The Complexity Of Nonuniform Random Number Generation Pdf
Non-Uniform Random Variate Generation Non-Uniform Random Variate Generation (originally published with Springer-Verlag, New York, 1986) School of Computer Science McGill University Preface to the Web Edition When I wrote this book in 1986, I had to argue long and hard with Springer Verlag to publish it. They printed a small number of copies, and never bothered with a second printing, even though, surprisingly, there seemed to be some continued demand for the book. I have asked Springer to print more copies, but they flatly refused, unless I was willing to publish a second edition with them in the near future. Burnt once, why would I trust them with a second edition? Also, I figured that since Springer had gross income about 500,000 US dollars from my books with them, that they would be more generous with their royalties and more responsive to demands for second printings.
The complexity of nonuniform random number generation pdf download: 439: The complexity of nonuniform random number generation pdf download. The complexity of nonuniform random number generation. In Algorithms and Complexity: New Directions and Recent Results, Academic Press. 2 International Journal of Recon.
The contrary is true in fact: royalties are decreasing (they stand now at 7.5% per book), and I feel that I am just one of the many academic rape victims. As the book is out of print, the copyright and ownership is mine, so I do with it what I want.
On these web pages, you will find a fine scan of my book in text searchable PDF format (thanks, HK). This is the original text. A list of errata is. Furthermore, I give anyone the permission, even without asking me, to take these PDF files to a printer, print as many copies as you like, and sell them for profit. If you would like me to advertise the sales points of the hard copies, please let me know. To the libraries: Please do not charge patrons for copying this book. I grant everyone the right to copy at will, for free.
So, there you have it. Eventually, I will do this with all my books. While I love Springer, my honeymoon with them is over. I will of course never start any affairs with the champion bloodsuckers like Elsevier, Kluwer or Dekker. Outfits I like are SIAM (nonprofit), Dover (great pricing) and Oxford University Press (allowing authors to post books on the web).
With the arrival of Amazon, book advertising is no longer necessary, and one can publish with any company, really. So, it will be a matter of a few years before the old publishers will come back to the academics on their hands and knees asking for manuscripts. The with all PDF files is provided for your convenience. Below, you will find a table of contents and an index, both in HTML format: look for a keyword, note the page number, go to the right chapter via the table, and you are done.
Luc Devroye Montreal, September 29, 2003 Table of contents TABLE OF CONTENTS I. General outline. About our notation. A few important univariate densities. Assessment of random variate generators.
Distributions with no variable parameters. Parametric families. Operations on random variables. Order statistics.
Sums of independent random variables. Sums of independent uniform random variables. The inversion method. The inversion principle. Inversion by numerical solution of $F(X)=U$. Explicit approximations.
The rejection method. Development of good rejection algorithms.
Generalizations of the rejection method. Wald's equation. Letac's lower bound. The squeeze principle. Recycling random variates. Decomposition as discrete mixtures. Decomposition into simple components.
Partitions into intervals. The waiting time method for asymmetric mixtures. Polynomial densities on $[0,1]$. Mixtures with negative coefficients. The acceptance-complement method. Simple acceptance-complement methods. Acceleration by avoiding the ratio computation.
An example: nearly flat densities on $[0,1]$. The inversion method. Inversion by truncation of a continuous random variate. Comparison-based inversions.
The method of guide tables. Inversion by correction. Table look-up methods.
The table look-up principle. Multiple table look-ups. The alias method. The alias-urn method. Geometrical puzzles. Other general principles. The rejection method.
The composition and acceptance-complement methods. Motivation for the chapter. The Forsythe-von Neumann method. Description of the method. Von Neumann's exponential random variate generator. Monahan's generalization.
An example: Vaduva's gamma generator. Almost-exact inversion. Monotone densities on $[0, inf )$.
Polya's approximation for the normal distribution. Approximations by simple functions of normal random variates. Many-to-one transformations. The principle. The absolute value transformation. The inverse gaussian distribution. The series method.
Analysis of the alternating series algorithm. Analysis of the convergent series algorithm. The exponential distribution.
The Raab-Green distribution. The Kolmogorov-Smirnov distribution. Representations of densities as integrals. Khinchine's and related theorems. The inverse-of-$f$ method for monotone densities. Convex densities. Recursive methods based upon representations.
