uiuc.edu
More informationA General Greedy Approximation Algorithm with Applications
A General Greedy Approximation Algorithm with Applications Tong Zhang IBM T.J. Watson Research Center Yorktown Heights, NY 10598 tzhang@watson.ibm.com Abstract Greedy approximation algorithms have been
More informationSFU CMPT Lecture: Week 8
SFU CMPT-307 2008-2 1 Lecture: Week 8 SFU CMPT-307 2008-2 Lecture: Week 8 Ján Maňuch E-mail: jmanuch@sfu.ca Lecture on June 24, 2008, 5.30pm-8.20pm SFU CMPT-307 2008-2 2 Lecture: Week 8 Universal hashing
More informationSFU CMPT Lecture: Week 9
SFU CMPT-307 2008-2 1 Lecture: Week 9 SFU CMPT-307 2008-2 Lecture: Week 9 Ján Maňuch E-mail: jmanuch@sfu.ca Lecture on July 8, 2008, 5.30pm-8.20pm SFU CMPT-307 2008-2 2 Lecture: Week 9 Binary search trees
More informationTHE DIVISION ALGORITHM IN COMPLEX BASES
Can. Math. Bull. Vol. 39 (), 996 pp. 47 54 THE DIVISION ALGORITHM IN COMPLEX BASES WILLIAM J. GILBERT ABSTRACT. Complex numbers can be represented in positional notation using certain Gaussian integers
More informationProbabilistic analysis of algorithms: What s it good for?
Probabilistic analysis of algorithms: What s it good for? Conrado Martínez Univ. Politècnica de Catalunya, Spain February 2008 The goal Given some algorithm taking inputs from some set Á, we would like
More informationOnline Facility Location
Online Facility Location Adam Meyerson Abstract We consider the online variant of facility location, in which demand points arrive one at a time and we must maintain a set of facilities to service these
More informationOptimal Time Bounds for Approximate Clustering
Optimal Time Bounds for Approximate Clustering Ramgopal R. Mettu C. Greg Plaxton Department of Computer Science University of Texas at Austin Austin, TX 78712, U.S.A. ramgopal, plaxton@cs.utexas.edu Abstract
More informationComputing optimal linear layouts of trees in linear time
Computing optimal linear layouts of trees in linear time Konstantin Skodinis University of Passau, 94030 Passau, Germany, e-mail: skodinis@fmi.uni-passau.de Abstract. We present a linear time algorithm
More information1 Elementary number theory
Math 215 - Introduction to Advanced Mathematics Spring 2019 1 Elementary number theory We assume the existence of the natural numbers and the integers N = {1, 2, 3,...} Z = {..., 3, 2, 1, 0, 1, 2, 3,...},
More informationOn-line Algorithms for Complex Number Arithmetic
Online Algorithms for Complex Number Arithmetic Robert McIlhenny rmcilhen@csuclaedu Computer Science epartment University of California Los Angeles, CA 94 Miloš Ercegovac milos@csuclaedu Abstract A class
More informationComparing Data Compression in Web-based Animation Models using Kolmogorov Complexity
Comparing Data Compression in Web-based Animation Models using Kolmogorov Complexity Carlos A. P. Campani, Fernando Accorsi, Paulo Blauth Menezes and Luciana Porcher Nedel Abstract In the last few years,
More informationApproximation by NURBS curves with free knots
Approximation by NURBS curves with free knots M Randrianarivony G Brunnett Technical University of Chemnitz, Faculty of Computer Science Computer Graphics and Visualization Straße der Nationen 6, 97 Chemnitz,
More informationOn the Performance of Greedy Algorithms in Packet Buffering
On the Performance of Greedy Algorithms in Packet Buffering Susanne Albers Ý Markus Schmidt Þ Abstract We study a basic buffer management problem that arises in network switches. Consider input ports,
More informationA Modality for Recursion
A Modality for Recursion (Technical Report) March 31, 2001 Hiroshi Nakano Ryukoku University, Japan nakano@mathryukokuacjp Abstract We propose a modal logic that enables us to handle self-referential formulae,
More informationCOUNTING THE NUMBER OF WINNING BINARY STRINGS IN THE 1-DIMENSIONAL SAME GAME. Department of Mathematics Oberlin College Oberlin OH 44074
