Parallel Tree Search in Volunteer Computing: a Case Study

Total Page:16

File Type:pdf, Size:1020Kb

Parallel Tree Search in Volunteer Computing: a Case Study View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by TUGraz OPEN Library J Grid Computing (2018) 16:647–662 https://doi.org/10.1007/s10723-017-9411-5 Parallel Tree Search in Volunteer Computing: a Case Study Wenjie Fang · Uwe Beckert Received: 20 April 2017 / Accepted: 3 October 2017 / Published online: 23 October 2017 © The Author(s) 2017. This article is an open access publication Abstract While volunteer computing, as a restricted Keywords Volunteer computing · Parallel tree model of parallel computing, has proved itself to be search · Power law · Performance · Implementation a successful paradigm of scientific computing with excellent benefit on cost efficiency and public out- reach, many problems it solves are intrinsically highly 1 Introduction parallel. However, many efficient algorithms, includ- ing backtracking search, take the form of a tree Since the founding of one of the first volunteer com- search on an extremely uneven tree that cannot be puting projects, Great Internet Mersenne Prime Search easily parallelized efficiently in the volunteer com- (GIMPS), in 1996 [28], the paradigm of volunteer puting paradigm. We explore in this article how to computing has been gradually established as a cost- perform such searches efficiently on volunteer com- efficient means of scientific computing with good puting projects. We propose a parallel tree search public outreach. This trend has been sped up by the scheme, and we describe two examples of its real- appearance of the middle-ware BOINC [3], with var- world implementation, Harmonious Tree and Odd ious successful projects, including SETI@home [4] Weird Search, both carried out at the volunteer com- and Einstein@home [1]. Umbrella projects have also puting project yoyo@home. To confirm the observed appeared, such as yoyo@home [31]heldbyavol- efficiency of our scheme, we perform a mathematical unteer community in Germany. Today, researchers analysis, which proves that, under reasonable assump- from various fields, including astrophysics, structural tion that agrees with experimental observation, our biology, high energy physic and mathematics, set up scheme is only a constant multiplicative factor away volunteer computing projects to solve problems in from perfect parallelism. Details on improving the their own fields. overall performance are also discussed. Despite the ever-growing number of projects, most of the problems they solve are intrinsically paral- lel, for example checking a segment of radio wave for specific signals (Einstein@home, SETI@home). W. Fang () Institute of Discrete Mathematics, Technical University However, there are many large problems, especially of Graz, Steyrergasse 30, Graz 8010, Austria those in discrete mathematics aiming at verifying con- e-mail: [email protected] jectures or finding solutions, that have no efficient parallel algorithm. For these problems, variants of U. Beckert Rechenkraft.net e.V., Marburg, Germany backtracking search are used, which often consist of e-mail: [email protected] searching through an extremely uneven tree, and are 648 W. Fang, U. Beckert thus difficult to parallelize. It is thus interesting to try can communicate with low cost and latency. There to parallelize efficiently massive tree search on uneven are also well-established APIs (such as OpenMP trees in the volunteer computing paradigm, in order [12]), languages (such as Cilk [8]) and job schedulers to extend the applicability of volunteer computing to (such as HTCondor [36]) in the industry for efficient previously unsuitable domains. scheduling in such environments. Some previous effort has been devoted to such par- In volunteer computing, the reduction of paral- allelization of tree search on specific problems, result- lelizing tree search to efficient scheduling is not so ing in several public projects. For instance, Rectilinear straightforward. It is because the task of schedul- Crossing Number is a project held by researchers ing itself becomes tricky in this paradigm, in which at TU Graz, with the goal of finding the rectilinear workers can have low and variable availability [25, crossing number for n ≤ 18 points using a back- 29], and they only pull work from a central server, tracking algorithm [2]. As another example, the OGR but never talk to peers. These constraints restrict the sub-project of Distributed.net searches for optimal use of established techniques such as work stealing Golomb rulers with n ≤ 28 markings [15], and it also [9]. Recently, there has been some study on efficient uses a backtracking algorithm for its purpose. Despite scheduling in volunteer computing, such as [17, 23, the effort, from a volunteer’s viewpoint, these projects 