首页 > 最新文献

Discret. Math. Theor. Comput. Sci.最新文献

英文 中文
The super-connectivity of Johnson graphs Johnson图的超连通性
Pub Date : 2019-06-15 DOI: 10.23638/DMTCS-22-1-12
Gülnaz Boruzanli Ekinci, John Baptist Gauci
For positive integers $n,k$ and $t$, the uniform subset graph $G(n, k, t)$ has all $k$-subsets of ${1,2,ldots, n}$ as vertices and two $k$-subsets are joined by an edge if they intersect at exactly $t$ elements. The Johnson graph $J(n,k)$ corresponds to $G(n,k,k-1)$, that is, two vertices of $J(n,k)$ are adjacent if the intersection of the corresponding $k$-subsets has size $k-1$. A super vertex-cut of a connected graph is a set of vertices whose removal disconnects the graph without isolating a vertex and the super-connectivity is the size of a minimum super vertex-cut. In this work, we fully determine the super-connectivity of the family of Johnson graphs $J(n,k)$ for $ngeq kgeq 1$.
对于正整数$n,k$和$t$,统一子集图$G(n, k, t)$将${1,2,ldots, n}$的所有$k$ -子集作为顶点,如果两个$k$ -子集恰好相交于$t$个元素,则它们由一条边连接。Johnson图$J(n,k)$对应于$G(n,k,k-1)$,即如果对应的$k$ -子集的交集大小为$k-1$,则$J(n,k)$的两个顶点相邻。连通图的超级顶点切割是指在不隔离任何一个顶点的情况下将连通图断开的一组顶点,超级连通性是指最小超级顶点切割的大小。在这项工作中,我们充分确定了$ngeq kgeq 1$的Johnson图族$J(n,k)$的超连通性。
{"title":"The super-connectivity of Johnson graphs","authors":"Gülnaz Boruzanli Ekinci, John Baptist Gauci","doi":"10.23638/DMTCS-22-1-12","DOIUrl":"https://doi.org/10.23638/DMTCS-22-1-12","url":null,"abstract":"For positive integers $n,k$ and $t$, the uniform subset graph $G(n, k, t)$ has all $k$-subsets of ${1,2,ldots, n}$ as vertices and two $k$-subsets are joined by an edge if they intersect at exactly $t$ elements. The Johnson graph $J(n,k)$ corresponds to $G(n,k,k-1)$, that is, two vertices of $J(n,k)$ are adjacent if the intersection of the corresponding $k$-subsets has size $k-1$. A super vertex-cut of a connected graph is a set of vertices whose removal disconnects the graph without isolating a vertex and the super-connectivity is the size of a minimum super vertex-cut. In this work, we fully determine the super-connectivity of the family of Johnson graphs $J(n,k)$ for $ngeq kgeq 1$.","PeriodicalId":110830,"journal":{"name":"Discret. Math. Theor. Comput. Sci.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129296039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Upward-closed hereditary families in the dominance order 向上封闭的世袭家族的统治顺序
Pub Date : 2019-05-23 DOI: 10.46298/dmtcs.5666
Michael D. Barrus, Jean Guillaume
The majorization relation orders the degree sequences of simple graphs intoposets called dominance orders. As shown by Ruch and Gutman (1979) and Merris(2002), the degree sequences of threshold and split graphs form upward-closedsets within the dominance orders they belong to, i.e., any degree sequencemajorizing a split or threshold sequence must itself be split or threshold,respectively. Motivated by the fact that threshold graphs and split graphs havecharacterizations in terms of forbidden induced subgraphs, we define a class$mathcal{F}$ of graphs to be dominance monotone if whenever no realization of$e$ contains an element $mathcal{F}$ as an induced subgraph, and $d$ majorizes$e$, then no realization of $d$ induces an element of $mathcal{F}$. We presentconditions necessary for a set of graphs to be dominance monotone, and weidentify the dominance monotone sets of order at most 3.
