LET Õ Ò µ denote the maximum size of a Õ-ary code

Size: px
Start display at page:

Download "LET Õ Ò µ denote the maximum size of a Õ-ary code"

Transcription

1 1 Long Nonbinary Codes Exceeding the Gilbert-Varshamov bound for Any Fixed Distance Sergey Yekhanin Ilya Dumer Abstract Let Õ µ denote the maximum size of a Õ- ary code of length and distance We study the minimum asymptotic redundancy Õ µ ÐÓ Õ Õ µ as grows while Õ and are fixed For any and Õ long algebraic codes are designed that improve on the BCH codes and have the lowest asymptotic redundancy Õ µ º µ ¾µµ ÐÓ Õ known to date Prior to this work, codes of fixed distance that asymptotically surpass BCH codes and the Gilbert-Varshamov bound were designed only for distances and Index Terms affine lines, BCH code, Bezout s theorem, norm I INTRODUCTION LET Õ µ denote the maximum size of a Õ-ary code of length and distance We study the asymptotic size Õ µ if Õ and are fixed as, and introduce a related quantity ÐÓ Õ Õ µ Õ µ ÐÑ ÐÓ Õ which we call the redundancy coefficient The Hamming upper bound Õ µ Õ µ¾ leads to the lower bound Õ µ Õ µ µ¾ (1) which is the best bound on Õ µ known to date for arbitrary values of Õ and On the other hand, the Varshamov existence bound admits any linear Õ code of dimension ¾ ÐÓÕ Õ µ This leads to the redundancy coefficient ± Õ µ ¾ (2) (Note that the Gilbert bound results in a weaker inequality Õ µ ) S Yekhanin is a PhD student at the Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, Cambridge, MA 02139, USA His research was supported in part by NTT Award MIT and NSF grant CCR I Dumer is with the College of Engineering, University of California, Riverside, CA 92521, USA His research was supported by NSF grant CCR Let be a primitive element of the Galois field Õ Ñ Consider (see [20]) the narrow-sense BCH code defined by the generator polynomial with zeros ¾ Let Õ Ñ µ denote the extended BCH code obtained by adding the overall parity check Code Õ Ñ µ has length ÕÑ constructive distance, and redundancy coefficient ¾µ Õ µ Õ µ (3) Õ Note that the above BCH bound (3) is better than the Varshamov bound (2) for Õ and coincides with (2) for Õ Note also that (3) meets the Hamming bound (1) if Õ ¾ or Therefore ¾ µ µ¾ and Õ µ For distances and infinite families of nonbinary linear codes are constructed in [5] and [6] that reduce asymptotic redundancy (3) Open Problem 2 from [6] also raises the question if the BCH bound (3) can be improved for larger values of Our main result is an algebraic construction of codes that gives an affirmative answer to this problem for all Õ In terms of redundancy, the new bound is expressed by Theorem 1 : For all Õ and Õ µ µ ¾µ (4) Combining (3) and (4), we obtain ¾µ Õ µ Õ µ Ñ Õ µ ¾µ Note that the above bound is better than the Varshamov existence bound for arbitrary Õ and The rest of the paper is organized as follows In Section II, we review the upper bounds for Õ µ that surpass the BCH bound (3) for small values of In Section III, we present our code construction and prove the new bound (4) This proof rests on important Theorem 4, which is proven in Section IV Finally, we make some concluding remarks in section V II PREVIOUS WORK Prior to this work, codes that asymptotically exceed the BCH bound (3) were known only for We start with the bounds for Õ µ Linear Õ codes are equivalent to caps in projective geometries Õµ and have been studied extensively under this name See [18] for a review However, the exact values of Õ µ remain unknown for all Õ and the gaps between the upper and the lower bounds are still large

2 2 The Hamming bound yields Õ µ Mukhopadhyay [22] obtained the upper bound Õ µ For all values of Õ this was later improved by Edel and Bierbrauer [7] to Õ µ ÐÓ Õ Õ Õ ¾ µ (5) Note that for large values of Õ the right hand side of (5) tends to The case of Õ has been of special interest, and general bound (5) has been improved in a few papers (see [17], [11], [2], [8]) The current record µ due to Edel [8] slightly improves on the previous record µ obtained by Calderbank and Fishburn [2] For Õ the construction of [14] also improves (5) Namely, µ Now we proceed to the bounds for Õ µ The Hamming bound yields Õ µ ¾ Several families of linear codes constructed in [6] reach the bound Õ µ (6) for all values of Õ Later, alternative constructions of codes with the same asymptotic redundancy were considered in [9] Similarly to the case of there exist better bounds for small alphabets Namely, Goppa pointed out that ternary double error-correcting BCH codes asymptotically meet the Hamming bound (1) For Õ and two different constructions that asymptotically meet the Hamming bound were proposed in [12] and [4] Thus, µ µ ¾ For the infinite families of linear codes designed in [5] and [6] reach the upper bound Õ µ (7) for all Õ The constructions are rather complex and the resulting linear codes are not cyclic Later, a simpler construction of a cyclic code with the same asymptotic redundancy was proposed in [3] Again, better bounds exist for small values of Õ Namely, µ ¾ [6] and µ [10] We summarize the bounds described so far in Figure 1 The following Lemma 2 due to Gevorkyan [13] shows that redundancy Õ µ cannot increase when the alphabet size is reduced Lemma 2 : For arbitrary value of distance, Õ Õ ¾ µ Õ µ Õ ¾ µ Proof: Given a code Î of length over the Õ ¾ -ary alphabet we prove the existence of a code Î of the same length over Õ - ary alphabet with the same redundancy coefficient Let Õ ¾ -ary alphabet be an additive group Õ¾, and Õ -ary alphabet form a subset Õ Õ¾ Define the componentwise shift Î Ú Î Ú of code Î by an arbitrary vector Ú ¾ Õ ¾ Note that any vector ¾ Õ belongs to exactly Î codes among all Õ ¾ codes Î Ú, as Ú runs through Õ ¾ Hence, codes Î Ú include on average Õ Î Õ ¾ vectors of the subset Õ Õ ¾ Therefore, some distance d alphabet q Fig 1 Hamming bound is tight Edel cap c(3,4) Glynn Tatau cap c(4,4) Edel Bierbrauer bound for c(q,4) Bound for c(4,6) by Feng et al Dumer bounds for c(q,5) and c(q,6) No bound better than BCH bound is known New bound A taxonomy of best known upper bounds for Õ µ set Î Ú Õ has at least this average size Denote this set by Î Clearly, Î is a Õ -ary code with the same distance as code Î It remains to note that ÐÓ Õ Õ Î Õ ¾ µ ÐÓ Õ ÐÓ Õ ¾ Î ÐÓ Õ¾ The proof is completed Corollary 3 : Let Õ be an infinite sequence of growing alphabet sizes Assume there exist and such that for all, Õ µ Then Õ µ for all values of Õ Proof: This follows trivially from Lemma 2 III CODE CONSTRUCTION In the sequel, the elements of the field Õ are denoted by Greek letters, while the elements of extension fields Õ are denoted by Latin letters We start with an extended BCH code Õ Ñ µ of length Õ Ñ and constructive distance Here for any position ¾ Õ Ñ we define its locator, where for and Then the parity check matrix of code has the form À Ñ Õ µ (8) Here the powers of locators are represented with respect to some basis of Õ Ñ over Õ Note that the redundancy of is at most µñ Also, we assume in the sequel that Õ does not divide ¾ since code has constructive distance instead of otherwise Consider any nonzero codeword ¾ of weight Û with nonzero symbols in positions Û Let µ Ü Ü Û denote its locator set, where we use notation Ü for all Û We say that µ lies on an affine line Ä µ over Õ if there exist ¾ Õ Ñ such that Ü (9)

3 3 where ¾ Õ for all values of Û The key observation underlining our code construction is that under some restrictions on extension Ñ and characteristic char Õ of the field Õ any code vector ¾ of weight has its locator set µ lying on some affine line 1 Formally, this is expressed by Theorem 4 : Let Ñ be a prime, Ñ µ and char Õ Consider the extended BCH code Õ Ñ µ of constructive distance Then any codeword of minimum weight has its locator set µ lying on some affine line Ä µ over Õ We defer the proof of Theorem 4 till section IV and proceed with the code construction Let Ñ ¾µ ¾µ Consider the field Õ and its subfield Õ Let be the basis of Õ over Õ such that Õ is spanned by Let Ñ be an arbitrary basis of Õ Ñ over Õ Below we map each element Ü Ñ «of the field Õ Ñ onto the element Ü Ñ «(10) of the field Õ It is readily seen that for arbitrary ¾ Õ Ñ and ¾ Õ Recall that the norm [15] of Ü ¾ Õ (11) Æ Õ» Õ Üµ Æ Õ µ Õ ¾ ܵ Ü is a classical mapping from Õ to Õ (12) Now we are ready to present our code construction Consider the Õ-ary code µ of length Õ Ñ with the parity check matrix À Ñ Õ Æ ¾ µ Æ ¾ µ (13) where the locators and their powers are represented in Õ with respect to the basis and values of Æ ¾ are represented in Õ with respect to Recall that Æ ¾ ܵ takes values in Õ Therefore the redundancy of does not exceed µñ Below is the main theorem of the paper Theorem 5 : Suppose Ñ µ is a prime, and char Õ ; then code µ defined by (13) has parameters Õ Ñ Õ Ñ µñ Ñ ¾µ Õ 1 We shall also see that code Õ Ñ µ does have minimum distance under these restrictions Proof: Note that, since is a subcode of the extended BCH code defined in (8) Let be the set of all codewords of weight exactly It remains to prove that Assume the converse Let ¾ be a codeword of weight with locator set µ Ü Ü µ This implies that for some nonzero symbols ¾ Õ Ü Ø Ø Æ ¾ Ü µ (14) Note that ¾ Therefore according to Theorem 4, there exist from Õ Ñ and pairwise distinct ¾ Õ such that Ü Consider the affine permutation ܵ Ü of the entire locator set Õ Ñ, where and Clearly, maps each Ü onto, ie Ü It is well known ([1], [20]) that the extended BCH code is invariant under any affine permutation of the locators, so that is also a locator set in Indeed, for any Ø ¾ we have an equality Ø Ü µ Ø Ø Ø Ø Ü (15) We shall now demonstrate that (14) yields one more equation ¾ (16) Indeed, we use (11) and (12) to obtain Õ µ Õ Æ ¾ ÕØ ÕØ (17) Ø ¾ Ø Ø µ Ø where Ø are some polynomials in and Now the last equation in (14) can be rewritten as ¾ ¾ Ø µ Ø Ø µ Ø Ø Ø This gives (16), due to the two facts: Ø for all Ø according to (15) ¾ µ Æ ¾ µ and is nonzero, since is nonzero and norm is a degree Equations (15) and (16) form the linear system Ø Ø ¾

