Search results for "Computer and Information Science"

showing 10 items of 1335 documents

Some properties of vertex-oblique graphs

2016

The type t G ( v ) of a vertex v ? V ( G ) is the ordered degree-sequence ( d 1 , ? , d d G ( v ) ) of the vertices adjacent with v , where d 1 ? ? ? d d G ( v ) . A graph G is called vertex-oblique if it contains no two vertices of the same type. In this paper we show that for reals a , b the class of vertex-oblique graphs G for which | E ( G ) | ? a | V ( G ) | + b holds is finite when a ? 1 and infinite when a ? 2 . Apart from one missing interval, it solves the following problem posed by Schreyer et?al. (2007): How many graphs of bounded average degree are vertex-oblique? Furthermore we obtain the tight upper bound on the independence and clique numbers of vertex-oblique graphs as a fun…

Discrete mathematicsClique-sumNeighbourhood (graph theory)020206 networking & telecommunications0102 computer and information sciences02 engineering and technology01 natural sciencesTheoretical Computer ScienceMetric dimensionCombinatoricsIndifference graphNew digraph reconstruction conjecture010201 computation theory & mathematicsChordal graphIndependent set0202 electrical engineering electronic engineering information engineeringDiscrete Mathematics and CombinatoricsBound graphirregular graphsindependence numbervertex-oblique graphslexicographic productMathematicsDiscrete Mathematics
researchProduct

Lehmer code transforms and Mahonian statistics on permutations

2012

Abstract In 2000 Babson and Steingrimsson introduced the notion of vincular patterns in permutations. They show that essentially all well-known Mahonian permutation statistics can be written as combinations of such patterns. Also, they proved and conjectured that other combinations of vincular patterns are still Mahonian. These conjectures were proved later: by Foata and Zeilberger in 2001, and by Foata and Randrianarivony in 2006. In this paper we give an alternative proof of some of these results. Our approach is based on permutation codes which, like the Lehmer code, map bijectively permutations onto subexcedant sequences. More precisely, we give several code transforms (i.e., bijections…

Discrete mathematicsCode (set theory)Mathematics::CombinatoricsValue (computer science)020206 networking & telecommunications0102 computer and information sciences02 engineering and technologyMathematical proof01 natural sciencesPermutation codeTheoretical Computer ScienceCombinatoricsPermutation010201 computation theory & mathematicsLehmer codeStatistics[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO]FOS: Mathematics0202 electrical engineering electronic engineering information engineeringMathematics - CombinatoricsDiscrete Mathematics and CombinatoricsCombinatorics (math.CO)Bijection injection and surjectionComputingMilieux_MISCELLANEOUSMathematics
researchProduct

Enumerating the Walecki-Type Hamiltonian Cycle Systems

2017

Let Kv be the complete graph on v vertices. A Hamiltonian cycle system of odd order v (briefly HCS(v)) is a set of Hamiltonian cycles of Kv whose edges partition the edge set of Kv. By means of a slight modification of the famous HCS(4n+1) of Walecki, we obtain 2n pairwise distinct HCS(4n+1) and we enumerate them up to isomorphism proving that this is equivalent to count the number of binary bracelets of length n, i.e. the orbits of Dn, the dihedral group of order 2n, acting on binary n-tuples.

Discrete mathematicsComplete graphBinary number020206 networking & telecommunications0102 computer and information sciences02 engineering and technologyDihedral group01 natural sciencesHamiltonian pathCombinatoricssymbols.namesake010201 computation theory & mathematicsPhysics::Space Physics0202 electrical engineering electronic engineering information engineeringsymbolsDiscrete Mathematics and CombinatoricsPartition (number theory)Hamiltonian (quantum mechanics)MathematicsJournal of Combinatorial Designs
researchProduct

Reordering Method and Hierarchies for Quantum and Classical Ordered Binary Decision Diagrams

2017

We consider Quantum OBDD model. It is restricted version of read-once Quantum Branching Programs, with respect to “width” complexity. It is known that maximal complexity gap between deterministic and quantum model is exponential. But there are few examples of such functions. We present method (called “reordering”), which allows to build Boolean function g from Boolean Function f, such that if for f we have gap between quantum and deterministic OBDD complexity for natural order of variables, then we have almost the same gap for function g, but for any order. Using it we construct the total function REQ which deterministic OBDD complexity is \(2^{\varOmega (n/log n)}\) and present quantum OBD…

Discrete mathematicsComputational complexity theoryImplicit functionBinary decision diagram010102 general mathematics0102 computer and information sciencesFunction (mathematics)Computer Science::Artificial IntelligenceComputer Science::Computational Complexity01 natural sciencesCombinatorics010201 computation theory & mathematicsComputer Science::Logic in Computer ScienceComplexity class0101 mathematicsBoolean functionQuantum complexity theoryQuantum computerMathematics
researchProduct

Sensitivity Versus Certificate Complexity of Boolean Functions

2016

Sensitivity, block sensitivity and certificate complexity are basic complexity measures of Boolean functions. The famous sensitivity conjecture claims that sensitivity is polynomially related to block sensitivity. However, it has been notoriously hard to obtain even exponential bounds. Since block sensitivity is known to be polynomially related to certificate complexity, an equivalent of proving this conjecture would be showing that the certificate complexity is polynomially related to sensitivity. Previously, it has been shown that $$bsf \le Cf \le 2^{sf-1} sf - sf-1$$. In this work, we give a better upper bound of $$bsf \le Cf \le \max \left 2^{sf-1}\left sf-\frac{1}{3}\right , sf\right $…

Discrete mathematicsConjectureStructure (category theory)Block (permutation group theory)0102 computer and information sciences02 engineering and technologyFunction (mathematics)01 natural sciencesUpper and lower boundsExponential functionCombinatorics010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSensitivity (control systems)Boolean functionMathematics
researchProduct

Dichotomies properties on computational complexity of S-packing coloring problems

2015

This work establishes the complexity class of several instances of the S -packing coloring problem: for a graph G , a positive integer k and a nondecreasing list of integers S = ( s 1 , ? , s k ) , G is S -colorable if its vertices can be partitioned into sets S i , i = 1 , ? , k , where each S i is an s i -packing (a set of vertices at pairwise distance greater than s i ). In particular we prove a dichotomy between NP-complete problems and polynomial-time solvable problems for lists of at most four integers.