多数化关系将简单图的度序列排序为拓扑集,称为优势序。如Ruch和Gutman(1979)和Merris(2002)所示,阈值图和分裂图的度序列在其所属的优势阶内形成向上封闭的集合,即任何主导分裂或阈值序列的度序列本身必须分别是分裂或阈值。考虑到阈值图和分割图具有禁止诱导子图的特征,我们定义了一类$mathcal{F}$是优势单调的:当$e$的任何实现都不包含$mathcal{F}$作为诱导子图的元素,并且$d$使$e$最大化时,则$d$的任何实现都不诱导出$mathcal{F}$的元素。我们给出了一组图是优势单调的必要条件,并确定了阶数最多为3的优势单调集。
{"title":"Upward-closed hereditary families in the dominance order","authors":"Michael D. Barrus, Jean Guillaume","doi":"10.46298/dmtcs.5666","DOIUrl":"https://doi.org/10.46298/dmtcs.5666","url":null,"abstract":"The majorization relation orders the degree sequences of simple graphs into\u0000posets called dominance orders. As shown by Ruch and Gutman (1979) and Merris\u0000(2002), the degree sequences of threshold and split graphs form upward-closed\u0000sets within the dominance orders they belong to, i.e., any degree sequence\u0000majorizing a split or threshold sequence must itself be split or threshold,\u0000respectively. Motivated by the fact that threshold graphs and split graphs have\u0000characterizations in terms of forbidden induced subgraphs, we define a class\u0000$mathcal{F}$ of graphs to be dominance monotone if whenever no realization of\u0000$e$ contains an element $mathcal{F}$ as an induced subgraph, and $d$ majorizes\u0000$e$, then no realization of $d$ induces an element of $mathcal{F}$. We present\u0000conditions necessary for a set of graphs to be dominance monotone, and we\u0000identify the dominance monotone sets of order at most 3.","PeriodicalId":110830,"journal":{"name":"Discret. Math. Theor. Comput. Sci.","volume":"13 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133919275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Space Lower Bound for Deterministic Self-Stabilizing Leader Election Algorithms 确定性自稳定领导者选举算法的最优空间下界
Pub Date : 2019-05-21 DOI: 10.46298/dmtcs.9335
Lélia Blin, Laurent Feuilloley, Gabriel Le Bouder
Given a boolean predicate $Pi$ on labeled networks (e.g., proper coloring,leader election, etc.), a self-stabilizing algorithm for $Pi$ is a distributedalgorithm that can start from any initial configuration of the network (i.e.,every node has an arbitrary value assigned to each of its variables), andeventually converge to a configuration satisfying $Pi$. It is known thatleader election does not have a deterministic self-stabilizing algorithm usinga constant-size register at each node, i.e., for some networks, some of theirnodes must have registers whose sizes grow with the size $n$ of the networks.On the other hand, it is also known that leader election can be solved by adeterministic self-stabilizing algorithm using registers of $O(log log n)$bits per node in any $n$-node bounded-degree network. We show that this latterspace complexity is optimal. Specifically, we prove that every deterministicself-stabilizing algorithm solving leader election must use $Omega(log logn)$-bit per node registers in some $n$-node networks. In addition, we show thatour lower bounds go beyond leader election, and apply to all problems thatcannot be solved by anonymous algorithms.
给定标记网络上的布尔谓词$Pi$(例如,适当的着色,领导者选举等),$Pi$的自稳定算法是一个分布式算法,可以从网络的任何初始配置开始(即,每个节点的每个变量都有一个任意值),并最终收敛到满足$Pi$的配置。众所周知,领导者选举不具有确定性的自稳定算法,该算法在每个节点上使用恒定大小的寄存器,即对于某些网络,它们的一些节点必须具有随着网络大小$n$而增长的寄存器。另一方面,我们也知道,在任何$n$节点有界度网络中,领导者选举可以通过使用每个节点$O(log log n)$位寄存器的确定性自稳定算法来解决。我们证明了这种后空间复杂度是最优的。具体地说,我们证明了在某些$n$节点网络中,每个求解领导者选举的确定性自稳定算法必须使用$Omega(log logn)$ -bit / node寄存器。此外,我们证明了我们的下界超越了领导者选举,并适用于所有无法通过匿名算法解决的问题。
{"title":"Optimal Space Lower Bound for Deterministic Self-Stabilizing Leader Election Algorithms","authors":"Lélia Blin, Laurent Feuilloley, Gabriel Le Bouder","doi":"10.46298/dmtcs.9335","DOIUrl":"https://doi.org/10.46298/dmtcs.9335","url":null,"abstract":"Given a boolean predicate $Pi$ on labeled networks (e.g., proper coloring,\u0000leader election, etc.), a self-stabilizing algorithm for $Pi$ is a distributed\u0000algorithm that can start from any initial configuration of the network (i.e.,\u0000every node has an arbitrary value assigned to each of its variables), and\u0000eventually converge to a configuration satisfying $Pi$. It is known that\u0000leader election does not have a deterministic self-stabilizing algorithm using\u0000a constant-size register at each node, i.e., for some networks, some of their\u0000nodes must have registers whose sizes grow with the size $n$ of the networks.