COUNTING THE NUMBER OF WINNING BINARY STRINGS IN THE 1-DIMENSIONAL SAME GAME CHRIS BURNS AND BENJAMIN PURCELL Department of Mathematics Oberlin College Oberlin OH 44074 Abstract. Ralf Stephan recently
More informationGeneral properties of staircase and convex dual feasible functions
General properties of staircase and convex dual feasible functions JÜRGEN RIETZ, CLÁUDIO ALVES, J. M. VALÉRIO de CARVALHO Centro de Investigação Algoritmi da Universidade do Minho, Escola de Engenharia
More informationThe Global Standard for Mobility (GSM) (see, e.g., [6], [4], [5]) yields a
Preprint 0 (2000)?{? 1 Approximation of a direction of N d in bounded coordinates Jean-Christophe Novelli a Gilles Schaeer b Florent Hivert a a Universite Paris 7 { LIAFA 2, place Jussieu - 75251 Paris
More informationThe Online Median Problem
The Online Median Problem Ramgopal R. Mettu C. Greg Plaxton November 1999 Abstract We introduce a natural variant of the (metric uncapacitated) -median problem that we call the online median problem. Whereas
More informationPACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS
PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PAUL BALISTER Abstract It has been shown [Balister, 2001] that if n is odd and m 1,, m t are integers with m i 3 and t i=1 m i = E(K n) then K n can be decomposed
More informationFrom Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols
From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols Christian Scheideler Ý Berthold Vöcking Þ Abstract We investigate how static store-and-forward routing algorithms
More informationExpander-based Constructions of Efficiently Decodable Codes
Expander-based Constructions of Efficiently Decodable Codes (Extended Abstract) Venkatesan Guruswami Piotr Indyk Abstract We present several novel constructions of codes which share the common thread of
More informationTo illustrate what is intended the following are three write ups by students. Diagonalization
General guidelines: You may work with other people, as long as you write up your solution in your own words and understand everything you turn in. Make sure to justify your answers they should be clear
More informationLecture 1. 1 Notation
Lecture 1 (The material on mathematical logic is covered in the textbook starting with Chapter 5; however, for the first few lectures, I will be providing some required background topics and will not be
More informationConstructive floorplanning with a yield objective
Constructive floorplanning with a yield objective Rajnish Prasad and Israel Koren Department of Electrical and Computer Engineering University of Massachusetts, Amherst, MA 13 E-mail: rprasad,koren@ecs.umass.edu
More informationCS321 Introduction To Numerical Methods
CS3 Introduction To Numerical Methods Fuhua (Frank) Cheng Department of Computer Science University of Kentucky Lexington KY 456-46 - - Table of Contents Errors and Number Representations 3 Error Types
More informationMobile Agent Rendezvous in a Ring
Mobile Agent Rendezvous in a Ring Evangelos Kranakis Danny Krizanc Ý Nicola Santoro Cindy Sawchuk Abstract In the rendezvous search problem, two mobile agents must move along the Ò nodes of a network so
More informationin this web service Cambridge University Press
978-0-51-85748- - Switching and Finite Automata Theory, Third Edition Part 1 Preliminaries 978-0-51-85748- - Switching and Finite Automata Theory, Third Edition CHAPTER 1 Number systems and codes This
More informationLecture Notes on GRAPH THEORY Tero Harju
Lecture Notes on GRAPH THEORY Tero Harju Department of Mathematics University of Turku FIN-20014 Turku, Finland e-mail: harju@utu.fi 2007 Contents 1 Introduction 2 1.1 Graphs and their plane figures.........................................
