首页 > 最新文献

Workshop on Analytic Algorithmics and Combinatorics最新文献

英文 中文
A bijection for plane graphs and its applications 平面图形的投影及其应用
Pub Date : 2014-01-06 DOI: 10.1137/1.9781611973204.5
O. Bernardi, Gwendal Collet, Éric Fusy
This paper is concerned with the counting and random sampling of plane graphs (simple planar graphs embedded in the plane). Our main result is a bijection between the class of plane graphs with triangular outer face, and a class of oriented binary trees. The number of edges and vertices of the plane graph can be tracked through the bijection. Consequently, we obtain counting formulas and an Efficient random sampling algorithm for rooted plane graphs (with arbitrary outer face) according to the number of edges and vertices. We also obtain a bijective link, via a bijection of Bona, between rooted plane graphs and 1342-avoiding permutations.
本文研究了平面图(嵌入在平面中的简单平面图)的计数和随机抽样问题。我们的主要结果是一类具有三角形外表面的平面图和一类有向二叉树之间的双射。通过双射可以跟踪平面图的边和顶点的数量。因此,我们根据边和顶点的数量,得到了有根平面图(具有任意外表面)的计数公式和有效的随机抽样算法。通过Bona的双射,我们也得到了根平面图和1342-避免置换之间的双射连接。
{"title":"A bijection for plane graphs and its applications","authors":"O. Bernardi, Gwendal Collet, Éric Fusy","doi":"10.1137/1.9781611973204.5","DOIUrl":"https://doi.org/10.1137/1.9781611973204.5","url":null,"abstract":"This paper is concerned with the counting and random sampling of plane graphs (simple planar graphs embedded in the plane). Our main result is a bijection between the class of plane graphs with triangular outer face, and a class of oriented binary trees. The number of edges and vertices of the plane graph can be tracked through the bijection. Consequently, we obtain counting formulas and an Efficient random sampling algorithm for rooted plane graphs (with arbitrary outer face) according to the number of edges and vertices. We also obtain a bijective link, via a bijection of Bona, between rooted plane graphs and 1342-avoiding permutations.","PeriodicalId":340112,"journal":{"name":"Workshop on Analytic Algorithmics and Combinatorics","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128831096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the asymptotic number of BCK(2)-terms 关于BCK(2)-项的渐近数
Pub Date : 2014-01-06 DOI: 10.1137/1.9781611973204.3
O. Bodini, Bernhard Gittenberger
We investigate the asymptotic number of a particular class of closed lambda-terms. This class is a generalization of a class of terms related to the axiom system BCK which is well known in combinatory logic. We determine the asymptotic number of terms, when their size tends to infinity, up to a constant multiplicative factor and discover a surprising asymptotic behaviour involving an exponential with fractional powers in the exponent.
我们研究了一类特定闭λ项的渐近数。这类是对在组合逻辑中众所周知的公理系统BCK相关的一类项的推广。我们确定了项的渐近数目,当它们的大小趋于无穷大时,直到一个常数乘因子,并发现了一个令人惊讶的渐近行为,涉及指数中的分数次方指数。
{"title":"On the asymptotic number of BCK(2)-terms","authors":"O. Bodini, Bernhard Gittenberger","doi":"10.1137/1.9781611973204.3","DOIUrl":"https://doi.org/10.1137/1.9781611973204.3","url":null,"abstract":"We investigate the asymptotic number of a particular class of closed lambda-terms. This class is a generalization of a class of terms related to the axiom system BCK which is well known in combinatory logic. We determine the asymptotic number of terms, when their size tends to infinity, up to a constant multiplicative factor and discover a surprising asymptotic behaviour involving an exponential with fractional powers in the exponent.","PeriodicalId":340112,"journal":{"name":"Workshop on Analytic Algorithmics and Combinatorics","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133305352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Clump Combinatorics, Automata, and Word Asymptotics 聚类组合、自动机和词渐近
Pub Date : 2014-01-06 DOI: 10.1137/1.9781611973204.6
M. Régnier, Billy Fang, Daria Iakovishina
Given a set of words and a probability model for random texts, we are interested in the behavior of occurrences of the words in a random text. Clumps are shown here to play a central role in these problems. They can be used to calculate relevant quantities, such as the probability that a random text contains a given number of pattern word occurrences. We provide combinatorial properties that greatly simplify the classical enumeration of these texts by inclusion-exclusion approaches. We describe two clump automata that can be used to efficiently calculate generating functions.
