A two dimensional non-overlapping code over a q-ary alphabet

Size: px
Start display at page:

Download "A two dimensional non-overlapping code over a q-ary alphabet"

Transcription

1 A two dimensional non-overlapping code over a q-ary alphabet Antonio Bernini Dipartimento di Matematica e Informatica, Università di Firenze Convegno GNCS Montecatini Terme, Febbraio 2018 Progetto di Ricerca 2017: Codici di stringhe e matrici non sovrapponibili Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

2 Background on strings Bifix-free strings: description The string has the bifix The string has not any bifix: it is said bifix-free. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

3 Background on strings Bifix-free strings: description Bifix-free strings are collected in a set: Definition Denote BF q n the set of n-length bifix-free strings on a q-ary alphabet. Theorem (Nielsen, 1973) BF q 1 = q BF q 2n = q BF q 2n 1 BF n q BF q 2n+1 = q BF q 2n Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

4 Background on strings Cross-bifix-free strings: description The two strings in BF , admit a cross-bifix: The two strings in BF , are cross-bifix-free. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

5 Background on strings Definition A set of strings is said cross-bifix-free if each string is bifix-free and if any two strings are cross-bifix-free. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

6 Background on strings A cross-bifix-free set Definition Fixed 2 k n 2, denote S (k) n,q the set of strings s[1]s[2]... s[n] of length n on the alphabet Σ = {0, 1,..., q 1} of the form s[1] s[2] s[k] s[k + 1] }{{}}{{} = 1 k 1 s[k + 2] s[n 1] }{{} avoiding 1 k s[n] }{{} 1 Example: if n = 7, k = 2 and q = 2 we obtain: S (2) 7,2 = { , , , , } while S (3) 7,2 = { , , , } Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

7 Background on strings A cross-bifix-free set Theorem (Chee, Kiah, Purkayastha, Wang, 2013) S n,q (k) is a non-expandable cross-bifix-free set on BFn q. Moreover, S n,q (k) = (q 1) 2 f (k) n k 2,q, where f (k) n,q { u Σ n u avoids 1 k} = q n (q 1) k j=1 f (k) n j,q se 0 n < k se n k Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

8 Extension to the bidimensional case: a first approach Bibifix-free square matrices: description The matrix ( ) 1 1 has the bibifix. It is a submatrix which appears at same time in two 1 0 opposite corners on the main diagonal. The matrix has not any bibifix: it is said bibifix-free. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

9 Extension to the bidimensional case: a first approach Bibifix-free square matrices: description Bibifix-free square matrices are collected in a set: Definition Denote BBF q n the set of bibifix-free matrices of dimension n n over a finite alphabet Σ = {0, 1,..., q 1} Theorem (Barcucci, Bernini, Bilotta, Pinzani, 2015) BBF q 0 = 1, BBFn q = q 2n 1 BBF q n 1, n 1, n odd, BBFn q = q 2n 1 BBF q n 1 q n2 2 BBF q n, n 1, n even. 2 Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

10 Cross-bibifix-free square matrices Description The matrices of BBF , overlap (cross each other) along the direction of the main diagonal: Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

11 Cross-bibifix-free square matrices Description The matrices of BBF , do not overlap along the direction of the main diagonal: they are said cross-bibifix-free. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

12 Cross-bibifix-free square matrices Definition A set of square matrices is said cross-bibifix-free if each matrix is bibifix-free and if any two matrices are cross-bibifix-free. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

13 Cross-bibifix-free square matrices A set of cross-bibifix-free matrices Definition u[1] CBBFn q. = u[2] u[n] u Sn q, Σ The set Sn q is such that Sn q (k) = max S n,q k=2,...,n 2 Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

14 Cross-bibifix-free square matrices A set of cross-bibifix-free matrices Definition u[1] CBBFn q. = u[2] u[n] u Sn q, Σ The set Sn q is such that Sn q (k) = max S n,q k=2,...,n 2 Proposition (Barcucci, Bernini, Bilotta, Pinzani, 2015) CBBF q n is a non-expandable cross-bibifix-free set on BBF q n. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

15 Non-overlapping matrices The matrices , can overlap in several ways: Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

16 Non-overlapping matrices The matrices , do not overlap along any direction of the plane: they are said non-overlapping. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

17 A set of non-overlapping binary matrices: definition Fixed 3 k n (k) 2, define S m n the set of matrices m n of the form M = (M i,j ) = 1 2 k 1 k k + 1 n k n k + 1 n k + 2 n 1 n such that the strings: 0M 1,k+1... M 1,n k 1 (red substring in the first row); M j,1... M j,n 1 0 for j = 2,..., m 1 (red strings in the row from the second to the second to last one); M m,k+1... M m,n k (red substring in the last row), avoid 0 k and 1 k Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

18 A set of non-overlapping binary matrices Definition A set of matrices is called non-overlapping if each matrix is self non-overlapping and for any two matrices in the set they are non-overlapping matrices. It is easily seen that each matrix of S (k) m n is self non-overlapping. Theorem (Barcucci, Bernini, Bilotta, Pinzani) The set S (k) m n is non-overlapping, for each k with 3 k n 2, m 2 and n 2k. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

19 A set of non-overlapping binary matrices Sketch of proof: If a matrix B could be overlapped on a matrix A, then a central row of A should contain a forbidden pattern: A = = B If the movement of B on A involved a fixed entry on the frame, some problem would appear in that entry: A = = B Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

20 A set of non-overlapping binary matrices: enumeration 1 2 k 1 k k + 1 n k n k + 1 n k + 2 n 1 n Denote B (k) n = { u {0, 1} n u avoids 0 k and 1 k} : first row: enumerated by r (k) (k) n 2k+2 where r n { } R n (k) = u B n (k) u 1 = 0, u n = 1 ; central { rows: enumerated } by z n (k) Z n (k) = u B n (k) u n = 0 ; where z (k) n = R n (k) and = Z n (k) and last row: enumerated by b (k) n 2k where b(k) n = B n (k). ( S m n (k) = r (k) n 2k+2 z (k) n ) m 2 b (k) n 2k Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