30]. However, these results may not apply directly have their inconvenience. We are therefore interested to our goal, since they concentrate more on selecting in catering the needs of volunteers while doing an good hosts for a given set of tasks with already a good efficient parallel tree search. estimation of workload, but in parallel backtracking Tree search consists of traversing all the nodes in search, we need to deal with tasks with high variance a given tree. It includes the special case of back- but no estimation on the workload. tracking search, which is a general algorithm that Without a suitable scheduling method in volunteer can be applied to many problems, mainly in discrete computing, we may want to resort to previous stud- optimization (see, e.g., Chapter 8 of [5]). In gen- ies on parallelizing tree search that do not rely on eral, a backtracking search often has an extremely existing scheduling methods. However, many of these unbalanced search tree, which makes it difficult to par- studies rely more or less on a cluster model, where allelize. Upon the development of distributed systems, inter-processor communication is easy (maybe with researchers tried to find ways to exploit parallelism in exception of [18, 32]), which do not directly apply to backtracking search, mainly in clusters. Studies on the the volunteer computing paradigm. In [32], the par- parallelization of backtracking search were pioneered allelization was done by splitting the whole search by Karp and Zhang [27], followed by others (e.g., [18, space into a huge number of tasks, at least a large 24, 32, 33]). Real world implementations of such par- constant times the number of processors. These tasks allel search are performed by many (e.g., [13, 16]) for are then put into a queue and dealt out to proces- finding combinatorial objects or verifying conjectures. sors to achieve maximal parallelism until the queue We also see development of software infrastructures is dried up. This approach can be easily adapted to (e.g., Stolee’s Treesearch [35]) that allows automation volunteer computing, but a straight-forward subdivi- of such searches. Readers can also see [22] for a sur- sion may introduce extremely large tasks, unwanted vey of some work in this direction. The overall idea for volunteer machines with varying availability. In is to split the search tree into sub-trees and distribute [18], by introducing an overhead of splitting the search them to workers while balancing workload. tree locally and deterministically upon each task, the However, the previously stated effort is partly work balancing is dealt with by selecting sets of non- superseded by advances in efficient scheduling, which overlapping sub-trees for each task. This approach can is a well-studied topic in distributed systems. It is easy also be easily adapted to volunteer computing, but to see how parallelization of tree search can be done the huge size of problems we deal with in volunteer simply by scheduling search on sub-trees as tasks, computing projects may lead to a large overhead, sab- which can be further subdivided if needed. For effi- otaging the effectiveness of this approach. Moreover, cient scheduling, much has been done in environments all these studies deal with machines in a cluster, man- such as multi-core processors and clusters, for exam- aged by technical people, but in volunteer computing, ple in [7, 9], where workers are highly available and machines are managed by laypeople, and we have Parallel Tree Search in Volunteer Computing: a Case Study 649 to consider some “human factors” to attain maximal project yoyo@home (Section 4), named Harmonious efficiency. Tree and Odd Weird Search. In order to understand the Another “human factor” in volunteer computing is behavior of our scheme and to explain the phenomena malicious behavior, which may endanger the integrity observed in our implementations, we analyze a simpli- of final result. This problem is more important for par- fied mathematical model for practical choices in our allel backtracking search, since most of the results will model (Section 5). We conclude by some discussions of be negative, which gives malicious users an incentive future improvements on the implementation (Section 6). to cheat by returning negative results without perform- Upon the writing of this article, we are aware of ing any real computation. Anti-cheating mechanisms an effort by Bazinet and Cummings [6] of subdivid- are not new in volunteer computing. For instance, in ing long computation into workunits with a fixed short [20], an anti-cheating mechanism called “ringers” was length, which shares some ideas with our work. How- introduced in the context of cryptological computa- ever, the motivation of their work is to reduce the tions, and in [34], a version
Recommended publications