4 4 in variables with the Vandermonde matrix Ø µ Recall that are nonzero and are pairwise distinct Therefore these equations hold only if simultaneously Thus, our initial assumption that has weight does not hold This completes the proof Lemma 6 : Suppose char Õ ; then Õ µ µ ¾µ Proof: We estimate the asymptotic redundancy of the family of codes presented in Theorem 5 Here Õ and are fixed, while Ñ µ runs to infinity over primes Then µñ Ñ ¾µ Õ µ ÐÑ Ñ Ñ µ ¾µ (18) The proof is completed It is obvious that for every there exists an infinite family Õ of growing alphabets such that char Õ Combining Lemma 6 with Corollary 3, we get Theorem 1 The proof is completed To conclude, we would like to note that our construction of code (13) generalizes the construction of nonbinary double error-correcting codes from Theorem 7 in [6] IV AFFINE LINES Before we proceed to the proof of Theorem 4, let us introduce some standard concepts and theorems of algebraic geometry Let be an algebraically closed field and Ö Ø be two positive integers Let Ö ¾ Ü Ü Ø For any Ü Ø µ ¾ Ø, the matrix Â Ü Ö µ Ü Ü Ö Ü Ü Ü Ø Ü Ö Ü Ø Ü (19) is called the Jacobian of functions at point Ü The set Î of common roots to the system of equations Ü Ü Ø µ Ö Ü Ü Ø µ (20) is called an affine variety The ideal Á Î µ is the set of all polynomials ¾ Ü Ü Ø such that ܵ for all Ü ¾ Î One important characteristic of a variety is its dimension Ñ Î Dimension of a non-empty variety is a non-negative integer Let Ü Ø µ ¾ Î be an arbitrary point on Î The dimension of a variety Î at a point Ü, denoted Ñ Ü Î, is the maximum dimension of an irreducible component of Î containing Ü A point Ü ¾ Î such that Ñ Ü Î is called an isolated point We shall need the following lemma ([19], p166) Lemma 7 : Let Î be an affine variety with the ideal Á Î µ Ü Ü Ø Then for any Ü Ø µ ¾ Î and Ö ¾ Á Î µ rank Â Ü µ Ø Ñ Ü Î The next lemma is a corollary to the classical Bezout s theorem ([16], p53) Lemma 8 : Let Î be an affine variety defined by (20) Then the number of isolated points on Î does not exceed Ö Let Ø be fixed non-zero elements of some finite field Õ Consider a variety Î in the algebraic closure of Õ defined by the following system of equations Ü Ø Ü Ø Ø Ü ¾ Ø Ü ¾ Ø Ø Ü Ø Ø Ü Ø Ø Ø (21) Let Ü Ø µ be an arbitrary point on Î We say that Ü is an interesting point if for all Lemma 9 : Let Î be the variety defined by (21) Suppose char Õ Ø; then every interesting point on Î is isolated Proof: Let Ü Ø µ be an arbitrary interesting point on Î Let Ü Ü Ø µ denote the left hand side of the -th equation of (21) Consider the Jacobian of at point Ü Â Ü Ø µ Thus we have Ø Â Ü Ø µ Ø Ø ¾ ¾ Ø Ø Ø Ø Ø Ø Ø Ø Ø Ø Ø Ø Ø Using standard properties of the Vandermonde determinant and the facts that are non-zero and char Õ Ø, we get rank Â Ü Ø µ Ø (22) It is easy to see that Ø ¾ Á Î µ Combining (22) with Lemma 7, we obtain Ñ Ü Î The proof is completed Lemma 10 : Let Ñ be a prime Ñ Ø Assume char Õ Ø Let Î be the variety defined by (21) Suppose Ü ¾ Õ Ø Ñ is an interesting point on Î ; then Ü ¾ Õ Ø In other words, every interesting point on Î that is rational over Õ Ñ is rational over Õ Proof: Assume the converse Let Ü Ø µ be an interesting point on Î such that Ü ¾ Õ Ø Ñ Õ Ø Consider the following Ñ conjugate points Ô Õ Õ Ø µ for all Ñ Each of the above points is interesting Since Ñ is a prime, the points are pairwise distinct However, according to Lemma 9 every interesting point on Î is isolated Thus, we have Ñ Ø isolated point on Î This contradicts Lemma 8 Remark 11 : Note that we can slightly weaken the condition of Lemma 10 replacing Ñ prime and Ñ Ø

5 5 with condition:, Ñ implies Ø Now we are ready to prove Theorem 4 Proof: Assume is nonempty (this fact will be proven later) and consider the locator set µ Ü Ü µ for any ¾ Recall that µ satisfies the first ¾ equations in (14) where for all Consider an affine permutation ܵ Ü of the locator set Õ Ñ of the code Let ¾ Õ Ñ be such that Ü ¾ µ and Ü µ (23) Let Ý denote Ü µ Now we again use the fact that code (8) is invariant under affine permutations Therefore the new locator set Ý µ Ý Ý µ satisfies similar equations ¾ Ý Ý ¾ Ý ¾ Ý ¾ ¾ Ý Ý ¾ (24) Now we remove the first equation (which does not include variables Ý µ from (24), and obtain the system of equations, which is identical to system (21) for Ø Recall that Ü Ü are pairwise distinct elements of Õ Ñ Therefore Ý Ý are also pairwise distinct Thus Ý Ý is an interesting solution to the above system It is straightforward to verify that all the conditions of Lemma 10 hold This yields Ý Ü ¾ Õ ¾ Thus, we obtain all locators Ü on the affine line Ü ¾ Õ Finally, we prove that is nonempty Note that char Õ ¾ Also, recall that we consider codes Õ Ñ µ with constructive distance in which case Õ does not divide ¾ Thus, we now assume that Õ Then we consider (24) taking and arbitrarily choosing different locators Ý Ý from Õ Obviously, the resulting system of linear equations has nonzero solution ¾ This gives the codeword of weight and completes the proof of Theorem 4 V CONCLUSION We have constructed an infinite family of nonbinary codes that reduce the asymptotic redundancy of BCH codes for any given alphabet size Õ and distance if Õ Families with such a property were earlier known only for distances, and [6] Even the shortest codes in our family have very big length Õ µ, therefore the construction is of theoretical interest The main question (ie the determination of the exact values of Õ µ) remains open ACKNOWLEDGEMENT S Yekhanin would like to express his deep gratitude to M Sudan for introducing the problem to him and many helpful discussions during this work He would also like to thank J Kelner for valuable advice REFERENCES [1] R Blahut, Algebraic Codes for Data Transmission Cambridge: Cambridge University Press, 2003 [2] AR Calderbank, PC Fishburn, Maximal Three-Independent Subsets of ¾, Designs, Codes and Cryptography, vol 4, pp , 1994 [3] D Danev, J Olsson, On a Sequence of Cyclic Codes with Minimum Distance Six, IEEE Trans on Inform Theory, vol 46, pp , March 2000 [4] II Dumer and VV Zinoviev, New maximal codes over Galois field GF(4), Probl Peredach Inform (Probl Inform Transm), vol 14, no 3, pp 24-34, 1978 [5] II Dumer, Nonbinary codes with distances 4,5 and 6 of cardinality greater than the BCH codes, Probl Peredach Inform (Probl Inform Transm), vol 24, no 3, pp 42-54, 1988 [6] II Dumer, Nonbinary double error-correcting codes designed by means of algebraic varieties, IEEE Trans on Inform Theory, vol 41, pp , November 1995 [7] Y Edel, J Bierbrauer, Recursive Constructions for Large Caps, Bulletein of Belgian Mathematical Society - Simon Stevin vol 6, pp , 1999 [8] Y Edel, Extensions of Generalized Product Caps, Designs, Codes and Cryptography, vol 31, pp 5-14, 2004 [9] GL Feng, X Wu, TRN Rao New Double-Byte Error-Correcting Codes for Memory Systems, IEEE Trans on Inform Theory, vol 44, pp , May 1998 [10] GL Feng, X Wu, TRN Rao New DbeC-TbeD Codes Better Than Gilbert-Varshamov Bound, Proc Int Symp on Information Theory, Sorrento, Italy, p32, June 2000 [11] P Frankl, RL Graham and V Rödl, On Subsets of Abelian Groups with No 3-Term Arithmetic Progression, J Comb Theory Ser A, vol 45, pp , 1987 [12] DN Gevorkyan, AM Avetisyan and VA Tigranyan, On the construction of codes correcting two errors in Hamming metric over Galois fields, in Vychislitel naya Technika, Kuibyshev, no 3, 1975, pp (in Russian) [13] DN Gevorkyan, On nonbinary codes with fixed code distance, in Proc Fifth Intern Symp on Inform Theory, Pt 1, Moscow-Tbilisi, USSR, 1979, pp (in Russian) [14] D Glynn and TT Tatau, A 126-cap of PG(5,4) and its corresponding ¾ -code, Utilas Mathematica, vol 55, pp , 1999 [15] R Lidl and H Niederrieter, Finite Fields Cambridge: Cambridge University Press, 1985 [16] R Hartshorne, Algebraic geometry New York : Springer, 1977 [17] R Hill, On the Largest Size Caps in Ë, Rened Acad Naz Lincei, vol 54, pp , 1973 [18] JWP Hirschfeld and L Storme, The packing problem in statistics, coding theory and finite projective spaces: update 2001, Developments in Mathematics, vol 3, Kluwer Academic Publishers Finite Geometries, Proceedings of the Fourth Isle of Thorns Conference, pp [19] E Kunz, Introduction to commutative algebra and algebraic geometry Boston : Birkhäuser, 1985 [20] F J MacWilliams and N J A Sloane, The Theory Of Error-Correcting Codes Amsterdam: North-Holland, 1977 [21] R Meshulam, On Subsets of Finite Abelian Groups with no Three Term Arithmetic Progressions, Journal of Combinatorial Theory A, vol 71, pp , 1995 [22] AC Mukhopadhyay, Lower bounds for Ñ Ø Ö µ, Journal of Combinatorial Theory A, vol 25, pp 1-13, 1978 [23] C Roos, A new lower bound for the minimum distance of a cyclic code, IEEE Trans on Inform Theory, vol 29, pp , May 1983 [24] JH Van Lint, R Wilson, On the Minimum Distance of Cyclic Codes, IEEE Trans on Inform Theory, vol 32, pp 23-40, January 1986

solutions:, and it cannot be the case that a supersolution is always greater than or equal to a subsolution.