21 Strings in B (k), Z (k) and R (k) n n Recurrences for b n (k), z n (k) and r n (k) b (k) n = z n (k) = 2 n if 0 n k 1 k 1 j=1 b (k) n j if n k 1 if n = 0 b (k) n / 2 if n 1 1 if n = 0 n r (k) n = 0 if n = 1 2 n 2 if 2 n k k 1 ( ) z (k) n j r (k) n j j=1 if n k + 1 Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

22 Relation with k-generalized Fibonacci numbers f (k) n Revised recurrences f (k) n = 2 n if 0 n k 1 k j=1 b n (k) = z n (k) = r n (k) = f (k) n j if n k 1 if n = 0 2f (k 1) n 1 if n 1 1 if n = 0 f (k 1) n 1 if n 1 1 if n = 0 f (k 1) n 1 +d (k) n 2 if n 1 k-generalized Fibonacci numbers with d n (k) = 1 if (n mod k) = 0 1 if (n mod k) = 1 0 if (n mod k) 2 Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

23 Relation with k-generalized Fibonacci numbers Generating functions b (k) (x) = n 0 b n (k) x n = 1 + 2xf (k 1) (x) z (k) (x) = n 0 z n (k) x n = 1 + xf (k 1) (x) r (k) (x) = n 0 r (k) n x n = xf (k 1) (x) + d (k) (x) 1 2 where d (k) (x) = n 0 d (k) n x n = 1 k i=1 x i and f (k) (x) = f n (k) x n = n 0 k i=1 k i=1 x i x i Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

24 Relation with k-generalized Fibonacci numbers Cardinality The number S (k) (k) m n can now be expressed in term of f n : S (k) m n = ( f (k 1) 2k 1 ) m 2 if n = 2k ( ) ( f (k 1) n 2k 1 f (k 1) n 2k+1 + d (k) n 2k+2 f (k 1) n 1 ) m 2 if n > 2k ( ( In particular, if k = 3, using f n (2) = possible to obtain a closed formula for S (3) m n 2 ) n+2 ( 1 ) ) n for n 0, it is Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

25 A possible extension to a q-ary alphabet Let Σ = {0, 1, 2,..., q 1}, P Σ, {P 1, P 2 } a partition of P. W.l.o.g assume P = {0, 1, 2,..., p 1}, with 2 p q and P 1 = {0, 1,..., j 1}, P 2 = {j, j + 1,..., p 1}. Definition For each (α, β) P 1 P 2, we construct the set S (k,p) m n,q (α, β) of matrices A = (a i,j ) satisfying the following conditions: A 1 = α k 1 βw 1 αβ k 1, where v 1 = βw 1 α is a q-ary string of length n 2k + 2 avoiding all the patterns 0 k, 1 k, 2 k,..., (p 1) k ; for i = 2,..., m 1, A i = w i β = v i, where v i is a q-ary string of length n avoiding all the patterns 0 k, 1 k, 2 k,..., (p 1) k ; A m = α k v m β k, where v m is a q-ary string of length n 2k avoiding all the patterns 0 k, 1 k, 2 k,..., (p 1) k. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

26 Example: S (3,4) 4 9,6 (α, β) q = 6 (Σ = {0, 1, 2, 3, 4, 5}) alphabet p = 4 (P = {0, 1, 2, 3}) number of forbidden patterns P 1 = {0, 1}, P 2 = {2, 3} partition k = 3 length of forbidden patterns P 1 P 2 = {(0, 2), (0, 3), (1, 2), (1, 3)} (α, β) red (sub)strings avoid the pattern 000, 111, 222 and 333. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

27 Let S (k,p) m n,q = (α,β) S (k,p) m n,q (α, β) Proposition (Barcucci, Bernini, Bilotta, Pinzani, 2017) The set S (k,p) m n,q M m n,q is non-overlapping, for each k, p, m, n with 2 k n 2, 2 p q and m 2. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

28 Enumeration S (k,p) m n,q = (α,β) S (k,p) m n,q(α, β) Referring to the above definition: S (k,p) = r (k,p) where m n,q(α, β) r (k,p) n 2k+2,q counts the strings v 1; n 2k+2,q = j(p j) ( z (k,p) n,q z (k,p) n,q counts the strings v i, i = 2, 3,..., m; b (k,p) S m n,q(α, (k,p) β) ) m 2 b (k,p) n 2k,q n 2k,q counts the strings v m S (3,3) 4 9,q (1, 3) = Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

29 Recursive relations: not so useful b (k,p) n,q = q n if 0 n k 1 k 1 (q 1) i=1 b (k,p) n i,q + (q p)b(k,p) n k,q if n k. 0 if n = 0 z (k,p) n,q = q n 1 if 1 n k 1 k 1 ( ) b (k,p) n i,q z (k,p) n i,q i=1 if n k. 0 if n = 0, 1 r (k,p) n,q = q n 2 k 1 ( ) z (k,p) n i,q r (k,p) n i,q i=1 if 2 n k if n k + 1. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

30 Asymptotic behaviour (as n tends to + ) (Rational) Generating functions: b q (k,p) (x) = h(x)/g(x) z q (k,p) (x) = (h(x) 1)/g(x) r q (k,p) (x) = (h(x) 1) 2 /h(x)g(x) where g(x) = 1 (q 1)(x + x x j 1 ) (q p)x k and h(x) = (1 + x + x x k 1 ). It is possible to prove that the three denominators have the same unique zero x 0 (k, p, q) with smallest modulo (it is x 0 (k, p, q) < 1 for q 3) and multiplicity d 0 = 1. Therefore,... Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

31 Asymptotic behaviour... there exist three constants L 0, M 0, and N 0 such that (Expansion of rational functions) b (k,p) n,q L 0 z(k,p) n,q M 0 r n,q (k,p) N 0 Then, considering j = p 2, we have S (k,p) m n,q p p = 2 2 and, as n tends to +, ( ( r (k,p) n 2k+2,q ( 1 x 0 (k, p, q) z (k,p) n,q ) n ) m 2 b (k,p) Proposition S (k,p) p p ( m n,q L 0 M m N x 0 (k, p, q) n 2k,q ) ) nm 4k+2 Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

