To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
“I think there's a revolution in mathematics around the corner. I think that … people will look back on the fin-de-siècle of the twentieth century and say ‘Then is when it happened’ (just like we look back at the Greeks for inventing the concept of proof and at the nineteenth century for making analysis rigorous). I really believe that. And it amazes me that no one seems to notice.
“Never before have the Platonic mathematical world and the physical world been this similar, this close. Is it strange that I expect leakage between these two worlds? That I think the proof strings will find their way to the computer memories?…
“What I expect is that some kind of computer system will be created, a proof checker, that all mathematicians will start using to check their work, their proofs, their mathematics. I have no idea what shape such a system will take. But I expect some system to come into being that is past some threshold so that it is practical enough for real work, and then quite suddenly some kind of ‘phase transition’ will occur and everyone will be using that system.”
Summary. In this chapter a general working knowledge of measure in three-dimensional Euclidean space is assumed. Nowhere does this book directly need integration. Measure alone suffices. Volume formulas for various classical solids are stated. Most of the volumes considered in this chapter (such as that of the ball, a rectangle, a tetrahedron, and a frustum) have been known since antiquity. This chapter describes the volumes of every three-dimensional solid that appears anywhere in the book.
To keep the presentation as simple as possible, we avoid surface integrals. As an elementary substitute for surface integration on a sphere, this book systematically replaces subsets of the unit sphere with threedimensional solids, called radial sets. This chapter presents basic properties of radial sets.
Finally, Section 3.3 uses the volume formula for cubes to estimate the number of integer lattice points in a ball of large radius.
Background in Measure
This book uses the concepts of null set, measurable set, and volume in three dimensions; the existence of these concepts with stated properties is assumed without proof.
Definition 3.1 (vol, measurable, null) Let vol be the Lebesgue measure on Euclidean space ℝ3. A null set is a Lebesgue measurable subsets of ℝ3 of measure zero. A measurable set in this book is a subset of ℝ3 that is bounded and Lebesgue measurable.
Remark 3.2 The Lebesgue measure may be replaced with various alternatives (for example, Riemann or gauge) of measure in this definition. A list of three-dimensional solids (a rectangle, a ball, a tetrahedron, a frustum, and so forth), called primitive regions, is provided by Definition 3.22.
Any function F: {0,. . ., N − 1} → {−1,1} such that F(x) can be computed from the binary digits of x using a bounded depth circuit is orthogonal to the Möbius function μ in the sense that
\[\frac{1}{N} \sum_{0 \leq x \leq N-1} \mu(x)F(x) → 0 \quad\text{as}~~ N → \infty.\]
The proof combines a result of Linial, Mansour and Nisan with techniques of Kátai and Harman, used in their work on finding primes with specified digits.
Cops and robbers is a turn-based pursuit game played on a graph G. One robber is pursued by a set of cops. In each round, these agents move between vertices along the edges of the graph. The cop number c(G) denotes the minimum number of cops required to catch the robber in finite time. We study the cop number of geometric graphs. For points x1, . . ., xn ∈ ℝ2, and r ∈ ℝ+, the vertex set of the geometric graph G(x1, . . ., xn; r) is the graph on these n points, with xi, xj adjacent when ∥xi − xj∥ ≤ r. We prove that c(G) ≤ 9 for any connected geometric graph G in ℝ2 and we give an example of a connected geometric graph with c(G) = 3. We improve on our upper bound for random geometric graphs that are sufficiently dense. Let (n,r) denote the probability space of geometric graphs with n vertices chosen uniformly and independently from [0,1]2. For G ∈ (n,r), we show that with high probability (w.h.p.), if r ≥ K1 (log n/n)1/4 then c(G) ≤ 2, and if r ≥ K2(log n/n)1/5 then c(G) = 1, where K1, K2 > 0 are absolute constants. Finally, we provide a lower bound near the connectivity regime of (n,r): if r ≤ K3 log n/ then c(G) > 1 w.h.p., where K3 > 0 is an absolute constant.
A function f: 2n → {0,1} is odd-cycle-free if there are no x1,. . .,xk ∈ 2n with k an odd integer such that f(x1) = ··· = f(xk) = 1 and x1 + ··· + xk = 0. We show that one can distinguish odd-cycle-free functions from those ε-far from being odd-cycle-free by making poly(1/ε) queries to an evaluation oracle. We give two proofs of this result, each shedding light on a different connection between testability of properties of Boolean functions and of dense graphs.
The first issue we study is directly reducing testing of linear-invariant properties of Boolean functions to testing associated graph properties. We show a black-box reduction from testing odd-cycle-freeness to testing bipartiteness of graphs. Such reductions have already been shown (Král’, Serra and Vena, and Shapira) for monotone linear-invariant properties defined by forbidding solutions to a finite number of equations. But for odd-cycle-freeness whose description involves an infinite number of forbidden equations, a reduction to graph property testing was not previously known. If one could show such a reduction more generally for any linear-invariant property closed under restrictions to subspaces, then it would likely lead to a characterization of the one-sided testable linear-invariant properties, an open problem raised by Sudan.
The second issue we study is whether there is an efficient canonical tester for linear-invariant properties of Boolean functions. A canonical tester for linear-invariant properties operates by picking a random linear subspace and then checking whether the restriction of the input function to the subspace satisfies a fixed property. The question is if, for every linear-invariant property, there is a canonical tester for which there is only a polynomial blow-up from the optimal query complexity. We answer the question affirmatively for odd-cycle-freeness. The general question remains open.