More informationOn Sequential Topogenic Graphs
Int. J. Contemp. Math. Sciences, Vol. 5, 2010, no. 36, 1799-1805 On Sequential Topogenic Graphs Bindhu K. Thomas, K. A. Germina and Jisha Elizabath Joy Research Center & PG Department of Mathematics Mary
More informationI-CONTINUITY IN TOPOLOGICAL SPACES. Martin Sleziak
I-CONTINUITY IN TOPOLOGICAL SPACES Martin Sleziak Abstract. In this paper we generalize the notion of I-continuity, which was defined in [1] for real functions, to maps on topological spaces. We study
More informationREGULAR GRAPHS OF GIVEN GIRTH. Contents
REGULAR GRAPHS OF GIVEN GIRTH BROOKE ULLERY Contents 1. Introduction This paper gives an introduction to the area of graph theory dealing with properties of regular graphs of given girth. A large portion
More informationCompetitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling
Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling Weizhen Mao Department of Computer Science The College of William and Mary Williamsburg, VA 23187-8795 USA wm@cs.wm.edu
More informationProperly Colored Paths and Cycles in Complete Graphs
011 ¼ 9 È È 15 ± 3 ¾ Sept., 011 Operations Research Transactions Vol.15 No.3 Properly Colored Paths and Cycles in Complete Graphs Wang Guanghui 1 ZHOU Shan Abstract Let K c n denote a complete graph on
More informationWinning Positions in Simplicial Nim
Winning Positions in Simplicial Nim David Horrocks Department of Mathematics and Statistics University of Prince Edward Island Charlottetown, Prince Edward Island, Canada, C1A 4P3 dhorrocks@upei.ca Submitted:
More informationUnit 7 Number System and Bases. 7.1 Number System. 7.2 Binary Numbers. 7.3 Adding and Subtracting Binary Numbers. 7.4 Multiplying Binary Numbers
Contents STRAND B: Number Theory Unit 7 Number System and Bases Student Text Contents Section 7. Number System 7.2 Binary Numbers 7.3 Adding and Subtracting Binary Numbers 7.4 Multiplying Binary Numbers
More informationBoolean networks, local models, and finite polynomial dynamical systems
Boolean networks, local models, and finite polynomial dynamical systems Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4500, Spring 2017
More informationChapter Summary. Mathematical Induction Recursive Definitions Structural Induction Recursive Algorithms
Chapter Summary Mathematical Induction Recursive Definitions Structural Induction Recursive Algorithms Section 5.1 Sec.on Summary Mathematical Induction Examples of Proof by Mathematical Induction Mistaken
More informationSimultaneous Optimization for Concave Costs: Single Sink Aggregation or Single Source Buy-at-Bulk
Simultaneous Optimization for Concave Costs: Single Sink Aggregation or Single Source Buy-at-Bulk Ashish Goel Ý Stanford University Deborah Estrin Þ University of California, Los Angeles Abstract We consider
More informationEmbedding a graph-like continuum in some surface
Embedding a graph-like continuum in some surface R. Christian R. B. Richter G. Salazar April 19, 2013 Abstract We show that a graph-like continuum embeds in some surface if and only if it does not contain
More informationChapter 4. square sum graphs. 4.1 Introduction
Chapter 4 square sum graphs In this Chapter we introduce a new type of labeling of graphs which is closely related to the Diophantine Equation x 2 + y 2 = n and report results of our preliminary investigations
More informationWilliam Linz 1 Department of Mathematics, Texas A&M University, College Station, Texas
#A59 INTEGERS 16 (016) r-completeness OF SEQUENCES OF POSITIVE INTEGERS William Linz 1 Department of Mathematics, Texas A&M University, College Station, Texas willdomath@tamu.edu Edna Jones Department
More informationAN ALGORITHM FOR A MINIMUM COVER OF A GRAPH
AN ALGORITHM FOR A MINIMUM COVER OF A GRAPH ROBERT Z. NORMAN1 AND MICHAEL O. RABIN2 Introduction. This paper contains two similar theorems giving conditions for a minimum cover and a maximum matching of
More informationWeighted Bit-Set Encodings for Redundant Digit Sets: Theory and Applications
Proc. 36th Asilomar Conf. Signals, Systems, and Computers, Pacific Grove, CA, 2001 Nov. 4-7 Weighted Bit-Set Encodings for Redundant Digit Sets: Theory and Applications Ghassem Jaberipur Sharif Univ. of
More informationThe strong chromatic number of a graph
The strong chromatic number of a graph Noga Alon Abstract It is shown that there is an absolute constant c with the following property: For any two graphs G 1 = (V, E 1 ) and G 2 = (V, E 2 ) on the same
More informationResponse Time Analysis of Asynchronous Real-Time Systems
Response Time Analysis of Asynchronous Real-Time Systems Guillem Bernat Real-Time Systems Research Group Department of Computer Science University of York York, YO10 5DD, UK Technical Report: YCS-2002-340
More informationA note on Prüfer-like coding and counting forests of uniform hypertrees
A note on Prüfer-like coding and counting forests of uniform hypertrees Christian Lavault Abstract The present note is designing encoding and decoding algorithms for a forest of rooted uniform hypertrees
More informationImaginary Number Bases
Imaginary Number Bases Philip Herd arxiv:1701.04506v1 [math.ho] 17 Jan 2017 January 18, 2017 Abstract An expansion upon Donald Kunth s quarter-imaginary base system is introduced to handle any imaginary
More informationPaths partition with prescribed beginnings in digraphs: a Chvátal-Erdős condition approach.