\u0000On the other hand, it is also known that leader election can be solved by a\u0000deterministic self-stabilizing algorithm using registers of $O(log log n)$\u0000bits per node in any $n$-node bounded-degree network. We show that this latter\u0000space complexity is optimal. Specifically, we prove that every deterministic\u0000self-stabilizing algorithm solving leader election must use $Omega(log log\u0000n)$-bit per node registers in some $n$-node networks. In addition, we show that\u0000our lower bounds go beyond leader election, and apply to all problems that\u0000cannot be solved by anonymous algorithms.","PeriodicalId":110830,"journal":{"name":"Discret. Math. Theor. Comput. Sci.","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122562327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wiener Index and Remoteness in Triangulations and Quadrangulations Wiener指数与三角形和四边形的距离
Pub Date : 2019-05-16 DOI: 10.46298/dmtcs.6473
É. Czabarka, P. Dankelmann, Trevor Olsen, L. Székely
Let $G$ be a a connected graph. The Wiener index of a connected graph is thesum of the distances between all unordered pairs of vertices. We provideasymptotic formulae for the maximum Wiener index of simple triangulations andquadrangulations with given connectivity, as the order increases, and makeconjectures for the extremal triangulations and quadrangulations based oncomputational evidence. If $overline{sigma}(v)$ denotes the arithmetic meanof the distances from $v$ to all other vertices of $G$, then the remoteness of$G$ is defined as the largest value of $overline{sigma}(v)$ over all vertices$v$ of $G$. We give sharp upper bounds on the remoteness of simpletriangulations and quadrangulations of given order and connectivity.
设$G$为连通图。连通图的维纳指数是所有无序顶点对之间距离的和。我们给出了具有给定连通性的简单三角剖分和四边形随着阶数增加的最大Wiener指数的渐近公式,并基于计算证据对三角剖分和四边形的极值进行了推测。如果$overline{sigma}(v)$表示$v$到$G$的所有其他顶点的距离的算术平均值,则将$G$的距离定义为$overline{sigma}(v)$对$G$的所有顶点$v$的最大值。我们给出了给定阶数和连通性的简单三角剖分和四边形的距离的明显上界。
{"title":"Wiener Index and Remoteness in Triangulations and Quadrangulations","authors":"É. Czabarka, P. Dankelmann, Trevor Olsen, L. Székely","doi":"10.46298/dmtcs.6473","DOIUrl":"https://doi.org/10.46298/dmtcs.6473","url":null,"abstract":"Let $G$ be a a connected graph. The Wiener index of a connected graph is the\u0000sum of the distances between all unordered pairs of vertices. We provide\u0000asymptotic formulae for the maximum Wiener index of simple triangulations and\u0000quadrangulations with given connectivity, as the order increases, and make\u0000conjectures for the extremal triangulations and quadrangulations based on\u0000computational evidence. If $overline{sigma}(v)$ denotes the arithmetic mean\u0000of the distances from $v$ to all other vertices of $G$, then the remoteness of\u0000$G$ is defined as the largest value of $overline{sigma}(v)$ over all vertices\u0000$v$ of $G$. We give sharp upper bounds on the remoteness of simple\u0000triangulations and quadrangulations of given order and connectivity.\u0000","PeriodicalId":110830,"journal":{"name":"Discret. Math. Theor. Comput. Sci.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134113542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Proofs of Conjectures about Pattern-Avoiding Linear Extensions 避免模式线性扩展猜想的证明
Pub Date : 2019-05-07 DOI: 10.23638/DMTCS-21-4-16
Colin Defant
After fixing a canonical ordering (or labeling) of the elements of a finite poset, one can associate each linear extension of the poset with a permutation. Some recent papers consider specific families of posets and ask how many linear extensions give rise to permutations that avoid certain patterns. We build off of two of these papers. We first consider pattern avoidance in $k$-ary heaps, where we obtain a general result that proves a conjecture of Levin, Pudwell, Riehl, and Sandberg in a special case. We then prove some conjectures that Anderson, Egge, Riehl, Ryan, Steinke, and Vaughan made about pattern-avoiding linear extensions of rectangular posets.