32 On the maximal size: S (k,p) m n,q = p p 2 2 ( ( r (k,p) n 2k+2,q z (k,p) n,q ) m 2 b (k,p) n 2k,q We are interested in the values of k and p giving the maximal value of the set when n is sufficiently large, once q is fixed. It is q qp(q 1) q(q k 1) p(q 1)(k 1) < 1 x 0 (k, p, q) < q p(q 1)k 1 (q 2) q k 1 (q 1) k q k 1 Recall that, for n sufficiently large, z (k,p) n,q M 0 ( 1 x 0 ) n ) 1. If k increases, the value 1/x 0 is expected to increase. So, z n has maximal size for k = n/2. 2. If p decreases, the value 1/x 0 is expected to increase. So, z n has maximal size for p = 2. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

33 On the maximal size: S (k,p) m n,q = p p 2 2 ( ( r (k,p) n 2k+2,q z (k,p) n,q ) m 2 b (k,p) n 2k,q ) Recall that ( ) n 2k+2 ( ) n 2k r (k,p) 1 n 2k+2,q N 0 and b (k,p) 1 n 2k,q x L 0 0 x 0 3. Different behaviour (unimodal behaviour) of b n 2k and r n 2k+2 with respect to z n depending on k (which appears in the exponent). 4. Same behaviour with respect to z n depending on p: maximal size for p = The coefficient p 2 p 2 is maximum if p = q. Summarizing: it is not easy the find the maximal size depending on p and k... Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

34 p = 2 p = 3 p = 4 k = S (k,p) 3 8,4 k = k = k = S (k,p) 8 8,4 k = k = k = S (k,p) 20 8,4 k = k = S (k,p) 60 8,4 k = k = Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

35 On the non-expandability The set S (k,p) m n,q can be expanded: fixed (α, β), let Consider the matrix B S (k+1,p) m n,q α α β α β β S m n,q(α, (k,p) β) A = β β α α α β β β S (k+1,p) m n,q (α, β) B = α α α β α β β β β β α α α α β β β β The last row of A can be overlapped with the first row of B. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

36 Grazie per l attenzione. Antonio Bernini (DIMAI - Unifi) A 2D non-overlapping code Convegno GNCS / 35

Grand Dyck consecutive patterns avoiding binary words

Grand Dyck consecutive patterns avoiding binary words Grand Dyck consecutive patterns avoiding binary words A.Bernini S.Bilotta E.Pergola R.Pinzani UNIVERSITA DEGLI STUDI DI FIRENZE Dipartimento di Matematica e Informatica Permutation Patterns 203 A.Bernini

More information

Some statistics on permutations avoiding generalized patterns

Some statistics on permutations avoiding generalized patterns PUMA Vol 8 (007), No 4, pp 7 Some statistics on permutations avoiding generalized patterns Antonio Bernini Università di Firenze, Dipartimento di Sistemi e Informatica, viale Morgagni 65, 504 Firenze,

More information

On q-ary optimal equitable symbol weight codes

On q-ary optimal equitable symbol weight codes On q-ary optimal equitable symbol weight codes 1/20 On q-ary optimal equitable symbol weight codes L. A. Bassalygo, V.A. Zinoviev A.A. Kharkevich Institute for Problems of Information Transmission, Moscow,

More information

A generating function for bit strings with no Grand Dyck pattern matching

A generating function for bit strings with no Grand Dyck pattern matching PU. M. A. Vol. 25 (205), No., pp. 30 44 A generating function for bit strings with no Grand Dyck pattern matching Antonio Bernini Dipartimento di Matematica e Informatica U. Dini Università degli Studi

More information

Paths, Permutations and Trees. Enumerating Permutations Avoiding Three Babson - Steingrímsson Patterns

Paths, Permutations and Trees. Enumerating Permutations Avoiding Three Babson - Steingrímsson Patterns Paths, Permutations and Trees Center for Combinatorics Nankai University Tianjin, February 5-7, 004 Enumerating Permutations Avoiding Three Babson - Steingrímsson Patterns Antonio Bernini, Elisa Pergola

More information

Enumerating Binary Strings

Enumerating Binary Strings International Mathematical Forum, Vol. 7, 2012, no. 38, 1865-1876 Enumerating Binary Strings without r-runs of Ones M. A. Nyblom School of Mathematics and Geospatial Science RMIT University Melbourne,

More information

Counting Palindromic Binary Strings Without r-runs of Ones

Counting Palindromic Binary Strings Without r-runs of Ones 1 3 47 6 3 11 Journal of Integer Sequences, Vol. 16 (013), Article 13.8.7 Counting Palindromic Binary Strings Without r-runs of Ones M. A. Nyblom School of Mathematics and Geospatial Science RMIT University

More information

A fast algorithm to generate necklaces with xed content

A fast algorithm to generate necklaces with xed content Theoretical Computer Science 301 (003) 477 489 www.elsevier.com/locate/tcs Note A fast algorithm to generate necklaces with xed content Joe Sawada 1 Department of Computer Science, University of Toronto,

More information

PROBLEMS ON CONGRUENCES AND DIVISIBILITY

PROBLEMS ON CONGRUENCES AND DIVISIBILITY PROBLEMS ON CONGRUENCES AND DIVISIBILITY 1. Do there exist 1,000,000 consecutive integers each of which contains a repeated prime factor? 2. A positive integer n is powerful if for every prime p dividing

More information

Binomial coefficients and k-regular sequences

Binomial coefficients and k-regular sequences Binomial coefficients and k-regular sequences Eric Rowland Hofstra University New York Combinatorics Seminar CUNY Graduate Center, 2017 12 22 Eric Rowland Binomial coefficients and k-regular sequences

More information

Matrix compositions. Emanuele Munarini. Dipartimento di Matematica Politecnico di Milano

Matrix compositions. Emanuele Munarini. Dipartimento di Matematica Politecnico di Milano Matrix compositions Emanuele Munarini Dipartimento di Matematica Politecnico di Milano emanuelemunarini@polimiit Joint work with Maddalena Poneti and Simone Rinaldi FPSAC 26 San Diego Motivation: L-convex

More information

A Recursive Relation for Weighted Motzkin Sequences

A Recursive Relation for Weighted Motzkin Sequences 1 3 47 6 3 11 Journal of Integer Sequences, Vol. 8 (005), Article 05.1.6 A Recursive Relation for Weighted Motzkin Sequences Wen-jin Woan Department of Mathematics Howard University Washington, D.C. 0059

More information

Countable and uncountable sets. Matrices.