Paths partition with prescribed beginnings in digraphs: a Chvátal-Erdős condition approach. S. Bessy, Projet Mascotte, CNRS/INRIA/UNSA, INRIA Sophia-Antipolis, 2004 route des Lucioles BP 93, 06902 Sophia-Antipolis
More informationTopology and Topological Spaces
Topology and Topological Spaces Mathematical spaces such as vector spaces, normed vector spaces (Banach spaces), and metric spaces are generalizations of ideas that are familiar in R or in R n. For example,
More informationMath Introduction to Advanced Mathematics
Math 215 - Introduction to Advanced Mathematics Number Theory Fall 2017 The following introductory guide to number theory is borrowed from Drew Shulman and is used in a couple of other Math 215 classes.
More informationTreewidth and graph minors
Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under
More informationON SWELL COLORED COMPLETE GRAPHS
Acta Math. Univ. Comenianae Vol. LXIII, (1994), pp. 303 308 303 ON SWELL COLORED COMPLETE GRAPHS C. WARD and S. SZABÓ Abstract. An edge-colored graph is said to be swell-colored if each triangle contains
More informationISSN X (print) COMPACTNESS OF S(n)-CLOSED SPACES
Matematiqki Bilten ISSN 0351-336X (print) 41(LXVII) No. 2 ISSN 1857-9914 (online) 2017(30-38) UDC: 515.122.2 Skopje, Makedonija COMPACTNESS OF S(n)-CLOSED SPACES IVAN LONČAR Abstract. The aim of this paper
More informationModule 11. Directed Graphs. Contents
Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................
More informationA Residue Approach of the Finite Field Arithmetics
A Residue Approach of the Finite Field Arithmetics 1/20 A Residue Approach of the Finite Field Arithmetics JC Bajard LIRMM, CNRS UM2 161 rue Ada, 34392 Montpellier cedex 5, France A Residue Approach of
More informationSpeeding Up Evaluation of Powers and Monomials
Speeding Up Evaluation of Powers and Monomials (Extended Abstract) Hatem M. Bahig and Hazem M. Bahig Computer Science Division, Department of Mathematics, Faculty of Science, Ain Shams University, Cairo,
More informationVHDL IMPLEMENTATION OF IEEE 754 FLOATING POINT UNIT
VHDL IMPLEMENTATION OF IEEE 754 FLOATING POINT UNIT Ms. Anjana Sasidharan Student, Vivekanandha College of Engineering for Women, Namakkal, Tamilnadu, India. Abstract IEEE-754 specifies interchange and
More informationA digital pretopology and one of its quotients
Volume 39, 2012 Pages 13 25 http://topology.auburn.edu/tp/ A digital pretopology and one of its quotients by Josef Šlapal Electronically published on March 18, 2011 Topology Proceedings Web: http://topology.auburn.edu/tp/
More informationOptimum Alphabetic Binary Trees T. C. Hu and J. D. Morgenthaler Department of Computer Science and Engineering, School of Engineering, University of C
Optimum Alphabetic Binary Trees T. C. Hu and J. D. Morgenthaler Department of Computer Science and Engineering, School of Engineering, University of California, San Diego CA 92093{0114, USA Abstract. We
More informationGenerating edge covers of path graphs
Generating edge covers of path graphs J. Raymundo Marcial-Romero, J. A. Hernández, Vianney Muñoz-Jiménez and Héctor A. Montes-Venegas Facultad de Ingeniería, Universidad Autónoma del Estado de México,
More informationOn-line Scheduling on Uniform Multiprocessors
On-line Scheduling on Uniform Multiprocessors Shelby Funk Ý Joël Goossens Þ Sanjoy Baruah Ý Ý University of North Carolina Chapel Hill, North Carolina funk,baruah@cs.unc.edu Þ Université Libre de Bruxelles
More information3 No-Wait Job Shops with Variable Processing Times
3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select
More informationAn exact algorithm for max-cut in sparse graphs
An exact algorithm for max-cut in sparse graphs F. Della Croce a M. J. Kaminski b, V. Th. Paschos c a D.A.I., Politecnico di Torino, Italy b RUTCOR, Rutgers University c LAMSADE, CNRS UMR 7024 and Université
More informationLearning to Align Sequences: A Maximum-Margin Approach
Learning to Align Sequences: A Maximum-Margin Approach Thorsten Joachims Department of Computer Science Cornell University Ithaca, NY 14853 tj@cs.cornell.edu August 28, 2003 Abstract We propose a discriminative
