Search results for "combinatoric"

showing 10 items of 1776 documents

Catalan words avoiding pairs of length three patterns

2021

Catalan words are particular growth-restricted words counted by the eponymous integer sequence. In this article we consider Catalan words avoiding a pair of patterns of length 3, pursuing the recent initiating work of the first and last authors and of S. Kirgizov where (among other things) the enumeration of Catalan words avoiding a patterns of length 3 is completed. More precisely, we explore systematically the structural properties of the sets of words under consideration and give enumerating results by means of recursive decomposition, constructive bijections or bivariate generating functions with respect to the length and descent number. Some of the obtained enumerating sequences are kn…

FOS: Computer and information sciencesMathematics::CombinatoricsDiscrete Mathematics (cs.DM)General Computer ScienceInteger sequenceBivariate analysisConstructivelanguage.human_languageTheoretical Computer ScienceCombinatorics[MATH.MATH-CO] Mathematics [math]/Combinatorics [math.CO]FOS: MathematicsEnumerationlanguageDiscrete Mathematics and CombinatoricsMathematics - CombinatoricsCatalanCombinatorics (math.CO)Recursive decompositionBijection injection and surjectionMathematicsDescent (mathematics)Computer Science - Discrete Mathematics
researchProduct

Pattern statistics in faro words and permutations

2021

We study the distribution and the popularity of some patterns in $k$-ary faro words, i.e. words over the alphabet $\{1, 2, \ldots, k\}$ obtained by interlacing the letters of two nondecreasing words of lengths differing by at most one. We present a bijection between these words and dispersed Dyck paths (i.e. Motzkin paths with all level steps on the $x$-axis) with a given number of peaks. We show how the bijection maps statistics of consecutive patterns of faro words into linear combinations of other pattern statistics on paths. Then, we deduce enumerative results by providing multivariate generating functions for the distribution and the popularity of patterns of length at most three. Fina…

FOS: Computer and information sciencesMultivariate statisticsDistribution (number theory)Discrete Mathematics (cs.DM)Interlacing0102 computer and information sciences02 engineering and technology[INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM]01 natural sciencesTheoretical Computer ScienceCombinatoricsStatistics[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO]05A05 (Primary) 05A15 05A19 68R15 (Secondary)0202 electrical engineering electronic engineering information engineeringFOS: MathematicsDiscrete Mathematics and CombinatoricsMathematics - CombinatoricsLinear combinationMathematicsDiscrete mathematicsMathematics::Combinatorics020206 networking & telecommunicationsComputer Science::Computation and Language (Computational Linguistics and Natural Language and Speech Processing)Derangement010201 computation theory & mathematicsBijectionCombinatorics (math.CO)AlphabetComputer Science::Formal Languages and Automata TheoryComputer Science - Discrete Mathematics
researchProduct

Classical automata on promise problems

2015

Promise problems were mainly studied in quantum automata theory. Here we focus on state complexity of classical automata for promise problems. First, it was known that there is a family of unary promise problems solvable by quantum automata by using a single qubit, but the number of states required by corresponding one-way deterministic automata cannot be bounded by a constant. For this family, we show that even two-way nondeterminism does not help to save a single state. By comparing this with the corresponding state complexity of alternating machines, we then get a tight exponential gap between two-way nondeterministic and one-way alternating automata solving unary promise problems. Secon…

FOS: Computer and information sciencesNested wordTheoryofComputation_COMPUTATIONBYABSTRACTDEVICESUnary operationGeneral Computer ScienceFormal Languages and Automata Theory (cs.FL)nondeterministic automataComputer Science - Formal Languages and Automata Theoryω-automatonComputational Complexity (cs.CC)Theoretical Computer ScienceContinuous spatial automatonQuantum finite automataDiscrete Mathematics and Combinatoricsalternating automatapromise problemsMathematicsprobabilistic automataNonlinear Sciences::Cellular Automata and Lattice GasesMobile automatonNondeterministic algorithmAlgebra[INFO.INFO-DM] Computer Science [cs]/Discrete Mathematics [cs.DM]Computer Science - Computational ComplexityTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESAutomata theorydescriptional complexityComputer Science::Formal Languages and Automata Theory
researchProduct

Exact quantum algorithms have advantage for almost all Boolean functions

2014

It has been proved that almost all $n$-bit Boolean functions have exact classical query complexity $n$. However, the situation seemed to be very different when we deal with exact quantum query complexity. In this paper, we prove that almost all $n$-bit Boolean functions can be computed by an exact quantum algorithm with less than $n$ queries. More exactly, we prove that ${AND}_n$ is the only $n$-bit Boolean function, up to isomorphism, that requires $n$ queries.

