Search results for "abstract"

showing 10 items of 1959 documents

A Criterion for Attaining the Welch Bounds with Applications for Mutually Unbiased Bases

2008

The paper gives a short introduction to mutually unbiased bases and the Welch bounds and demonstrates that the latter is a good technical tool to explore the former. In particular, a criterion for a system of vectors to satisfy the Welch bounds with equality is given and applied for the case of MUBs. This yields a necessary and sufficient condition on a set of orthonormal bases to form a complete system of MUBs. This condition takes an especially elegant form in the case of homogeneous systems of MUBs. We express some known constructions of MUBs in this form. Also it is shown how recently obtained results binding MUBs and some combinatorial structures (such as perfect nonlinear functions an…

CombinatoricsSet (abstract data type)Discrete mathematicsNonlinear systemWelch boundsHomogeneousOrthonormal basisAbelian groupNuclear ExperimentMutually unbiased basesHadamard matrixMathematics
researchProduct

Forbidden Factors and Fragment Assembly

2001

In this paper methods and results related to the notion of minimal forbidden words are applied to the fragment assembly problem. The fragment assembly problem can be formulated, in its simplest form, as follows: reconstruct a word w from a given set I of substrings (fragments ) of a word w . We introduce an hypothesis involving the set of fragments I and the maximal length m(w) of the minimal forbidden factors of w . Such hypothesis allows us to reconstruct uniquely the word w from the set I in linear time. We prove also that, if w is a word randomly generated by a memoryless source with identical symbol probabilities, m(w) is logarithmic with respect to the size of w . This result shows th…

CombinatoricsSet (abstract data type)Fragment (logic)LogarithmDeterministic automatonSymbol (programming)General MathematicsTime complexitySoftwareWord (computer architecture)SubstringComputer Science ApplicationsMathematicsRAIRO - Theoretical Informatics and Applications
researchProduct

ARITHMETICAL QUESTIONS IN π-SEPARABLE GROUPS

2005

If G is a finite π-separable group, π a set of primes und X is a π-suhgroup of G, let vπ(G, X) be the number of Hall π-suhgroups of G containing X. If K is a subgroup of G containing X, we prove that vπ(K,X) divides vπ(G).

CombinatoricsSet (abstract data type)Hall subgroupPure mathematicsNilpotentAlgebra and Number TheorySubgroupGroup (mathematics)Arithmetic functionMathematicsSeparable spaceCommunications in Algebra
researchProduct

Closedness properties in ex-identification

2001

In this paper we investigate in which cases unions of identifiable classes are also necessarily identifiable. We consider identification in the limit with bounds on mindchanges and anomalies. Though not closed under the set union, these identification types still have features resembling closedness. For each of them we and n such that (1) if every union of n − 1 classes out of U1, ... , Un is identifiable, so is the union of all n classes; (2) there are classes U1, ... ,Un−1 such that every union of n−2 classes out of them is identifiable, while the union of n − 1 classes is not. We show that by finding these n we can distinguish which requirements put on the identifiability of unions of cl…

CombinatoricsSet (abstract data type)Identification (information)General Computer ScienceIdentifiabilityLimit (mathematics)Computer Science(all)Theoretical Computer ScienceMathematicsTheoretical Computer Science
researchProduct

On bijections vs. unary functions

1996

A set of finite structures is in Binary NP if it can be characterized by existential second order formulas in which second order quantification is over relations of arity 2. In [DLS95] subclasses of Binary NP were considered, in which the second order quantifiers range only over certain classes of relations. It was shown that many of these subclasses coincide and that all of them can be ordered in a three-level linear hierarchy, the levels of which are represented by bijections, successor relations and unary functions respectively.

CombinatoricsSet (abstract data type)Range (mathematics)Unary operationHierarchy (mathematics)Computer Science::Logic in Computer ScienceOrder (group theory)Unary functionArityBijection injection and surjectionComputer Science::Formal Languages and Automata TheoryMathematics
researchProduct

Basic Definitions and Facts

2001

Symbol is treated here as a primitive entity as point or line in geometry. Let Con = {f α : α < β} be a well-ordered set of symbols called a language type. β is an ordinal number. The elements of the above set are called connectives. To each connective f α a natural number α(α) ∈ w called the rank of f α or the arity of f α is assigned. The arity α(α) defines the number of arguments of f α . Thus we speak of nullary, unary, or binary connectives, etc. In the sequel Con is assumed to be fixed but arbitrary.

CombinatoricsSet (abstract data type)Unary operationSymbol (programming)Binary numberOrdinal numberNatural numberRank (differential topology)ArityMathematics
researchProduct

O(n 2 log n) Time On-Line Construction of Two-Dimensional Suffix Trees

2005

The two-dimensional suffix tree of an n × n square matrix A is a compacted trie that represents all square submatrices of Ai¾?[9]. For the off-line case, i.e., A is given in advance to the algorithm, it is known how to build it in optimal time, for any type of alphabet sizei¾?[9,15]. Motivated by applications in Image Compressioni¾?[18], Giancarlo and Guaianai¾?[12] considered the on-line version of the two-dimensional suffix tree and presented an On2log2n-time algorithm, which we refer to as GG. That algorithm is a non-trivial generalization of Ukkonen's on-line algorithm for standard suffix trees [19]. The main contribution in this paper is an Olog n factor improvement in the time complex…

CombinatoricsSet (abstract data type)lawSuffix treeTrieGeneralized suffix treeBlock matrixUkkonen's algorithmSuffixTime complexityMathematicslaw.invention
researchProduct

Markov Chains and Electrical Networks

2020

There is a natural connection between electrical networks and so called reversible Markov chains. An example for such a chain is the symmetric graph random walk which, in each step, jumps to a randomly chosen graph neighbor at equal probability. This connection is studied here in some detail. As an application, we prove the statement that if such a graph random walk is recurrent, then it is recurrent also on each subgraph. (Although this statement is rather plausible, it is hard to show by different means.) In particular, the graph random walk on a percolation cluster of the planar integer lattice is recurrent.

CombinatoricsStatement (computer science)Markov chainComputer sciencelawSymmetric graphElectrical networkInteger latticeGraph (abstract data type)Random walklaw.inventionConnection (mathematics)
researchProduct

Fast and Simple Approximation of the Diameter and Radius of a Graph

2006

The increasing amount of data to be processed by computers has led to the need for highly efficient algorithms for various computational problems. Moreover, the algorithms should be as simple as possible to be practically applicable. In this paper we propose a very simple approximation algorithm for finding the diameter and the radius of an undirected graph. The algorithm runs in $O(m\sqrt{n})$ time and gives an additive error of $O(\sqrt{n})$ for a graph with n vertices and m edges. Practical experiments show that the results of our algorithm are close to the optimum and compare favorably to the 2/3-approximation algorithm for the diameter problem by Aingworth et al [1].

CombinatoricsTheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITYGraph (abstract data type)Approximation algorithmAlgorithm engineeringRadiusComputational problemStrength of a graphDistanceMathematicsofComputing_DISCRETEMATHEMATICSAnalysis of algorithmsMathematics
researchProduct

SELF-ENERGIES AND VERTEX CORRECTIONS WITH TWO FACTORIZING LOOPS

1999

A complete set of factorizing two-loop self-energies and vertex corrections is calculated analytically for arbitrary masses and momenta — including the case of collinear singularities — within the ℛ-functions approach.

CombinatoricsVertex (graph theory)PhysicsSet (abstract data type)Nuclear and High Energy PhysicsGeneral Physics and AstronomyAstronomy and AstrophysicsGravitational singularityModern Physics Letters A
researchProduct