Grand Dyck consecutive patterns avoiding binary words

Size: px
Start display at page:

Download "Grand Dyck consecutive patterns avoiding binary words"

Transcription

1 Grand Dyck consecutive patterns avoiding binary words A.Bernini S.Bilotta E.Pergola R.Pinzani UNIVERSITA DEGLI STUDI DI FIRENZE Dipartimento di Matematica e Informatica Permutation Patterns 203 A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 / 37

2 Table of contents Outline Definitions and notations 2 A general approach 3 Main Result 4 Enumeration 5 Generalization 6 Further developments A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 2 / 37

3 Definitions and notations Binary words avoiding a pattern p Let F {0, } be the class of binary words ω such that ω 0 ω for any ω F, ω 0 and ω are the number of zeroes and ones in ω, respectively. We are interested in studying the subclass F [p] F of binary words excluding a given pattern p = p 0... p h {0, } h, i.e. the words ω F [p] that do not admit a sequence of consecutive indices i, i +,..., i + h such that ω i ω i+... ω i+h = p 0 p... p h. R. Sedgewick & P. Flajolet (996): An Introduction to the Analysis of Algorithms. Addison-Wesley, Reading, MA. A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 3 / 37

4 Example Definitions and notations p = 0 0 ω = A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 4 / 37

5 Grand Dyck words Definitions and notations Let us denote by G j the set of 2j-length Grand Dyck words. It is well known that a Grand Dyck word δ is a binary string such that δ 0 = δ. In this work, we consider the so called bifix-free Grand Dyck words, i.e. a Grand Dyck word δ is said to be bifix-free if and only if no prefix of δ is a suffix of δ. Let us denote by Gj b the set of 2j-length bifix-free Grand Dyck words and we study the class F [p] with p Gj b, for any fixed j. A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 5 / 37

6 A general approach A general approach Let F {0, } be the class of binary words ω such that ω 0 ω for any ω F. For example, in order to generate the language F [p] an ad hoc grammar (depending on the forbidden pattern p) should be defined. Consequently, for each pattern p a different generating function enumerating the words in F [p] must to be computed. Our aim is to determine a constructive algorithm proposing a more unified approach. The algorithm bases on a succession rule which allows us to obtain a generating function for the enumeration of each classes F [p], according to the number of ones. Such enumeration does not depend on the shape of the forbidden pattern p. A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 6 / 37

7 Succession rules A general approach A succession rule Ω is a system constituted by an axiom (a), with a N, and a set of productions of the form: (k) (e (k))(e 2 (k))... (e k (k)), k N, e i : N N. A production constructs, for any given label (k), its successors (e (k)), (e 2 (k)),..., (e k (k)). Compact notation: { (a) (k) (e (k))(e 2 (k))... (e k (k)) F. R. K. Chung, R. L. Graham, V. E. Hoggatt & M. Kleimann (978): The number of Baxter permutations. Journal of Combinatorial Theory, Series A 24, pp A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 7 / 37

8 Generating trees A general approach The rule Ω can be represented by means of a generating tree, that is a rooted tree whose vertices are the labels of Ω; where (a) is the label of the root and each node labelled (k) has k sons labelled (e (k)), (e 2 (k)),..., (e k (k)), respectively. As usual, the root lies at level 0, and a node lies at level n if its parent lies at level n. A succession rule describes the growth of a class of combinatorial objects if there exists a bijection between the object of size n and the nodes at level n in the generating tree, then a given object can be coded by the sequence of labels met from the root of the generating tree to the object itself. A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 8 / 37

9 Jumping succession rules A general approach A jumping succession rule is a set of productions acting on the objects of a class and producing sons at different levels. Compact notation: (a) (k) (k) (e (k))(e 2 (k))... (e k (k)), j (d (k))(d 2 (k))... (d k (k)). L. Ferrari, E. Pergola, R. Pinzani & S. Rinaldi (2003): Jumping succession rules and their generating functions. Discrete Mathematics 27, pp A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 9 / 37

10 A general approach Jumping and marked succession rules A jumping and marked succession rule is a jumping succession rule where marked labels are considered together with usual ones. In this way a generating tree can support negative values if we consider a node labelled (k) as opposed to a node labelled (k) lying on the same level. Compact notation: (a) (k) (k) (e (k))(e 2 (k))... (e k (k)), j (d (k))(d 2 (k))... (d k (k)). A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 0 / 37