在确定有限偏序集元素的规范排序(或标记)之后,可以将偏序集的每个线性扩展与置换联系起来。最近的一些论文考虑了特定的偏序集族,并询问有多少线性扩展产生了避免某些模式的排列。我们以其中两篇论文为基础。我们首先考虑$k$ ary堆中的模式避免,在那里我们得到了一个一般的结果,证明了Levin, Pudwell, Riehl和Sandberg在特殊情况下的一个猜想。然后,我们证明了Anderson, Egge, Riehl, Ryan, Steinke和Vaughan关于矩形偏置集的免模式线性扩展的一些猜想。
{"title":"Proofs of Conjectures about Pattern-Avoiding Linear Extensions","authors":"Colin Defant","doi":"10.23638/DMTCS-21-4-16","DOIUrl":"https://doi.org/10.23638/DMTCS-21-4-16","url":null,"abstract":"After fixing a canonical ordering (or labeling) of the elements of a finite poset, one can associate each linear extension of the poset with a permutation. Some recent papers consider specific families of posets and ask how many linear extensions give rise to permutations that avoid certain patterns. We build off of two of these papers. We first consider pattern avoidance in $k$-ary heaps, where we obtain a general result that proves a conjecture of Levin, Pudwell, Riehl, and Sandberg in a special case. We then prove some conjectures that Anderson, Egge, Riehl, Ryan, Steinke, and Vaughan made about pattern-avoiding linear extensions of rectangular posets.","PeriodicalId":110830,"journal":{"name":"Discret. Math. Theor. Comput. Sci.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130702697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The LexCycle on $overline{P_{2}cup P_{3}}$-free Cocomparability Graphs LexCycle上的$overline{P_{2}cup P_{3}}$ -free Cocomparability图
Pub Date : 2019-04-17 DOI: 10.23638/DMTCS-22-4-13
Xiaolu Gao, Shoujun Xu
A graph $G$ is a cocomparability graph if there exists an acyclic transitive orientation of the edges of its complement graph $overline{G}$. LBFS$^{+}$ is a graph variant of the generic LBFS, which uses a specific tie-breaking mechanism. Starting with some ordering $sigma_{0}$ of $G$, let ${sigma_{i}}_{igeq 1}$ be the sequence of orderings such that $sigma_{i}=$LBFS$^{+}(G, sigma_{i-1})$. The LexCycle($G$) is defined as the maximum length of a cycle of vertex orderings of $G$ obtained via such a sequence of LBFS$^{+}$ sweeps. Dusart and Habib [Discrete Appl. Math., 216 (2017), pp. 149-161] conjectured that LexCycle($G$)=2 if $G$ is a cocomparability graph and proved it holds for interval graphs. In this paper, we show that LexCycle($G$)=2 if $G$ is a $overline{P_{2}cup P_{3}}$-free cocomparability graph, where a $overline{P_{2}cup P_{3}}$ is the graph whose complement is the disjoint union of $P_{2}$ and $P_{3}$. As corollaries, it's applicable for diamond-free cocomparability graphs, cocomparability graphs with girth at least 4, as well as interval graphs.
