Search results for "upper"

showing 10 items of 987 documents

On a Conjecture by Christian Choffrut

2017

It is one of the most famous open problems to determine the minimum amount of states required by a deterministic finite automaton to distinguish a pair of strings, which was stated by Christian Choffrut more than thirty years ago. We investigate the same question for different automata models and we obtain new upper and lower bounds for some of them including alternating, ultrametric, quantum, and affine finite automata.

Discrete mathematicsFinite-state machineConjecture010102 general mathematics02 engineering and technology01 natural sciencesUpper and lower boundsAutomatonDeterministic finite automatonCounting problem0202 electrical engineering electronic engineering information engineeringComputer Science (miscellaneous)020201 artificial intelligence & image processingAffine transformation0101 mathematicsUltrametric spaceMathematicsInternational Journal of Foundations of Computer Science
researchProduct

Affine Automata Verifiers

2021

We initiate the study of the verification power of Affine finite automata (AfA) as a part of Arthur-Merlin (AM) proof systems. We show that every unary language is verified by a real-valued AfA verifier. Then, we focus on the verifiers restricted to have only integer-valued or rational-valued transitions. We observe that rational-valued verifiers can be simulated by integer-valued verifiers, and their protocols can be simulated in nondeterministic polynomial time. We show that this upper bound is tight by presenting an AfA verifier for NP-complete problem SUBSETSUM. We also show that AfAs can verify certain non-affine and non-stochastic unary languages.

Discrete mathematicsFinite-state machineUnary operationComputer scienceUnary languageSubset sum problemAffine transformationUpper and lower boundsNPAutomaton
researchProduct

Branch and bound for the cutwidth minimization problem

2013

The cutwidth minimization problem consists of finding a linear arrangement of the vertices of a graph where the maximum number of cuts between the edges of the graph and a line separating consecutive vertices is minimized. We first review previous approaches for special classes of graphs, followed by lower bounds and then a linear integer formulation for the general problem. We then propose a branch-and-bound algorithm based on different lower bounds on the cutwidth of partial solutions. Additionally, we introduce a Greedy Randomized Adaptive Search Procedure (GRASP) heuristic to obtain good initial solutions. The combination of the branch-and-bound and GRASP methods results in optimal solu…

Discrete mathematicsGeneral Computer ScienceBranch and boundGeneral problemMinimization problemGRASPCPU timeManagement Science and Operations ResearchUpper and lower boundsCombinatoricsModeling and SimulationInteger programmingGreedy randomized adaptive search procedureMathematicsComputers & Operations Research
researchProduct

The Besov capacity in metric spaces

2016

We study a capacity theory based on a definition of Haj{\l} asz-Besov functions. We prove several properties of this capacity in the general setting of a metric space equipped with a doubling measure. The main results of the paper are lower bound and upper bound estimates for the capacity in terms of a modified Netrusov-Hausdorff content. Important tools are $\gamma$-medians, for which we also prove a new version of a Poincar\'e type inequality.

Discrete mathematicsGeneral Mathematics010102 general mathematicsType inequalitykapasiteetti01 natural sciencesMeasure (mathematics)Upper and lower boundsmetriset avaruudetFunctional Analysis (math.FA)Theory basedMathematics - Functional Analysis010101 applied mathematicsMetric spaceBesov spacesContent (measure theory)FOS: Mathematics0101 mathematicsMathematics
researchProduct

Nondeterministic Unitary OBDDs

2017

We investigate the width complexity of nondeterministic unitary OBDDs (NUOBDDs). Firstly, we present a generic lower bound on their widths based on the size of strong 1-fooling sets. Then, we present classically “cheap” functions that are “expensive” for NUOBDDs and vice versa by improving the previous gap. We also present a function for which neither classical nor unitary nondeterminism does help. Moreover, based on our results, we present a width hierarchy for NUOBDDs. Lastly, we provide the bounds on the widths of NUOBDDs for the basic Boolean operations negation, union, and intersection.