Discrete mathematicsDichotomyComputational complexity theory010102 general mathematics0102 computer and information sciences01 natural sciencesGraphTheoretical Computer ScienceCombinatoricsIntegerSet packing010201 computation theory & mathematicsComplexity classDiscrete Mathematics and CombinatoricsPairwise comparison0101 mathematicsColoring problemMathematicsDiscrete Mathematics
researchProduct

On the use of relational expressions in the design of efficient algorithms

2005

Relational expressions have finite binary relations as arguments and the operations are composition (·), closure (*), inverse (−1), and union (U). The efficient computation of the relation denoted by a relational expression is considered, and a tight bound is established on the complexity of the algorithm suggested by Hunt, Szymanski and Ullman. The result implies a unified method for deriving efficient algorithms for many problems in parsing. For example, optimal algorithms are derived for strong LL(1) and strong LL(2) parser construction and an efficient polynomialtime algorithm is derived for determining the inessential error entries in an LR(1) parsing table.

Discrete mathematicsEmpty stringParsingRelation (database)Binary relationTransitive closure0102 computer and information sciences02 engineering and technology16. Peace & justicecomputer.software_genre01 natural sciencesExpression (mathematics)TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESClosure (mathematics)010201 computation theory & mathematics020204 information systems0202 electrical engineering electronic engineering information engineeringTable (database)computerMathematics
researchProduct

On the computational power of affine automata

2017

We investigate the computational power of affine automata (AfAs) introduced in [4]. In particular, we present a simpler proof for how to change the cutpoint for any affine language and a method how to reduce error in bounded error case. Moreover, we address to the question of [4] by showing that any affine language can be recognized by an AfA with certain limitation on the entries of affine states and transition matrices. Lastly, we present the first languages shown to be not recognized by AfAs with bounded-error.

Discrete mathematicsFOS: Computer and information sciencesComputer scienceFormal Languages and Automata Theory (cs.FL)Computer Science - Formal Languages and Automata Theory0102 computer and information sciences02 engineering and technologyerror reduction[INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM]01 natural sciencesBounded errorPower (physics)Automatonaffine automata[INFO.INFO-FL]Computer Science [cs]/Formal Languages and Automata Theory [cs.FL]010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineeringnon-classical models of automatacutpoint languages020201 artificial intelligence & image processingTransition matricesAffine transformationcompact setsbounded error
researchProduct

On Packing Colorings of Distance Graphs

2014

International audience; The {\em packing chromatic number} $\chi_{\rho}(G)$ of a graph $G$ is the least integer $k$ for which there exists a mapping $f$ from $V(G)$ to $\{1,2,\ldots ,k\}$ such that any two vertices of color $i$ are at distance at least $i+1$. This paper studies the packing chromatic number of infinite distance graphs $G(\mathbb{Z},D)$, i.e. graphs with the set $\mathbb{Z}$ of integers as vertex set, with two distinct vertices $i,j\in \mathbb{Z}$ being adjacent if and only if $|i-j|\in D$. We present lower and upper bounds for $\chi_{\rho}(G(\mathbb{Z},D))$, showing that for finite $D$, the packing chromatic number is finite. Our main result concerns distance graphs with $D=…

Discrete mathematicsFOS: Computer and information sciencesDiscrete Mathematics (cs.DM)Applied Mathematics[ INFO.INFO-DM ] Computer Science [cs]/Discrete Mathematics [cs.DM][INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM]distance graphGraphVertex (geometry)Combinatoricspacking chromatic numberIntegergraph coloringFOS: MathematicsDiscrete Mathematics and CombinatoricsMathematics - Combinatoricsdistance graph.Graph coloringChromatic scaleCombinatorics (math.CO)MathematicsComputer Science - Discrete Mathematics
researchProduct

Understanding Quantum Algorithms via Query Complexity

2017

Query complexity is a model of computation in which we have to compute a function $f(x_1, \ldots, x_N)$ of variables $x_i$ which can be accessed via queries. The complexity of an algorithm is measured by the number of queries that it makes. Query complexity is widely used for studying quantum algorithms, for two reasons. First, it includes many of the known quantum algorithms (including Grover's quantum search and a key subroutine of Shor's factoring algorithm). Second, one can prove lower bounds on the query complexity, bounding the possible quantum advantage. In the last few years, there have been major advances on several longstanding problems in the query complexity. In this talk, we su…

Discrete mathematicsFOS: Computer and information sciencesQuantum PhysicsComputer scienceModel of computationSubroutineComputer Science::Information RetrievalFOS: Physical sciencesFunction (mathematics)Computational Complexity (cs.CC)Symmetric functionComputer Science - Computational ComplexityBounding overwatchPartial functionKey (cryptography)Quantum algorithmQuantum Physics (quant-ph)Computer Science::Databases
researchProduct