  • How Numbers Work Discover the Strange and Beautiful World of Mathematics
    How Numbers Work Discover the strange and beautiful world of mathematics NEW SCIENTIST 629745_How_Number_Work_Book.indb 3 08/12/17 4:11 PM First published in Great Britain in 2018 by John Murray Learning First published in the US in 2018 by Nicholas Brealey Publishing John Murray Learning and Nicholas Brealey Publishing are companies of Hachette UK Copyright © New Scientist 2018 The right of New Scientist to be identified as the Author of the Work has been asserted by it in accordance with the Copyright, Designs and Patents Act 1988. Database right Hodder & Stoughton (makers) All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the publisher, or as expressly permitted by law, or under terms agreed with the appropriate reprographic rights organization. Enquiries concerning reproduction outside the scope of the above should be sent to the Rights Department at the addresses below. You must not circulate this book in any other binding or cover and you must impose this same condition on any acquirer. A catalogue record for this book is available from the British Library and the Library of Congress. UK ISBN 978 1 47 362974 5 / eISBN 978 14 7362975 2 US ISBN 978 1 47 367035 8 / eISBN 978 1 47367036 5 1 The publisher has used its best endeavours to ensure that any website addresses referred to in this book are correct and active at the time of going to press.
    [Show full text]
  • Square Roots and the Rabin Cryptosystem William J
    The Roots of Higher Mathematics Computing Square Roots and the Rabin Cryptosystem William J. Martin, WPI Abstract: We explore thought experiments dealing with the computation of square roots in various number systems. As an application, we introduce an encryption scheme of Rabin. 1 Weird Number Systems A child learns about number systems in a very sensible way: First the counting numbers, then perhaps integers, then fraction, on to real numbers, and then the complex numbers. This seems very reasonable: each contains all the previous ones and enjoys more and more features, allowing more and more flexibility. Before we discuss other systems, let us review the notation for these familiar objects. The natural numbers, or positive integers, are denoted N = f1; 2; 3;:::g. They are closed under addition and multiplication: if we add or multiply two numbers from this set, the answer is guaranteed to be in this set. This is a great context for a discussion of unique factorization: an integer p > 1 is prime if its only divisors are 1 and itself. (Note that one is neither prime nor composite; it has an inverse, so it is called a \unit".) The integers are the first ring a student sees. The set Z = f:::; −3; −2; −1; 0; 1; 2; 3;:::g is closed under both addition and multiplication. It is a commutative ring since ab = ba for any two integers a and b. Every element has an additive inverse: stately precisely, for any integer a, there is a (unique) integer b such that a + b = 0. In algebra, we extend intuitive notation and denote this b by \−a".
    [Show full text]
  • Eureka Issue 61
    Eureka 61 A Journal of The Archimedeans Cambridge University Mathematical Society Editors: Philipp Legner and Anja Komatar © The Archimedeans (see page 94 for details) Do not copy or reprint any parts without permission. October 2011 Editorial Eureka Reinvented… efore reading any part of this issue of Eureka, you will have noticed The Team two big changes we have made: Eureka is now published in full col- our, and printed on a larger paper size than usual. We felt that, with Philipp Legner Design and Bthe internet being an increasingly large resource for mathematical articles of Illustrations all kinds, it was necessary to offer something new and exciting to keep Eu- reka as successful as it has been in the past. We moved away from the classic Anja Komatar Submissions LATEX-look, which is so common in the scientific community, to a modern, more engaging, and more entertaining design, while being conscious not to Sean Moss lose any of the mathematical clarity and rigour. Corporate Ben Millwood To make full use of the new design possibilities, many of this issue’s articles Publicity are based around mathematical images: from fractal modelling in financial Lu Zou markets (page 14) to computer rendered pictures (page 38) and mathemati- Subscriptions cal origami (page 20). The Showroom (page 46) uncovers the fundamental role pictures have in mathematics, including patterns, graphs, functions and fractals. This issue includes a wide variety of mathematical articles, problems and puzzles, diagrams, movie and book reviews. Some are more entertaining, such as Bayesian Bets (page 10), some are more technical, such as Impossible Integrals (page 80), or more philosophical, such as How to teach Physics to Mathematicians (page 42).