solutions:, and it cannot be the case that a supersolution is always greater than or equal to a subsolution. Chapter 4 Comparison The basic problem to be considered here is the question when one can say that a supersolution is always greater than or equal to a subsolution of a problem, where one in most cases

More information

A Calculus for End-to-end Statistical Service Guarantees

A Calculus for End-to-end Statistical Service Guarantees A Calculus for End-to-end Statistical Service Guarantees Technical Report: University of Virginia, CS-2001-19 (2nd revised version) Almut Burchard Ý Jörg Liebeherr Stephen Patek Ý Department of Mathematics

More information

Improved Boosting Algorithms Using Confidence-rated Predictions

Improved Boosting Algorithms Using Confidence-rated Predictions Improved Boosting Algorithms Using Confidence-rated Predictions ÊÇÊÌ º ËÀÈÁÊ schapire@research.att.com AT&T Labs, Shannon Laboratory, 18 Park Avenue, Room A279, Florham Park, NJ 7932-971 ÇÊÅ ËÁÆÊ singer@research.att.com

More information

Extensional Equality in Intensional Type Theory

Extensional Equality in Intensional Type Theory Extensional Equality in Intensional Type Theory Thorsten Altenkirch Department of Informatics University of Munich Oettingenstr. 67, 80538 München, Germany, alti@informatik.uni-muenchen.de Abstract We

More information

Decomposition and Complexity of Hereditary History Preserving Bisimulation on BPP

Decomposition and Complexity of Hereditary History Preserving Bisimulation on BPP Decomposition and Complexity of Hereditary History Preserving Bisimulation on BPP Sibylle Fröschle and Sławomir Lasota Institute of Informatics, Warsaw University 02 097 Warszawa, Banacha 2, Poland sib,sl

More information

Two-Way Equational Tree Automata for AC-like Theories: Decidability and Closure Properties

Two-Way Equational Tree Automata for AC-like Theories: Decidability and Closure Properties Two-Way Equational Tree Automata for AC-like Theories: Decidability and Closure Properties Kumar Neeraj Verma LSV/CNRS UMR 8643 & INRIA Futurs projet SECSI & ENS Cachan, France verma@lsv.ens-cachan.fr

More information

ÈÖÓÚ Ò Ò ÁÑÔÐ Ø ÓÒ È É Ï Ö Ø ÐÓÓ Ø Û Ý ØÓ ÔÖÓÚ Ø Ø Ñ ÒØ Ó Ø ÓÖÑ Á È Ø Ò É ÓÖ È É Ì ÓÐÐÓÛ Ò ÔÖÓÓ ØÝÔ Ò Ð Ó Ù ØÓ ÔÖÓÚ Ø Ø Ñ ÒØ Ó Ø ÓÖÑ Ü È Üµ É Üµµ Ý ÔÔ

ÈÖÓÚ Ò Ò ÁÑÔÐ Ø ÓÒ È É Ï Ö Ø ÐÓÓ Ø Û Ý ØÓ ÔÖÓÚ Ø Ø Ñ ÒØ Ó Ø ÓÖÑ Á È Ø Ò É ÓÖ È É Ì ÓÐÐÓÛ Ò ÔÖÓÓ ØÝÔ Ò Ð Ó Ù ØÓ ÔÖÓÚ Ø Ø Ñ ÒØ Ó Ø ÓÖÑ Ü È Üµ É Üµµ Ý ÔÔ Å Ø Ó Ó ÈÖÓÓ ÊÙÐ Ó ÁÒ Ö Ò ¹ Ø ØÖÙØÙÖ Ó ÔÖÓÓ ÆÓÛ ËØÖ Ø ÓÖ ÓÒ ØÖÙØ Ò ÔÖÓÓ ÁÒØÖÓ ÙØ ÓÒ ØÓ ÓÑÑÓÒ ÔÖÓÓ Ø Ò ÕÙ Ê ÐÐ Ø Ø Ñ ÒØ ÒØ Ò Ø Ø Ø Ö ØÖÙ ÓÖ Ð º Ò Ø ÓÒ ÔÖÓÓ ÓÒÚ Ò Ò Ö ÙÑ ÒØ Ø Ø Ø Ø Ñ ÒØ ØÖÙ º ÆÓØ Ï ÒÒÓØ

More information

Contact 3-Manifolds, Holomorphic Curves and Intersection Theory

Contact 3-Manifolds, Holomorphic Curves and Intersection Theory Contact 3-Manifolds, Holomorphic Curves and Intersection Theory (Durham University, August 2013) Chris Wendl University College London These slides plus detailed lecture notes (in progress) available at:

More information

Event Based Sequential Program Development: Application to Constructing a Pointer Program

Event Based Sequential Program Development: Application to Constructing a Pointer Program Event Based Sequential Program Development: Application to Constructing a Pointer Program Jean-Raymond Abrial Consultant, Marseille, France jr@abrial.org Abstract. In this article, I present an event approach

More information

ishares Core Composite Bond ETF

ishares Core Composite Bond ETF ishares Core Composite Bond ETF ARSN 154 626 767 ANNUAL FINANCIAL REPORT 30 June 2017 BlackRock Investment Management (Australia) Limited 13 006 165 975 Australian Financial Services Licence No 230523

More information

Nominal Techniques in Isabelle/HOL

Nominal Techniques in Isabelle/HOL Noname manuscript No. (will be inserted by the editor) Nominal Techniques in Isabelle/HOL Christian Urban Received: date / Accepted: date Abstract This paper describes a formalisation of the lambda-calculus

More information

ONLINE APPENDIX: Why Do Voters Dismantle Checks and Balances? Extensions and Robustness

ONLINE APPENDIX: Why Do Voters Dismantle Checks and Balances? Extensions and Robustness CeNTRe for APPlieD MACRo - AND PeTRoleuM economics (CAMP) CAMP Working Paper Series No 2/2013 ONLINE APPENDIX: Why Do Voters Dismantle Checks and Balances? Extensions and Robustness Daron Acemoglu, James

More information

How hard is it to control sequential elections via the agenda?

How hard is it to control sequential elections via the agenda? How hard is it to control sequential elections via the agenda? Vincent Conitzer Department of Computer Science Duke University Durham, NC 27708, USA conitzer@cs.duke.edu Jérôme Lang LAMSADE Université

More information

ÔÖ Î µ ÛÖ Î Ø Ø Ó ÚÖØ ÖÔ Ø Ø Ó º ØØ Û Ö ÚÒ Ø Ò Ú ¼ ½ Ú ½ ¾ Ú ¾ Ú Ú ½ ÒÒ ÙÒØÓÒ Eº ÏÐ Ò Ø ÖÔ ÕÙÒ Ú ÛÖ Ú ¼ Ú ¾ Î ½ ¾ Ò E µ Ú ½ Ú º Ì ÛÐ ÐÓ Ø Ö Ø Ò Ð Ø ÚÖ

ÔÖ Î µ ÛÖ Î Ø Ø Ó ÚÖØ ÖÔ Ø Ø Ó º ØØ Û Ö ÚÒ Ø Ò Ú ¼ ½ Ú ½ ¾ Ú ¾ Ú Ú ½ ÒÒ ÙÒØÓÒ Eº ÏÐ Ò Ø ÖÔ ÕÙÒ Ú ÛÖ Ú ¼ Ú ¾ Î ½ ¾ Ò E µ Ú ½ Ú º Ì ÛÐ ÐÓ Ø Ö Ø Ò Ð Ø ÚÖ ÙÐÖÒ ÖÔ ÔÖ Î µ ÛÖ Î Ø Ø Ó ÚÖØ ÖÔ Ø Ø Ó º ØØ Û Ö ÚÒ Ø Ò Ú ¼ ½ Ú ½ ¾ Ú ¾ Ú Ú ½ ÒÒ ÙÒØÓÒ Eº ÏÐ Ò Ø ÖÔ ÕÙÒ Ú ÛÖ Ú ¼ Ú ¾ Î ½ ¾ Ò E µ Ú ½ Ú º Ì ÛÐ ÐÓ Ø Ö Ø Ò Ð Ø ÚÖØ ÓÒº ÈØ ÛÐ ÛÖ ÚÖÝ ÚÖØÜ ÓÙÖ Ø ÑÓ Ø ÓÒº ÝÐ ÐÓ

More information

Approval Voting and Scoring Rules with Common Values

Approval Voting and Scoring Rules with Common Values Approval Voting and Scoring Rules with Common Values David S. Ahn University of California, Berkeley Santiago Oliveros University of Essex June 2016 Abstract We compare approval voting with other scoring

More information

Refinement in Requirements Specification and Analysis: a Case Study

Refinement in Requirements Specification and Analysis: a Case Study Refinement in Requirements Specification and Analysis: a Case Study Edwin de Jong Hollandse Signaalapparaten P.O. Box 42 7550 GD Hengelo The Netherlands edejong@signaal.nl Jaco van de Pol CWI P.O. Box

More information

Limited arbitrage is necessary and sufficient for the existence of an equilibrium

Limited arbitrage is necessary and sufficient for the existence of an equilibrium ELSEVIER Journal of Mathematical Economics 28 (1997) 470-479 JOURNAL OF Mathematical ECONOMICS Limited arbitrage is necessary and sufficient for the existence of an equilibrium Graciela Chichilnisky 405

More information

Hoboken Public Schools. Algebra II Honors Curriculum

Hoboken Public Schools. Algebra II Honors Curriculum Hoboken Public Schools Algebra II Honors Curriculum Algebra Two Honors HOBOKEN PUBLIC SCHOOLS Course Description Algebra II Honors continues to build students understanding of the concepts that provide

More information

Solutions of Implication Constraints yield Type Inference for More General Algebraic Data Types