More informationDISCRETE MATHEMATICS
DISCRETE MATHEMATICS WITH APPLICATIONS THIRD EDITION SUSANNA S. EPP DePaul University THOIVISON * BROOKS/COLE Australia Canada Mexico Singapore Spain United Kingdom United States CONTENTS Chapter 1 The
More informationA Note on Karr s Algorithm
A Note on Karr s Algorithm Markus Müller-Olm ½ and Helmut Seidl ¾ ½ FernUniversität Hagen, FB Informatik, LG PI 5, Universitätsstr. 1, 58097 Hagen, Germany mmo@ls5.informatik.uni-dortmund.de ¾ TU München,
More informationEfficient validation and construction of border arrays
Efficient validation and construction of border arrays Jean-Pierre Duval Thierry Lecroq Arnaud Lefebvre LITIS, University of Rouen, France, {Jean-Pierre.Duval,Thierry.Lecroq,Arnaud.Lefebvre}@univ-rouen.fr
More informationKey words. graph algorithms, chromatic number, circular arc graphs, induced cycles
SIAM J. COMPUT. Vol. 0, No. 0, pp. 000 000 c XXXX Society for Industrial and Applied Mathematics REVISITING TUCKER S ALGORITHM TO COLOR CIRCULAR ARC GRAPHS MARIO VALENCIA-PABON Abstract. The circular arc
More informationDisjoint directed cycles
Disjoint directed cycles Noga Alon Abstract It is shown that there exists a positive ɛ so that for any integer k, every directed graph with minimum outdegree at least k contains at least ɛk vertex disjoint
More informationON LICT SIGRAPHS. Communicated by Dariush Kiani
Transactions on Combinatorics ISSN (print): 2251-8657, ISSN (on-line): 2251-8665 Vol. 3 No. 4 (2014), pp. 11-18. c 2014 University of Isfahan www.combinatorics.ir www.ui.ac.ir ON LICT SIGRAPHS V. MATHAD
More informationDiscrete Applied Mathematics. A revision and extension of results on 4-regular, 4-connected, claw-free graphs
Discrete Applied Mathematics 159 (2011) 1225 1230 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam A revision and extension of results
More informationWords, Words, I Am So Sick of Words! Joseph Malkevitch Mathematics (York College)
Words, Words, I Am So Sick of Words! Joseph Malkevitch Mathematics (York College) What is mathematics about? The study of numbers. The study of shapes. But it should be viewed as: The study of patterns.
More information1 Elementary number theory
1 Elementary number theory We assume the existence of the natural numbers and the integers N = {1, 2, 3,...} Z = {..., 3, 2, 1, 0, 1, 2, 3,...}, along with their most basic arithmetical and ordering properties.
More informationCMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes
Multiple-byte data CMSC 313 Lecture 03 big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes UMBC, CMSC313, Richard Chang 4-5 Chapter
More informationOnline Scheduling for Sorting Buffers
Online Scheduling for Sorting Buffers Harald Räcke ½, Christian Sohler ½, and Matthias Westermann ¾ ½ Heinz Nixdorf Institute and Department of Mathematics and Computer Science Paderborn University, D-33102
More informationDisjoint Support Decompositions
Chapter 4 Disjoint Support Decompositions We introduce now a new property of logic functions which will be useful to further improve the quality of parameterizations in symbolic simulation. In informal
More informationA Residue Approach to the Finite Field Arithmetics
A Residue Approach to the Finite Field Arithmetics 1/23 A Residue Approach to the Finite Field Arithmetics JC Bajard LIRMM, CNRS UM2 161 rue Ada, 34392 Montpellier cedex 5, France CIRM 2009 A Residue Approach
More informationELEMENTARY NUMBER THEORY AND METHODS OF PROOF
CHAPTER 4 ELEMENTARY NUMBER THEORY AND METHODS OF PROOF Copyright Cengage Learning. All rights reserved. SECTION 4.3 Direct Proof and Counterexample III: Divisibility Copyright Cengage Learning. All rights
More informationCSE 20 DISCRETE MATH. Winter
CSE 20 DISCRETE MATH Winter 2017 http://cseweb.ucsd.edu/classes/wi17/cse20-ab/ Final exam The final exam is Saturday March 18 8am-11am. Lecture A will take the exam in GH 242 Lecture B will take the exam
More informationChapter 3: Theory of Modular Arithmetic 1. Chapter 3: Theory of Modular Arithmetic