Countable and uncountable sets. Matrices. Lecture 11 Countable and uncountable sets. Matrices. Instructor: Kangil Kim (CSE) E-mail: kikim01@konkuk.ac.kr Tel. : 02-450-3493 Room : New Milenium Bldg. 1103 Lab : New Engineering Bldg. 1202 Next topic:

More information

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials Outline MSRI-UP 2009 Coding Theory Seminar, Week 2 John B. Little Department of Mathematics and Computer Science College of the Holy Cross Cyclic Codes Polynomial Algebra More on cyclic codes Finite fields

More information

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16 Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the

More information

Parity Dominating Sets in Grid Graphs

Parity Dominating Sets in Grid Graphs Parity Dominating Sets in Grid Graphs John L. Goldwasser and William F. Klostermeyer Dept. of Mathematics West Virginia University Morgantown, WV 26506 Dept. of Computer and Information Sciences University

More information

SOLUTIONS, what is the value of f(4)?

SOLUTIONS, what is the value of f(4)? 005 Georgia Tech High School Mathematics Competition Junior-Varsity Multiple-Choice Examination Version A Problem : If f(x) = x4 x +x x SOLUTIONS, what is the value of f(4)? (A) 6 (B) 70 (C) 78 (D) 8 (E)

More information

Exhaustive generation for ballot sequences in lexicographic and Gray code order

Exhaustive generation for ballot sequences in lexicographic and Gray code order Exhaustive generation for ballot sequences in lexicographic and Gray code order Ahmad Sabri Department of Informatics Gunadarma University, Depok, Indonesia sabri@staff.gunadarma.ac.id Vincent Vajnovszki

More information

q-counting hypercubes in Lucas cubes

q-counting hypercubes in Lucas cubes Turkish Journal of Mathematics http:// journals. tubitak. gov. tr/ math/ Research Article Turk J Math (2018) 42: 190 203 c TÜBİTAK doi:10.3906/mat-1605-2 q-counting hypercubes in Lucas cubes Elif SAYGI

More information

Generating Functions

Generating Functions Semester 1, 2004 Generating functions Another means of organising enumeration. Two examples we have seen already. Example 1. Binomial coefficients. Let X = {1, 2,..., n} c k = # k-element subsets of X

More information

Cross-Bifix-Free Codes Within a Constant Factor of Optimality

Cross-Bifix-Free Codes Within a Constant Factor of Optimality 4668 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 7, JULY 2013 Cross-Bifix-Free Codes Within a Constant Factor of Optimality Yeow Meng Chee, Senior Member, IEEE, Han Mao Kiah, Punarbasu Purkayastha,

More information

Math 324 Summer 2012 Elementary Number Theory Notes on Mathematical Induction

Math 324 Summer 2012 Elementary Number Theory Notes on Mathematical Induction Math 4 Summer 01 Elementary Number Theory Notes on Mathematical Induction Principle of Mathematical Induction Recall the following axiom for the set of integers. Well-Ordering Axiom for the Integers If

More information

ACM106a - Homework 2 Solutions

ACM106a - Homework 2 Solutions ACM06a - Homework 2 Solutions prepared by Svitlana Vyetrenko October 7, 2006. Chapter 2, problem 2.2 (solution adapted from Golub, Van Loan, pp.52-54): For the proof we will use the fact that if A C m

More information

Dynamic Programming. Shuang Zhao. Microsoft Research Asia September 5, Dynamic Programming. Shuang Zhao. Outline. Introduction.

Dynamic Programming. Shuang Zhao. Microsoft Research Asia September 5, Dynamic Programming. Shuang Zhao. Outline. Introduction. Microsoft Research Asia September 5, 2005 1 2 3 4 Section I What is? Definition is a technique for efficiently recurrence computing by storing partial results. In this slides, I will NOT use too many formal

More information

Discrete Structures: Sample Questions, Exam 2, SOLUTIONS

Discrete Structures: Sample Questions, Exam 2, SOLUTIONS Discrete Structures: Sample Questions, Exam 2, SOLUTIONS (This is longer than the actual test.) 1. Show that any postage of 8 cents or more can be achieved by using only -cent and 5-cent stamps. We proceed

More information

Visual cryptography schemes with optimal pixel expansion

Visual cryptography schemes with optimal pixel expansion Theoretical Computer Science 369 (2006) 69 82 wwwelseviercom/locate/tcs Visual cryptography schemes with optimal pixel expansion Carlo Blundo a,, Stelvio Cimato b, Alfredo De Santis a a Dipartimento di

More information

LEVEL GENERATING TREES AND PROPER RIORDAN ARRAYS

LEVEL GENERATING TREES AND PROPER RIORDAN ARRAYS Applicable Analysis and Discrete Mathematics, (008), 69 9 Available electronically at http://pefmathetfbgacyu LEVEL GENERATING TREES AND PROPER RIORDAN ARRAYS D Baccherini, D Merlini, R Sprugnoli We introduce

More information

Countable and uncountable sets. Matrices.

Countable and uncountable sets. Matrices. CS 441 Discrete Mathematics for CS Lecture 11 Countable and uncountable sets. Matrices. Milos Hauskrecht milos@cs.pitt.edu 5329 Sennott Square Arithmetic series Definition: The sum of the terms of the

More information

Discrete Mathematics. Benny George K. September 22, 2011

Discrete Mathematics. Benny George K. September 22, 2011 Discrete Mathematics Benny George K Department of Computer Science and Engineering Indian Institute of Technology Guwahati ben@iitg.ernet.in September 22, 2011 Set Theory Elementary Concepts Let A and

More information

ANALYTICAL MATHEMATICS FOR APPLICATIONS 2018 LECTURE NOTES 3

ANALYTICAL MATHEMATICS FOR APPLICATIONS 2018 LECTURE NOTES 3 ANALYTICAL MATHEMATICS FOR APPLICATIONS 2018 LECTURE NOTES 3 ISSUED 24 FEBRUARY 2018 1 Gaussian elimination Let A be an (m n)-matrix Consider the following row operations on A (1) Swap the positions any

More information

Rings. EE 387, Notes 7, Handout #10

Rings. EE 387, Notes 7, Handout #10 Rings EE 387, Notes 7, Handout #10 Definition: A ring is a set R with binary operations, + and, that satisfy the following axioms: 1. (R, +) is a commutative group (five axioms) 2. Associative law for

