Search results for "Theoretical Computer Science"

showing 10 items of 1151 documents

Burrows-Wheeler transform and palindromic richness

2009

AbstractThe investigation of the extremal case of the Burrows–Wheeler transform leads to study the words w over an ordered alphabet A={a1,a2,…,ak}, with a1<a2<⋯<ak, such that bwt(w) is of the form aknkak−1nk−1⋯a2n2a1n1, for some non-negative integers n1,n2,…,nk. A characterization of these words in the case |A|=2 has been given in [Sabrina Mantaci, Antonio Restivo, Marinella Sciortino, Burrows-Wheeler transform and Sturmian words, Information Processing Letters 86 (2003) 241–246], where it is proved that they correspond to the powers of conjugates of standard words. The case |A|=3 has been settled in [Jamie Simpson, Simon J. Puglisi, Words with simple Burrows-Wheeler transforms, Electronic …

Combinatorics on wordsGeneral Computer ScienceBurrows–Wheeler transformSettore INF/01 - InformaticaRich wordsPalindromeBurrows-Wheeler transformTheoretical Computer ScienceCombinatoricsRich wordBurrows-Wheeler transform; Palindromes; Rich words; Combinatorics on wordsPalindromePalindromesSpecies richnessAlphabetArithmeticBurrows–Wheeler transformComputer Science(all)MathematicsCombinatorics on word
researchProduct

Weak associativity and restricted rotation

2009

A restricted rotation induced by a weak associative law is introduced. The corresponding equivalence relation is identical to the Glivenko congruence on Tamari lattices, i.e. lattices of binary trees endowed by the well-known rotation operation.

CombinatoricsBinary treeLattice (order)Signal ProcessingEquivalence relationAssociative propertyComputer Science ApplicationsInformation SystemsTheoretical Computer ScienceMathematicsInformation Processing Letters
researchProduct

An optimal bound for embedding linear spaces into projective planes

1988

Abstract Linear spaces with υ >n 2 − 1 2 n + 1 points, b⩽n2 + n + 1 lines and not constant point degree are classified. It turns out that there is essentially one class of such linear spaces which are not near pencils and which can not be embedded into any projective plane of order n.

CombinatoricsBlocking setDuality (projective geometry)Discrete Mathematics and CombinatoricsProjective spaceEmbeddingProjective planeFano planeTheoretical Computer ScienceMathematicsDiscrete Mathematics
researchProduct

Cyclic and lift closures for k…21-avoiding permutations

2011

We prove that the cyclic closure of the permutation class avoiding the pattern k(k-1)...21 is finitely based. The minimal length of a minimal permutation is 2k-1 and these basis permutations are enumerated by (2k-1).c"k where c"k is the kth Catalan number. We also define lift operations and give similar results. Finally, we consider the toric closure of a class and we propose some open problems.

CombinatoricsCatalan numberDiscrete mathematicsLift (mathematics)PermutationMathematics::CombinatoricsClosure (computer programming)Discrete Mathematics and CombinatoricsTheoretical Computer ScienceCyclic permutationMathematicsDiscrete Mathematics
researchProduct

A reconstruction algorithm for L-convex polyominoes

2006

AbstractWe give an algorithm that uniquely reconstruct an L-convex polyomino from the size of some special paths, called bordered L-paths.

CombinatoricsConvexityMathematics::CombinatoricsGeneral Computer SciencePolyominoPolyominoesRegular polygonReconstruction algorithmReconstructionComputer Science(all)Theoretical Computer ScienceMathematicsTheoretical Computer Science
researchProduct

The irregularity strength of circulant graphs

2005

AbstractThe irregularity strength of a simple graph is the smallest integer k for which there exists a weighting of the edges with positive integers at most k such that all the weighted degrees of the vertices are distinct. In this paper we study the irregularity strength of circulant graphs of degree 4. We find the exact value of the strength for a large family of circulant graphs.

