The second step in characterizing a three-word code

IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Acta Informatica Pub Date : 2023-09-08 DOI:10.1007/s00236-023-00444-6
Chunhua Cao, Jiao Xu, Lei Liao, Di Yang, Guichuan Jia, Qian Du
{"title":"The second step in characterizing a three-word code","authors":"Chunhua Cao,&nbsp;Jiao Xu,&nbsp;Lei Liao,&nbsp;Di Yang,&nbsp;Guichuan Jia,&nbsp;Qian Du","doi":"10.1007/s00236-023-00444-6","DOIUrl":null,"url":null,"abstract":"<div><p>In the fields of combinatorics on words and theory of codes, a two-word language <span>\\(\\{x, y\\}\\)</span> is a code if and only if <span>\\(xy \\not = yx\\)</span>. But up to now, corresponding characterizations for a three-word language, which forms a code, have not been completely found. Let <span>\\(X=\\{x,\\ y,\\ z\\}\\)</span> be a three-word language and <span>\\(|x|,\\ |y|,\\ |z|\\)</span> be their lengths. When <span>\\(|x| = |y| &lt; |z|\\)</span>, a necessary and sufficient condition for <i>X</i> to be a code was obtained in 2018. If <span>\\(|x| &lt; |y| = |z| \\le 2|x|\\)</span>, a necessary and sufficient condition for <i>X</i> to be a code is proposed in this paper.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.4000,"publicationDate":"2023-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Acta Informatica","FirstCategoryId":"94","ListUrlMain":"https://link.springer.com/article/10.1007/s00236-023-00444-6","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

In the fields of combinatorics on words and theory of codes, a two-word language \(\{x, y\}\) is a code if and only if \(xy \not = yx\). But up to now, corresponding characterizations for a three-word language, which forms a code, have not been completely found. Let \(X=\{x,\ y,\ z\}\) be a three-word language and \(|x|,\ |y|,\ |z|\) be their lengths. When \(|x| = |y| < |z|\), a necessary and sufficient condition for X to be a code was obtained in 2018. If \(|x| < |y| = |z| \le 2|x|\), a necessary and sufficient condition for X to be a code is proposed in this paper.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
描述三字代码的第二步
在词的组合学领域和码理论中,两个词的语言\(\{x, y\}\)是一个码当且仅当\(xy \not = yx\)。但是到目前为止,对于构成一个码的三字语言,还没有完全找到相应的表征。让\(X=\{x,\ y,\ z\}\)是一个三个单词的语言,\(|x|,\ |y|,\ |z|\)是它们的长度。当\(|x| = |y| < |z|\), 2018年获得X为代码的充分必要条件。如果\(|x| < |y| = |z| \le 2|x|\),本文给出了X为码的充分必要条件。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Acta Informatica
Acta Informatica 工程技术-计算机:信息系统
CiteScore
2.40
自引率
16.70%
发文量
24
审稿时长
>12 weeks
期刊介绍: Acta Informatica provides international dissemination of articles on formal methods for the design and analysis of programs, computing systems and information structures, as well as related fields of Theoretical Computer Science such as Automata Theory, Logic in Computer Science, and Algorithmics. Topics of interest include: • semantics of programming languages • models and modeling languages for concurrent, distributed, reactive and mobile systems • models and modeling languages for timed, hybrid and probabilistic systems • specification, program analysis and verification • model checking and theorem proving • modal, temporal, first- and higher-order logics, and their variants • constraint logic, SAT/SMT-solving techniques • theoretical aspects of databases, semi-structured data and finite model theory • theoretical aspects of artificial intelligence, knowledge representation, description logic • automata theory, formal languages, term and graph rewriting • game-based models, synthesis • type theory, typed calculi • algebraic, coalgebraic and categorical methods • formal aspects of performance, dependability and reliability analysis • foundations of information and network security • parallel, distributed and randomized algorithms • design and analysis of algorithms • foundations of network and communication protocols.
期刊最新文献
Editorial 2024: moving forwards in the electronic age Serial and parallel algorithms for order-preserving pattern matching based on the duel-and-sweep paradigm Linear-size suffix tries and linear-size CDAWGs simplified and improved Parameterized aspects of distinct Kemeny rank aggregation Word-representable graphs from a word’s perspective
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1