Chapter 3: Theory of Modular Arithmetic 1 Chapter 3: Theory of Modular Arithmetic SECTION A Introduction to Congruences By the end of this section you will be able to deduce properties of large positive
More informationInformation-Theoretic Private Information Retrieval: A Unified Construction (Extended Abstract)
Information-Theoretic Private Information Retrieval: A Unified Construction (Extended Abstract) Amos Beimel ½ and Yuval Ishai ¾ ¾ ½ Ben-Gurion University, Israel. beimel@cs.bgu.ac.il. DIMACS and AT&T Labs
More informationarxiv: v1 [math.na] 20 Jun 2014
Iterative methods for the inclusion of the inverse matrix Marko D Petković University of Niš, Faculty of Science and Mathematics Višegradska 33, 18000 Niš, Serbia arxiv:14065343v1 [mathna 20 Jun 2014 Miodrag
More informationA 2-Approximation Algorithm for the Soft-Capacitated Facility Location Problem
A 2-Approximation Algorithm for the Soft-Capacitated Facility Location Problem Mohammad Mahdian Yinyu Ye Ý Jiawei Zhang Þ Abstract This paper is divided into two parts. In the first part of this paper,
More informationGRAPHS WITH 1-FACTORS
proceedings of the american mathematical society Volume 42, Number 1, January 1974 GRAPHS WITH 1-FACTORS DAVID P. SUMNER Abstract. In this paper it is shown that if G is a connected graph of order 2n (n>
More informationFast Broadcasting and Gossiping in Radio Networks
Fast Broadcasting and Gossiping in Radio Networks Marek Chrobak Leszek Ga sieniec Ý Wojciech Rytter Þ Abstract We establish an Ç Ò ÐÓ ¾ Òµ upper bound on the time for deterministic distributed broadcasting
More informationELEMENTARY NUMBER THEORY AND METHODS OF PROOF
CHAPTER 4 ELEMENTARY NUMBER THEORY AND METHODS OF PROOF Copyright Cengage Learning. All rights reserved. SECTION 4.3 Direct Proof and Counterexample III: Divisibility Copyright Cengage Learning. All rights
More informationOn the sum of graphic matroids Csongor György Csehi Supervisor: András Recski
On the sum of graphic matroids Csongor György Csehi Supervisor: András Recski BME 203.05.08. Abstract There is a conjecture that if the sum of graphic matroids is not graphic then it is nonbinary. Some
More informationPrimes in Classes of the Iterated Totient Function
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 11 (2008), Article 08.1.2 Primes in Classes of the Iterated Totient Function Tony D. Noe 14025 NW Harvest Lane Portland, OR 97229 USA noe@sspectra.com
More information2 Computation with Floating-Point Numbers
2 Computation with Floating-Point Numbers 2.1 Floating-Point Representation The notion of real numbers in mathematics is convenient for hand computations and formula manipulations. However, real numbers
More informationOn expansive chaotic maps in G-spaces
International Journal of Applied Mathematical Research, 3 (3) (2014) 225-232 Science Publishing Corporation wwwsciencepubcocom/indexphp/ijamr doi: 1014419/ijamrv3i32286 Research Paper On expansive chaotic
More informationStamp Foldings, Semi-meanders, and Open Meanders: Fast Generation Algorithms
Stamp Foldings, Semi-meanders, and Open Meanders: Fast Generation Algorithms J. Sawada R. Li Abstract By considering a permutation representation for stamp-foldings and semi-meanders we construct treelike
More informationA.1 Numbers, Sets and Arithmetic
522 APPENDIX A. MATHEMATICS FOUNDATIONS A.1 Numbers, Sets and Arithmetic Numbers started as a conceptual way to quantify count objects. Later, numbers were used to measure quantities that were extensive,
More informationComputing Integer Powers in Floating-Point Arithmetic
Computing Integer Powers in Floating-Point Arithmetic Peter Kornerup Vincent Lefèvre Jean-Michel Muller May 2007 This is LIP Research Report number RR2007-23 Ceci est le Rapport de Recherches numéro RR2007-23
More informationON WIENER INDEX OF GRAPH COMPLEMENTS. Communicated by Alireza Abdollahi. 1. Introduction
Transactions on Combinatorics ISSN (print): 51-8657, ISSN (on-line): 51-8665 Vol. 3 No. (014), pp. 11-15. c 014 University of Isfahan www.combinatorics.ir www.ui.ac.ir ON WIENER INDEX OF GRAPH COMPLEMENTS
More information