    [Show full text]
  • Integer Sequences
    UHX6PF65ITVK Book > Integer sequences Integer sequences Filesize: 5.04 MB Reviews A very wonderful book with lucid and perfect answers. It is probably the most incredible book i have study. Its been designed in an exceptionally simple way and is particularly just after i finished reading through this publication by which in fact transformed me, alter the way in my opinion. (Macey Schneider) DISCLAIMER | DMCA 4VUBA9SJ1UP6 PDF > Integer sequences INTEGER SEQUENCES Reference Series Books LLC Dez 2011, 2011. Taschenbuch. Book Condition: Neu. 247x192x7 mm. This item is printed on demand - Print on Demand Neuware - Source: Wikipedia. Pages: 141. Chapters: Prime number, Factorial, Binomial coeicient, Perfect number, Carmichael number, Integer sequence, Mersenne prime, Bernoulli number, Euler numbers, Fermat number, Square-free integer, Amicable number, Stirling number, Partition, Lah number, Super-Poulet number, Arithmetic progression, Derangement, Composite number, On-Line Encyclopedia of Integer Sequences, Catalan number, Pell number, Power of two, Sylvester's sequence, Regular number, Polite number, Ménage problem, Greedy algorithm for Egyptian fractions, Practical number, Bell number, Dedekind number, Hofstadter sequence, Beatty sequence, Hyperperfect number, Elliptic divisibility sequence, Powerful number, Znám's problem, Eulerian number, Singly and doubly even, Highly composite number, Strict weak ordering, Calkin Wilf tree, Lucas sequence, Padovan sequence, Triangular number, Squared triangular number, Figurate number, Cube, Square triangular
    [Show full text]
  • Numbers 1 to 100
    Numbers 1 to 100 PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Tue, 30 Nov 2010 02:36:24 UTC Contents Articles −1 (number) 1 0 (number) 3 1 (number) 12 2 (number) 17 3 (number) 23 4 (number) 32 5 (number) 42 6 (number) 50 7 (number) 58 8 (number) 73 9 (number) 77 10 (number) 82 11 (number) 88 12 (number) 94 13 (number) 102 14 (number) 107 15 (number) 111 16 (number) 114 17 (number) 118 18 (number) 124 19 (number) 127 20 (number) 132 21 (number) 136 22 (number) 140 23 (number) 144 24 (number) 148 25 (number) 152 26 (number) 155 27 (number) 158 28 (number) 162 29 (number) 165 30 (number) 168 31 (number) 172 32 (number) 175 33 (number) 179 34 (number) 182 35 (number) 185 36 (number) 188 37 (number) 191 38 (number) 193 39 (number) 196 40 (number) 199 41 (number) 204 42 (number) 207 43 (number) 214 44 (number) 217 45 (number) 220 46 (number) 222 47 (number) 225 48 (number) 229 49 (number) 232 50 (number) 235 51 (number) 238 52 (number) 241 53 (number) 243 54 (number) 246 55 (number) 248 56 (number) 251 57 (number) 255 58 (number) 258 59 (number) 260 60 (number) 263 61 (number) 267 62 (number) 270 63 (number) 272 64 (number) 274 66 (number) 277 67 (number) 280 68 (number) 282 69 (number) 284 70 (number) 286 71 (number) 289 72 (number) 292 73 (number) 296 74 (number) 298 75 (number) 301 77 (number) 302 78 (number) 305 79 (number) 307 80 (number) 309 81 (number) 311 82 (number) 313 83 (number) 315 84 (number) 318 85 (number) 320 86 (number) 323 87 (number) 326 88 (number)
    [Show full text]
  • Further Reading