More information

New Inequalities for q-ary Constant-Weight Codes

New Inequalities for q-ary Constant-Weight Codes New Inequalities for q-ary Constant-Weight Codes Hyun Kwang Kim 1 Phan Thanh Toan 1 1 Department of Mathematics, POSTECH International Workshop on Coding and Cryptography April 15-19, 2013, Bergen (Norway

More information

The Kth M-ary Partition Function

The Kth M-ary Partition Function Indiana University of Pennsylvania Knowledge Repository @ IUP Theses and Dissertations (All) Fall 12-2016 The Kth M-ary Partition Function Laura E. Rucci Follow this and additional works at: http://knowledge.library.iup.edu/etd

More information

Fast reversion of formal power series

Fast reversion of formal power series Fast reversion of formal power series Fredrik Johansson LFANT, INRIA Bordeaux RAIM, 2016-06-29, Banyuls-sur-mer 1 / 30 Reversion of power series F = exp(x) 1 = x + x 2 2! + x 3 3! + x 4 G = log(1 + x)

More information

GENERALIZATION OF AN IDENTITY OF ANDREWS

GENERALIZATION OF AN IDENTITY OF ANDREWS GENERALIZATION OF AN IDENTITY OF ANDREWS arxiv:math/060480v1 [math.co 1 Apr 006 Eduardo H. M. Brietze Instituto de Matemática UFRGS Caixa Postal 15080 91509 900 Porto Alegre, RS, Brazil email: brietze@mat.ufrgs.br

More information

MULTI-RESTRAINED STIRLING NUMBERS

MULTI-RESTRAINED STIRLING NUMBERS MULTI-RESTRAINED STIRLING NUMBERS JI YOUNG CHOI DEPARTMENT OF MATHEMATICS SHIPPENSBURG UNIVERSITY SHIPPENSBURG, PA 17257, U.S.A. Abstract. Given positive integers n, k, and m, the (n, k)-th m- restrained

More information

EFFICIENT COMPUTATION OF TERMS OF LINEAR RECURRENCE SEQUENCES OF ANY ORDER

EFFICIENT COMPUTATION OF TERMS OF LINEAR RECURRENCE SEQUENCES OF ANY ORDER #A39 INTEGERS 8 (28) EFFIIENT OMPUTATION OF TERMS OF LINEAR REURRENE SEQUENES OF ANY ORDER Dmitry I. Khomovsky Lomonosov Moscow State University, Moscow, Russia khomovskij@physics.msu.ru Received: /2/6,

More information

HMMT February 2018 February 10, 2018

HMMT February 2018 February 10, 2018 HMMT February 018 February 10, 018 Algebra and Number Theory 1. For some real number c, the graphs of the equation y = x 0 + x + 18 and the line y = x + c intersect at exactly one point. What is c? 18

More information

0 Sets and Induction. Sets

0 Sets and Induction. Sets 0 Sets and Induction Sets A set is an unordered collection of objects, called elements or members of the set. A set is said to contain its elements. We write a A to denote that a is an element of the set

More information

MATH 402 : 2017 page 1 of 6

MATH 402 : 2017 page 1 of 6 ADMINISTRATION What? Math 40: Enumerative Combinatorics Who? Me: Professor Greg Smith You: students interested in combinatorics When and Where? lectures: slot 00 office hours: Tuesdays at :30 6:30 and

More information

Expected Number of Distinct Subsequences in Randomly Generated Binary Strings

Expected Number of Distinct Subsequences in Randomly Generated Binary Strings Expected Number of Distinct Subsequences in Randomly Generated Binary Strings arxiv:704.0866v [math.co] 4 Mar 08 Yonah Biers-Ariel, Anant Godbole, Elizabeth Kelley March 6, 08 Abstract When considering

More information

The part-frequency matrices of a partition

The part-frequency matrices of a partition The part-frequency matrices of a partition William J. Keith, Michigan Tech Michigan Technological University Kliakhandler Conference 2015 August 28, 2015 A partition of an integer n is a sequence λ = (λ

More information

The 4-periodic spiral determinant

The 4-periodic spiral determinant The 4-periodic spiral determinant Darij Grinberg rough draft, October 3, 2018 Contents 001 Acknowledgments 1 1 The determinant 1 2 The proof 4 *** The purpose of this note is to generalize the determinant

More information

Research Statement. Janine E. Janoski

Research Statement. Janine E. Janoski Research Statement Janine E. Janoski 1 Introduction My research is in discrete mathematics and combinatorics. I have worked on a wide variety of research topics including, enumeration problems, eigenvalue

More information

Involutions by Descents/Ascents and Symmetric Integral Matrices. Alan Hoffman Fest - my hero Rutgers University September 2014

Involutions by Descents/Ascents and Symmetric Integral Matrices. Alan Hoffman Fest - my hero Rutgers University September 2014 by Descents/Ascents and Symmetric Integral Matrices Richard A. Brualdi University of Wisconsin-Madison Joint work with Shi-Mei Ma: European J. Combins. (to appear) Alan Hoffman Fest - my hero Rutgers University

More information

Exam 2 Solutions. In class questions

Exam 2 Solutions. In class questions Math 5330 Spring 2018 Exam 2 Solutions In class questions 1. (15 points) Solve the following congruences. Put your answer in the form of a congruence. I usually find it easier to go from largest to smallest

More information

Cookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems!

Cookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems! Cookie Monster Meets the Fibonacci Numbers. Mmmmmm Theorems! Steven J. Miller (MC 96) http://www.williams.edu/mathematics/sjmiller/public_html Yale University, April 14, 2014 Introduction Goals of the

More information

Definitions, Theorems and Exercises. Abstract Algebra Math 332. Ethan D. Bloch

Definitions, Theorems and Exercises. Abstract Algebra Math 332. Ethan D. Bloch Definitions, Theorems and Exercises Abstract Algebra Math 332 Ethan D. Bloch December 26, 2013 ii Contents 1 Binary Operations 3 1.1 Binary Operations............................... 4 1.2 Isomorphic Binary

More information

1 Sequences and Summation

1 Sequences and Summation 1 Sequences and Summation A sequence is a function whose domain is either all the integers between two given integers or all the integers greater than or equal to a given integer. For example, a m, a m+1,...,

More information

Orthogonal Arrays & Codes

Orthogonal Arrays & Codes Orthogonal Arrays & Codes Orthogonal Arrays - Redux An orthogonal array of strength t, a t-(v,k,λ)-oa, is a λv t x k array of v symbols, such that in any t columns of the array every one of the possible

More information

Connections and Determinants

Connections and Determinants Connections and Determinants Mark Blunk Sam Coskey June 25, 2003 Abstract The relationship between connections and determinants in conductivity networks is discussed We paraphrase Lemma 312, by Curtis

More information

Interesting Examples on Maximal Irreducible Goppa Codes

Interesting Examples on Maximal Irreducible Goppa Codes Interesting Examples on Maximal Irreducible Goppa Codes Marta Giorgetti Dipartimento di Fisica e Matematica, Universita dell Insubria Abstract. In this paper a full categorization of irreducible classical

More information

Ranks of Hadamard Matrices and Equivalence of Sylvester Hadamard and Pseudo-Noise Matrices

Ranks of Hadamard Matrices and Equivalence of Sylvester Hadamard and Pseudo-Noise Matrices Operator Theory: Advances and Applications, Vol 1, 1 13 c 27 Birkhäuser Verlag Basel/Switzerland Ranks of Hadamard Matrices and Equivalence of Sylvester Hadamard and Pseudo-Noise Matrices Tom Bella, Vadim

More information

7 Asymptotics for Meromorphic Functions

7 Asymptotics for Meromorphic Functions Lecture G jacques@ucsd.edu 7 Asymptotics for Meromorphic Functions Hadamard s Theorem gives a broad description of the exponential growth of coefficients in power series, but the notion of exponential

More information

= = = = = =

= = = = = = PARTITION THEORY (notes by M. Hlynka, University of Windsor) Definition: A partition of a positive integer n is an expression of n as a sum of positive integers. Partitions are considered the same if the

More information

Generating Functions of Partitions

Generating Functions of Partitions CHAPTER B Generating Functions of Partitions For a complex sequence {α n n 0,, 2, }, its generating function with a complex variable q is defined by A(q) : α n q n α n [q n ] A(q). When the sequence has

More information

Limits at Infinity. Horizontal Asymptotes. Definition (Limits at Infinity) Horizontal Asymptotes

Limits at Infinity. Horizontal Asymptotes. Definition (Limits at Infinity) Horizontal Asymptotes Limits at Infinity If a function f has a domain that is unbounded, that is, one of the endpoints of its domain is ±, we can determine the long term behavior of the function using a it at infinity. Definition

More information

Arithmetic properties of lacunary sums of binomial coefficients

Arithmetic properties of lacunary sums of binomial coefficients Arithmetic properties of lacunary sums of binomial coefficients Tamás Mathematics Department Occidental College 29th Journées Arithmétiques JA2015, July 6-10, 2015 Arithmetic properties of lacunary sums

More information

Visual Cryptography Schemes with Optimal Pixel Expansion

Visual Cryptography Schemes with Optimal Pixel Expansion Visual Cryptography Schemes with Optimal Pixel Expansion Carlo Blundo, Stelvio Cimato and Alfredo De Santis Dipartimento di Informatica ed Applicazioni Università degli Studi di Salerno, 808, Baronissi

More information

ELE/MCE 503 Linear Algebra Facts Fall 2018

ELE/MCE 503 Linear Algebra Facts Fall 2018 ELE/MCE 503 Linear Algebra Facts Fall 2018 Fact N.1 A set of vectors is linearly independent if and only if none of the vectors in the set can be written as a linear combination of the others. Fact N.2

More information

Identifying an m-ary Partition Identity through an m-ary Tree

Identifying an m-ary Partition Identity through an m-ary Tree Bridgewater State University Virtual Commons - Bridgewater State University Mathematics Faculty Publications Mathematics Department 06 Identifying an m-ary Partition Identity through an m-ary Tree Timothy

More information

Numeration Systems. S. E. Payne General Numeration Systems 2. 3 Combinatorial Numeration Numeration with forbidden substrings 14

Numeration Systems. S. E. Payne General Numeration Systems 2. 3 Combinatorial Numeration Numeration with forbidden substrings 14 Numeration Systems S. E. Payne 2010 Contents 1 General Numeration Systems 2 2 Greedy Representations 3 3 Combinatorial Numeration 13 4 Numeration with forbidden substrings 14 5 The dominant root of the

More information

Counting permutations by cyclic peaks and valleys

Counting permutations by cyclic peaks and valleys Annales Mathematicae et Informaticae 43 (2014) pp. 43 54 http://ami.ektf.hu Counting permutations by cyclic peaks and valleys Chak-On Chow a, Shi-Mei Ma b, Toufik Mansour c Mark Shattuck d a Division of

More information

Counting Palindromes According to r-runs of Ones Using Generating Functions

Counting Palindromes According to r-runs of Ones Using Generating Functions 3 47 6 3 Journal of Integer Sequences, Vol. 7 (04), Article 4.6. Counting Palindromes According to r-runs of Ones Using Generating Functions Helmut Prodinger Department of Mathematics Stellenbosch University

More information

Algebraic aspects of some Riordan arrays related to binary words avoiding a pattern

Algebraic aspects of some Riordan arrays related to binary words avoiding a pattern Algebraic aspects of some Riordan arrays related to binary words avoiding a pattern D. Merlini and R. Sprugnoli Dipartimento di Sistemi e Informatica viale Morgagni 65, 5034, Firenze, Italia merlini@dsi.unifi.it,

More information

TC08 / 6. Hadamard codes SX

TC08 / 6. Hadamard codes SX TC8 / 6. Hadamard codes 3.2.7 SX Hadamard matrices Hadamard matrices. Paley s construction of Hadamard matrices Hadamard codes. Decoding Hadamard codes A Hadamard matrix of order is a matrix of type whose

More information

Mapping the Discrete Logarithm: Talk 2

Mapping the Discrete Logarithm: Talk 2 Mapping the Discrete Logarithm: Talk 2 Joshua Holden Joint work with Daniel Cloutier, Nathan Lindle (Senior Theses), Max Brugger, Christina Frederick, Andrew Hoffman, and Marcus Mace (RHIT REU) Rose-Hulman