FOS: Computer and information sciencesNuclear and High Energy Physics81P68 03D15Parity functionBoolean circuitGeneral Physics and AstronomyFOS: Physical sciencesBoolean algebras canonically definedComputational Complexity (cs.CC)Theoretical Computer ScienceCombinatoricsBoolean expressionBoolean functionMathematical PhysicsComputer Science::DatabasesMathematicsDiscrete mathematicsSymmetric Boolean functionQuantum PhysicsProduct termComputer Science::Information RetrievalStatistical and Nonlinear PhysicsComputer Science - Computational ComplexityComputational Theory and MathematicsMaximum satisfiability problemQuantum Physics (quant-ph)
researchProduct

Quantum lower bound for inverting a permutation with advice

2014

Given a random permutation $f: [N] \to [N]$ as a black box and $y \in [N]$, we want to output $x = f^{-1}(y)$. Supplementary to our input, we are given classical advice in the form of a pre-computed data structure; this advice can depend on the permutation but \emph{not} on the input $y$. Classically, there is a data structure of size $\tilde{O}(S)$ and an algorithm that with the help of the data structure, given $f(x)$, can invert $f$ in time $\tilde{O}(T)$, for every choice of parameters $S$, $T$, such that $S\cdot T \ge N$. We prove a quantum lower bound of $T^2\cdot S \ge \tilde{\Omega}(\epsilon N)$ for quantum algorithms that invert a random permutation $f$ on an $\epsilon$ fraction of…

FOS: Computer and information sciencesNuclear and High Energy PhysicsComputer Science - Cryptography and SecurityGeneral Physics and AstronomyFOS: Physical sciencesOne-way functionComputational Complexity (cs.CC)Upper and lower boundsTheoretical Computer ScienceCyclic permutationCombinatoricsPermutationMathematical PhysicsMathematicsDiscrete mathematicsQuantum PhysicsBit-reversal permutationStatistical and Nonlinear PhysicsRandom permutationComputer Science - Computational ComplexityComputational Theory and MathematicsQuantum algorithmQuantum Physics (quant-ph)Advice (complexity)Cryptography and Security (cs.CR)MathematicsofComputing_DISCRETEMATHEMATICS
researchProduct

The rightmost equal-cost position problem.

2013

LZ77-based compression schemes compress the input text by replacing factors in the text with an encoded reference to a previous occurrence formed by the couple (length, offset). For a given factor, the smallest is the offset, the smallest is the resulting compression ratio. This is optimally achieved by using the rightmost occurrence of a factor in the previous text. Given a cost function, for instance the minimum number of bits used to represent an integer, we define the Rightmost Equal-Cost Position (REP) problem as the problem of finding one of the occurrences of a factor whose cost is equal to the cost of the rightmost one. We present the Multi-Layer Suffix Tree data structure that, for…

FOS: Computer and information sciencesOffset (computer science)Computer scienceSuffix treeComputer Science - Information Theorylaw.inventionCombinatoricslawLog-log plotComputer Science - Data Structures and AlgorithmsCompression schemetext compressiondictionary text compressionData Structures and Algorithms (cs.DS)LZ77 compressiondata compressionLossless compressionfull text indexSuffix Tree Data StructuresSettore INF/01 - InformaticaInformation Theory (cs.IT)Data structurePrefixCompression ratioCompression scheme; Constant time; Suffix Tree Data StructuresAlgorithmData compressionConstant time
researchProduct

On the family of $r$-regular graphs with Grundy number $r+1$

2014

International audience; The Grundy number of a graph $G$, denoted by $\Gamma(G)$, is the largest $k$ such that there exists a partition of $V(G)$, into $k$ independent sets $V_1,\ldots, V_k$ and every vertex of $V_i$ is adjacent to at least one vertex in $V_j$, for every $j < i$. The objects which are studied in this article are families of $r$-regular graphs such that $\Gamma(G) = r + 1$. Using the notion of independent module, a characterization of this family is given for $r=3$. Moreover, we determine classes of graphs in this family, in particular the class of $r$-regular graphs without induced $C_4$, for $r \le 4$. Furthermore, our propositions imply results on partial Grundy number.