Solutions of Implication Constraints yield Type Inference for More General Algebraic Data Types Solutions of Implication Constraints yield Type Inference for More General Algebraic Data Types Peter J. Stuckey NICTA Victoria Laboratory Department of Computer Science and Software Engineering The University

More information

Implementing Domain Specific Languages using Dependent Types and Partial Evaluation

Implementing Domain Specific Languages using Dependent Types and Partial Evaluation Implementing Domain Specific Languages using Dependent Types and Partial Evaluation Edwin Brady eb@cs.st-andrews.ac.uk University of St Andrews EE-PigWeek, January 7th 2010 EE-PigWeek, January 7th 2010

More information

Infinite-Horizon Policy-Gradient Estimation

Infinite-Horizon Policy-Gradient Estimation Journal of Artificial Intelligence Research 15 (2001) 319-350 Submitted 9/00; published 11/01 Infinite-Horizon Policy-Gradient Estimation Jonathan Baxter WhizBang! Labs. 4616 Henry Street Pittsburgh, PA

More information

MSR, Access Control, and the Most Powerful Attacker

MSR, Access Control, and the Most Powerful Attacker MSR, Access Control, and the Most Powerful Attacker Iliano Cervesato Advanced Engineering and Sciences Division ITT Industries, Inc. 2560 Huntington Avenue, Alexandria, VA 22303-1410 USA Tel.: +1-202-404-4909,

More information

Approval Voting Theory with Multiple Levels of Approval

Approval Voting Theory with Multiple Levels of Approval Claremont Colleges Scholarship @ Claremont HMC Senior Theses HMC Student Scholarship 2012 Approval Voting Theory with Multiple Levels of Approval Craig Burkhart Harvey Mudd College Recommended Citation

More information

Domain, Range, Inverse

Domain, Range, Inverse Ê Ð Ø ÓÒ Ò Ø ÓÒ Ò ÖÝ Ö Ð Ø ÓÒ ÓÒ Ø Ò Ù Ø Ó Ü º Ì Ø ÒÝ Ê Ò ÖÝ Ö Ð Ø ÓÒº Ù Ø Ó ¾ Ü Ò ÖÝ Ö Ð Ø ÓÒ ÓÒ º ÆÓØ Ø ÓÒ Á µ ¾ Ê Û Ó Ø Ò ÛÖ Ø Ê º Ü ÑÔÐ Ò Ò ÖÝ Ö Ð Ø ÓÒ È ÓÒ ÓÖ ÐÐ Ñ Òµ ¾ ÑÈÒ Ñ Ò Ú Òº ËÓ È¾ È ¹ µ Ƚº

More information

Essential Questions Content Skills Assessments Standards/PIs. Identify prime and composite numbers, GCF, and prime factorization.

Essential Questions Content Skills Assessments Standards/PIs. Identify prime and composite numbers, GCF, and prime factorization. Map: MVMS Math 7 Type: Consensus Grade Level: 7 School Year: 2007-2008 Author: Paula Barnes District/Building: Minisink Valley CSD/Middle School Created: 10/19/2007 Last Updated: 11/06/2007 How does the

More information

Randomized Pursuit-Evasion in Graphs

Randomized Pursuit-Evasion in Graphs Randomized Pursuit-Evasion in Graphs Micah Adler, Harald Räcke ¾, Naveen Sivadasan, Christian Sohler ¾, and Berthold Vöcking ¾ Department of Computer Science University of Massachusetts, Amherst, micah@cs.umass.edu

More information

"Efficient and Durable Decision Rules with Incomplete Information", by Bengt Holmström and Roger B. Myerson

Efficient and Durable Decision Rules with Incomplete Information, by Bengt Holmström and Roger B. Myerson April 15, 2015 "Efficient and Durable Decision Rules with Incomplete Information", by Bengt Holmström and Roger B. Myerson Econometrica, Vol. 51, No. 6 (Nov., 1983), pp. 1799-1819. Stable URL: http://www.jstor.org/stable/1912117

More information

MODELLING OF GAS-SOLID TURBULENT CHANNEL FLOW WITH NON-SPHERICAL PARTICLES WITH LARGE STOKES NUMBERS

MODELLING OF GAS-SOLID TURBULENT CHANNEL FLOW WITH NON-SPHERICAL PARTICLES WITH LARGE STOKES NUMBERS MODELLING OF GAS-SOLID TURBULENT CHANNEL FLOW WITH NON-SPHERICAL PARTICLES WITH LARGE STOKES NUMBERS Ö Ò Ú Ò Ï Ñ ÓÖ Å ÐÐÓÙÔÔ Ò Ó Å Ö Ò Ø ÛÒÝ Ó Ø Ø ÓÒ È½¼¼ ÇØÓ Ö ½ ¾¼½½ Ö Ò Ú Ò Ï Ñ ÁÑÔ Ö Ð ÓÐÐ µ ÆÓÒ¹ Ô

More information

Social welfare functions

Social welfare functions Social welfare functions We have defined a social choice function as a procedure that determines for each possible profile (set of preference ballots) of the voters the winner or set of winners for the

More information

Randomized Pursuit-Evasion in Graphs

Randomized Pursuit-Evasion in Graphs Randomized Pursuit-Evasion in Graphs Micah Adler Harald Räcke Ý Naveen Sivadasan Þ Christian Sohler Ý Berthold Vöcking Þ Abstract We analyze a randomized pursuit-evasion game on graphs. This game is played

More information

Mathematics and Social Choice Theory. Topic 4 Voting methods with more than 2 alternatives. 4.1 Social choice procedures

Mathematics and Social Choice Theory. Topic 4 Voting methods with more than 2 alternatives. 4.1 Social choice procedures Mathematics and Social Choice Theory Topic 4 Voting methods with more than 2 alternatives 4.1 Social choice procedures 4.2 Analysis of voting methods 4.3 Arrow s Impossibility Theorem 4.4 Cumulative voting

More information

Arrow s Impossibility Theorem on Social Choice Systems

Arrow s Impossibility Theorem on Social Choice Systems Arrow s Impossibility Theorem on Social Choice Systems Ashvin A. Swaminathan January 11, 2013 Abstract Social choice theory is a field that concerns methods of aggregating individual interests to determine

More information

Ò ÓÛ Æ ØÛÓÖ Ð ÓÖ Ø Ñ ÓÖ ¹ ÙÐ Ö ÓÒ

Ò ÓÛ Æ ØÛÓÖ Ð ÓÖ Ø Ñ ÓÖ ¹ ÙÐ Ö ÓÒ Ò ÓÛ ÆØÛÓÖ ÐÓÖØÑ ÓÖ¹ÙÐÖ ÓÒ ÚÐÙÒ Øµ E µ ÙÚµ Ò Úµ µ E µ ÚÙµ ÐÐ ¹ÒÖ Ò ¹ÓÙØÖ Ó ÚÖØÜ Ú Î Ö Ö ÔØÚÐݺ ÄØ Î µ ÖØ ÖÔº ÓÖ ÚÖØÜ Ú Î Û Ò ÓÙØÖ Úµ Ò Ò Ø ÒÖ Ò Øµ Úµº ÓÖ Úµ Ø ÚÖØÜ Ú ÐÐ ÓÙÖ Úµ Á е ÓÖ Ò ÙÙµ Ó ÖÔ Ö ÔØÚÐݺ

More information

A New Method of the Single Transferable Vote and its Axiomatic Justification

A New Method of the Single Transferable Vote and its Axiomatic Justification A New Method of the Single Transferable Vote and its Axiomatic Justification Fuad Aleskerov ab Alexander Karpov a a National Research University Higher School of Economics 20 Myasnitskaya str., 101000

More information

Computational Inelasticity FHLN05. Assignment A non-linear elasto-plastic problem

Computational Inelasticity FHLN05. Assignment A non-linear elasto-plastic problem Computational Inelasticity FHLN05 Assignment 2016 A non-linear elasto-plastic problem General instructions A written report should be submitted to the Division of Solid Mechanics no later than 1 November

More information

Ë ÁÌÇ ÌÓ Ó ÍÒ Ú Ö Øݵ Ç ¼ Ô Û Ö ÙÒÓ Ø Ò Ð Ä Ò ÙÖ ÖÝ ÓÒ ÒÓØ Ý ÛÓÖ Û Ø Ã ÞÙ ÖÓ Á Ö Ó ÒØ Ë Ò ÝÓ ÍÒ Ú Ö Øݵ Ç

Ë ÁÌÇ ÌÓ Ó ÍÒ Ú Ö Øݵ Ç ¼ Ô Û Ö ÙÒÓ Ø Ò Ð Ä Ò ÙÖ ÖÝ ÓÒ ÒÓØ Ý ÛÓÖ Û Ø Ã ÞÙ ÖÓ Á Ö Ó ÒØ Ë Ò ÝÓ ÍÒ Ú Ö Øݵ Ç Ë ÁÌÇ ÌÓ Ó ÍÒ Ú Ö Øݵ Ç ¼ Ô Û Ö ÙÒÓ Ø Ò Ð Ä Ò ÙÖ ÖÝ ÓÒ ÒÓØ Ý ÛÓÖ Û Ø Ã ÞÙ ÖÓ Á Ö Ó ÒØ Ë Ò ÝÓ ÍÒ Ú Ö Øݵ Ç ½ Ä Ò Ô Ô Ä Ô Õµ Ø ¹Ñ Ò ÓÐ Ó Ø Ò Ý Ä Ò ÓÒ Ø ØÖ Ú Ð ÒÓØ Ò Ë º Ô Õ¹ ÙÖ ÖÝ Ô Õµ¹ÙÖÚ ¾ ÈÖÓ Ð Ñ Ø Ð

More information

The Integer Arithmetic of Legislative Dynamics

The Integer Arithmetic of Legislative Dynamics The Integer Arithmetic of Legislative Dynamics Kenneth Benoit Trinity College Dublin Michael Laver New York University July 8, 2005 Abstract Every legislature may be defined by a finite integer partition

More information

Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case

Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case Yevgeniy Dodis Department of Computer Science New York University Email: dodis@cs.nyu.edu Moti Yung Department of Computer Science

More information

Voter Compatibility In Interval Societies

Voter Compatibility In Interval Societies Voter Compatibility In Interval Societies Rosalie J. Carlson Francis Edward Su, Advisor Michael Orrison, Reader Department of Mathematics May, 2013 Copyright c 2013 Rosalie J. Carlson. The author grants

