Search results for "Information Science"

showing 10 items of 3627 documents

Generalized Schröder permutations

2013

We give the generating function for the integer sequence enumerating a class of pattern avoiding permutations depending on two parameters: m and p. The avoided patterns are the permutations of length m with the largest element in the first position and the second largest in one of the last p positions. For particular instances of m and p we obtain pattern avoiding classes enumerated by Schroder, Catalan and central binomial coefficient numbers, and thus, the obtained two-parameter generating function gathers under one roof known generating functions and expresses new ones. This work generalizes some earlier results of Barcucci et al. (2000) [2], Kremer (2000) [5] and Kremer (2003) [6].

Discrete mathematicsClass (set theory)General Computer Science010102 general mathematicsGenerating functionInteger sequence0102 computer and information sciences[ MATH.MATH-CO ] Mathematics [math]/Combinatorics [math.CO]01 natural sciencesTheoretical Computer ScienceCombinatorics010201 computation theory & mathematicsPosition (vector)[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO]Central binomial coefficient0101 mathematicsElement (category theory)ComputingMilieux_MISCELLANEOUSMathematics
researchProduct

Unavoidable sets and circular splicing languages

2017

Circular splicing systems are a formal model of a generative mechanism of circular words, inspired by a recombinant behaviour of circular DNA. They are defined by a finite alphabet A, an initial set I of circular words, and a set R of rules. In this paper, we focus on the still unknown relations between regular languages and circular splicing systems with a finite initial set and a finite set R of rules represented by a pair of letters ( ( 1 , 3 ) -CSSH systems). When R = A × A , it is known that the set of all words corresponding to the splicing language belongs to the class of pure unitary languages, introduced by Ehrenfeucht, Haussler, Rozenberg in 1983. They also provided a characteriza…

Discrete mathematicsClass (set theory)General Computer ScienceRegular languages; Circular splicing systems; Unavoidable sets0102 computer and information sciences02 engineering and technologyRegular languagesCharacterization (mathematics)01 natural sciencesUnitary stateTheoretical Computer ScienceFocus (linguistics)Set (abstract data type)CombinatoricsRegular language010201 computation theory & mathematicsUnavoidable sets0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingFinite setGenerative grammarCircular splicing systemsMathematicsTheoretical Computer Science
researchProduct

Querying the Guarded Fragment with Transitivity

2016

We study the problem of answering a union of Boolean conjunctive queries q against a database Δ, and a logical theory φ which falls in the guarded fragment with transitive guards (GF + TG). We trace the frontier between decidability and undecidability of the problem under consideration. Surprisingly, we show that query answering under GF2 + TG, i.e., the two-variable fragment of GF + TG, is already undecidable (even without equality), whereas its monadic fragment is decidable; in fact, it is 2exptime-complete in combined complexity and coNP-complete in data complexity. We also show that for a restricted class of queries, query answering under GF+TG is decidable. © 2013 Springer-Verlag.

Discrete mathematicsClass (set theory)Transitive relationTrace (linear algebra)0102 computer and information sciences02 engineering and technology16. Peace & justice01 natural sciencesDecidabilityUndecidable problemTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESDescription logicFragment (logic)010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingConjunctive queryMathematicsAutomata, Languages, and Programming
researchProduct

Some properties of vertex-oblique graphs

2016

The type t G ( v ) of a vertex v ? V ( G ) is the ordered degree-sequence ( d 1 , ? , d d G ( v ) ) of the vertices adjacent with v , where d 1 ? ? ? d d G ( v ) . A graph G is called vertex-oblique if it contains no two vertices of the same type. In this paper we show that for reals a , b the class of vertex-oblique graphs G for which | E ( G ) | ? a | V ( G ) | + b holds is finite when a ? 1 and infinite when a ? 2 . Apart from one missing interval, it solves the following problem posed by Schreyer et?al. (2007): How many graphs of bounded average degree are vertex-oblique? Furthermore we obtain the tight upper bound on the independence and clique numbers of vertex-oblique graphs as a fun…

Discrete mathematicsClique-sumNeighbourhood (graph theory)020206 networking & telecommunications0102 computer and information sciences02 engineering and technology01 natural sciencesTheoretical Computer ScienceMetric dimensionCombinatoricsIndifference graphNew digraph reconstruction conjecture010201 computation theory & mathematicsChordal graphIndependent set0202 electrical engineering electronic engineering information engineeringDiscrete Mathematics and CombinatoricsBound graphirregular graphsindependence numbervertex-oblique graphslexicographic productMathematicsDiscrete Mathematics
researchProduct

Lehmer code transforms and Mahonian statistics on permutations

2012

Abstract In 2000 Babson and Steingrimsson introduced the notion of vincular patterns in permutations. They show that essentially all well-known Mahonian permutation statistics can be written as combinations of such patterns. Also, they proved and conjectured that other combinations of vincular patterns are still Mahonian. These conjectures were proved later: by Foata and Zeilberger in 2001, and by Foata and Randrianarivony in 2006. In this paper we give an alternative proof of some of these results. Our approach is based on permutation codes which, like the Lehmer code, map bijectively permutations onto subexcedant sequences. More precisely, we give several code transforms (i.e., bijections…