A representation for the stable distribution. Densities with Polya type characteristic functions. The ratio-of-uniforms method. Several examples. Uniform and exponential spacings.
Uniform spacings. Exponential spacings. Generating ordered samples. Generating uniform $[0,1]$ order statistics.
Bucket sorting. Bucket searching. Generating exponential order statistics. Generating order statistics with distribution function F.
Generating exponential random variates in batches. The polar method.
Radially symmetric distributions. Generating random vectors uniformly distributed on $C sub d$. Generating points uniformly in and on $C sub 2$.233 4.4. Generating normal random variates in batches.
Generating radially symmetric random vectors. The deconvolution method. The Poisson process. Simulation of homogeneous Poisson processes.
Nonhomogeneous Poisson processes. Global methods for nonhomogeneous Poisson process simulation. Generation of random variates with a given hazard rate. Connection with Poisson processes. The inversion method. The composition method.
The thinning method. DHR distributions. Dynamic thinning. Analysis of the dynamic thinning algorithm.
Generating random variates with a given discrete hazard rate. The sequential test method.
Hazard rates bounded away from 1.280 3.4. Discrete dynamic thinning. Black box philosophy. Log-concave densities. Inequalities for log-concave densities. A black box algorithm.
The optimal rejection algorithm. The mirror principle. Non-universal rejection methods.
Inequalities for families of densities. Bounds for unimodal densities.
Densities satisfying a Lipschitz condition. Normal scale mixtures.
The inversion-rejection method. The principle. Bounded densities. Unimodal and monotone densities.
Monotone densities on $[0,1]$. Bounded monotone densities: inversion-rejection based on Newton-Raphson iterations.
Bounded monotone densities: geometrically increasing interval sizes. Lipschitz densities on $[0, inf )$.
Composition versus rejection. Strip methods. Example 1: monotone densities on $[0,1]$.362 2.3. Other examples. Grid methods. Generating a point uniformly in a compact set $A$. Avoidance problems.
Fast random variate generators. The normal density. The tail of the normal density. Composition/rejection methods. The exponential density. Marsaglia's exponential generator.
The rectangle-wedge-tail method. The gamma density. The gamma family. Gamma variate generators. Uniformly fast rejection algorithms for $a >= 1$.407 3.4. The Weibull density. Johnk's theorem and its implications.
Gamma variate generators when $a 3.7. The tail of the gamma density. Stacy's generalized gamma distribution. The beta density. Properties of the beta density. Overview of beta generators.
The symmetric beta density. Uniformly fast rejection algorithms. Generators when $min (a,b) 4.6. The t distribution. Ordinary rejection methods.
The Cauchy density. The stable distribution. Definition and properties.
Overview of generators. The Bergstrom-Feller series. The series method for stable random variates.
Nonstandard distributions. Bessel function distributions. The logistic and hyperbolic secant distributions. The von Mises distribution. The Burr distribution. The generalized inverse gaussian distribution. Goals of this chapter.
Generating functions. A universal rejection method. The geometric distribution. Definition and genesis. The Poisson distribution.
Basic properties. Overview of generators. Simple generators. Rejection methods. The binomial distribution. Overview of generators. Simple generators.
The rejection method. Recursive methods. Symmetric binomial random variates. The negative binomial distribution.
The logarithmic series distribution. The Zipf distribution. A simple generator.
The Planck distribution. The Yule distribution. General principles. The conditional distribution method. The rejection method. The composition method. Discrete distributions.
Linear transformations. The multinormal distribution. Linear transformations.
Generators of random vectors with a given covariance matrix. The multinormal distribution. Points uniformly distributed in a hyperellipsoid. Uniform polygonal random vectors. Singular distributions.
Bivariate distributions. Creating and measuring dependence. Bivariate uniform distributions. Bivariate exponential distributions. A case study: bivariate gamma distributions. The Dirichlet distribution. Definitions and properties.
Liouville distributions. Some useful multivariate families. The Cook-Johnson family. Multivariate Khinchine mixtures. Random matrices. Random correlation matrices.
Random orthogonal matrices. Random $R times C$ tables. Classical sampling.
The swapping method. Classical sampling with membership checking 613 2.3. Sequential sampling. Standard sequential sampling. The spacings method for sequential sampling. The inversion method for sequential sampling. The ghost point method.