More information

THREATS TO SUE AND COST DIVISIBILITY UNDER ASYMMETRIC INFORMATION. Alon Klement. Discussion Paper No /2000

THREATS TO SUE AND COST DIVISIBILITY UNDER ASYMMETRIC INFORMATION. Alon Klement. Discussion Paper No /2000 ISSN 1045-6333 THREATS TO SUE AND COST DIVISIBILITY UNDER ASYMMETRIC INFORMATION Alon Klement Discussion Paper No. 273 1/2000 Harvard Law School Cambridge, MA 02138 The Center for Law, Economics, and Business

More information

Regression. Linear least squares. Support vector regression. increasing the dimensionality fitting polynomials to data over fitting regularization

Regression. Linear least squares. Support vector regression. increasing the dimensionality fitting polynomials to data over fitting regularization Regression Linear least squares increasing the dimensionality fitting polynomials to data over fitting regularization Support vector regression Fitting a degree 1 polynomial Fitting a degree 2 polynomial

More information

Committee proposals and restrictive rules

Committee proposals and restrictive rules Proc. Natl. Acad. Sci. USA Vol. 96, pp. 8295 8300, July 1999 Political Sciences Committee proposals and restrictive rules JEFFREY S. BANKS Division of Humanities and Social Sciences, California Institute

More information

Lazy Semiring Neighbours

Lazy Semiring Neighbours Ä ÞÝ Ë Ñ Ö Ò Æ ÓÙÖ Ò ÓÑ ÔÔÐ Ø ÓÒ È Ø Ö ÀĐÓ Ò Ö ÖÒ Ö ÅĐÓÐÐ Ö ÍÒ Ú Ö ØÝ Ó Ë Æ Ð Íà ÍÒ Ú Ö ØĐ Ø Ù ÙÖ ÖÑ ÒÝ ¾¼¼ Ⱥ ÀĐÓ Ò Ö ß ½ ß RelMiCS/AKA 06 Motivation ÒØ ÖÚ Ð ÐÓ Ö Ù ÓÖ Ô Ø ÓÒ Ò Ú Ö Ø ÓÒ Ó ØÝ ÔÖÓÔ ÖØ Ó

More information

Universality of election statistics and a way to use it to detect election fraud.

Universality of election statistics and a way to use it to detect election fraud. Universality of election statistics and a way to use it to detect election fraud. Peter Klimek http://www.complex-systems.meduniwien.ac.at P. Klimek (COSY @ CeMSIIS) Election statistics 26. 2. 2013 1 /

More information

Computational Social Choice: Spring 2007

Computational Social Choice: Spring 2007 Computational Social Choice: Spring 2007 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today This lecture will be an introduction to voting

More information

Proof a n d Com p uta tion in Coq Maxime Dénès, Benjamin Grégoire, Chantal Keller, Pierre Yves Strub, Laurent Théry Map 16 p.1

Proof a n d Com p uta tion in Coq Maxime Dénès, Benjamin Grégoire, Chantal Keller, Pierre Yves Strub, Laurent Théry Map 16 p.1 ÈÖÓÓ Ò ÓÑÔÙØ Ø ÓÒ Ò ÓÕ Å Ü Ñ Ò Ò Ñ Ò Ö Ó Ö ÒØ Ð Ã ÐÐ Ö È ÖÖ Ú ËØÖÙ Ä ÙÖ ÒØ Ì ÖÝ Map 16 p.1 ÅÓØ Ú Ø ÓÒ ÔÖÓ Ö ÑÑ Ò Ð Ò Ù ÙÒØ ÓÒ Ð Compute prime 31. = true ÔÖÓÚ Ö Ì ÓÖ Ñ Check Euclid_dvdX. forall m n p :

More information

É ÀÓÛ Ó Ý Ò ² Ö Ò ÁÒ Ö Ò «Ö ÓØ ÑÔ Ù ÔÖÓ Ð ØÝ ØÓ Ö ÙÒ ÖØ ÒØÝ ÙØ Ø Ý ÓÒ Ø ÓÒ ÓÒ «Ö ÒØ Ø Ò º Ü ÑÔÐ ÁÑ Ò Ð Ò Ð ØÖ Ð Û Ø Ò ½ Ñ Ø Ô Ö Ó Ù Ø º ÁÒ Ô Ö ÓÒ Ù Ø

É ÀÓÛ Ó Ý Ò ² Ö Ò ÁÒ Ö Ò «Ö ÓØ ÑÔ Ù ÔÖÓ Ð ØÝ ØÓ Ö ÙÒ ÖØ ÒØÝ ÙØ Ø Ý ÓÒ Ø ÓÒ ÓÒ «Ö ÒØ Ø Ò º Ü ÑÔÐ ÁÑ Ò Ð Ò Ð ØÖ Ð Û Ø Ò ½ Ñ Ø Ô Ö Ó Ù Ø º ÁÒ Ô Ö ÓÒ Ù Ø ËØ Ø Ø Ð È Ö Ñ Ý Ò ² Ö ÕÙ ÒØ Ø ÊÓ ÖØ Ä ÏÓÐÔ ÖØ Ù ÍÒ Ú Ö ØÝ Ô ÖØÑ ÒØ Ó ËØ Ø Ø Ð Ë Ò ¾¼½ Ë Ô ½¼ ÈÖÓ Ñ Ò Ö É ÀÓÛ Ó Ý Ò ² Ö Ò ÁÒ Ö Ò «Ö ÓØ ÑÔ Ù ÔÖÓ Ð ØÝ ØÓ Ö ÙÒ ÖØ ÒØÝ ÙØ Ø Ý ÓÒ Ø ÓÒ ÓÒ «Ö ÒØ Ø Ò º Ü ÑÔÐ ÁÑ

More information

DYNAMIC RISK MANAGEMENT IN ELECTRICITY PORTFOLIO OPTIMIZATION VIA POLYHEDRAL RISK FUNCTIONALS

DYNAMIC RISK MANAGEMENT IN ELECTRICITY PORTFOLIO OPTIMIZATION VIA POLYHEDRAL RISK FUNCTIONALS DYNAMIC RISK MANAGEMENT IN ELECTRICITY PORTFOLIO OPTIMIZATION VIA POLYHEDRAL RISK FUNCTIONALS Andreas Eichhorn Department of Mathematics Humboldt University 199 Berlin, Germany Email eichhorn@math.hu-berlin.de

More information

ÙÒØ ÓÒ Ò Ø ÓÒ ÙÒØ ÓÒ ÖÓÑ ØÓ ÒÓØ Ö Ð Ø ÓÒ ÖÓÑ ØÓ Ù Ø Ø ÓÖ Ú ÖÝ Ü ¾ Ø Ö ÓÑ Ý ¾ Ù Ø Ø Ü Ýµ Ò Ø Ö Ð Ø ÓÒ Ò Ü Ýµ Ò Ü Þµ Ö Ò Ø Ö Ð Ø ÓÒ Ø Ò Ý Þº ÆÓØ Ø ÓÒ Á

ÙÒØ ÓÒ Ò Ø ÓÒ ÙÒØ ÓÒ ÖÓÑ ØÓ ÒÓØ Ö Ð Ø ÓÒ ÖÓÑ ØÓ Ù Ø Ø ÓÖ Ú ÖÝ Ü ¾ Ø Ö ÓÑ Ý ¾ Ù Ø Ø Ü Ýµ Ò Ø Ö Ð Ø ÓÒ Ò Ü Ýµ Ò Ü Þµ Ö Ò Ø Ö Ð Ø ÓÒ Ø Ò Ý Þº ÆÓØ Ø ÓÒ Á ÙÒØ ÓÒ Ò Ø ÓÒ ÙÒØ ÓÒ ÖÓÑ ØÓ ÒÓØ Ö Ð Ø ÓÒ ÖÓÑ ØÓ Ù Ø Ø ÓÖ Ú ÖÝ Ü ¾ Ø Ö ÓÑ Ý ¾ Ù Ø Ø Ü Ýµ Ò Ø Ö Ð Ø ÓÒ Ò Ü Ýµ Ò Ü Þµ Ö Ò Ø Ö Ð Ø ÓÒ Ø Ò Ý Þº ÆÓØ Ø ÓÒ Á Ü Ýµ Ò Ø Ö Ð Ø ÓÒ Û ÛÖ Ø Üµ ݺ Ì Ø Ø ÓÑ Ò Ó Ø ÙÒØ ÓÒ

More information

Tensor. Field. Vector 2D Length. SI BG cgs. Tensor. Units. Template. DOFs u v. Distribution Functions. Domain

Tensor. Field. Vector 2D Length. SI BG cgs. Tensor. Units. Template. DOFs u v. Distribution Functions. Domain ÁÒØÖÓ ÙØ ÓÒ ØÓ Ø ÁÌ ÈË Ð ÁÒØ Ö ÖÐ ÇÐÐ Ú Ö¹ ÓÓ Ì ÍÒ Ú Ö ØÝ Ó Ö Ø ÓÐÙÑ Å Ö Å ÐÐ Ö Ä ÛÖ Ò Ä Ú ÖÑÓÖ Æ Ø ÓÒ Ð Ä ÓÖ ØÓÖÝ Ò Ð ÐÓÒ Ö Ê Ò Ð Ö ÈÓÐÝØ Ò ÁÒ Ø ØÙØ ¾¼½½ ËÁ Å Ë ÓÒ Ö Ò Ê ÒÓ Æ Ú Å Ö ¾¼½½ ÇÐÐ Ú Ö¹ ÓÓ Å

More information

Cloning in Elections 1

Cloning in Elections 1 Cloning in Elections 1 Edith Elkind, Piotr Faliszewski, and Arkadii Slinko Abstract We consider the problem of manipulating elections via cloning candidates. In our model, a manipulator can replace each

More information

Sequential Voting with Externalities: Herding in Social Networks

Sequential Voting with Externalities: Herding in Social Networks Sequential Voting with Externalities: Herding in Social Networks Noga Alon Moshe Babaioff Ron Karidi Ron Lavi Moshe Tennenholtz February 7, 01 Abstract We study sequential voting with two alternatives,