Discrete mathematicsCode (set theory)Mathematics::CombinatoricsValue (computer science)020206 networking & telecommunications0102 computer and information sciences02 engineering and technologyMathematical proof01 natural sciencesPermutation codeTheoretical Computer ScienceCombinatoricsPermutation010201 computation theory & mathematicsLehmer codeStatistics[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO]FOS: Mathematics0202 electrical engineering electronic engineering information engineeringMathematics - CombinatoricsDiscrete Mathematics and CombinatoricsCombinatorics (math.CO)Bijection injection and surjectionComputingMilieux_MISCELLANEOUSMathematics
researchProduct

Enumerating the Walecki-Type Hamiltonian Cycle Systems

2017

Let Kv be the complete graph on v vertices. A Hamiltonian cycle system of odd order v (briefly HCS(v)) is a set of Hamiltonian cycles of Kv whose edges partition the edge set of Kv. By means of a slight modification of the famous HCS(4n+1) of Walecki, we obtain 2n pairwise distinct HCS(4n+1) and we enumerate them up to isomorphism proving that this is equivalent to count the number of binary bracelets of length n, i.e. the orbits of Dn, the dihedral group of order 2n, acting on binary n-tuples.

Discrete mathematicsComplete graphBinary number020206 networking & telecommunications0102 computer and information sciences02 engineering and technologyDihedral group01 natural sciencesHamiltonian pathCombinatoricssymbols.namesake010201 computation theory & mathematicsPhysics::Space Physics0202 electrical engineering electronic engineering information engineeringsymbolsDiscrete Mathematics and CombinatoricsPartition (number theory)Hamiltonian (quantum mechanics)MathematicsJournal of Combinatorial Designs
researchProduct

Reordering Method and Hierarchies for Quantum and Classical Ordered Binary Decision Diagrams

2017

We consider Quantum OBDD model. It is restricted version of read-once Quantum Branching Programs, with respect to “width” complexity. It is known that maximal complexity gap between deterministic and quantum model is exponential. But there are few examples of such functions. We present method (called “reordering”), which allows to build Boolean function g from Boolean Function f, such that if for f we have gap between quantum and deterministic OBDD complexity for natural order of variables, then we have almost the same gap for function g, but for any order. Using it we construct the total function REQ which deterministic OBDD complexity is \(2^{\varOmega (n/log n)}\) and present quantum OBD…

Discrete mathematicsComputational complexity theoryImplicit functionBinary decision diagram010102 general mathematics0102 computer and information sciencesFunction (mathematics)Computer Science::Artificial IntelligenceComputer Science::Computational Complexity01 natural sciencesCombinatorics010201 computation theory & mathematicsComputer Science::Logic in Computer ScienceComplexity class0101 mathematicsBoolean functionQuantum complexity theoryQuantum computerMathematics
researchProduct

Sensitivity Versus Certificate Complexity of Boolean Functions

2016

Sensitivity, block sensitivity and certificate complexity are basic complexity measures of Boolean functions. The famous sensitivity conjecture claims that sensitivity is polynomially related to block sensitivity. However, it has been notoriously hard to obtain even exponential bounds. Since block sensitivity is known to be polynomially related to certificate complexity, an equivalent of proving this conjecture would be showing that the certificate complexity is polynomially related to sensitivity. Previously, it has been shown that $$bsf \le Cf \le 2^{sf-1} sf - sf-1$$. In this work, we give a better upper bound of $$bsf \le Cf \le \max \left 2^{sf-1}\left sf-\frac{1}{3}\right , sf\right $…

Discrete mathematicsConjectureStructure (category theory)Block (permutation group theory)0102 computer and information sciences02 engineering and technologyFunction (mathematics)01 natural sciencesUpper and lower boundsExponential functionCombinatorics010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSensitivity (control systems)Boolean functionMathematics
researchProduct

Dichotomies properties on computational complexity of S-packing coloring problems

2015

This work establishes the complexity class of several instances of the S -packing coloring problem: for a graph G , a positive integer k and a nondecreasing list of integers S = ( s 1 , ? , s k ) , G is S -colorable if its vertices can be partitioned into sets S i , i = 1 , ? , k , where each S i is an s i -packing (a set of vertices at pairwise distance greater than s i ). In particular we prove a dichotomy between NP-complete problems and polynomial-time solvable problems for lists of at most four integers.

Discrete mathematicsDichotomyComputational complexity theory010102 general mathematics0102 computer and information sciences01 natural sciencesGraphTheoretical Computer ScienceCombinatoricsIntegerSet packing010201 computation theory & mathematicsComplexity classDiscrete Mathematics and CombinatoricsPairwise comparison0101 mathematicsColoring problemMathematicsDiscrete Mathematics
researchProduct

On the use of relational expressions in the design of efficient algorithms

2005

Relational expressions have finite binary relations as arguments and the operations are composition (·), closure (*), inverse (−1), and union (U). The efficient computation of the relation denoted by a relational expression is considered, and a tight bound is established on the complexity of the algorithm suggested by Hunt, Szymanski and Ullman. The result implies a unified method for deriving efficient algorithms for many problems in parsing. For example, optimal algorithms are derived for strong LL(1) and strong LL(2) parser construction and an efficient polynomialtime algorithm is derived for determining the inessential error entries in an LR(1) parsing table.

Discrete mathematicsEmpty stringParsingRelation (database)Binary relationTransitive closure0102 computer and information sciences02 engineering and technology16. Peace & justicecomputer.software_genre01 natural sciencesExpression (mathematics)TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESClosure (mathematics)010201 computation theory & mathematics020204 information systems0202 electrical engineering electronic engineering information engineeringTable (database)computerMathematics
researchProduct