Modern Computer Arithmetic focuses on arbitrary-precision algorithms for efficiently performing arithmetic operations such as addition, multiplication and division, and their connections to topics such as modular arithmetic, greatest common divisors, the Fast Fourier Transform (FFT), and the computation of elementary and special functions. Brent and Zimmermann present algorithms that are ready to implement in your favourite language, while keeping a high-level description and avoiding too low-level or machine-dependent details. The book is intended for anyone interested in the design and implementation of efficient high-precision algorithms for computer arithmetic, and more generally efficient multiple-precision numerical algorithms. It may also be used in a graduate course in mathematics or computer science, for which exercises are included. These vary considerably in difficulty, from easy to small research projects, and expand on topics discussed in the text. Solutions to selected exercises are available from the authors.
Let A and B be two affinely generating sets of ℤ2n. As usual, we denote their Minkowski sum by A+B. How small can A+B be, given the cardinalities of A and B? We give a tight answer to this question. Our bound is attained when both A and B are unions of cosets of a certain subgroup of ℤ2n. These cosets are arranged as Hamming balls, the smaller of which has radius 1.
By similar methods, we re-prove the Freiman–Ruzsa theorem in ℤ2n, with an optimal upper bound. Denote by F(K) the maximal spanning constant |〈 A 〉|/|A| over all subsets A ⊆ ℤ2n with doubling constant |A+A|/|A| ≤ K. We explicitly calculate F(K), and in particular show that 4K/4K ≤ F(K)⋅(1+o(1)) ≤ 4K/2K. This improves the estimate F(K) = poly(K)4K, found recently by Green and Tao [17] and by Konyagin [23].
The Parikh finite word automaton (PA) was introduced and studied in 2003 by Klaedtke andRueß. Natural variants of the PA arise from viewing a PA equivalently as an automaton thatkeeps a count of its transitions and semilinearly constrains their numbers. Here we adoptthis view and define the affine PA, that extends the PA by having eachtransition induce an affine transformation on the PA registers, and the PA onletters, that restricts the PA by forcing any two transitions on the sameletter to affect the registers equally. Then we report on the expressiveness, closure, anddecidability properties of such PA variants. We note that deterministic PA are strictlyweaker than deterministic reversal-bounded counter machines.
We investigate the possibility of extending Chrobak normal form to the probabilisticcase. While in the nondeterministic case a unary automaton can be simulated by anautomaton in Chrobak normal form without increasing the number of the states in thecycles, we show that in the probabilistic case the simulation is not possible by keepingthe same number of ergodic states. This negative result is proved by considering thenatural extension to the probabilistic case of Chrobak normal form, obtained by replacingnondeterministic choices with probabilistic choices. We then propose a different kind ofnormal form, namely, cyclic normal form, which does not suffer from the same problem: weprove that each unary probabilistic automaton can be simulated by a probabilisticautomaton in cyclic normal form, with at most the same number of ergodic states. In thenondeterministic case there are trivial simulations between Chrobak normal form and cyclicnormal form, preserving the total number of states in the automata and in theircycles.
LetLϕ,λ = {ω ∈ Σ∗| ϕ(ω) >λ} be thelanguage recognized by a formal seriesϕ:Σ∗ → ℝ with isolated cut pointλ. We provide new conditions that guarantee the regularity of thelanguage Lϕ,λ in the case thatϕ is rational or ϕ is a Hadamard quotient of rationalseries. Moreover the decidability property of such conditions is investigated.
We introduce and investigate string assembling systems which form a computational model that generates strings from copies out of a finite set of assembly units. The underlying mechanism is based on piecewise assembly of a double-stranded sequence of symbols, where the upper and lower strand have to match. The generation is additionally controlled by the requirement that the first symbol of a unit has to be the same as the last symbol of the strand generated so far, as well as by the distinction of assembly units that may appear at the beginning, during, and at the end of the assembling process. We start to explore the generative capacity of string assembling systems. In particular, we prove that any such system can be simulated by some nondeterministic one-way two-head finite automaton, while the stateless version of the two-head finite automaton marks to some extent a lower bound for the generative capacity. Moreover, we obtain several incomparability and undecidability results as well as (non-)closure properties, and present questions for further investigations.
In this paper, we introduce generating networks of splicing processors (GNSP for short),a formal languages generating model related to networks of evolutionary processors and toaccepting networks of splicing processors. We show that all recursively enumerablelanguages can be generated by GNSPs with only nine processors. We also show, by directsimulation, that two other variants of this computing model, where the communicationbetween processors is conducted in different ways, have the same computational power.
A class of labelled graphs is bridge-addable if, for all graphs G in and all vertices u and v in distinct connected components of G, the graph obtained by adding an edge between u and v is also in ; the class is monotone if, for all G ∈ and all subgraphs H of G, we have H ∈ . We show that for any bridge-addable, monotone class whose elements have vertex set {1,. . .,n}, the probability that a graph chosen uniformly at random from is connected is at least (1−on(1))e−½, where on(1) → 0 as n → ∞. This establishes the special case of the conjecture of McDiarmid, Steger and Welsh when the condition of monotonicity is added. This result has also been obtained independently by Kang and Panagiotou.