    Further reading Wolfram Mathematica® provides a collection of ready to use functions, and with its rules of programming it sets the stage like a chess board. Now it depends on you (and your imagination) how to combine these and make your move to attack the problem in hand. It always helps to look at different resources to get ideas of ways to combine the Mathematica functions. There are excellent books written about Mathematica, for example Ilan Vardi [5], Stan Wagon [6], Shaw–Tigg [4] and Gaylord, Kamin, Wellin [2]to name a few. The reader is encouraged to have a look at them. Wolfram demonstration projects http://demonstrations.wolfram.com/ contains many interesting examples of how to use Mathematica in different disciplines. And finally, the Mathematica Help and its virtual book is a treasure, dig it! R. Hazrat, Mathematica ®: A Problem-Centered Approach, Springer Undergraduate Mathematics Series, DOI 10.1007/978-1-84996-251-3, © Springer-Verlag London Limited 2010 Bibliography [1] R. Gaylord, Mathematica Programming Fundamentals, Lecture Notes, Available in MathSource 100 [2] R. Gaylord, S. Kamin, P. Wellin, An introduction to programming with Mathematica, Cambridge University Press, 2005. 146, 184 [3] S. Rabinowitz, Index to Mathematical problems 1980–1984, Math pro Press. 1992. viii [4] W. Shaw, J. Tigg, Applied Mathematica, Addison-Wesley Publishing, 1994. 184 [5] I. Vardi, Computational Recreations in Mathematica, Addison-Wesley Pub- lishing, 1991. 62, 92, 184 [6] S. Wagon, Mathematica in Action, Springer-Verlag, 1999. 146, 184 [7]
    [Show full text]
  • Sylvester: Ushering in the Modern Era of Research on Odd Perfect Numbers Steven Gimbel Gettysburg College
    Philosophy Faculty Publications Philosophy Fall 10-23-2003 Sylvester: Ushering in the Modern Era of Research on Odd Perfect Numbers Steven Gimbel Gettysburg College John Jaroma Follow this and additional works at: https://cupola.gettysburg.edu/philfac Part of the Logic and Foundations of Mathematics Commons, and the Number Theory Commons Share feedback about the accessibility of this item. Gimbel, S. and Jaroma, J. Sylvester: Ushering in the Modern Era of Research on Odd Perfect Numbers. (2003). Integers: Electronic Journal of Combinatorial Number Theory, 3. This is the publisher's version of the work. This publication appears in Gettysburg College's institutional repository by permission of the copyright owner for personal use, not for redistribution. Cupola permanent link: https://cupola.gettysburg.edu/philfac/10 This open access article is brought to you by The uC pola: Scholarship at Gettysburg College. It has been accepted for inclusion by an authorized administrator of The uC pola. For more information, please contact [email protected]. Sylvester: Ushering in the Modern Era of Research on Odd Perfect Numbers Abstract In 1888, James Joseph Sylvester (1814-1897) published a series of papers that he hoped would pave the way for a general proof of the nonexistence of an odd perfect number (OPN). Seemingly unaware that more than fifty years earlier Benjamin Peirce had proved that an odd perfect number must have at least four distinct prime divisors, Sylvester began his fundamental assault on the problem by establishing the same result. Later that same year, he strengthened his conclusion to five. These findings would help to mark the beginning of the modern era of research on odd perfect numbers.