More information

Coalitional Game Theory

Coalitional Game Theory Coalitional Game Theory Game Theory Algorithmic Game Theory 1 TOC Coalitional Games Fair Division and Shapley Value Stable Division and the Core Concept ε-core, Least core & Nucleolus Reading: Chapter

More information

Rock the Vote or Vote The Rock

Rock the Vote or Vote The Rock Rock the Vote or Vote The Rock Tom Edgar Department of Mathematics University of Notre Dame Notre Dame, Indiana October 27, 2008 Graduate Student Seminar Introduction Basic Counting Extended Counting Introduction

More information

The Nominal Datatype Package in Isabelle/HOL

The Nominal Datatype Package in Isabelle/HOL The Nominal Datatype Package in Isabelle/HOL Christian Urban University of Munich joint work with Stefan Berghofer, Markus Wenzel, Alexander Krauss... Notingham, 18. April 2006 p.1 (1/1) The POPLmark-Challenge

More information

COWLES FOUNDATION FOR RESEARCH IN ECONOMICS YALE UNIVERSITY

COWLES FOUNDATION FOR RESEARCH IN ECONOMICS YALE UNIVERSITY ECLECTIC DISTRIBUTIONAL ETHICS By John E. Roemer March 2003 COWLES FOUNDATION DISCUSSION PAPER NO. 1408 COWLES FOUNDATION FOR RESEARCH IN ECONOMICS YALE UNIVERSITY Box 208281 New Haven, Connecticut 06520-8281

More information

Lecture 7 A Special Class of TU games: Voting Games

Lecture 7 A Special Class of TU games: Voting Games Lecture 7 A Special Class of TU games: Voting Games The formation of coalitions is usual in parliaments or assemblies. It is therefore interesting to consider a particular class of coalitional games that

More information

VOTING BY VETO: MAKING THE MUELLER-MOULIN ALGORITHM MORE VERSATILE

VOTING BY VETO: MAKING THE MUELLER-MOULIN ALGORITHM MORE VERSATILE DAN S. FELSENTHAL AND MOSHt~ MACHOVER SEQUENTIAL VOTING BY VETO: MAKING THE MUELLER-MOULIN ALGORITHM MORE VERSATILE ABSTRACT. This paper shows that a relatively easy algorithm for computing the (unique)

More information

A denotational semantics for deliberation dialogues

A denotational semantics for deliberation dialogues A denotational semantics for deliberation dialogues Peter McBurney Department of Computer Science University of Liverpool Liverpool L69 3BX UK pjmcburney@csclivacuk Simon Parsons Department of Computer

More information

Voting and Markov Processes

Voting and Markov Processes Voting and Markov Processes Andrew Nicholson Department of Mathematics The University of North Carolina at Asheville One University Heights Asheville, NC 884. USA Faculty Advisor: Dr. Sam Kaplan Abstract

More information

Verification. Lecture 3. Bernd Finkbeiner

Verification. Lecture 3. Bernd Finkbeiner Verification Lecture 3 Bernd Finkbeiner Plan for today CTL model checking Thebasicalgorithm Fairness Counterexamplesandwitnesses Review: Computation tree logic modal logic over infinite trees[clarke& Emerson

More information

38050 Povo (Trento), Italy Tel.: Fax: e mail: url:

38050 Povo (Trento), Italy Tel.: Fax: e mail: url: CENTRO PER LA RICERCA SCIENTIFICA E TECNOLOGICA 38050 Povo (Trento), Italy Tel.: +39 0461 314312 Fax: +39 0461 302040 e mail: prdoc@itc.it url: http://www.itc.it HISTORY DEPENDENT AUTOMATA Montanari U.,

More information

Learning and Belief Based Trade 1

Learning and Belief Based Trade 1 Learning and Belief Based Trade 1 First Version: October 31, 1994 This Version: September 13, 2005 Drew Fudenberg David K Levine 2 Abstract: We use the theory of learning in games to show that no-trade

More information

Safe Votes, Sincere Votes, and Strategizing

Safe Votes, Sincere Votes, and Strategizing Safe Votes, Sincere Votes, and Strategizing Rohit Parikh Eric Pacuit April 7, 2005 Abstract: We examine the basic notion of strategizing in the statement of the Gibbard-Satterthwaite theorem and note that

More information

1. The augmented matrix for this system is " " " # (remember, I can't draw the V Ç V ß #V V Ä V ß $V V Ä V

1. The augmented matrix for this system is    # (remember, I can't draw the V Ç V ß #V V Ä V ß $V V Ä V MATH 339, Fall 2017 Homework 1 Solutions Bear in mind that the row-reduction process is not a unique determined creature. Different people might choose to row reduce a matrix in slightly different ways.

More information

Deadlock. deadlock analysis - primitive processes, parallel composition, avoidance

Deadlock. deadlock analysis - primitive processes, parallel composition, avoidance Deadlock CDS News: Brainy IBM Chip Packs One Million Neuron Punch Overview: ideas, 4 four necessary and sufficient conditions deadlock analysis - primitive processes, parallel composition, avoidance the

More information

Contents. Bibliography 121. Index 123

Contents. Bibliography 121. Index 123 Contents 5 Advanced Data Types page 2 5.1 Sparse Arrays: Dictionary Arrays, Hashing Arrays, and Maps 2 5.2 The Implementation of the Data Type Map 14 5.3 Dictionaries and Sets 27 5.4 Priority Queues 28

More information

Hoboken Public Schools. College Algebra Curriculum

Hoboken Public Schools. College Algebra Curriculum Hoboken Public Schools College Algebra Curriculum College Algebra HOBOKEN PUBLIC SCHOOLS Course Description College Algebra reflects the New Jersey learning standards at the high school level and is designed

More information

Ì ÄÈ Ë ÈÖÓ Ð Ñ Ì ÄÈ Ë ÐÓÒ Ø Ô Ö Ñ Ø Ö Þ ÓÑÑÓÒ Ù ÕÙ Ò µ ÔÖÓ Ð Ñ Ò Ö Ð Þ Ø ÓÒ Ó Û ÐÐ ÒÓÛÒ Ä Ë ÔÖÓ Ð Ñ ÓÒØ Ò Ò Ô¹ÓÒ ØÖ ÒØ º Ò Ø ÓÒ ÁÒ ÄÈ Ë(,, Ã ½, Ã ¾, )

Ì ÄÈ Ë ÈÖÓ Ð Ñ Ì ÄÈ Ë ÐÓÒ Ø Ô Ö Ñ Ø Ö Þ ÓÑÑÓÒ Ù ÕÙ Ò µ ÔÖÓ Ð Ñ Ò Ö Ð Þ Ø ÓÒ Ó Û ÐÐ ÒÓÛÒ Ä Ë ÔÖÓ Ð Ñ ÓÒØ Ò Ò Ô¹ÓÒ ØÖ ÒØ º Ò Ø ÓÒ ÁÒ ÄÈ Ë(,, à ½, à ¾, ) Ð ÓÖ Ø Ñ ÓÖ ÓÑÔÙØ Ò Ø ÄÓÒ Ø È Ö Ñ Ø Ö Þ ÓÑÑÓÒ ËÙ ÕÙ Ò Ó Ø Ëº ÁÐ ÓÔÓÙÐÓ ½ Å Ö Ò ÃÙ ¾ ź ËÓ Ð Ê Ñ Ò ½ Ò ÌÓÑ Þ Ï Ð ¾ ½ Ð ÓÖ Ø Ñ Ò ÖÓÙÔ Ô ÖØÑ ÒØ Ó ÓÑÔÙØ Ö Ë Ò Ã Ò ÓÐÐ ÄÓÒ ÓÒ ¾ ÙÐØÝ Ó Å Ø Ñ Ø ÁÒ ÓÖÑ Ø Ò ÔÔÐ

More information

NEW YORK CITY COLLEGE OF TECHNOLOGY The City University of New York

NEW YORK CITY COLLEGE OF TECHNOLOGY The City University of New York NEW YORK CITY COLLEGE OF TECHNOLOGY The City University of New York DEPARTMENT: Mathematics COURSE: MAT 2440/ MA 440 TITLE: DESCRIPTION: TEXTS: Discrete Structures and Algorithms I This course introduces

More information

Computational Social Choice: Spring 2017

Computational Social Choice: Spring 2017 Computational Social Choice: Spring 2017 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today So far we saw three voting rules: plurality, plurality

More information

Enriqueta Aragones Harvard University and Universitat Pompeu Fabra Andrew Postlewaite University of Pennsylvania. March 9, 2000

Enriqueta Aragones Harvard University and Universitat Pompeu Fabra Andrew Postlewaite University of Pennsylvania. March 9, 2000 Campaign Rhetoric: a model of reputation Enriqueta Aragones Harvard University and Universitat Pompeu Fabra Andrew Postlewaite University of Pennsylvania March 9, 2000 Abstract We develop a model of infinitely

More information

An Integer Linear Programming Approach for Coalitional Weighted Manipulation under Scoring Rules

An Integer Linear Programming Approach for Coalitional Weighted Manipulation under Scoring Rules An Integer Linear Programming Approach for Coalitional Weighted Manipulation under Scoring Rules Antonia Maria Masucci, Alonso Silva To cite this version: Antonia Maria Masucci, Alonso Silva. An Integer

More information

Maximin equilibrium. Mehmet ISMAIL. March, This version: June, 2014

Maximin equilibrium. Mehmet ISMAIL. March, This version: June, 2014 Maximin equilibrium Mehmet ISMAIL March, 2014. This version: June, 2014 Abstract We introduce a new theory of games which extends von Neumann s theory of zero-sum games to nonzero-sum games by incorporating

More information

A Formal Architecture for the 3APL Agent Programming Language

A Formal Architecture for the 3APL Agent Programming Language A Formal Architecture for the 3APL Agent Programming Language Mark d Inverno, Koen Hindriks Ý, and Michael Luck Þ Ý Þ Cavendish School of Computer Science, 115 New Cavendish Street, University of Westminster,

More information

Cloning in Elections

Cloning in Elections Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence (AAAI-10) Cloning in Elections Edith Elkind School of Physical and Mathematical Sciences Nanyang Technological University Singapore

More information

3 Electoral Competition

3 Electoral Competition 3 Electoral Competition We now turn to a discussion of two-party electoral competition in representative democracy. The underlying policy question addressed in this chapter, as well as the remaining chapters