The rejection method. Reservoir sampling. The reservoir method with geometric jumps.
General principles. The decoding method. Generation based upon recurrences. Random permutations. Simple generators. Random binary search trees. Random binary trees. Solidworks Free Download For Windows 7 Cracker on this page.
Representations of binary trees. Generation by rejection. Generation by sequential sampling. The decoding method. Random partitions. Recurrences and codewords.
Generation of random partitions. Random free trees. Prufer's construction. Klingsberg's algorithm.
Free trees with a given number of leaves. Random graphs. Random graphs with simple properties. Connected graphs. Tinhofer's graph generators.
Bipartite graphs. The maximum of iid random variables.
Overview of methods. The quick elimination principle.
The record time method. Random variates with given moments. The moment problem. Discrete distributions. Unimodal densities and scale mixtures.
Convex combinations. Characteristic functions. Problem statement.
The rejection method for characteristic functions. A black box method. Problem statement. A detour via characteristic functions. Rejection based upon a local central limit theorem. A local limit theorem. The mixture method for simulating sums.
Sums of independent uniform random variables. Discrete event simulation. Future event set algorithms.
Reeves's model. Linear lists. Tree structures. Regenerative phenomena. The principle.
Random walks. Birth and death processes. Phase type distributions.
The generalization of a sample. Problem statement.
Sample independence. Consistency of density estimates. Sample indistinguishability. Moment matching.
Generators for $f sub n$. The random bit model. Some examples. The Knuth-Yao lower bound. The lower bound.
Optimal and suboptimal DDG-tree algorithms. Suboptimal DDG-tree algorithms.
Optimal DDG-tree algorithms. Distribution-free inequalities for the performance of optimal DDG-tree algorithms.
782 784 817 2-3 tree 613 2-3 tree in discrete event simulation 747 Abramowitz, M. 297 302 391 415 678 absolute continuity 172 absolute value transformation 147 absorbing Markov chain 757 acceptance complement method for discrete distributions 116 acceptance-complement method 75 accelerated 78 for Cauchy distribution 81 451 for Poisson distribution 502 for t distribution 446 of Ahrens and Dieter 77 79 squeeze principle for 78 aceptance-complement method for nearly flat densities 79 adaptive inversion method 38 adaptive strip method 367 adjacency list 669 admissible algorithm 9 admissible generator 9 10 Afifi, A.A. 606 Aho, A.V. 90 92 214 372 669 Ahrens, J.H. 36 72 76 77 84 98 121 145 359 379 380 383 391 396 397 405 413 420 423 424 425 432 502 507 518 523 538 617 Ahrens-Dieter generator for exponential distribution 397 Aitchison, J.
594 Akima, H. 763 Alder, B.J. 372 algorithm B2PE for beta distribution 305 309 algorithm B4PE for beta distribution 305 algorithm of Nijenhuis and Wilf for classical sampling 618 algorithm 2 Ali, M.M. 578 alias method algorithm 108 bit-based 777 set-up 109 with two tables 109 alias-urn method 110 almost-exact inversion method 133 for exponential distribution 134 for gamma distribution 137 139 141 145 for monotone densities 134 for normal distribution 135 380 for t distribution 143 alternating series method 153 analysis of 154 exponential version of 154 for exponential distribution 158 for Kolmogorov-Smirnov distribution 162 for Raab-Green distribution 158 analytic characteristic function 685 Ananthanarayanan, K. 359 Anderson, T.W. 168 716 Anderson-Darling statistic 168 Andrews, D.F. 326 approximations for inverse of normal distribution function 36 arc sine distribution 429 481 as the projection of a radially symmetric random vector 230 deconvolution method 239 polar method for 482 properties of 482 Archer, N.P.
687 Arfwedson's distribution 497 Arfwedson, G. 497 Arnason, A.N. 432 Arnold, B.C. 482 583 Arnold, D.B. 592 656 Asau, Y. 96 assessment of generators 8 association 574 576 589 asymmetric Kolmogorov-Smirnov statistics 167 asymmetric mixtures 71 asymptotic independence 760 Atkinson's algorithm for Poisson distribution 518 Atkinson, A.C.