如果补图$overline{G}$的边存在无环传递方向,则该图$G$为共比较图。LBFS $^{+}$是通用LBFS的图形变体,它使用特定的tie-breaking机制。从$G$的一些排序$sigma_{0}$开始,设${sigma_{i}}_{igeq 1}$为排序序列,以便$sigma_{i}=$ LBFS $^{+}(G, sigma_{i-1})$。LexCycle($G$)定义为通过这样的LBFS $^{+}$扫描序列获得的$G$顶点排序的循环的最大长度。杜萨特和哈比卜[离散苹果]。数学。[j], 216 (2017), pp. 149-161]推测如果$G$是共可比性图,则LexCycle($G$)=2,并证明它适用于区间图。在本文中,我们证明了如果$G$是一个无$overline{P_{2}cup P_{3}}$的共比较图,那么LexCycle($G$)=2,其中$overline{P_{2}cup P_{3}}$是其补是$P_{2}$和$P_{3}$的不相交并的图。作为推论,它适用于无金刚石共比较图、周长至少为4的共比较图以及区间图。
{"title":"The LexCycle on $overline{P_{2}cup P_{3}}$-free Cocomparability Graphs","authors":"Xiaolu Gao, Shoujun Xu","doi":"10.23638/DMTCS-22-4-13","DOIUrl":"https://doi.org/10.23638/DMTCS-22-4-13","url":null,"abstract":"A graph $G$ is a cocomparability graph if there exists an acyclic transitive orientation of the edges of its complement graph $overline{G}$. LBFS$^{+}$ is a graph variant of the generic LBFS, which uses a specific tie-breaking mechanism. Starting with some ordering $sigma_{0}$ of $G$, let ${sigma_{i}}_{igeq 1}$ be the sequence of orderings such that $sigma_{i}=$LBFS$^{+}(G, sigma_{i-1})$. The LexCycle($G$) is defined as the maximum length of a cycle of vertex orderings of $G$ obtained via such a sequence of LBFS$^{+}$ sweeps. Dusart and Habib [Discrete Appl. Math., 216 (2017), pp. 149-161] conjectured that LexCycle($G$)=2 if $G$ is a cocomparability graph and proved it holds for interval graphs. In this paper, we show that LexCycle($G$)=2 if $G$ is a $overline{P_{2}cup P_{3}}$-free cocomparability graph, where a $overline{P_{2}cup P_{3}}$ is the graph whose complement is the disjoint union of $P_{2}$ and $P_{3}$. As corollaries, it's applicable for diamond-free cocomparability graphs, cocomparability graphs with girth at least 4, as well as interval graphs.","PeriodicalId":110830,"journal":{"name":"Discret. Math. Theor. Comput. Sci.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134533291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Binary patterns in the Prouhet-Thue-Morse sequence prouet - thue - morse序列中的二进制模式
Pub Date : 2019-04-15 DOI: 10.46298/dmtcs.5460
J. Almeida, Ondvrej Kl'ima
We show that, with the exception of the words $a^2ba^2$ and $b^2ab^2$, all(finite or infinite) binary patterns in the Prouhet-Thue-Morse sequence canactually be found in that sequence as segments (up to exchange of letters inthe infinite case). This result was previously attributed to unpublished workby D. Guaiana and may also be derived from publications of A. Shur onlyavailable in Russian. We also identify the (finitely many) finite binarypatterns that appear non trivially, in the sense that they are obtained byapplying an endomorphism that does not map the set of all segments of thesequence into itself.
我们表明,除了单词$a^2ba^2$和$b^2ab^2$外,prouet - thue - morse序列中的所有(有限或无限)二进制模式实际上都可以在该序列中作为片段找到(直到在无限情况下交换字母)。这一结果先前归因于D. Guaiana未发表的作品,也可能来自A. Shur的出版物,仅在俄语中可用。我们还确定了(有限多)有限的二元模式,这些模式出现在非平凡的意义上,它们是通过应用一个不将序列的所有片段的集合映射到自身的自同态而获得的。
{"title":"Binary patterns in the Prouhet-Thue-Morse sequence","authors":"J. Almeida, Ondvrej Kl'ima","doi":"10.46298/dmtcs.5460","DOIUrl":"https://doi.org/10.46298/dmtcs.5460","url":null,"abstract":"We show that, with the exception of the words $a^2ba^2$ and $b^2ab^2$, all\u0000(finite or infinite) binary patterns in the Prouhet-Thue-Morse sequence can\u0000actually be found in that sequence as segments (up to exchange of letters in\u0000the infinite case). This result was previously attributed to unpublished work\u0000by D. Guaiana and may also be derived from publications of A. Shur only\u0000available in Russian. We also identify the (finitely many) finite binary\u0000patterns that appear non trivially, in the sense that they are obtained by\u0000applying an endomorphism that does not map the set of all segments of the\u0000sequence into itself.","PeriodicalId":110830,"journal":{"name":"Discret. Math. Theor. Comput. Sci.","volume":"100 5 Pt 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131402105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prolific Compositions 多产的作品
Pub Date : 2019-04-11 DOI: 10.23638/DMTCS-21-2-10
Murray Tannock, M. Albert
Under what circumstances might every extension of a combinatorial structure contain more copies of another one than the original did? This property, which we call prolificity, holds universally in some cases (e.g., finite linear orders) and only trivially in others (e.g., permutations). Integer compositions, or equivalently layered permutations, provide a middle ground. In that setting, there are prolific compositions for a given pattern if and only if that pattern begins and ends with 1. For each pattern, there is an easily constructed automaton that recognises prolific compositions for that pattern. Some instances where there is a unique minimal prolific composition for a pattern are classified.