More information

Ö Ô ÓÒ Ø Ó ØÛÓ Ø Î Ò ÒÓØ Ý Î µº Ë Ø Î Ò Ø ÒÓÒ¹ ÑÔØÝ Ø Ó Ú ÖØ ÓÖ ÒÓ µ Ò Ø Ó Ô Ö Ó Ú ÖØ ÐÐ º Ï Ù Î µ Ò µ ØÓ Ö ÔÖ ÒØ Ø Ø Ó Ú ÖØ Ò Ò Ö Ô Ö Ô Ø Ú Ðݺ ÅÓÖ Ò

Ö Ô ÓÒ Ø Ó ØÛÓ Ø Î Ò ÒÓØ Ý Î µº Ë Ø Î Ò Ø ÒÓÒ¹ ÑÔØÝ Ø Ó Ú ÖØ ÓÖ ÒÓ µ Ò Ø Ó Ô Ö Ó Ú ÖØ ÐÐ º Ï Ù Î µ Ò µ ØÓ Ö ÔÖ ÒØ Ø Ø Ó Ú ÖØ Ò Ò Ö Ô Ö Ô Ø Ú Ðݺ ÅÓÖ Ò Ö Ô Ð ÓÖ Ø Ñ ÁÒ ½ ÙÐ Ö Ú Ø Ø ÖÒ ÈÖÙ Ò ÃÓ Ò Ö Ò ÓÙÒ Ø Ö Û Ö Ú Ò Ö ÖÓ Ø Ö Ú Ö Ò Ò Ð Ò º À Ñ ÙÔ ÕÙ Ø ÓÒ Ø Ø Ò ÒÝÓÒ Ø ÖØ Ø ÒÝ Ð Ò µ Û Ð Ø ÖÓÙ Ü ØÐÝ ÓÒ ÓÖ Ö Ò Ö ØÙÖÒ ØÓ Ø ÓÖ ¹ Ò Ð Ø ÖØ Ò ÔÓ ÒØ Ê Ö ØÓ ÙÖ ½º

More information

Ú Ö Ò ÔØÓÖ ÓÖÑ ÖÓÑ ØÛÓ ÓÒ ÙØ Ò ÔÐ Ø Ô Ö Ø Ý ØÒ Ð Ý Öº Ò ÙÐ Ø Ò ÌÝÔ Ó ÔØÓÖ ÙÖÖ ÒØ i ÓÛ ÔÓ Ø Ú Ò q Û ÐÐ Á ÓÒ Ø ÙÔÔ Ö ÔÐ Ø º ÌÓ ÔÖ ÖÚ ÙÑÙÐ Ø Ò ÙØÖ Ð ØÝ Ð

Ú Ö Ò ÔØÓÖ ÓÖÑ ÖÓÑ ØÛÓ ÓÒ ÙØ Ò ÔÐ Ø Ô Ö Ø Ý ØÒ Ð Ý Öº Ò ÙÐ Ø Ò ÌÝÔ Ó ÔØÓÖ ÙÖÖ ÒØ i ÓÛ ÔÓ Ø Ú Ò q Û ÐÐ Á ÓÒ Ø ÙÔÔ Ö ÔÐ Ø º ÌÓ ÔÖ ÖÚ ÙÑÙÐ Ø Ò ÙØÖ Ð ØÝ Ð Ú Ö Ò ÌÝÔ Ó ÔØÓÖ Ò Ò ½» ½¾ Ú Ö Ò ÔØÓÖ ÓÖÑ ÖÓÑ ØÛÓ ÓÒ ÙØ Ò ÔÐ Ø Ô Ö Ø Ý ØÒ Ð Ý Öº Ò ÙÐ Ø Ò ÌÝÔ Ó ÔØÓÖ ÙÖÖ ÒØ i ÓÛ ÔÓ Ø Ú Ò q Û ÐÐ Á ÓÒ Ø ÙÔÔ Ö ÔÐ Ø º ÌÓ ÔÖ ÖÚ ÙÑÙÐ Ø Ò ÙØÖ Ð ØÝ Ð Ò Ò Ò Ø Ú Ö Ö ÔÖ ÒØ ÓÒ

More information

Check off these skills when you feel that you have mastered them. Identify if a dictator exists in a given weighted voting system.

Check off these skills when you feel that you have mastered them. Identify if a dictator exists in a given weighted voting system. Chapter Objectives Check off these skills when you feel that you have mastered them. Interpret the symbolic notation for a weighted voting system by identifying the quota, number of voters, and the number

More information

Sampling Equilibrium, with an Application to Strategic Voting Martin J. Osborne 1 and Ariel Rubinstein 2 September 12th, 2002.

Sampling Equilibrium, with an Application to Strategic Voting Martin J. Osborne 1 and Ariel Rubinstein 2 September 12th, 2002. Sampling Equilibrium, with an Application to Strategic Voting Martin J. Osborne 1 and Ariel Rubinstein 2 September 12th, 2002 Abstract We suggest an equilibrium concept for a strategic model with a large

More information

½ Ê Ú Û Ó ÆÒ ÕÙÓØ ÒØ ¾ ÇÖØ Ó ÓÒ Ð ÒÚ Ö ÒØ ÓÙ Ð Ö Ø ÓÒ Ý ÕÙÓØ ÒØ Ñ Ô ÇÖ Ø ÓÖÖ ÔÓÒ Ò Ü ÑÔÐ Ó ÓÖ Ø ÓÖÖ ÔÓÒ Ò Ü ÑÔÐ Ø Ò ÓÖ ÔÖÓ ÙØ Ü ÑÔÐ ÓÒØÖ Ø ÓÒ Ñ Ô ÇÔ Ò

½ Ê Ú Û Ó ÆÒ ÕÙÓØ ÒØ ¾ ÇÖØ Ó ÓÒ Ð ÒÚ Ö ÒØ ÓÙ Ð Ö Ø ÓÒ Ý ÕÙÓØ ÒØ Ñ Ô ÇÖ Ø ÓÖÖ ÔÓÒ Ò Ü ÑÔÐ Ó ÓÖ Ø ÓÖÖ ÔÓÒ Ò Ü ÑÔÐ Ø Ò ÓÖ ÔÖÓ ÙØ Ü ÑÔÐ ÓÒØÖ Ø ÓÒ Ñ Ô ÇÔ Ò ÆÒ ÕÙÓØ ÒØ Ò Ø ÓÖÖ ÔÓÒ Ò Ó ÓÖ Ø ÃÝÓ Æ Ý Ñ Ö Ù Ø Ë ÓÓÐ Ó Ë Ò ÃÝÓØÓ ÍÒ Ú Ö ØÝ ÁÒØ ÖÒ Ø ÓÒ Ð ÓÒ Ö Ò ÓÒ Ê ÒØ Ú Ò Ò Å Ø Ñ Ø Ò Ø ÔÔÐ Ø ÓÒ º Ë ÔØ Ñ Ö ¾ ß ¼ ¾¼¼ µ Ô ÖØÑ ÒØ Ó Å Ø Ñ Ø ÃÍ ÈÓ Ø Ö Ù Ø ÒØ Ö Ð ÙÑ Ã ÖÒ

More information

ÐÓ Û µ ÅÄ Ó Ò ººº Ð Ò Ö Ó Ü = (,..., Ü Ò ) ººº ÒØ Ó ÛÓÖ Ý = (Ý ½,..., Ý Ò ) ººº Ö Ú ÛÓÖ ¹ ÓÒ Ø ÒØ ÐÓ Û µ Å Ü ÑÙÑ Ä Ð ÓÓ Åĵ Ó Ö Ø Ø ÔÓ Ð Ó Ö Ñ Ò Ñ Þ Ø

ÐÓ Û µ ÅÄ Ó Ò ººº Ð Ò Ö Ó Ü = (,..., Ü Ò ) ººº ÒØ Ó ÛÓÖ Ý = (Ý ½,..., Ý Ò ) ººº Ö Ú ÛÓÖ ¹ ÓÒ Ø ÒØ ÐÓ Û µ Å Ü ÑÙÑ Ä Ð ÓÓ Åĵ Ó Ö Ø Ø ÔÓ Ð Ó Ö Ñ Ò Ñ Þ Ø ¼ ÅÓ ÖÒ Ó Ò Ì ÓÖÝ ØÛ ÅÄ Ó Ö ÌÓÑ ÐÐ Ö Ò Â Ö Ö Ôغ Ó Ð ØÖ Ð Ò ÓÑÔÙØ Ö Ò Ò Ö Ò ËÍÆ Ò ÑØÓÒ ÐÓ Û µ ÅÄ Ó Ò ººº Ð Ò Ö Ó Ü = (,..., Ü Ò ) ººº ÒØ Ó ÛÓÖ Ý = (Ý ½,..., Ý Ò ) ººº Ö Ú ÛÓÖ ¹ ÓÒ Ø ÒØ ÐÓ Û µ Å Ü ÑÙÑ Ä

More information

Ø Ñ Ò Ò ÙØÙÑÒ ¾¼¼¾ Ò Ò Ö ÕÙ ÒØ ÐÓ µ Ø Û Ø ØÖ ØÖÙØÙÖ ½ ȹØÖ È¹ ÖÓÛØ ÄÇË Ì È¹ØÖ Ø ØÖÙØÙÖ È¹ ÖÓÛØ Ð ÓÖ Ø Ñ ÓÖ Ò Ò ÐÐ Ö ÕÙ ÒØ Ø ÄÇË Ì Ð ÓÖ Ø Ñ ÓÖ Ò Ò Ö ÕÙ

Ø Ñ Ò Ò ÙØÙÑÒ ¾¼¼¾ Ò Ò Ö ÕÙ ÒØ ÐÓ µ Ø Û Ø ØÖ ØÖÙØÙÖ ½ ȹØÖ È¹ ÖÓÛØ ÄÇË Ì È¹ØÖ Ø ØÖÙØÙÖ È¹ ÖÓÛØ Ð ÓÖ Ø Ñ ÓÖ Ò Ò ÐÐ Ö ÕÙ ÒØ Ø ÄÇË Ì Ð ÓÖ Ø Ñ ÓÖ Ò Ò Ö ÕÙ Ø Ñ Ò Ò ÙØÙÑÒ ¾¼¼¾ Ò Ò Ö ÕÙ ÒØ ÐÓ µ Ø Û Ø ØÖ ØÖÙØÙÖ ½ Ö ÕÙ ÒØ ÐÓ µ Ø Û Ø Ò Ò ØÖÙØÙÖ ØÖ Ø Ñ Ò Ò ÙØÙÑÒ ¾¼¼¾ Ò Ò Ö ÕÙ ÒØ ÐÓ µ Ø Û Ø ØÖ ØÖÙØÙÖ ½ ȹØÖ È¹ ÖÓÛØ ÄÇË Ì È¹ØÖ Ø ØÖÙØÙÖ È¹ ÖÓÛØ Ð ÓÖ Ø Ñ ÓÖ Ò Ò ÐÐ

