Search results for "combinatoric"

showing 10 items of 1776 documents

Polyomino coloring and complex numbers

2008

AbstractUsually polyominoes are represented as subsets of the lattice Z2. In this paper we study a representation of polyominoes by Gaussian integers. Polyomino {(x1,y1),(x2,y2),…,(xs,ys)}⊂Z2 is represented by the set {(x1+iy1),(x2+iy2),…,(xs+iys)}⊂Z[i]. Then we consider functions of type f:P→G from the set P of all polyominoes to an abelian group G, given by f(x,y)≡(x+iy)m(modv), where v is prime in Z[i],1≤m<N(v) (N(v) is the norm of v). Using the arithmetic of the ring Z[i] we find necessary and sufficient conditions for such a function to be a coloring map.

Gaussian integersDiscrete mathematicsGeneral Computer SciencePolyominoGaussian integerPolyomino tilingLattice (group)Tileability criteriaType (model theory)Prime (order theory)Theoretical Computer ScienceCombinatoricssymbols.namesakeIntegersymbolsColoringFunction compositionAbelian groupComputer Science(all)MathematicsTheoretical Computer Science
researchProduct

Quantitative lower bounds to the Euclidean and the Gaussian Cheeger constants

2020

We provide a quantitative lower bound to the Cheeger constant of a set $\Omega$ in both the Euclidean and the Gaussian settings in terms of suitable asymmetry indexes. We provide examples which show that these quantitative estimates are sharp.

Gaussianmedia_common.quotation_subject01 natural sciencesUpper and lower boundsAsymmetryOmegaCombinatoricsSet (abstract data type)Cheeger sets; Cheeger constant; quantitative inequalitiessymbols.namesakeMathematics - Analysis of PDEsEuclidean geometryFOS: MathematicsMathematics::Metric Geometry0101 mathematicsepäyhtälötMathematicsmedia_common49Q10 49Q20 39B62osittaisdifferentiaaliyhtälöt010102 general mathematicsCheeger constantCheeger setsArticlesCheeger constant (graph theory)010101 applied mathematicssymbolsquantitative inequalitiesAnalysis of PDEs (math.AP)Annales Fennici Mathematici
researchProduct

Strong chromatic index of products of graphs

2007

Graphs and Algorithms

General Computer ScienceCritical graphKronecker product[INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM]strong productinduced matchingTheoretical Computer ScienceCombinatoricssymbols.namesakeComputer Science::Discrete MathematicsCartesian productDiscrete Mathematics and CombinatoricsChromatic scaleMathematicsDiscrete mathematicsKronecker productMathematics::Combinatoricslcsh:Mathematics[ INFO.INFO-DM ] Computer Science [cs]/Discrete Mathematics [cs.DM]Cartesian productlcsh:QA1-939Graph[INFO.INFO-DM] Computer Science [cs]/Discrete Mathematics [cs.DM]Edge coloringMSC 05C15strong product.symbolsHypercubeStrong edge colouringMathematicsofComputing_DISCRETEMATHEMATICS
researchProduct

Exact results for accepting probabilities of quantum automata

2001

One of the properties of Kondacs-Watrous model of quantum finite automata (QFA) is that the probability of the correct answer for a QFA cannot be amplified arbitrarily. In this paper, we determine the maximum probabilities achieved by QFAs for several languages. In particular, we show that any language that is not recognized by an RFA (reversible finite automaton) can be recognized by a QFA with probability at most 0.7726...

General Computer ScienceFOS: Physical sciences0102 computer and information sciences02 engineering and technologyUnitary transformationComputer Science::Computational Complexity01 natural sciencesTheoretical Computer ScienceCombinatoricsQuantum measurementFormal languageQuantum computation0202 electrical engineering electronic engineering information engineeringQuantum finite automataMathematicsQuantum computerQuantum PhysicsFinite-state machineMarkov chainExact resultsTransformation (function)010201 computation theory & mathematics020201 artificial intelligence & image processingQuantum Physics (quant-ph)Finite automataComputer Science::Formal Languages and Automata TheoryComputer Science(all)Theoretical Computer Science
researchProduct

Word assembly through minimal forbidden words

2006

AbstractWe give a linear-time algorithm to reconstruct a finite word w over a finite alphabet A of constant size starting from a finite set of factors of w verifying a suitable hypothesis. We use combinatorics techniques based on the minimal forbidden words, which have been introduced in previous papers. This improves a previous algorithm which worked under the assumption of stronger hypothesis.

General Computer ScienceFragment assemblyFactor automaton[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS][INFO.INFO-DS] Computer Science [cs]/Data Structures and Algorithms [cs.DS]0102 computer and information sciences02 engineering and technology01 natural sciencesMinimal forbidden wordTheoretical Computer ScienceCombinatorics0202 electrical engineering electronic engineering information engineeringFinite setComputingMilieux_MISCELLANEOUSCombinatorics on wordMathematicsShortest superstringCombinatorics on wordsRepetition index16. Peace & justice010201 computation theory & mathematics020201 artificial intelligence & image processingAlphabetConstant (mathematics)Word (computer architecture)Computer Science::Formal Languages and Automata TheoryComputer Science(all)
researchProduct

Local Normal Forms for First-Order Logic with Applications to Games and Automata

1999

Building on work of Gaifman [Gai82] it is shown that every first-order formula is logically equivalent to a formula of the form ∃ x_1,...,x_l, \forall y, φ where φ is r-local around y, i.e. quantification in φ is restricted to elements of the universe of distance at most r from y. \par From this and related normal forms, variants of the Ehrenfeucht game for first-order and existential monadic second-order logic are developed that restrict the possible strategies for the spoiler, one of the two players. This makes proofs of the existence of a winning strategy for the duplicator, the other player, easier and can thus simplify inexpressibility proofs. \par As another application, automata mode…