给定一组单词和随机文本的概率模型,我们对单词在随机文本中出现的行为感兴趣。这里显示团块在这些问题中起着核心作用。它们可用于计算相关数量,例如随机文本包含给定数量的模式单词出现的概率。我们提供了组合属性,通过包含-排除方法大大简化了这些文本的经典枚举。我们描述了两个可以用来有效地计算生成函数的簇自动机。
{"title":"Clump Combinatorics, Automata, and Word Asymptotics","authors":"M. Régnier, Billy Fang, Daria Iakovishina","doi":"10.1137/1.9781611973204.6","DOIUrl":"https://doi.org/10.1137/1.9781611973204.6","url":null,"abstract":"Given a set of words and a probability model for random texts, we are interested in the behavior of occurrences of the words in a random text. Clumps are shown here to play a central role in these problems. They can be used to calculate relevant quantities, such as the probability that a random text contains a given number of pattern word occurrences. We provide combinatorial properties that greatly simplify the classical enumeration of these texts by inclusion-exclusion approaches. We describe two clump automata that can be used to efficiently calculate generating functions.","PeriodicalId":340112,"journal":{"name":"Workshop on Analytic Algorithmics and Combinatorics","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126874777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Expected External Profile of PATRICIA Tries PATRICIA Tries的预期外部形象
Pub Date : 2014-01-06 DOI: 10.1137/1.9781611973204.2
A. Magner, C. Knessl, W. Szpankowski
We consider PATRICIA tries on n random binary strings generated by a memoryless source with parameter p ≥ 1/2. For both the symmetric (p = 1/2) and asymmetric cases, we analyze asymptotics of the expected value of the external profile at level k = k(n), defined to be the number of leaves at level k. We study three natural ranges of k with respect to n. For k bounded, the mean profile decays exponentially with respect to n. For k growing logarithmically with n, the parameter exhibits polynomial growth in n, with some periodic fluctuations. Finally, for k = Θ(n), we see super-exponential decay, again with periodic fluctuations. Our derivations rely on analytic techniques, including Mellin transforms, analytic depoissonization, and the saddle point method. To cover wider ranges of k and n and provide more intuitive insights, we also use methods of applied mathematics, including asymptotic matching and linearization.
我们考虑在参数p≥1/2的无记忆源生成的n个随机二进制字符串上进行PATRICIA尝试。对于对称(p = 1/2)和非对称情况,我们分析了k = k(n)层外部轮廓期望值的渐近性,定义为k层叶子的数量。我们研究了k相对于n的三个自然范围。对于k有界,平均轮廓相对于n呈指数衰减。对于k随n呈对数增长,参数在n中呈现多项式增长,并具有一些周期性波动。最后,对于k = Θ(n),我们看到了超级指数衰减,同样伴随着周期性波动。我们的推导依赖于解析技术,包括梅林变换、解析解泊松化和鞍点法。为了涵盖更广泛的k和n范围并提供更直观的见解,我们还使用了应用数学方法,包括渐近匹配和线性化。
{"title":"Expected External Profile of PATRICIA Tries","authors":"A. Magner, C. Knessl, W. Szpankowski","doi":"10.1137/1.9781611973204.2","DOIUrl":"https://doi.org/10.1137/1.9781611973204.2","url":null,"abstract":"We consider PATRICIA tries on n random binary strings generated by a memoryless source with parameter p ≥ 1/2. For both the symmetric (p = 1/2) and asymmetric cases, we analyze asymptotics of the expected value of the external profile at level k = k(n), defined to be the number of leaves at level k. We study three natural ranges of k with respect to n. For k bounded, the mean profile decays exponentially with respect to n. For k growing logarithmically with n, the parameter exhibits polynomial growth in n, with some periodic fluctuations. Finally, for k = Θ(n), we see super-exponential decay, again with periodic fluctuations. Our derivations rely on analytic techniques, including Mellin transforms, analytic depoissonization, and the saddle point method. To cover wider ranges of k and n and provide more intuitive insights, we also use methods of applied mathematics, including asymptotic matching and linearization.","PeriodicalId":340112,"journal":{"name":"Workshop on Analytic Algorithmics and Combinatorics","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115733057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Tight Analysis of Randomized Rumor Spreading in Complete Graphs 完全图中随机谣言传播的严密分析
Pub Date : 2014-01-06 DOI: 10.1137/1.9781611973204.8
Benjamin Doerr, Marvin Künnemann
We present a tight analysis of the basic randomized rumor spreading process in complete graphs introduced by Frieze and Grimmett (1985), where in each round of the process each node knowing the rumor gossips the rumor to a node chosen uniformly at random. The process starts with a single node knowing the rumor. We show that the number Sn of rounds required to spread a rumor in a complete graph with n nodes is very closely described by log2 n plus (1/n) times the completion time of the coupon collector process. This in particular gives very precise bounds for the expected runtime of the process, namely ⌊log2 n⌋ + ln n − 1:116 ≤ E[Sn] ≤ ⌈log2 n⌉ + ln n + 2:765 + o(1).