More information

k-protected VERTICES IN BINARY SEARCH TREES

k-protected VERTICES IN BINARY SEARCH TREES k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from

More information

Stochastic Realization of Binary Exchangeable Processes

Stochastic Realization of Binary Exchangeable Processes Stochastic Realization of Binary Exchangeable Processes Lorenzo Finesso and Cecilia Prosdocimi Abstract A discrete time stochastic process is called exchangeable if its n-dimensional distributions are,

More information

Online Computation of Abelian Runs

Online Computation of Abelian Runs Online Computation of Abelian Runs Gabriele Fici 1, Thierry Lecroq 2, Arnaud Lefebvre 2, and Élise Prieur-Gaston2 1 Dipartimento di Matematica e Informatica, Università di Palermo, Italy Gabriele.Fici@unipa.it

More information

MATH4250 Game Theory 1. THE CHINESE UNIVERSITY OF HONG KONG Department of Mathematics MATH4250 Game Theory

MATH4250 Game Theory 1. THE CHINESE UNIVERSITY OF HONG KONG Department of Mathematics MATH4250 Game Theory MATH4250 Game Theory 1 THE CHINESE UNIVERSITY OF HONG KONG Department of Mathematics MATH4250 Game Theory Contents 1 Combinatorial games 2 1.1 Combinatorial games....................... 2 1.2 P-positions

More information

On The Weights of Binary Irreducible Cyclic Codes

On The Weights of Binary Irreducible Cyclic Codes On The Weights of Binary Irreducible Cyclic Codes Yves Aubry and Philippe Langevin Université du Sud Toulon-Var, Laboratoire GRIM F-83270 La Garde, France, {langevin,yaubry}@univ-tln.fr, WWW home page:

More information

Math/CS 466/666: Homework Solutions for Chapter 3

Math/CS 466/666: Homework Solutions for Chapter 3 Math/CS 466/666: Homework Solutions for Chapter 3 31 Can all matrices A R n n be factored A LU? Why or why not? Consider the matrix A ] 0 1 1 0 Claim that this matrix can not be factored A LU For contradiction,

More information

Algorithms: Background

Algorithms: Background Algorithms: Background Amotz Bar-Noy CUNY Amotz Bar-Noy (CUNY) Algorithms: Background 1 / 66 What is a Proof? Definition I: The cogency of evidence that compels acceptance by the mind of a truth or a fact.

More information

To get horizontal and slant asymptotes algebraically we need to know about end behaviour for rational functions.

To get horizontal and slant asymptotes algebraically we need to know about end behaviour for rational functions. Concepts: Horizontal Asymptotes, Vertical Asymptotes, Slant (Oblique) Asymptotes, Transforming Reciprocal Function, Sketching Rational Functions, Solving Inequalities using Sign Charts. Rational Function

More information

The distribution of run lengths in integer compositions

The distribution of run lengths in integer compositions The distribution of run lengths in integer compositions Herbert S Wilf University of Pennsylvania Philadelphia PA 19104-6395, USA wilf@mathupennedu Submitted: Mar 7, 2010; Accepted: Oct 9, 2011; Published:

More information

Binomial Coefficient Identities/Complements

Binomial Coefficient Identities/Complements Binomial Coefficient Identities/Complements CSE21 Fall 2017, Day 4 Oct 6, 2017 https://sites.google.com/a/eng.ucsd.edu/cse21-fall-2017-miles-jones/ permutation P(n,r) = n(n-1) (n-2) (n-r+1) = Terminology

More information

Chapter 2 Notes: Polynomials and Polynomial Functions

Chapter 2 Notes: Polynomials and Polynomial Functions 39 Algebra 2 Honors Chapter 2 Notes: Polynomials and Polynomial Functions Section 2.1: Use Properties of Exponents Evaluate each expression (3 4 ) 2 ( 5 8 ) 3 ( 2) 3 ( 2) 9 ( a2 3 ( y 2 ) 5 y 2 y 12 rs

More information

Generalization of real interval matrices to other fields arxiv: v1 [math.ra] 15 Dec 2018

Generalization of real interval matrices to other fields arxiv: v1 [math.ra] 15 Dec 2018 Generalization of real interval matrices to other fields arxiv:1812.07386v1 [math.ra] 15 Dec 2018 Elena Rubei Dipartimento di Matematica e Informatica U. Dini, viale Morgagni 67/A, 50134 Firenze, Italia

More information

Applications. More Counting Problems. Complexity of Algorithms

Applications. More Counting Problems. Complexity of Algorithms Recurrences Applications More Counting Problems Complexity of Algorithms Part I Recurrences and Binomial Coefficients Paths in a Triangle P(0, 0) P(1, 0) P(1,1) P(2, 0) P(2,1) P(2, 2) P(3, 0) P(3,1) P(3,

More information

Chapter 2 Formulas and Definitions:

Chapter 2 Formulas and Definitions: Chapter 2 Formulas and Definitions: (from 2.1) Definition of Polynomial Function: Let n be a nonnegative integer and let a n,a n 1,...,a 2,a 1,a 0 be real numbers with a n 0. The function given by f (x)

More information

Relations. We have seen several types of abstract, mathematical objects, including propositions, predicates, sets, and ordered pairs and tuples.

Relations. We have seen several types of abstract, mathematical objects, including propositions, predicates, sets, and ordered pairs and tuples. Relations We have seen several types of abstract, mathematical objects, including propositions, predicates, sets, and ordered pairs and tuples. Relations use ordered tuples to represent relationships among

More information

Zero-sum square matrices

Zero-sum square matrices Zero-sum square matrices Paul Balister Yair Caro Cecil Rousseau Raphael Yuster Abstract Let A be a matrix over the integers, and let p be a positive integer. A submatrix B of A is zero-sum mod p if the

More information

NORTHERN INDIA ENGINEERING COLLEGE, LKO D E P A R T M E N T O F M A T H E M A T I C S. B.TECH IIIrd SEMESTER QUESTION BANK ACADEMIC SESSION

NORTHERN INDIA ENGINEERING COLLEGE, LKO D E P A R T M E N T O F M A T H E M A T I C S. B.TECH IIIrd SEMESTER QUESTION BANK ACADEMIC SESSION NORTHERN INDIA ENGINEERING COLLEGE, LKO D E P A R T M E N T O F M A T H E M A T I C S B.TECH IIIrd SEMESTER QUESTION BANK ACADEMIC SESSION 011-1 DISCRETE MATHEMATICS (EOE 038) 1. UNIT I (SET, RELATION,