CombinatoricsDiscrete mathematicsCirculant graphSimple graphIntegerLabelingDiscrete Mathematics and CombinatoricsCirculant matrixIrregularity strengthGraphTheoretical Computer ScienceMathematicsDiscrete Mathematics
researchProduct

The equidistribution of some Mahonian statistics over permutations avoiding a pattern of length three

2022

Abstract We prove the equidistribution of several multistatistics over some classes of permutations avoiding a 3-length pattern. We deduce the equidistribution, on the one hand of inv and foz e ″ statistics, and on the other hand that of maj and makl statistics, over these classes of pattern avoiding permutations. Here inv and maj are the celebrated Mahonian statistics, foz e ″ is one of the statistics defined in terms of generalized patterns in the 2000 pioneering paper of Babson and Steingrimsson, and makl is one of the statistics defined by Clarke, Steingrimsson and Zeng in (1997) [5] . These results solve several conjectures posed by Amini in (2018) [1] .

CombinatoricsDiscrete mathematicsFOS: Computer and information sciencesDiscrete Mathematics (cs.DM)StatisticsFOS: MathematicsDiscrete Mathematics and CombinatoricsMathematics - CombinatoricsCombinatorics (math.CO)Theoretical Computer ScienceMathematicsComputer Science - Discrete Mathematics
researchProduct

On extremal intersection numbers of a block design

1982

K.N. Majumdar has shown that for a 2-(v, k, @l) design D there are three numbers @a, @t, and @S such that each intersection number of D is not greater than @S and not less than max{@a, @t}. In this paper we investigate designs having one of these 'extremal' intersection numbers. Quasisymmetric designs with at least one extremal intersection number are characterized. Furthermore, we show that a smooth design D having the intersection number @S or @a>0 is isomorphic to the system of points and hyperplanes of a finite projective space. Using this theorem, we can characterize all smooth strongly resolvable designs.

CombinatoricsDiscrete mathematicsIntersectionHyperplaneDiscrete Mathematics and CombinatoricsProjective spaceIntersection numberFinite intersection propertyMajumdarTheoretical Computer ScienceMathematicsBlock designDiscrete Mathematics
researchProduct

Irredundant tandem motifs

2014

Eliminating the possible redundancy from a set of candidate motifs occurring in an input string is fundamental in many applications. The existing techniques proposed to extract irredundant motifs are not suitable when the motifs to search for are structured, i.e., they are made of two (or several) subwords that co-occur in a text string s of length n. The main effort of this work is studying and characterizing a compact class of tandem motifs, that is, pairs of substrings {m1, m2} occurring in tandem within a maximum distance of d symbols in s, where d is an integer constant given in input. To this aim, we first introduce the concept of maximality, related to four specific conditions that h…

CombinatoricsDiscrete mathematicsMotifs Tandem Patterns Irredundant motifs String algorithm Suffix treeGeneral Computer ScienceTandemlawSuffix treeText stringSubstringTheoretical Computer ScienceLinear numberMathematicslaw.inventionTheoretical Computer Science
researchProduct

Words and forbidden factors

2002

AbstractGiven a finite or infinite word v, we consider the set M(v) of minimal forbidden factors of v. We show that the set M(v) is of fundamental importance in determining the structure of the word v. In the case of a finite word w we consider two parameters that are related to the size of M(w): the first counts the minimal forbidden factors of w and the second gives the length of the longest minimal forbidden factor of w. We derive sharp upper and lower bounds for both parameters. We prove also that the second parameter is related to the minimal period of the word w. We are further interested to the algorithmic point of view. Indeed, we design linear time algorithm for the following two p…

CombinatoricsGeneral Computer ScienceGeneral problemFree monoidFormal languageSturmian wordWord problem (mathematics)AutomorphismTime complexityUpper and lower boundsMathematicsTheoretical Computer ScienceComputer Science(all)Theoretical Computer Science
researchProduct