我们对Frieze和Grimmett(1985)引入的完全图中的基本随机谣言传播过程进行了严密的分析,其中在每一轮过程中,每个知道谣言的节点将谣言传播给随机选择的一致节点。这个过程从一个知道谣言的节点开始。我们证明了在有n个节点的完全图中传播谣言所需的Sn轮数非常接近地描述为log2n加上(1/n)乘以优惠券收集过程的完成时间。尤其是这使非常精确的界限的预期运行时过程,即⌊log2 n⌋+ ln−1:116≤E (Sn)≤⌈log2 n⌉+ ln n + 2:765 + o(1)。
{"title":"Tight Analysis of Randomized Rumor Spreading in Complete Graphs","authors":"Benjamin Doerr, Marvin Künnemann","doi":"10.1137/1.9781611973204.8","DOIUrl":"https://doi.org/10.1137/1.9781611973204.8","url":null,"abstract":"We present a tight analysis of the basic randomized rumor spreading process in complete graphs introduced by Frieze and Grimmett (1985), where in each round of the process each node knowing the rumor gossips the rumor to a node chosen uniformly at random. The process starts with a single node knowing the rumor. \u0000 \u0000We show that the number Sn of rounds required to spread a rumor in a complete graph with n nodes is very closely described by log2 n plus (1/n) times the completion time of the coupon collector process. This in particular gives very precise bounds for the expected runtime of the process, namely ⌊log2 n⌋ + ln n − 1:116 ≤ E[Sn] ≤ ⌈log2 n⌉ + ln n + 2:765 + o(1).","PeriodicalId":340112,"journal":{"name":"Workshop on Analytic Algorithmics and Combinatorics","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116207840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Permuted Random Walk Exits Typically in Linear Time 排列随机漫步通常在线性时间内退出
Pub Date : 2014-01-06 DOI: 10.1137/1.9781611973204.7
S. Ganguly, Y. Peres
Given a permutation σ of the integers {−n, −n + 1,...,n} we consider the Markov chain Xσ, which jumps from k to σ(k ± 1) equally likely if k ≠ −n,n. We prove that the expected hitting time of {−n,n} starting from any point is Θ(n) with high probability when σ is a uniformly chosen permutation. We prove this by showing that with high probability, the digraph of allowed transitions is an Eulerian expander; we then utilize general estimates of hitting times in directed Eulerian expanders.
给定整数{−n,−n + 1,…,n}我们考虑马尔可夫链Xσ,当k≠- n,n时,它从k跃迁到σ(k±1)等可能。证明了当σ为一致选择的排列时,{−n,n}从任意点出发的期望命中时间为Θ(n),且概率高。我们证明了在高概率下,允许跃迁的有向图是一个欧拉展开式;然后我们利用有向欧拉展开中命中时间的一般估计。
{"title":"Permuted Random Walk Exits Typically in Linear Time","authors":"S. Ganguly, Y. Peres","doi":"10.1137/1.9781611973204.7","DOIUrl":"https://doi.org/10.1137/1.9781611973204.7","url":null,"abstract":"Given a permutation σ of the integers {−n, −n + 1,...,n} we consider the Markov chain Xσ, which jumps from k to σ(k ± 1) equally likely if k ≠ −n,n. We prove that the expected hitting time of {−n,n} starting from any point is Θ(n) with high probability when σ is a uniformly chosen permutation. We prove this by showing that with high probability, the digraph of allowed transitions is an Eulerian expander; we then utilize general estimates of hitting times in directed Eulerian expanders.","PeriodicalId":340112,"journal":{"name":"Workshop on Analytic Algorithmics and Combinatorics","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126279424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On The Average-Case Complexity of the Bottleneck Tower of Hanoi Problem 河内问题瓶颈塔的平均情形复杂度研究
Pub Date : 2014-01-06 DOI: 10.1137/1.9781611973204.10
Noam Solomon, Shay Solomon
The Bottleneck Tower of Hanoi (BTH) problem, posed in 1981 by Wood, is a natural generalization of the classic Tower of Hanoi (TH) problem. There, a generalized placement rule allows a larger disk to be placed higher than a smaller one if their size difference is less than a given parameter k ≥ 1; when k = 1 we arrive at the classic TH problem. The objective is to compute a shortest move-sequence transferring a legal (under the above rule) configuration of n disks on three pegs to another legal configuration. In SOFSEM'07, Dinitz and the second author established tight asymptotic bounds for the worst-case complexity of the BTH problem, for all n and k. Moreover, they proved that the average-case complexity is asymptotically the same as the worst-case complexity, for all n > 3k and n ≤ k, and conjectured that the same phenomenon also occurs in the complementary range k < n ≤ 3k. In this paper we settle the conjecture of Dinitz and Solomon from SOFSEM'07 