11 A general approach Jumping and marked succession rules Compact notation: (a) (k) (k) (e (k))(e 2 (k))... (e k (k)), j (d (k))(d 2 (k))... (d k (k)). describes also the behavior for (k): { (k) (e (k))(e 2 (k))... (e k (k)), (k) j (d (k))(d 2 (k))... (d k (k)). having (k) = (k). A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 / 37

12 Example (0) (k) (k) A general approach (k + )(k) ()(0)(0) 2 (k + )(k) ()(0)(0) level 0 (0) () (0) (0) 2 (2) () (0) (0) () (0) (0) () (0) (0) () (0) (0) (k) = (k) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 2 / 37

13 Example (0) (k) (k) A general approach (k + )(k) ()(0)(0) 2 (k + )(k) ()(0)(0) level 0 (0) Cardinality () (0) (0) 3 2 (2) () (0) (0) () (0) (0) () (0) (0) () (0) (0) 7 (k) = (k) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 2 / 37

14 Theorem Main Result Theorem The generating tree of the paths in F [p], where p Gj b, according to the number of rise steps, is isomorphic to the tree having its root labelled (0) and recursively defined by the succession rule: (k) (k + )(k)... ()(0 2 )(0 ) k 0 (0) j (0 2 ) (k) j (k)(k )... ()(0 2 )(0 ) k A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 3 / 37

15 Method Main Result Each node at level n and labelled with (k), k 0, represents a path on the discrete plane having n rise steps and ending at the ordinate k. (0) () (0 ) 2 (0) (2) () (0 2 ) (0 ) () (0 2 ) (0 ) () (0 2 ) (0 ) (0 ) 2 A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 4 / 37

16 Method Main Result Each node at level n and labelled with (k), k 0, represents a path on the discrete plane having n rise steps and ending at the ordinate k. ε () (02) (0) (2) () (0 2 ) () (0 (0) 2 ) (0 ) () (02) (0) (02) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 4 / 37

17 Method Main Result Each node at level n and labelled with (k), k 0, represents a path on the discrete plane having n rise steps and ending at the ordinate k. ε () (0 2 ) (0 ) (2) () (02) (0 ) () (02) (0) () (02) (0) (0 2 ) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 4 / 37

18 Method Main Result Each node at level n and labelled with (k), k 0, represents a path on the discrete plane having n rise steps and ending at the ordinate k. ε () (02) (0) (2) () (0 2 ) () (0 (0) 2 ) (0 ) () (02) (0) (02) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 4 / 37

19 The constructive algorithm: First step ( k) ( k + ) ( k) ( ) ( 0 ) ( 0 ) 2 A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 5 / 37

20 The constructive algorithm: First step ( k) ( k + ) ( k) () ( 02) ( 0) k (k) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 5 / 37

21 The constructive algorithm: First step ( k) (k +) (k) () ( 02) ( 0) k k+ ( k) ( k+) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 5 / 37

22 The constructive algorithm: First step ( k) ( k + ) (k) () ( 0 ) ( ) 2 0 k k+ k ( k) (k+) (k) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 5 / 37

23 The constructive algorithm: First step ( k) ( k + ) ( k)... () ( 02) ( 0 ) k k+ k... ( k) (k+) (k) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 5 / 37

24 The constructive algorithm: First step ( k) ( k + ) ( k) () ( 0 ) ( ) 2 0 k k+ k ( k) (k+) (k) () A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 5 / 37

25 The constructive algorithm: First step ( k) ( k + ) ( k) () (0 2 ) (0 ) k k+ k ( k) (k+) (k) () (0 2) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 5 / 37

26 The constructive algorithm: First step ( k) ( k + ) ( k) ( ) ( ) 0 2 (0 ) k k+ k? (k ) ( k +) ( k) () (02) (0 ) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 5 / 37

27 The constructive algorithm: First step ( k) ( k + ) ( k) () ( 0 ) ( ) 2 0 k k+ k? ( k) (k+) (k) () (0 2) (0) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 5 / 37