    [Show full text]
  • Not Always Buried Deep Paul Pollack
    Not Always Buried Deep Paul Pollack Department of Mathematics, 273 Altgeld Hall, MC-382, 1409 West Green Street, Urbana, IL 61801 E-mail address: [email protected] Dedicated to the memory of Arnold Ephraim Ross (1906–2002). Contents Foreword xi Notation xiii Acknowledgements xiv Chapter 1. Elementary Prime Number Theory, I 1 1. Introduction 1 § 2. Euclid and his imitators 2 § 3. Coprime integer sequences 3 § 4. The Euler-Riemann zeta function 4 § 5. Squarefree and smooth numbers 9 § 6. Sledgehammers! 12 § 7. Prime-producing formulas 13 § 8. Euler’s prime-producing polynomial 14 § 9. Primes represented by general polynomials 22 § 10. Primes and composites in other sequences 29 § Notes 32 Exercises 34 Chapter 2. Cyclotomy 45 1. Introduction 45 § 2. An algebraic criterion for constructibility 50 § 3. Much ado about Z[ ] 52 § p 4. Completion of the proof of the Gauss–Wantzel theorem 55 § 5. Period polynomials and Kummer’s criterion 57 § vii viii Contents 6. A cyclotomic proof of quadratic reciprocity 61 § 7. Jacobi’s cubic reciprocity law 64 § Notes 75 Exercises 77 Chapter 3. Elementary Prime Number Theory, II 85 1. Introduction 85 § 2. The set of prime numbers has density zero 88 § 3. Three theorems of Chebyshev 89 § 4. The work of Mertens 95 § 5. Primes and probability 100 § Notes 104 Exercises 107 Chapter 4. Primes in Arithmetic Progressions 119 1. Introduction 119 § 2. Progressions modulo 4 120 § 3. The characters of a finite abelian group 123 § 4. The L-series at s = 1 127 § 5. Nonvanishing of L(1,) for complex 128 § 6. Nonvanishing of L(1,) for real 132 § 7.
    [Show full text]
  • Primitive Weird Numbers Having More Than Three Distinct Prime Factors 3
    PRIMITIVE WEIRD NUMBERS HAVING MORE THAN THREE DISTINCT PRIME FACTORS GIANLUCA AMATO, MAXIMILIAN F. HASLER, GIUSEPPE MELFI, AND MAURIZIO PARTON Abstract. In this paper we study some structure properties of primitive weird numbers in terms of their factorization. We give sufficient conditions to ensure that a positive integer is weird. Two algorithms for generating weird numbers having a given number of distinct prime factors are presented. These algorithms yield primitive weird numbers of the form mp1 ...pk for a suitable deficient positive integer m and primes p1,...,pk and generalize a recent technique developed for generating primitive weird numbers of the form n 2 p1p2. The same techniques can be used to search for odd weird numbers, whose existence is still an open question. 1. Introduction N Let n ∈ be a natural number, and let σ(n)= d|n d be the sum of its divisors. If σ(n) > 2n, then n is called abundant, whereas if σ(n) < 2n, then n is called deficient. Perfect numbers are those for which σ(n)=2n. P According to [5], we will refer to ∆(n)= σ(n) − 2n as the abundance of n, and to d(n)=2n − σ(n)= −∆(n) as the deficience of n. If n can be expressed as a sum of distinct proper divisors, then n is called semiperfect, or sometimes also pseudoperfect. Slightly abundant numbers with ∆(n) = 1 are called quasi-perfect, and slightly deficient numbers with d(n) = 1 are called almost perfect. A weird number is a number which is abundant but not semiperfect. In other words, n ∈ N is weird if it is abundant and it cannot be written as the sum of some of its proper divisors.
    [Show full text]
  • Primitive Abundant and Weird Numbers with Many Prime Factors 3
    PRIMITIVE ABUNDANT AND WEIRD NUMBERS WITH MANY PRIME FACTORS GIANLUCA AMATO, MAXIMILIAN F. HASLER, GIUSEPPE MELFI, AND MAURIZIO PARTON Abstract. We give an algorithm to enumerate all primitive abundant numbers (briefly, PAN) with a fixed Ω (the number of prime factors counted with their multiplicity), and explicitly find all PAN up to Ω = 6, count all PAN and square-free PAN up to Ω = 7 and count all odd PAN and odd square-free PAN up to Ω = 8. We find primitive weird numbers (briefly, PWN) with up to 16 prime factors, improving the previous results of [1] where PWN with up to 6 prime factors were given. The largest PWN we find has 14712 digits: as far as we know, this is the largest example existing, the previous one being 5328 digits long [14]. We find hundreds of PWN with exactly one square odd prime factor: as far as we know, only five were known before. We find all PWN with at least one odd prime factor with multiplicity greater than one and Ω = 7 and prove that there are none with Ω < 7. Regarding PWN with a cubic (or higher power) odd prime factor, we prove that there are none with Ω ≤ 7, and we did not find any with larger Ω. Finally, we find several PWN with 2 square odd prime factors, and one with 3 square odd prime factors. These are the first such examples. 1. Introduction N Let n ∈ be a natural number, and let σ(n)= d|n d be the sum of its divisors.