在什么情况下,组合结构的每一个扩展可能包含比原始结构更多的另一个副本?这个性质,我们称之为增殖性,在某些情况下(例如,有限线性顺序)普遍成立,而在其他情况下(例如,排列)则不那么重要。整数组合,或同等的分层排列,提供了一个中间地带。在这种情况下,对于给定的模式,当且仅当该模式以1开始和结束时,就会有大量的组合。对于每个模式,都有一个容易构造的自动机来识别该模式的大量组合。在某些情况下,对一个模式有唯一的最小多产组合进行分类。
{"title":"Prolific Compositions","authors":"Murray Tannock, M. Albert","doi":"10.23638/DMTCS-21-2-10","DOIUrl":"https://doi.org/10.23638/DMTCS-21-2-10","url":null,"abstract":"Under what circumstances might every extension of a combinatorial structure contain more copies of another one than the original did? This property, which we call prolificity, holds universally in some cases (e.g., finite linear orders) and only trivially in others (e.g., permutations). Integer compositions, or equivalently layered permutations, provide a middle ground. In that setting, there are prolific compositions for a given pattern if and only if that pattern begins and ends with 1. For each pattern, there is an easily constructed automaton that recognises prolific compositions for that pattern. Some instances where there is a unique minimal prolific composition for a pattern are classified.","PeriodicalId":110830,"journal":{"name":"Discret. Math. Theor. Comput. Sci.","volume":"513 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116379437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enumeration of Stack-Sorting Preimages via a Decomposition Lemma 基于分解引理的堆栈排序预象枚举
Pub Date : 2019-04-04 DOI: 10.46298/dmtcs.6709
Colin Defant
We give three applications of a recently-proven ``Decomposition Lemma," which allows one to count preimages of certain sets of permutations under West's stack-sorting map $s$. We first enumerate the permutation class $s^{-1}(text{Av}(231,321))=text{Av}(2341,3241,45231)$, finding a new example of an unbalanced Wilf equivalence. This result is equivalent to the enumeration of permutations sortable by ${bf B}circ s$, where ${bf B}$ is the bubble sort map. We then prove that the sets $s^{-1}(text{Av}(231,312))$, $s^{-1}(text{Av}(132,231))=text{Av}(2341,1342,underline{32}41,underline{31}42)$, and $s^{-1}(text{Av}(132,312))=text{Av}(1342,3142,3412,34underline{21})$ are counted by the so-called ``Boolean-Catalan numbers," settling a conjecture of the current author and another conjecture of Hossain. This completes the enumerations of all sets of the form $s^{-1}(text{Av}(tau^{(1)},ldots,tau^{(r)}))$ for ${tau^{(1)},ldots,tau^{(r)}}subseteq S_3$ with the exception of the set ${321}$. We also find an explicit formula for $|s^{-1}(text{Av}_{n,k}(231,312,321))|$, where $text{Av}_{n,k}(231,312,321)$ is the set of permutations in $text{Av}_n(231,312,321)$ with $k$ descents. This allows us to prove a conjectured identity involving Catalan numbers and order ideals in Young's lattice.