28 The constructive algorithm: a marked forbidden pattern We define a marked forbidden pattern p as a pattern p Gj b whose steps cannot be split, that is, they must always be contained all together in that defined sequence. We say that a point is strictly contained in a given marked forbidden pattern p if it is in p and it is different from both its initial point and its last point. We denote a marked forbidden pattern p by drawing its minimal bounding rectangle B. B A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 6 / 37

29 . Main Result The constructive algorithm: First step (0) j (0 ) 2 A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 7 / 37

30 The constructive algorithm: First step (0) j (0 ) 2 j (0) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 7 / 37

31 The constructive algorithm: First step (0) j (0 2 ) j (0) (0 2 ) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 7 / 37

32 The constructive algorithm: First step (0) j (02) j (0) (0 2 ) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 7 / 37

33 The constructive algorithm: First step ( ) j k ( k) ( k-) () (02) (0 ) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 8 / 37

34 The constructive algorithm: First step ( k) j ( k) ( k-) () (02) (0 ) k j ( k) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 8 / 37

35 The constructive algorithm: First step ( k) j ( k) ( k-) () (02) (0 ) k j k (k) ( k) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 8 / 37

36 The constructive algorithm: First step ( k) j ( k) ( k-) () (02) (0 ) k j k k- (k) (k) ( k-) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 8 / 37

37 The constructive algorithm: First step j ( k ) ( k) ( k-)... () (0 ) 2 (0 ) k j k k-... (k) (k) (k-) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 8 / 37

38 The constructive algorithm: First step j ( k ) ( k) ( k-) () (0 ) 2 (0 ) k j k k- (k) (k) (k-) () A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 8 / 37

39 The constructive algorithm: First step j ( k ) ( k) ( k-) () (0 2 ) (0 ) k j k k- (k) (k) (k-) () (02) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 8 / 37

40 The constructive algorithm: First step ( k) j ( k) ( k-) () (02) (0 ) k j k k-? (k) (k) (k-) () (0 2) (0) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 8 / 37

41 The constructive algorithm: First step ( k) j ( k) ( k-) () (02) (0 ) k j k k-? (k) ( k) (k-) () (0 2) (0) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 8 / 37

42 Problem Main Result Lattice paths which end on the x-axis by a rise step are never obtained. j = 2 p = A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 9 / 37

43 Main Result The constructive algorithm: Second step First action in order to obtain the label (0 ) ω = ω = k () (k) j = 2 ω = () ω = vϕ, being ϕ the rightmost suffix in ω beginning from the x-axis with a rise step where each marked forbidden pattern (if ϕ contains at least one of them) has its initial point with positive ordinate. A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

44 The constructive algorithm: Second step First action in order to obtain the label (0 ) ϕ ω = ω = (k) k j = 2 ω = () ϕ () ω = vϕ, being ϕ the rightmost suffix in ω beginning from the x-axis with a rise step where each marked forbidden pattern (if ϕ contains at least one of them) has its initial point with positive ordinate. A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

45 The constructive algorithm: Second step - case ϕ does not contain any marked forbidden pattern vϕ ϕ A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 2 / 37

46 The constructive algorithm: Second step - case ϕ does not contain any marked forbidden pattern vϕ ϕ A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 2 / 37

47 The constructive algorithm: Second step - case ϕ does not contain any marked forbidden pattern vϕ ϕ vϕ c x x (0 ) ϕ c A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 2 / 37

48 The constructive algorithm: Second step - case 2 ϕ contains at least one marked forbidden pattern Find z the leftmost point in ϕ having highest ordinate and not strictly contained in a marked forbidden pattern. Apply the cut and paste operation. A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

49 The constructive algorithm: Second step - case 2 ϕ contains at least one marked forbidden pattern Find z the leftmost point in ϕ having highest ordinate and not strictly contained in a marked forbidden pattern. Apply the cut and paste operation. A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

50 The constructive algorithm: Second step - case 2 ϕ contains at least one marked forbidden pattern A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

51 The constructive algorithm: Second step - case 2 ϕ contains at least one marked forbidden pattern z A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

52 The constructive algorithm: Second step - case 2 ϕ contains at least one marked forbidden pattern z A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

53 The constructive algorithm: Second step - case 2 ϕ contains at least one marked forbidden pattern z z A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

54 The constructive algorithm: Second step - case 2 ϕ contains at least one marked forbidden pattern z z z A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