121 379 380 404 432 439 440 443 480 502 505 507 518 Atkinson-Whittaker method for beta distribution 440 443 autocorrelation matrix 571 AVL tree in discrete event simulation 747 avoidance problems 372 grid method for 373 Baase, S. 214 Babu, A.J.G. 304 305 309 432 Badel, M. 571 Bailey, B.J.R. 36 balanced binary search tree in discrete event simulation 746 balanced parentheses 652 ball-in-urn method 608 609 for multinomial distribution 558 for random bipartite graphs 671 Banks, J. 4 736 Barbu, G.
204 Barlow, R.E. 260 277 343 356 742 Barnard, D.R.
367 Barndorff-Nielsen, O. 329 330 478 483 Barnett, V. 582 Barr, D.R. 566 Bartels's bounds 460 461 Bartels, R. 458 459 460 462 Bartlett's kernel 762 765 767 inversion method for 767 order statistics method for 766 rejection method for 765 Bartlett, M.S. Office 2007 Professional Trial Download Mirror Mirror more. 762 Barton, D.E. 168 519 Basu, D.
594 batch method for exponential distribution 223 Beasley, J.D. 36 Beckman, R.J. 175 Bell, J.R. 236 380 Bendel, R.B.
4 Bentley, J.L. 215 Berenson, M.L. 215 220 Bergstrom, H. 459 460 Bergstrom-Feller series for stable distribution 459 460 461 Berman's method analysis of 419 for beta distribution 418 for gamma distribution 419 420 Berman's theorem 416 Berman, M.B. 416 420 Bernoulli distribution 486 521 properties of 689 Bernoulli generator 769 Bernoulli number 490 493 550 Bernoulli trial 521 Berry-Esseen theorem application of 225 Besag, J.E. 372 Bessel function distribution 469 type I 469 type II 469 Bessel function 469 integral representation for 470 modified 469 of the first kind 473 755 of the second kind 469 Best's rejection method for gamma distribution 410 Best, D.J.
This article proposes a surprisingly simple framework for the random generation of combinatorial configurations based on what we call Boltzmann models. The idea is to perform random generation of possibly complex structured objects by placing an appropriate measure spread over the whole of a combinatorial class -- an object receives a probability essentially proportional to an exponential of its size.
As demonstrated here, the resulting algorithms based on real-arithmetic operations often operate in linear time. They can be implemented easily, be analysed mathematically with great precision, and, when suitably tuned, tend to be very efficient in practice. We use random sampling as a tool for solving undirected graph problems. We show that the sparse graph, or skeleton, that arises when we randomly sample a graph’s edges will accurately approximate the value of all cuts in the original graph with high probability. This makes sampling effective for problems involving cuts in graphs. We present fast randomized (Monte Carlo and Las Vegas) algorithms for approximating and exactly finding minimum cuts and maximum flows in unweighted, undirected graphs. Our cut-approximation algorithms extend unchanged to weighted graphs while our weighted-graph flow algorithms are somewhat slower.
Our approach gives a general paradigm with potential applications to any packing problem. It has since been used in a near-linear time algorithm for finding minimum cuts, as well as faster cut and flow algorithms. Our sampling theorems also yield faster algorithms for several other cut-based problems, including approximating the best balanced cut of a graph, finding a k-connected orientation of a 2k-connected graph, and finding integral multicommodity flows in graphs with a great deal of excess capacity. Our methods also improve the efficiency of some parallel cut and flow algorithms. Our methods also apply to the network design problem, where we wish to build a network satisfying certain connectivity requirements between vertices. We can purchase edges of various costs and wish to satisfy the requirements at minimum total cost.
Since our sampling theorems apply even when the sampling probabilities are different for different edges, we can apply randomized rounding to solve network design problems. This gives approximation algorithms that guarantee much better approximations than previous algorithms whenever the minimum connectivity requirement is large.
As a particular example, we improve the best approximation bound for the minimum k-connected subgraph problem from 1.85 to 1 � O(�log n)/k). We describe efficient constructions of small probability spaces that approximate the independent distribution for general random variables. Previous work on efficient constructions concentrate on approximations of the independent distribution for the special case of uniform boolean-valued random variables. Our results yield efficient constructions of small sets with low discrepancy in high dimensional space and have applications to derandomizing randomized algorithms. 1 Introduction The problem of constructing small sample spaces that 'approximate' the independent distribution on n random variables has received considerable attention recently (cf.