FOS: Computer and information sciencesPartial Grundy numberDiscrete Mathematics (cs.DM)Regular graphFalse twinsFOS: MathematicsGrundy numberMathematics - Combinatorics[ INFO.INFO-DM ] Computer Science [cs]/Discrete Mathematics [cs.DM]Combinatorics (math.CO)[INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM]Computer Science - Discrete Mathematics
researchProduct

Whom to befriend to influence people

2020

Alice wants to join a new social network, and influence its members to adopt a new product or idea. Each person $v$ in the network has a certain threshold $t(v)$ for {\em activation}, i.e adoption of the product or idea. If $v$ has at least $t(v)$ activated neighbors, then $v$ will also become activated. If Alice wants to activate the entire social network, whom should she befriend? More generally, we study the problem of finding the minimum number of links that a set of external influencers should form to people in the network, in order to activate the entire social network. This {\em Minimum Links} Problem has applications in viral marketing and the study of epidemics. Its solution can be…

FOS: Computer and information sciencesPhysics - Physics and SocietyGeneral Computer ScienceFOS: Physical sciencesPhysics and Society (physics.soc-ph)0102 computer and information sciences02 engineering and technology01 natural sciencesSocial networksGraphTheoretical Computer ScienceCombinatoricsComputer Science - Data Structures and AlgorithmsGreedy algorithmFOS: Mathematics0202 electrical engineering electronic engineering information engineeringMathematics - CombinatoricsData Structures and Algorithms (cs.DS)Greedy algorithmTime complexityNP-completeMathematicsSocial and Information Networks (cs.SI)Social networkDiscrete mathematicsBinary treeDegree (graph theory)Computer Science (all)Order (ring theory)Computer Science - Social and Information NetworksJoin (topology)Influence maximizationGreedy algorithms010201 computation theory & mathematicsGraphs; Greedy algorithms; Influence maximization; NP-complete; Social networksProduct (mathematics)020201 artificial intelligence & image processingCombinatorics (math.CO)Constant (mathematics)GraphsTheoretical Computer Science
researchProduct

A permutation code preserving a double Eulerian bistatistic

2016

Visontai conjectured in 2013 that the joint distribution of ascent and distinct nonzero value numbers on the set of subexcedant sequences is the same as that of descent and inverse descent numbers on the set of permutations. This conjecture has been proved by Aas in 2014, and the generating function of the corresponding bistatistics is the double Eulerian polynomial. Among the techniques used by Aas are the M\"obius inversion formula and isomorphism of labeled rooted trees. In this paper we define a permutation code (that is, a bijection between permutations and subexcedant sequences) and show the more general result that two $5$-tuples of set-valued statistics on the set of permutations an…

FOS: Computer and information sciencesPolynomialDiscrete Mathematics (cs.DM)0102 computer and information sciences01 natural sciencesBijective proofCombinatoricsSet (abstract data type)symbols.namesakeEquidistributed sequence[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO]FOS: MathematicsDiscrete Mathematics and CombinatoricsMathematics - Combinatorics0101 mathematicsComputingMilieux_MISCELLANEOUSMathematicsConjectureMathematics::CombinatoricsApplied Mathematics010102 general mathematicsGenerating functionEulerian path010201 computation theory & mathematicssymbolsBijectionCombinatorics (math.CO)Computer Science - Discrete Mathematics
researchProduct

On prefix normal words and prefix normal forms

2016

A $1$-prefix normal word is a binary word with the property that no factor has more $1$s than the prefix of the same length; a $0$-prefix normal word is defined analogously. These words arise in the context of indexed binary jumbled pattern matching, where the aim is to decide whether a word has a factor with a given number of $1$s and $0$s (a given Parikh vector). Each binary word has an associated set of Parikh vectors of the factors of the word. Using prefix normal words, we provide a characterization of the equivalence class of binary words having the same set of Parikh vectors of their factors. We prove that the language of prefix normal words is not context-free and is strictly contai…

FOS: Computer and information sciencesPrefix codePrefix normal wordPre-necklaceDiscrete Mathematics (cs.DM)General Computer ScienceFormal Languages and Automata Theory (cs.FL)Binary numberComputer Science - Formal Languages and Automata TheoryContext (language use)Binary languageLyndon words0102 computer and information sciences02 engineering and technologyPrefix grammarprefix normal formsKraft's inequalityCharacterization (mathematics)Lyndon word01 natural sciencesPrefix normal formenumerationTheoretical Computer ScienceFOS: Mathematics0202 electrical engineering electronic engineering information engineeringMathematics - CombinatoricsMathematicsDiscrete mathematicsprefix normal words prefix normal forms binary languages binary jumbled pattern matching pre-necklaces Lyndon words enumerationbinary jumbled pattern matchingSettore INF/01 - InformaticaComputer Science (all)pre-necklacesComputer Science::Computation and Language (Computational Linguistics and Natural Language and Speech Processing)prefix normal wordsPrefix010201 computation theory & mathematics020201 artificial intelligence & image processingCombinatorics (math.CO)binary languagesComputer Science::Formal Languages and Automata TheoryWord (group theory)Computer Science - Discrete MathematicsTheoretical Computer Science
researchProduct