Analytical dePoissonization and its applications

被引:112
作者
Jacquet, P
Szpankowski, W [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Inst Natl Rech Informat & Automat, F-78153 Le Chesnay, France
基金
美国国家科学基金会;
关键词
poissonization; depoissonization; Cauchy integral formula; saddle point method; limiting distributions; mellin transform of complex variable; analytical combinatorics; analysis of algorithms and data structures; digital trees;
D O I
10.1016/S0304-3975(97)00167-9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In combinatorics and analysis of algorithms a Poisson version of a problem (henceforth called Poisson model or poissonization) is often easier to solve than the original one, which we name here the Bernoulli model. Poissonization is a technique that replaces the original input (e.g., think of balls thrown into urns) by a Poisson process (e.g., think of balls arriving according to a Poisson process into urns). More precisely, analytical Poisson transform maps a sequence (e.g., characterizing the Bernoulli model) into a generating function of a complex variable. However, after poissonization one must depoissonize in order to translate the results of the Poisson model into the original (i.e., Bernoulli) model. We present in this paper several analytical depoissonization results that fall into the following general scheme: If the Poisson transform has an appropriate growth in the complex plane, then an asymptotic expansion of the sequence can be expressed in terms of the Poisson transform and its derivatives evaluated on the real line. Not surprisingly, actual formulations of depoissonization results depend on the nature of the growth of the Poisson transform, and thus we have polynomial and exponential depoissonization theorems. Normalization (e.g., as in the central limit theorem) introduces another twist that led us to formulate the so-called diagonal depoissonization theorems. Finally, we illustrate our results on numerous examples from combinatorics and the analysis of algorithms and data structures (e.g., combinatorial assemblies, digital trees, multiaccess protocols, probabilistic counting, selecting a leader, data compression, etc.). (C) 1998-Elsevier Science B.V. All rights reserved.
引用
收藏
页码:1 / 62
页数:62
相关论文
共 63 条
[1]  
ALDOUS D, 1989, PROBABILITY APPROX P
[2]  
[Anonymous], ADV COMBINATORICS
[3]  
[Anonymous], STOCHASTIC MODELS
[4]   INDEPENDENT PROCESS APPROXIMATIONS FOR RANDOM COMBINATORIAL STRUCTURES [J].
ARRATIA, R ;
TAVARE, S .
ADVANCES IN MATHEMATICS, 1994, 104 (01) :90-154
[5]   GENERALIZED TDMA - MULTI-ACCESSING TREE PROTOCOL [J].
CAPETANAKIS, JI .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1979, 27 (10) :1476-1484
[6]   TREE ALGORITHMS FOR PACKET BROADCAST CHANNELS [J].
CAPETANAKIS, JI .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1979, 25 (05) :505-515
[7]  
Chihara TS., 1978, INTRO ORTHOGONAL POL
[8]  
Davis B, 1985, INTEGRAL TRANSFORMS
[9]  
DEBRUIJN NG, 1962, ASYMPTOTIC METHODS A
[10]   THE EXPECTED LENGTH OF THE LONGEST PROBE SEQUENCE FOR BUCKET SEARCHING WHEN THE DISTRIBUTION IS NOT UNIFORM [J].
DEVROYE, L .
JOURNAL OF ALGORITHMS, 1985, 6 (01) :1-9