General Computer ScienceLogical equivalenceautomataComputer scienceOf the formMathematical proofMonadic predicate calculusTheoretical Computer ScienceCombinatoricslocalityDeterministic automatonDiscrete Mathematics and CombinatoricsMathematicsgamesDiscrete mathematicsPredicate logiclcsh:MathematicsLocalityAtomic formulaexistential monadic second-order logiclcsh:QA1-939AutomatonFirst-order logic[INFO.INFO-DM] Computer Science [cs]/Discrete Mathematics [cs.DM]TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESAutomata theoryFirst-order logicDiscrete Mathematics & Theoretical Computer Science
researchProduct

The pruning-grafting lattice of binary trees

2008

AbstractWe introduce a new lattice structure Bn on binary trees of size n. We exhibit efficient algorithms for computing meet and join of two binary trees and give several properties of this lattice. More precisely, we prove that the length of a longest (resp. shortest) path between 0 and 1 in Bn equals to the Eulerian numbers 2n−(n+1) (resp. (n−1)2) and that the number of coverings is (2nn−1). Finally, we exhibit a matching in a constructive way. Then we propose some open problems about this new structure.

General Computer ScienceMatching (graph theory)Distribution sequences0102 computer and information sciencesFeasible sequences01 natural sciencesTheoretical Computer ScienceCombinatoricsCatalan numbersymbols.namesakeLattice (order)[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO]0101 mathematicsComputingMilieux_MISCELLANEOUSMathematicsBinary tree010102 general mathematicsEulerian pathLatticesJoin (topology)Binary trees010201 computation theory & mathematicsShortest path problemPath (graph theory)symbolsCatalan numbersComputer Science(all)
researchProduct

From Nerode's congruence to Suffix Automata with mismatches

2009

AbstractIn this paper we focus on the minimal deterministic finite automaton Sk that recognizes the set of suffixes of a word w up to k errors. As first result we give a characterization of the Nerode’s right-invariant congruence that is associated with Sk. This result generalizes the classical characterization described in [A. Blumer, J. Blumer, D. Haussler, A. Ehrenfeucht, M. Chen, J. Seiferas, The smallest automaton recognizing the subwords of a text, Theoretical Computer Science, 40, 1985, 31–55]. As second result we present an algorithm that makes use of Sk to accept in an efficient way the language of all suffixes of w up to k errors in every window of size r of a text, where r is the…

General Computer ScienceOpen problem[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]0102 computer and information sciences02 engineering and technologyString searching algorithm01 natural sciencesTheoretical Computer ScienceCombinatoricsDeterministic automatonSuffix automata0202 electrical engineering electronic engineering information engineeringCombinatorics on words Indexing Suffix Automata Languages with mismatches Approximate string matchingMathematicsDiscrete mathematicsCombinatorics on wordsApproximate string matchingSettore INF/01 - InformaticaLanguages with mismatchesComputer Science::Computation and Language (Computational Linguistics and Natural Language and Speech Processing)PrefixCombinatorics on wordsDeterministic finite automaton010201 computation theory & mathematicsSuffix automatonIndexing020201 artificial intelligence & image processingSuffixComputer Science::Formal Languages and Automata TheoryComputer Science(all)
researchProduct

Motif patterns in 2D

2008

AbstractMotif patterns consisting of sequences of intermixed solid and don’t-care characters have been introduced and studied in connection with pattern discovery problems of computational biology and other domains. In order to alleviate the exponential growth of such motifs, notions of maximal saturation and irredundancy have been formulated, whereby more or less compact subsets of the set of all motifs can be extracted, that are capable of expressing all others by suitable combinations. In this paper, we introduce the notion of maximal irredundant motifs in a two-dimensional array and develop initial properties and a combinatorial argument that poses a linear bound on the total number of …

General Computer SciencePattern discoveryTheoretical Computer ScienceCombinatoricsExponential growthMotif extraction Pattern discovery 2D MotifsMotif2D irredundant motifsMotif (music)Pattern matchingRemainderPattern matchingDesign and analysis of algorithmsMathematicsComputer Science(all)Theoretical Computer Science
researchProduct

On the exhaustive generation of k-convex polyominoes

2017

The degree of convexity of a convex polyomino P is the smallest integer k such that any two cells of P can be joined by a monotone path inside P with at most k changes of direction. In this paper we present a simple algorithm for computing the degree of convexity of a convex polyomino and we show how it can be used to design an algorithm that generates, given an integer k, all k-convex polyominoes of area n in constant amortized time, using space O(n). Furthermore, by applying few changes, we are able to generate all convex polyominoes whose degree of convexity is exactly k.

General Computer SciencePolyomino0102 computer and information sciences02 engineering and technologyComputer Science::Computational Geometry01 natural sciencesConvexityTheoretical Computer ScienceCombinatoricsCAT algorithmIntegerExhaustive generation0202 electrical engineering electronic engineering information engineeringConvex polyominoeConvexity K-convex polyominoes.Convex polyominoesComputer Science::DatabasesMathematicsDiscrete mathematicsAmortized analysisMathematics::CombinatoricsDegree (graph theory)Settore INF/01 - InformaticaComputer Science (all)Regular polygonMonotone polygon010201 computation theory & mathematicsPath (graph theory)020201 artificial intelligence & image processingCAT algorithms; Convex polyominoes; Exhaustive generation;CAT algorithms
researchProduct