More information

ON EXPLICIT FORMULAE AND LINEAR RECURRENT SEQUENCES. 1. Introduction

ON EXPLICIT FORMULAE AND LINEAR RECURRENT SEQUENCES. 1. Introduction ON EXPLICIT FORMULAE AND LINEAR RECURRENT SEQUENCES R. EULER and L. H. GALLARDO Abstract. We notice that some recent explicit results about linear recurrent sequences over a ring R with 1 were already

More information

RANK AND PERIMETER PRESERVER OF RANK-1 MATRICES OVER MAX ALGEBRA

RANK AND PERIMETER PRESERVER OF RANK-1 MATRICES OVER MAX ALGEBRA Discussiones Mathematicae General Algebra and Applications 23 (2003 ) 125 137 RANK AND PERIMETER PRESERVER OF RANK-1 MATRICES OVER MAX ALGEBRA Seok-Zun Song and Kyung-Tae Kang Department of Mathematics,

More information

3 Polynomial and Rational Functions

3 Polynomial and Rational Functions 3 Polynomial and Rational Functions 3.1 Polynomial Functions and their Graphs So far, we have learned how to graph polynomials of degree 0, 1, and. Degree 0 polynomial functions are things like f(x) =,

More information

Definition: Let S and T be sets. A binary relation on SxT is any subset of SxT. A binary relation on S is any subset of SxS.

Definition: Let S and T be sets. A binary relation on SxT is any subset of SxT. A binary relation on S is any subset of SxS. 4 Functions Before studying functions we will first quickly define a more general idea, namely the notion of a relation. A function turns out to be a special type of relation. Definition: Let S and T be

More information

A characterization of the set of lines either external to or secant to an ovoid in PG(3,q)

A characterization of the set of lines either external to or secant to an ovoid in PG(3,q) AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 49 (011), Pages 159 163 A characterization of the set of lines either external to or secant to an ovoid in PG(3,q) Stefano Innamorati Dipartimento di Ingegneria

More information

Explicit formulas using partitions of integers for numbers defined by recursion

Explicit formulas using partitions of integers for numbers defined by recursion Explicit formulas using partitions of integers for numbers defined by recursion Giuseppe Fera, Vittorino Talamini, arxiv:2.440v2 [math.nt] 27 Feb 203 DCFA, Sezione di Fisica e Matematica, Università di

More information

On the Decision Tree Complexity of String Matching. December 29, 2017

On the Decision Tree Complexity of String Matching. December 29, 2017 On the Decision Tree Complexity of String Matching Xiaoyu He 1 Neng Huang 1 Xiaoming Sun 2 December 29, 2017 arxiv:1712.09738v1 [cs.cc] 28 Dec 2017 Abstract String matching is one of the most fundamental

More information

(k, l)-universality OF TERNARY QUADRATIC FORMS ax 2 + by 2 + cz 2

(k, l)-universality OF TERNARY QUADRATIC FORMS ax 2 + by 2 + cz 2 #A20 INTEGERS 18 (2018) (k, l)-universality OF TERNARY QUADRATIC FORMS ax 2 + by 2 + cz 2 Lerna Pehlivan Department of Mathematics and Statistics, Acadia University, Wolfville, Nova Scotia, Canada lerna.pehlivan@acadiau.ca

More information

Multiple coverings of the farthest-off points and multiple saturating sets in projective spaces

Multiple coverings of the farthest-off points and multiple saturating sets in projective spaces Thirteenth International Workshop on Algebraic and Combinatorial Coding Theory June 15-21, 2012, Pomorie, Bulgaria pp. 53 59 Multiple coverings of the farthest-off points and multiple saturating sets in

More information

Intrinsic products and factorizations of matrices

Intrinsic products and factorizations of matrices Available online at www.sciencedirect.com Linear Algebra and its Applications 428 (2008) 5 3 www.elsevier.com/locate/laa Intrinsic products and factorizations of matrices Miroslav Fiedler Academy of Sciences

More information

Symmetric configurations for bipartite-graph codes

Symmetric configurations for bipartite-graph codes Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 2008, Pamporovo, Bulgaria pp. 63-69 Symmetric configurations for bipartite-graph codes Alexander Davydov adav@iitp.ru

More information

Section Summary. Sequences. Recurrence Relations. Summations. Examples: Geometric Progression, Arithmetic Progression. Example: Fibonacci Sequence

Section Summary. Sequences. Recurrence Relations. Summations. Examples: Geometric Progression, Arithmetic Progression. Example: Fibonacci Sequence Section 2.4 1 Section Summary Sequences. Examples: Geometric Progression, Arithmetic Progression Recurrence Relations Example: Fibonacci Sequence Summations 2 Introduction Sequences are ordered lists of

More information

Math Circle: Recursion and Induction

Math Circle: Recursion and Induction Math Circle: Recursion and Induction Prof. Wickerhauser 1 Recursion What can we compute, using only simple formulas and rules that everyone can understand? 1. Let us use N to denote the set of counting

More information

Counting Palindromes According to r-runs of Ones Using Generating Functions

Counting Palindromes According to r-runs of Ones Using Generating Functions Counting Palindromes According to r-runs of Ones Using Generating Functions Helmut Prodinger Department of Mathematics Stellenbosch University 7602 Stellenbosch South Africa hproding@sun.ac.za Abstract

More information

Combinatorial properties of the numbers of tableaux of bounded height

Combinatorial properties of the numbers of tableaux of bounded height Combinatorial properties of the numbers of tableaux of bounded height Marilena Barnabei, Flavio Bonetti, and Matteo Sibani Abstract We introduce an infinite family of lower triangular matrices Γ (s), where

More information

ON MULTI-AVOIDANCE OF RIGHT ANGLED NUMBERED POLYOMINO PATTERNS

ON MULTI-AVOIDANCE OF RIGHT ANGLED NUMBERED POLYOMINO PATTERNS INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 4 (2004), #A21 ON MULTI-AVOIDANCE OF RIGHT ANGLED NUMBERED POLYOMINO PATTERNS Sergey Kitaev Department of Mathematics, University of Kentucky,

More information