Discrete mathematicsHierarchy (mathematics)Intersection (set theory)010102 general mathematics0102 computer and information sciencesFunction (mathematics)Computer Science::Computational Complexity01 natural sciencesUpper and lower boundsUnitary stateNondeterministic algorithmCombinatoricsNegation010201 computation theory & mathematicsBoolean operations in computer-aided design0101 mathematicsMathematics
researchProduct

Extensions and intentions in the rough set theory

1998

Abstract The approach to rough set theory proposed in this paper is based on the mutual correspondence of the concepts of extension and intension. It is different from the well-known approaches in the literature in that the upper approximations and the lower approximations of ‘unknown’ sets are considered as certain families of ‘known’ sets. This approach makes it possible to formulate necessary and sufficient conditions for the existence of operations on rough sets, which are analogous to classical operations on sets. The basic results presented in this paper, based on certain ideas of the second author, were formulated by the first author in his doctoral dissertation prepared under the su…

Discrete mathematicsInformation Systems and ManagementApproximations of πDominance-based rough set approachIntensionExtension (predicate logic)Computer Science ApplicationsTheoretical Computer ScienceAlgebraArtificial IntelligenceControl and Systems EngineeringApproximation operatorsRough setDoctoral dissertationSoftwareUpper approximationMathematicsInformation Sciences
researchProduct

Quantum Algorithms for Learning Symmetric Juntas via Adversary Bound

2014

In this paper, we study the following variant of the junta learning problem. We are given oracle access to a Boolean function f on n variables that only depends on k variables, and, when restricted to them, equals some predefined function h. The task is to identify the variables the function depends on. This is a generalisation of the Bernstein-Vazirani problem (when h is the XOR function) and the combinatorial group testing problem (when h is the OR function). We analyse the general case using the adversary bound, and give an alternative formulation for the quantum query complexity of this problem. We construct optimal quantum query algorithms for the cases when h is the OR function (compl…

Discrete mathematicsMajority functionOpen problem0102 computer and information sciencesFunction (mathematics)01 natural sciencesUpper and lower boundsCombinatoricsComplexity index010201 computation theory & mathematicsQuartic function0103 physical sciencesQuantum algorithm010306 general physicsBoolean functionMathematics2014 IEEE 29th Conference on Computational Complexity (CCC)
researchProduct

Time-Efficient Quantum Walks for 3-Distinctness

2013

We present two quantum walk algorithms for 3-Distinctness. Both algorithms have time complexity $\tilde{O}(n^{5/7})$, improving the previous $\tilde{O}(n^{3/4})$ and matching the best known upper bound for query complexity (obtained via learning graphs) up to log factors. The first algorithm is based on a connection between quantum walks and electric networks. The second algorithm uses an extension of the quantum walk search framework that facilitates quantum walks with nested updates.

Discrete mathematicsMatching (graph theory)0102 computer and information sciencesExtension (predicate logic)01 natural sciencesUpper and lower boundsTildeCombinatorics010201 computation theory & mathematics0103 physical sciencesQuantum algorithmQuantum walkConnection (algebraic framework)010306 general physicsTime complexityMathematics
researchProduct

A Motzkin filter in the Tamari lattice

2015

The Tamari lattice of order n can be defined on the set T n of binary trees endowed with the partial order relation induced by the well-known rotation transformation. In this paper, we restrict our attention to the subset M n of Motzkin trees. This set appears as a filter of the Tamari lattice. We prove that its diameter is 2 n - 5 and that its radius is n - 2 . Enumeration results are given for join and meet irreducible elements, minimal elements and coverings. The set M n endowed with an order relation based on a restricted rotation is then isomorphic to a ranked join-semilattice recently defined in Baril and Pallo (2014). As a consequence, we deduce an upper bound for the rotation distan…

Discrete mathematicsMathematics::CombinatoricsBinary tree010102 general mathematicsLattice (group)0102 computer and information sciences[ MATH.MATH-CO ] Mathematics [math]/Combinatorics [math.CO]01 natural sciencesUpper and lower boundsTheoretical Computer ScienceCombinatoricsJoin and meet010201 computation theory & mathematics[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO]Discrete Mathematics and CombinatoricsOrder (group theory)Ideal (order theory)0101 mathematicsFilter (mathematics)Tamari latticeComputingMilieux_MISCELLANEOUSMathematics
researchProduct

A Tight Lower Bound on Certificate Complexity in Terms of Block Sensitivity and Sensitivity

2014

Sensitivity, certificate complexity and block sensitivity are widely used Boolean function complexity measures. A longstanding open problem, proposed by Nisan and Szegedy [7], is whether sensitivity and block sensitivity are polynomially related. Motivated by the constructions of functions which achieve the largest known separations, we study the relation between 1-certificate complexity and 0-sensitivity and 0-block sensitivity.

Discrete mathematicsOpen problem020206 networking & telecommunications0102 computer and information sciences02 engineering and technologyCertificate01 natural sciencesUpper and lower bounds010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineeringSensitivity (control systems)Boolean functionBlock (data storage)Mathematics39th International Symposium on Mathematical Foundations of Computer Science, MFCS 2014
researchProduct