in the affirmative, and show that the average-case complexity of the BTH problem is asymptotically the same as the worst-case complexity, for all n and k. To this end we provide a new proof that applies to all values of n > k. That is, our proof is not a patch over the previous proof of Dinitz and Solomon that is tailored only for the regime k < n ≤ 3k, but is rather a stronger proof that is based on different principles and deeper ideas. We also show that there are natural connections between the BTH problem, the problem of sorting with complete networks of stacks using a forklift [Albert and Atkinson 2002, Konig and Lubbecke 2008] and the well-studied pancake problem [Gates and Papadimitriou 1979].
Wood在1981年提出的河内瓶颈塔(BTH)问题是经典河内塔(TH)问题的自然推广。在这里,一个广义的放置规则允许较大的磁盘被放置在比较小的磁盘更高的位置,如果它们的大小差小于给定参数k≥1;当k = 1时,我们就得到了经典的TH问题。目标是计算一个最短的移动序列,将一个合法的(在上述规则下的)3个节点上的n个磁盘配置转移到另一个合法的配置。在SOFSEM'07中,Dinitz和第二作者建立了所有n和k的BTH问题的最坏情况复杂度的紧密渐近界,并证明了所有n > 3k和n≤k的平均情况复杂度与最坏情况复杂度渐近相同,并推测在k < n≤3k的互补范围内也会出现同样的现象。在本文中,我们解决Dinitz和所罗门的猜想SOFSEM ' 07肯定的,表明蓝芽的平均情况复杂性问题是渐近一样坏的复杂性,n和k。为此我们提供一个新的证明适用于所有的值n > k。也就是说,我们的证明不是一块过去的证明Dinitz所罗门只定制的政权k < n≤3 k,而是基于不同原则和更深层次思想的更有力的证明。我们还表明,在BTH问题、使用铲车对完整的栈网络进行排序的问题(Albert and Atkinson 2002, Konig and Lubbecke 2008)和得到充分研究的煎饼问题(Gates and Papadimitriou 1979)之间存在自然联系。
{"title":"On The Average-Case Complexity of the Bottleneck Tower of Hanoi Problem","authors":"Noam Solomon, Shay Solomon","doi":"10.1137/1.9781611973204.10","DOIUrl":"https://doi.org/10.1137/1.9781611973204.10","url":null,"abstract":"The Bottleneck Tower of Hanoi (BTH) problem, posed in 1981 by Wood, is a natural generalization of the classic Tower of Hanoi (TH) problem. There, a generalized placement rule allows a larger disk to be placed higher than a smaller one if their size difference is less than a given parameter k ≥ 1; when k = 1 we arrive at the classic TH problem. The objective is to compute a shortest move-sequence transferring a legal (under the above rule) configuration of n disks on three pegs to another legal configuration. In SOFSEM'07, Dinitz and the second author established tight asymptotic bounds for the worst-case complexity of the BTH problem, for all n and k. Moreover, they proved that the average-case complexity is asymptotically the same as the worst-case complexity, for all n > 3k and n ≤ k, and conjectured that the same phenomenon also occurs in the complementary range k < n ≤ 3k. In this paper we settle the conjecture of Dinitz and Solomon from SOFSEM'07 in the affirmative, and show that the average-case complexity of the BTH problem is asymptotically the same as the worst-case complexity, for all n and k. To this end we provide a new proof that applies to all values of n > k. That is, our proof is not a patch over the previous proof of Dinitz and Solomon that is tailored only for the regime k < n ≤ 3k, but is rather a stronger proof that is based on different principles and deeper ideas. We also show that there are natural connections between the BTH problem, the problem of sorting with complete networks of stacks using a forklift [Albert and Atkinson 2002, Konig and Lubbecke 2008] and the well-studied pancake problem [Gates and Papadimitriou 1979].","PeriodicalId":340112,"journal":{"name":"Workshop on Analytic Algorithmics and Combinatorics","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114367784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Typical Depth of a Digital Search Tree built on a general source 建立在通用源上的数字搜索树的典型深度
Pub Date : 2014-01-06 DOI: 10.1137/1.9781611973204.1
Kanal Hun, B. Vallée
The digital search tree (dst) plays a central role in compression algorithms, of Lempel-Ziv type. This important structure can be viewed as a mixing of a digital structure (the trie) with a binary search tree. Its probabilistic analysis is thus involved, even in the case when the text is produced by a simple source (a memoryless source, or a Markov chain). After the seminal paper of Flajolet and Sedgewick (1986) [11] which deals with the memoryless unbiased case, many papers, due to Drmota, Jacquet, Louchard, Prodinger, Szpankowski, Tang, published between 1990 and 2005, dealt with general memoryless sources or Markov chains, and