    [Show full text]
  • Mbk068-Endmatter.Pdf
    Not Always Buried Deep Not Always Buried Deep A Second Course in Elementary A Second Course in Elementary Number Theory Number Theory Paul Pollack AMERICAN MATHEMATICAL SOCIETY http://dx.doi.org/10.1090/mbk/068 Not Always Buried Deep A Second Course in Elementary Number Theory Paul Pollack AMERICAN MATHEMATICAL SOCIETY 2000 Mathematics Subject Classification. Primary 11A15, 11A25, 11A41, 11N05, 11N35, 11N36, 11P05, 11T22. For additional information and updates on this book, visit www.ams.org/bookpages/mbk-68 Library of Congress Cataloging-in-Publication Data Pollack, Paul, 1980– Not always buried deep : a second course in elementary number theory / Paul Pollack. p. cm. Includes bibliographical references and index. ISBN 978-8218-4880-7 (alk. paper) 1. Number theory. I. Title. QA241.P657 2009 512.72–dc22 2009023766 Copying and reprinting. Individual readers of this publication, and nonprofit libraries acting for them, are permitted to make fair use of the material, such as to copy a chapter for use in teaching or research. Permission is granted to quote brief passages from this publication in reviews, provided the customary acknowledgment of the source is given. Republication, systematic copying, or multiple reproduction of any material in this publication is permitted only under license from the American Mathematical Society. Requests for such permission should be addressed to the Acquisitions Department, American Mathematical Society, 201 Charles Street, Providence, Rhode Island 02904-2294 USA. Requests can also be made by e-mail to [email protected]. c 2009 by the American Mathematical Society. All rights reserved. The American Mathematical Society retains all rights except those granted to the United States Government.
    [Show full text]
  • ON NEAR PERFECT NUMBERS Let Σ(N)
    ON NEAR PERFECT NUMBERS PETER COHEN, KATHERINE CORDWELL, ALYSSA EPSTEIN, CHUNG HANG KWAN, ADAM LOTT, AND STEVEN J. MILLER ABSTRACT. The study of perfect numbers (numbers which equal the sum of their proper divisors) goes back to antiquity, and is responsible for some of the oldest and most popular conjectures in number theory. We investigate a generalization introduced by Pollack and Shevelev: k-near-perfect numbers. These are examples to the well-known pseudoperfect numbers first defined by Sierpinski,´ and are numbers such that the sum of all but at most k of its proper divisors equals the number. We establish their asymptotic order for most integers k ≥ 4, as well as some properties of related quantities. 1. INTRODUCTION Let σ(n) be the sum of all positive divisors of n. A natural number n is perfect if σ(n)=2n. Perfect numbers have played a prominent role in classical number theory for millennia. A well-known conjecture claims that there are infinitely many even, but no odd, perfect numbers. Despite the fact that these conjectures remain unproven, there has been significant progress on studying the distribution of perfect numbers [Vo, HoWi, Ka, Er], as well as generalizations. One are the pseudoperfect numbers, which were introduced by Sierpinski´ [Si]. A natural number is pseudoperfect if it is a sum of some subset of its proper divisors. Erdös and Benkoski [Erd, BeEr] proved that the asymptotic density for pseudoperfect numbers, as well as that of abundant numbers that are not pseudoperfect (also called weird numbers), exist and are positive. Pollack and Shevelev [PoSh] initiated the study of a subclass of pseudoperfect numbers called near-perfect numbers.
    [Show full text]