Search results for "Combinatorics"

showing 10 items of 1770 documents

Polyomino Number Theory (II)

2003

Polyominoes are connected plane figures formed of joining unit squares edge to edge. We have a monomino, a domino, two trominoes named I and V, five tetrominoes named I, L, N, O and T, respectively, and twelve pentominoes (a registered trademark of Solomon W. Golomb) named F, I, L, N, P, T, U, V, W, X, Y and Z respectively.

CombinatoricsNumber theoryPolyominoPlane (geometry)Golomb codingEdge (geometry)Registered trademarkUnit (ring theory)DominoMathematics
researchProduct

Construction de Triplets Spectraux à Partir de Modules de Fredholm

1998

Soit (A, H, F) un module de Fredholm p-sommable, où l'algèbre A = CT est engendrée par un groupe discret Gamma d'éléments unitaires de L(H) qui est de croissance polynomiale r. On construit alors un triplet spectral (A, H, D) sommabilité q pour tout q > p + r + 1 avec F = signD. Dans le cas où (A, H, F) est (p, infini)-sommable on obtient la (q, infini)-sommabilité de (A, H, D)pour tout q > p + r + 1. Let (A, H, F) be a p-summable Fredholm module where the algebra A = CT is generated by a discrete group of unitaries in L(H) which is of polynomial growth r. Then we construct a spectral triple (A, H, D) with F = signD which is q-summable for each q > p + r + 1. In case (A, H, F) is (p, infini…

CombinatoricsOperator algebraInstitut für MathematikGeneral Medicineddc:510Mathematics
researchProduct

Optimization problem in inductive inference

1995

Algorithms recognizing to which of n classes some total function belongs are constructed (n > 2). In this construction strategies determining to which of two classes the function belongs are used as subroutines. Upper and lower bounds for number of necessary strategies are obtained in several models: FIN- and EX-identification and EX-identification with limited number of mindchanges. It is proved that in EX-identification it is necessary to use n(n−1)/2 strategies. In FIN-identification [3n/2 − 2] strategies are necessary and sufficient, in EX-identification with one mindchange- n log2n+o(n log2n) strategies.

CombinatoricsOptimization problemFinInductive probabilitySubroutineTotal functionFunction (mathematics)Inductive reasoningUpper and lower boundsMathematics
researchProduct

Packing dimensions of sections of sets

1999

We obtain a formula for the essential supremum of the packing dimensions of the sections of sets parallel to a given subspace. This depends on a variant of packing dimension defined in terms of local projections of sets.

CombinatoricsPacking dimensionGeneral MathematicsEssential supremum and essential infimumSubspace topologyMathematicsMathematical Proceedings of the Cambridge Philosophical Society
researchProduct

Packing a Trunk

2003

We report on a project with a German car manufacturer. The task is to compute (approximate) solutions to a specific large-scale packing problem. Given a polyhedral model of a car trunk, the aim is to pack as many identical boxes of size 4 × 2 × 1 units as possible into the interior of the trunk. This measure is important for car manufacturers, because it is a standard in the European Union.

CombinatoricsPacking problemsMeasure (data warehouse)Linear programmingPolytope modelmedia_common.cataloged_instanceEuropean unionGreedy algorithmInteger programmingAlgorithmTrunkMathematicsmedia_common
researchProduct

Direct Evaluation of Path Integrals

2001

Every time τ n is assigned a point y n . We now connect the individual points with a classical path y(τ). y(τ) is not necessarily the (on-shell trajectory) extremum of the classical action. It can be any path between τ n and τn−1 specified by the classical Lagrangian \(L(y,\dot{y},t).\)

CombinatoricsPath (topology)PhysicsFree particlePhase factorsymbols.namesakePath integral formulationTrajectorysymbolsHarmonic oscillatorAction (physics)Schrödinger equation
researchProduct

Order-disorder phase transition in random-walk networks

2004

In this paper we study in detail the behavior of random-walk networks (RWN's). These networks are a generalization of the well-known random Boolean networks (RBN's), a classical approach to the study of the genome. RWN's are also discrete networks, but their response is defined by small variations in the state of each gene, thus being a more realistic representation of the genome and a natural bridge between discrete and continuous models. RWN's show a clear transition between order and disorder. Here we explicitly deduce the formula of the critical line for the annealed model and compute numerically the transition points for quenched and annealed models. We show that RBN's and the annealed…

CombinatoricsPhase transitionGeneralizationCritical lineOrder and disorderLimit (mathematics)Statistical physicsState (functional analysis)Representation (mathematics)Random walkMathematicsPhysical Review E
researchProduct

Berry’s Phase

2001

Let a physical system be described by a Hamiltonian with two sets of variables \(\boldsymbol{r}\) and \(\boldsymbol{R}(t):\, H(\boldsymbol{r},\boldsymbol{R}(t)).\) The dynamical degrees of freedom \(\boldsymbol{r}\) (not necessarily space variables) are also called fast variables. The external time dependence is given by the slowly varying parameters \(\boldsymbol{R}(t) =\{ X(t),\,Y (t),\,\ldots,\,Z(t)\}\); consequently, the \(\boldsymbol{R}(t)\) are called slow variables.

CombinatoricsPhysics
researchProduct

The Increase and Cumulation of Round-Off Errors

1970

To give an impression of how fast round-off errors may increase even in a not really ill-conditioned case, a short numerical example shall be discussed before reporting the results of the computer runs. The problem is to compute $${\rm{e}}\,{\rm{ = }}\,{\rm{a}}\,{\rm{ - }}\,{\rm{b}}{\rm{.c}}$$ and $${\rm{g}}\,{\rm{ = }}\,{\rm{d}}\,{\rm{ - }}\,{\rm{e}}{\rm{.f}}$$

CombinatoricsPhysics
researchProduct

Measurement of Branching Fractions and Charge Asymmetries inB±→ρ±π0andB±→ρ0π±Decays, and Search forB0→ρ0π0

2004

We present measurements of branching fractions and charge asymmetries in $B$-meson decays to ${\ensuremath{\rho}}^{+}{\ensuremath{\pi}}^{0}$, ${\ensuremath{\rho}}^{0}{\ensuremath{\pi}}^{+}$, and ${\ensuremath{\rho}}^{0}{\ensuremath{\pi}}^{0}$. The data sample comprises $89\ifmmode\times\else\texttimes\fi{}{10}^{6}$ $\ensuremath{\Upsilon}(4S)\ensuremath{\rightarrow}B\overline{B}$ decays collected with the BABAR detector at the PEP-II asymmetric-energy $B$ Factory at SLAC. We find the charge-averaged branching fractions $\mathcal{B}({B}^{+}\ensuremath{\rightarrow}{\ensuremath{\rho}}^{+}{\ensuremath{\pi}}^{0})=[10.9\ifmmode\pm\else\textpm\fi{}1.9\mathrm{(}\mathrm{s}\mathrm{t}\mathrm{a}\mathrm{…

CombinatoricsPhysics010308 nuclear & particles physicsBranching fractionElectron–positron annihilation0103 physical sciencesGeneral Physics and AstronomyB mesonCharge (physics)010306 general physics01 natural sciencesPhysical Review Letters
researchProduct