More information

Comparison of the Psychometric Properties of Several Computer-Based Test Designs for. Credentialing Exams

Comparison of the Psychometric Properties of Several Computer-Based Test Designs for. Credentialing Exams CBT DESIGNS FOR CREDENTIALING 1 Running head: CBT DESIGNS FOR CREDENTIALING Comparison of the Psychometric Properties of Several Computer-Based Test Designs for Credentialing Exams Michael Jodoin, April

More information

Reputation-Based Trust Management (extended abstract)

Reputation-Based Trust Management (extended abstract) Reputation-Based Trust Management (extended abstract) Vitaly Shmatikov and Carolyn Talcott Computer Science Laboratory, SRI International, Menlo Park, CA 94025 USA shmat,clt @csl.sri.com Abstract. We propose

More information

Density Data

Density Data È ÖØ Ó ÔÖÓ Ø ØÓ Ø ØÝ Ó ÒØ Ö Ø ÓÒ Ý ÑÓÒ ØÓÖ Ò Ö Ú Ò Ô ØØ ÖÒ º Ì ÔÖÓ Ø Ù Ú Ð ØÖ Ò ÓÒ ÓÖ ÖÓÙÒ» ÖÓÙÒ Ñ ÒØ Ø ÓÒº Ì ØÖ Ò ÜÔ Ö Ò ÔÖÓ Ð Ñ Ù ØÓ ËØ Ò Ö ÓÐÙØ ÓÒ ØÓ ÑÓ Ð Ô Ü Ð Ù Ò Ù Ò Ñ ÜØÙÖ º ÍÔ Ø Ø Ô Ö Ñ Ø Ö Ó Ù

More information

The mathematics of voting, power, and sharing Part 1

The mathematics of voting, power, and sharing Part 1 The mathematics of voting, power, and sharing Part 1 Voting systems A voting system or a voting scheme is a way for a group of people to select one from among several possibilities. If there are only two

More information

(67686) Mathematical Foundations of AI June 18, Lecture 6

(67686) Mathematical Foundations of AI June 18, Lecture 6 (67686) Mathematical Foundations of AI June 18, 2008 Lecturer: Ariel D. Procaccia Lecture 6 Scribe: Ezra Resnick & Ariel Imber 1 Introduction: Social choice theory Thus far in the course, we have dealt

More information

½º»¾¼ º»¾¼ ¾º»¾¼ º»¾¼ º»¾¼ º»¾¼ º»¾¼ º»¾¼» ¼» ¼ ÌÓØ Ð»½ ¼

½º»¾¼ º»¾¼ ¾º»¾¼ º»¾¼ º»¾¼ º»¾¼ º»¾¼ º»¾¼» ¼» ¼ ÌÓØ Ð»½ ¼ Ò Ð Ü Ñ Ò Ø ÓÒ ËÌ ½½ ÈÖÓ Ð ØÝ ² Å ÙÖ Ì ÓÖÝ ÌÙ Ý ¾¼½ ½¼ ¼¼ Ñ ß ½¾ ¼¼Ò Ì ÐÓ ¹ ÓÓ Ü Ñ Ò Ø ÓÒº ÓÙ Ñ Ý Ù Ø Ó ÔÖ Ô Ö ÒÓØ ÝÓÙ Û ÙØ ÝÓÙ Ñ Ý ÒÓØ Ö Ñ Ø Ö Ð º Á ÕÙ Ø ÓÒ Ñ Ñ ÙÓÙ ÓÖ ÓÒ Ù Ò ÔÐ Ñ ØÓ Ð Ö Ý Øº ÍÒÐ ÔÖÓ

More information

Hat problem on a graph

Hat problem on a graph Hat problem on a graph Submitted by Marcin Piotr Krzywkowski to the University of Exeter as a thesis for the degree of Doctor of Philosophy by Publication in Mathematics In April 2012 This thesis is available

More information

Topics on the Border of Economics and Computation December 18, Lecture 8

Topics on the Border of Economics and Computation December 18, Lecture 8 Topics on the Border of Economics and Computation December 18, 2005 Lecturer: Noam Nisan Lecture 8 Scribe: Ofer Dekel 1 Correlated Equilibrium In the previous lecture, we introduced the concept of correlated

More information

Complexity of Strategic Behavior in Multi-Winner Elections

Complexity of Strategic Behavior in Multi-Winner Elections Journal of Artificial Intelligence Research 33 (2008) 149 178 Submitted 03/08; published 09/08 Complexity of Strategic Behavior in Multi-Winner Elections Reshef Meir Ariel D. Procaccia Jeffrey S. Rosenschein

More information

Measuring the Compliance, Proportionality, and Broadness of a Seat Allocation Method

Measuring the Compliance, Proportionality, and Broadness of a Seat Allocation Method Center for People Empowerment in Governance 3F, CSWCD, Magsaysay Avenue University of the Philippines, Diliman Quezon City, 1101, Philippines Tel/fax +632-929-9526 www.cenpeg.org Email: cenpeg.info@gmail.com

More information

A representation theorem for minmax regret policies

A representation theorem for minmax regret policies Artificial Intelligence 171 (2007) 19 24 Research note www.elsevier.com/locate/artint A representation theorem for minmax regret policies Sanjiang Li a,b a State Key Laboratory of Intelligent Technology

More information

Introduction to the Theory of Cooperative Games

Introduction to the Theory of Cooperative Games Bezalel Peleg Peter Sudholter Introduction to the Theory of Cooperative Games Second Edition 4y Springer Preface to the Second Edition Preface to the First Edition List of Figures List of Tables Notation

More information

A procedure to compute a probabilistic bound for the maximum tardiness using stochastic simulation

A procedure to compute a probabilistic bound for the maximum tardiness using stochastic simulation Proceedings of the 17th World Congress The International Federation of Automatic Control A procedure to compute a probabilistic bound for the maximum tardiness using stochastic simulation Nasser Mebarki*.

More information

MATH4999 Capstone Projects in Mathematics and Economics Topic 3 Voting methods and social choice theory

MATH4999 Capstone Projects in Mathematics and Economics Topic 3 Voting methods and social choice theory MATH4999 Capstone Projects in Mathematics and Economics Topic 3 Voting methods and social choice theory 3.1 Social choice procedures Plurality voting Borda count Elimination procedures Sequential pairwise

More information

È Ö Ø ² ÑÔ Ö Ø Ò ÓÖÑ Ø ÓÒ ÓÖ Ñ È Ö Ø Ò ÓÖÑ Ø ÓÒ ÈÐ Ý Ö ÒÓÛ ÓÙØ Ø ÔÖ Ú ÓÙ ÑÓÚ Ó ÓÔÔÓÒ ÒØ º º º Ð ¹ËØ Û ÖØ Ñ º ÁÑÔ Ö Ø Ò ÓÖÑ Ø ÓÒ ÈÐ Ý Ö Ó ÒÓØ ÒÓÛ ÓÙØ Û

È Ö Ø ² ÑÔ Ö Ø Ò ÓÖÑ Ø ÓÒ ÓÖ Ñ È Ö Ø Ò ÓÖÑ Ø ÓÒ ÈÐ Ý Ö ÒÓÛ ÓÙØ Ø ÔÖ Ú ÓÙ ÑÓÚ Ó ÓÔÔÓÒ ÒØ º º º Ð ¹ËØ Û ÖØ Ñ º ÁÑÔ Ö Ø Ò ÓÖÑ Ø ÓÒ ÈÐ Ý Ö Ó ÒÓØ ÒÓÛ ÓÙØ Û Ð ¹ËØ Û ÖØ Ñ Ò Ð Û ÐÐ Ñ Ù Á Ñ ÍÒ Ú Ö ØÝ Ó Ð ÓÖÒ Ö Ð Ýµ ½ Ø Ó Å Ý ¾¼½¾ È Ö Ø ² ÑÔ Ö Ø Ò ÓÖÑ Ø ÓÒ ÓÖ Ñ È Ö Ø Ò ÓÖÑ Ø ÓÒ ÈÐ Ý Ö ÒÓÛ ÓÙØ Ø ÔÖ Ú ÓÙ ÑÓÚ Ó ÓÔÔÓÒ ÒØ º º º Ð ¹ËØ Û ÖØ Ñ º ÁÑÔ Ö Ø Ò ÓÖÑ Ø ÓÒ ÈÐ

More information

Æ ÛØÓÒ³ Å Ø Ó ÐÓ Ì ÓÖÝ Ò ËÓÑ Ø Ò ÓÙ ÈÖÓ ÐÝ Ò³Ø ÃÒÓÛ ÓÙØ Ú º ÓÜ Ñ Ö Ø ÓÐÐ

Æ ÛØÓÒ³ Å Ø Ó ÐÓ Ì ÓÖÝ Ò ËÓÑ Ø Ò ÓÙ ÈÖÓ ÐÝ Ò³Ø ÃÒÓÛ ÓÙØ Ú º ÓÜ Ñ Ö Ø ÓÐÐ Æ ÛØÓÒ³ Å Ø Ó ÐÓ Ì ÓÖÝ Ò ËÓÑ Ø Ò ÓÙ ÈÖÓ ÐÝ Ò³Ø ÃÒÓÛ ÓÙØ Ú º ÓÜ Ñ Ö Ø ÓÐÐ Ê Ö Ò ÃÐ Ò Ä ØÙÖ ÓÒ Ø ÁÓ ÖÓÒ Ì Ù Ò Ö ½ ËÑ Ð ÇÒ Ø Æ ÒÝ Ó Ð ÓÖ Ø Ñ Ò ÐÝ ÙÐк ÅË ½ ÅÅÙÐÐ Ò Ñ Ð Ó Ö Ø ÓÒ Ð Ñ Ô Ò Ø Ö Ø Ú ÖÓÓع Ò Ò Ð

More information