[6, Chor Goldreich] [8, Karp Wigderson], [11, Luby], [1, Alon Babai Itai], [13, Naor Naor], [2, Alon Goldreich Hastad Peralta], [3, Azar Motwani Naor]). The primary motivation for this line of research is that random variables that are 'approximately' independent suffices for the analysis of many interesting randomized algorithm and hence c.
We derive new limitations on the information rate and the average information rate of secret sharing schemes for access structure represented by graphs. We give the first proof of the existence of access structures with optimal information rate and optimal average information rate less that 1=2 + ffl, where ffl is an arbitrary positive constant. We also consider the problem of testing if one of these access structures is a sub-structure of an arbitrary access structure and we show that this problem is NP-complete. We provide several general lower bounds on information rate and average information rate of graphs. In particular, we show that any graph with n vertices admits a secret sharing scheme with information rate Omega Gammate/3 n)=n). 1 Introduction A secret sharing scheme is a method to distribute a secret s among a set of participants P in such a way that only qualified subsets of P can reconstruct the value of s whereas any other subset of P; non-qualified to know s; cannot.
We define the universal type class of a sequence x n, in analogy to the notion used in the classical method of types. Two sequences of the same length are said to be of the same universal (LZ) type if and only if they yield the same set of phrases in the incremental parsing of Ziv and Lempel (1978). We show that the empirical probability distributions of any finite order of two sequences of the same universal type converge, in the variational sense, as the sequence length increases. Consequently, the normalized logarithms of the probabilities assigned by any kth order probability assignment to two sequences of the same universal type, as well as the kth order empirical entropies of the sequences, converge for all k. We study the size of a universal type class, and show that its asymptotic behavior parallels that of the conventional counterpart, with the LZ78 code length playing the role of the empirical entropy. We also estimate the number of universal types for sequences of length n, and show that it is of the form exp((1+o(1))γ n/log n) for a well characterized constant γ.
We describe algorithms for enumerating the sequences in a universal type class, and for drawing a sequence from the class with uniform probability. As an application, we consider the problem of universal simulation of individual sequences.
A sequence drawn with uniform probability from the universal type class of x n is an optimal simulation of x n in a well defined mathematical sense. Daws at cs.ru.nl Abstract. We present a language-theoretic approach to symbolic model checking of PCTL over discrete-time Markov chains. The probability with which a path formula is satisfied is represented by a regular expression. A recursive evaluation of the regular expression yields an exact rational value when transition probabilities are rational, and rational functions when some probabilities are left unspecified as parameters of the system.
This allows for parametric model checking by evaluating the regular expression for different parameter values, for instance, to study the influence of a lossy channel in the overall reliability of a randomized protocol. We describe efficient constructions of small probability spaces that approximate the joint distribution of general random variables. Previous work on efficient constructions concentrate on approximations of the joint distribution for the special case of identical, uniformly distributed random variables. Preliminary version has appeared in the Proceedings of the 24th ACM Symp. On Theory of Computing (STOC), pages 10--16, 1992. Of Electrical Engineering--Systems, Tel--Aviv University, Ramat--Aviv, Tel--Aviv 69978, Israel.
Email: guy@eng.tau.ac.il. Z Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel. Email: oded@wisdom.weizmann.ac.il.
Research partially supported by grant No. 89-00312 from the United StatesIsrael Binational Science Foundation (BSF), Jerusalem, Israel. X International Computer Science Institute, Berkeley, CA 94704, USA.
Email: luby@icsi.berkeley.edu. Research supported in part by National Science Founda.
We consider secret sharing schemes in which the dealer is able (after a preprocessing stage) to activate a particular access structure out of a given set and/or to allow the participants to reconstruct different secrets (in different time instants) by sending them the same broadcast message. In this paper we establish a formal setting to study secret sharing schemes of this kind. The security of the schemes presented is unconditional, since they are not based on any computational assumption.
We give bounds on the size of the shares held by participants, on the size of the broadcast message, and on the randomness needed in such schemes. 1 Introduction A secret sharing scheme is a method of dividing a secret s among a set P of participants in such a way that: if the participants in A ` P are qualified to know the secret then by pooling together their information they can reconstruct the secret s; but any set A of participants not qualified to know s has absolutely no information on the.