performed the analysis of the main parameters of dst's--namely, internal path length, profile, typical depth-- (see for instance [7, 15, 14]). Here, we are interested in a more realistic analysis, when the words are emitted by a general source, where the emission of symbols may depend on the whole previous history. There exist previous analyses of text algorithms or digital structures that have been performed for general sources, for instance for tries ([3, 2]), or for basic sorting and searching algorithms ([22, 4]). However, the case of digital search trees has not yet been considered, and this is the main subject of the paper. The idea of this study is due to Philippe Flajolet and the first steps of the work were performed with him, during the end of 2010. This paper is dedicated to Philippe's memory.
数字搜索树(dst)在Lempel-Ziv型压缩算法中起着核心作用。这个重要的结构可以看作是数字结构(树)和二叉搜索树的混合。因此,即使在文本由简单源(无记忆源或马尔可夫链)产生的情况下,也涉及到它的概率分析。在Flajolet和Sedgewick(1986)的开创性论文[11]处理无记忆无偏情况之后,由于Drmota, Jacquet, Louchard, Prodinger, Szpankowski, Tang在1990年至2005年间发表了许多论文,处理了一般的无记忆源或马尔可夫链,并对dst的主要参数进行了分析-即内部路径长度,轮廓,典型深度-(参见例如[7,15,14])。这里,我们感兴趣的是一种更现实的分析,当单词由一般来源发出时,其中符号的发出可能取决于整个以前的历史。之前已经有针对一般来源的文本算法或数字结构的分析,例如针对try([3,2])或针对基本排序和搜索算法([22,4])的分析。然而,数字搜索树的情况还没有被考虑,这是本文的主要主题。这项研究的想法是由于Philippe Flajolet和工作的第一步是在2010年底与他一起进行的。这篇文章是为了纪念菲利普。
{"title":"Typical Depth of a Digital Search Tree built on a general source","authors":"Kanal Hun, B. Vallée","doi":"10.1137/1.9781611973204.1","DOIUrl":"https://doi.org/10.1137/1.9781611973204.1","url":null,"abstract":"The digital search tree (dst) plays a central role in compression algorithms, of Lempel-Ziv type. This important structure can be viewed as a mixing of a digital structure (the trie) with a binary search tree. Its probabilistic analysis is thus involved, even in the case when the text is produced by a simple source (a memoryless source, or a Markov chain). After the seminal paper of Flajolet and Sedgewick (1986) [11] which deals with the memoryless unbiased case, many papers, due to Drmota, Jacquet, Louchard, Prodinger, Szpankowski, Tang, published between 1990 and 2005, dealt with general memoryless sources or Markov chains, and performed the analysis of the main parameters of dst's--namely, internal path length, profile, typical depth-- (see for instance [7, 15, 14]). Here, we are interested in a more realistic analysis, when the words are emitted by a general source, where the emission of symbols may depend on the whole previous history. There exist previous analyses of text algorithms or digital structures that have been performed for general sources, for instance for tries ([3, 2]), or for basic sorting and searching algorithms ([22, 4]). However, the case of digital search trees has not yet been considered, and this is the main subject of the paper. The idea of this study is due to Philippe Flajolet and the first steps of the work were performed with him, during the end of 2010. This paper is dedicated to Philippe's memory.","PeriodicalId":340112,"journal":{"name":"Workshop on Analytic Algorithmics and Combinatorics","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128906712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Survivors in Leader Election Algorithms 领袖选举算法中的幸存者
Pub Date : 2013-12-01 DOI: 10.1137/1.9781611973204.11
Ravi Kalpathy, H. Mahmoud, W. Rosenkrantz
We consider the number of survivors in a broad class of fair leader election algorithms after a number of election rounds. We give sufficient conditions for the number of survivors to converge to a product of independent identically distributed random variables. The number of terms in the product is determined by the round number considered. Each individual term in the product is a limit of a scaled random variable associated with the splitting protocol. The proof is established via convergence (to 0) of the first-order Wasserstein distance from the product limit. In a broader context, the paper is a case study of a class of stochastic recursive equations. We give two illustrative examples, one with binomial splitting protocol (for which we show that a normalized version is asymptotically Gaussian) and one with uniform splitting protocol.