我们给出了最近证明的“分解引理”的三个应用,它允许人们在West的堆栈排序映射$s$下计算某些排列集合的预像。我们首先枚举排列类$s^{-1}(text{Av}(231,321))=text{Av}(2341,3241,45231)$,找到一个不平衡Wilf等价的新例子。该结果相当于可通过${bf B}circ s$排序的排列枚举,其中${bf B}$是冒泡排序映射。然后我们证明集合$s^{-1}(text{Av}(231,312))$, $s^{-1}(text{Av}(132,231))=text{Av}(2341,1342,underline{32}41,underline{31}42)$和$s^{-1}(text{Av}(132,312))=text{Av}(1342,3142,3412,34underline{21})$是由所谓的“布尔-加泰罗尼亚数”来计数的,解决了当前作者的一个猜想和Hossain的另一个猜想。这样就完成了对${tau^{(1)},ldots,tau^{(r)}}subseteq S_3$的表单$s^{-1}(text{Av}(tau^{(1)},ldots,tau^{(r)}))$的所有集合的枚举,除了集合${321}$。我们还找到了$|s^{-1}(text{Av}_{n,k}(231,312,321))|$的显式公式,其中$text{Av}_{n,k}(231,312,321)$是$text{Av}_n(231,312,321)$中具有$k$下降的排列集合。这使我们能够证明一个包含加泰罗尼亚数和杨格中的序理想的猜想恒等式。
{"title":"Enumeration of Stack-Sorting Preimages via a Decomposition Lemma","authors":"Colin Defant","doi":"10.46298/dmtcs.6709","DOIUrl":"https://doi.org/10.46298/dmtcs.6709","url":null,"abstract":"We give three applications of a recently-proven ``Decomposition Lemma,\" which allows one to count preimages of certain sets of permutations under West's stack-sorting map $s$. We first enumerate the permutation class $s^{-1}(text{Av}(231,321))=text{Av}(2341,3241,45231)$, finding a new example of an unbalanced Wilf equivalence. This result is equivalent to the enumeration of permutations sortable by ${bf B}circ s$, where ${bf B}$ is the bubble sort map. We then prove that the sets $s^{-1}(text{Av}(231,312))$, $s^{-1}(text{Av}(132,231))=text{Av}(2341,1342,underline{32}41,underline{31}42)$, and $s^{-1}(text{Av}(132,312))=text{Av}(1342,3142,3412,34underline{21})$ are counted by the so-called ``Boolean-Catalan numbers,\" settling a conjecture of the current author and another conjecture of Hossain. This completes the enumerations of all sets of the form $s^{-1}(text{Av}(tau^{(1)},ldots,tau^{(r)}))$ for ${tau^{(1)},ldots,tau^{(r)}}subseteq S_3$ with the exception of the set ${321}$. We also find an explicit formula for $|s^{-1}(text{Av}_{n,k}(231,312,321))|$, where $text{Av}_{n,k}(231,312,321)$ is the set of permutations in $text{Av}_n(231,312,321)$ with $k$ descents. This allows us to prove a conjectured identity involving Catalan numbers and order ideals in Young's lattice.","PeriodicalId":110830,"journal":{"name":"Discret. Math. Theor. Comput. Sci.","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127252903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A code for square permutations and convex permutominoes 正方形排列和凸置换的代码
Pub Date : 2019-04-04 DOI: 10.23638/DMTCS-21-2-2
E. Duchi
In this article we consider square permutations, a natural subclass of permutations defined in terms of geometric conditions, that can also be described in terms of pattern avoiding permutations, and convex permutoninoes, a related subclass of polyominoes. While these two classes of objects arised independently in various contexts, they play a natural role in the description of certain random horizontally and vertically convex grid configurations. We propose a common approach to the enumeration of these two classes of objets that allows us to explain the known common form of their generating functions, and to derive new refined formulas and linear time random generation algorithms for these objects and the associated grid configurations.
在本文中,我们将考虑平方置换和凸置换,这是根据几何条件定义的置换的自然子类,也可以用避免模式置换来描述。凸置换是多多项式的相关子类。虽然这两类对象在不同的环境中独立出现,但它们在描述某些随机的水平和垂直凸网格配置中发挥着自然的作用。我们提出了一种常见的方法来枚举这两类对象,使我们能够解释其生成函数的已知常见形式,并为这些对象和相关的网格配置导出新的精炼公式和线性时间随机生成算法。
{"title":"A code for square permutations and convex permutominoes","authors":"E. Duchi","doi":"10.23638/DMTCS-21-2-2","DOIUrl":"https://doi.org/10.23638/DMTCS-21-2-2","url":null,"abstract":"In this article we consider square permutations, a natural subclass of permutations defined in terms of geometric conditions, that can also be described in terms of pattern avoiding permutations, and convex permutoninoes, a related subclass of polyominoes. While these two classes of objects arised independently in various contexts, they play a natural role in the description of certain random horizontally and vertically convex grid configurations. \u0000We propose a common approach to the enumeration of these two classes of objets that allows us to explain the known common form of their generating functions, and to derive new refined formulas and linear time random generation algorithms for these objects and the associated grid configurations.","PeriodicalId":110830,"journal":{"name":"Discret. Math. Theor. Comput. Sci.","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127361064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Discret. Math. Theor. Comput. Sci.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1