我们考虑在一系列选举轮之后,在广泛的公平领导人选举算法中幸存的人数。给出了幸存者数量收敛于独立同分布随机变量的乘积的充分条件。产品中的项数由所考虑的整数决定。乘积中的每个单独项都是与拆分协议相关的缩放随机变量的极限。证明是通过从乘积极限的一阶Wasserstein距离的收敛(到0)建立的。在更广泛的背景下,本文是一类随机递归方程的案例研究。我们给出了两个说明性的例子,一个是二项分裂协议(我们证明了一个归一化版本是渐近高斯的),一个是均匀分裂协议。
{"title":"Survivors in Leader Election Algorithms","authors":"Ravi Kalpathy, H. Mahmoud, W. Rosenkrantz","doi":"10.1137/1.9781611973204.11","DOIUrl":"https://doi.org/10.1137/1.9781611973204.11","url":null,"abstract":"We consider the number of survivors in a broad class of fair leader election algorithms after a number of election rounds. We give sufficient conditions for the number of survivors to converge to a product of independent identically distributed random variables. The number of terms in the product is determined by the round number considered. Each individual term in the product is a limit of a scaled random variable associated with the splitting protocol. The proof is established via convergence (to 0) of the first-order Wasserstein distance from the product limit. In a broader context, the paper is a case study of a class of stochastic recursive equations. We give two illustrative examples, one with binomial splitting protocol (for which we show that a normalized version is asymptotically Gaussian) and one with uniform splitting protocol.","PeriodicalId":340112,"journal":{"name":"Workshop on Analytic Algorithmics and Combinatorics","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133983993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
On the Average Number of Edges in Theta Graphs 关于Theta图的平均边数
Pub Date : 2013-04-11 DOI: 10.1137/1.9781611973204.12
Pat Morin, S. Verdonschot
Theta graphs are important geometric graphs that have many applications, including wireless networking, motion planning, real-time animation, and minimum-spanning tree construction. We give closed form expressions for the average degree of theta graphs of a homogeneous Poisson point process over the plane. We then show that essentially the same bounds---with vanishing error terms---hold for theta graphs of finite sets of points that are uniformly distributed in a square. Finally, we show that the number of edges in a theta graph of points uniformly distributed in a square is concentrated around its expected value.
Theta图是重要的几何图,有许多应用,包括无线网络、运动规划、实时动画和最小生成树构造。我们给出了平面上齐次泊松点过程的图的平均度的封闭表达式。然后我们证明,对于均匀分布在正方形中的有限点集的θ图,本质上是相同的边界-具有消失的误差项。最后,我们证明了均匀分布在正方形中的点的theta图中的边数集中在其期望值附近。
{"title":"On the Average Number of Edges in Theta Graphs","authors":"Pat Morin, S. Verdonschot","doi":"10.1137/1.9781611973204.12","DOIUrl":"https://doi.org/10.1137/1.9781611973204.12","url":null,"abstract":"Theta graphs are important geometric graphs that have many applications, including wireless networking, motion planning, real-time animation, and minimum-spanning tree construction. We give closed form expressions for the average degree of theta graphs of a homogeneous Poisson point process over the plane. We then show that essentially the same bounds---with vanishing error terms---hold for theta graphs of finite sets of points that are uniformly distributed in a square. Finally, we show that the number of edges in a theta graph of points uniformly distributed in a square is concentrated around its expected value.","PeriodicalId":340112,"journal":{"name":"Workshop on Analytic Algorithmics and Combinatorics","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133141976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Workshop on Analytic Algorithmics and Combinatorics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1