55 The constructive algorithm: Second step - case 2 ϕ contains at least one marked forbidden pattern z z z A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

56 The constructive algorithm: Second step - case 2 ϕ contains at least one marked forbidden pattern z z z z A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

57 The constructive algorithm: Second step - case 2 Cut and paste z A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

58 The constructive algorithm: Second step - case 2 Cut and paste z A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

59 The constructive algorithm: Second step - case 2 Cut and paste z A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

60 The constructive algorithm: Second step - case 2 Cut and paste (0 ) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

61 The constructive algorithm: Second step - case 2 Reverse of cut and paste (0 ) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

62 The constructive algorithm: Second step - case 2 Reverse of cut and paste m A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

63 The constructive algorithm: Second step - case 2 Reverse of cut and paste m A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

64 The constructive algorithm: Second step - case 2 Reverse of cut and paste m A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

65 The constructive algorithm: Second step - case 2 Reverse of cut and paste m A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

66 The constructive algorithm: Second step - case 2 Reverse of cut and paste A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

67 Example of the complete algorithm (3) (2) () (02 ) (0 ) (2) () (2) (0 2 ) (0 ) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

68 Proof: idea Main Result The described algorithm is a construction for the set F [p] according to the number of rise steps. This means that all the paths in F with n rise steps are obtained. Moreover, for each obtained path ψ in F \F [p], having C forbidden patterns, with n rise steps and (k) as last label of the associated code, a path ψ in F \F [p] having C forbidden patterns, with n rise steps, and (k) as last label of the associated code is also generated having the same shape as ψ but such that the last forbidden pattern is marked if it is not in ψ and vice-versa. ()(0)()(2)() ()(0)()() (0)()(2)() (0)()() A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

69 Enumeration Enumeration Let Z be the set of paths whose instances are coded by a sequence of labels in the generating tree ending by a non-marked zero, S be the set of paths whose instances are coded by a sequence of labels ending by a marked zero, N be the set of paths whose instances are coded by a sequence of labels ending by a non-marked k and M be the set of paths whose instances are coded by a sequence of labels ending by a marked k. Then F [p] = (Z\S) (N\M). Z(x, ) = ω Z xn(ω) y 0 = + 2xZ(x, ) + 2xN(x, ) + x j S(x, ) + 2x j M(x, ), S(x, ) = ω S xn(ω) y 0 = 2xS(x, ) + 2xM(x, ) + x j Z(x, ) + 2x j N(x, ), N(x, y) = ω N xn(ω) y h(ω) = xyz(x, ) + h(ω)+ ω N i= x n(ω)+ y i + h(ω) ω M i= xn(ω)+j y i, M(x, y) = ω M xn(ω) y h(ω) = xys(x, ) + h(ω)+ ω M i= x n(ω)+ y i + h(ω) ω N i= xn(ω)+j y i. A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

70 Enumeration Enumeration We obtain the generating function F j (x), j >, for the words ω F [p] according to the number of ones: where F j (x) = y 0 (x) x j ( x j )( + x j 2xy 0 (x)), y 0 (x) = x j + (x j + ) 2 4x. 2x A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

71 Enumeration Enumeration Let us remark that the generating function F j (x) depends only on the number of ones in the forbidden pattern. So, bifix-free Grand Dyck words represent an invariant class for the enumeration of the words which avoid anyone of such a shape path. This means that all the sets in F with n ones avoiding a forbidden pattern p G b j have the same cardinality, independently on the shape of p. Example For any pattern p in G4 b, the first numbers of the sequence enumerating the binary words in F [p], according to the number of ones, are:, 3, 0, 35, 25, 454, 67, 62, 2326, being the associated generating function. F 4 (x) = x 4 x 8 + 2x 4 + 4x 2x( x 3 ) x 8 + 2x 4 + 4x A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

72 Enumeration Why bifix-free forbidden patterns? The method works only for bifix-free forbidden patterns: if p is not bifix-free, then the jumping and marked succession rule should generate paths containing forbidden patterns which could not be eliminated in the right way. For example, when p = ε A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 3 / 37

73 Enumeration Why bifix-free forbidden patterns? The method works only for bifix-free forbidden patterns: if p is not bifix-free, then the jumping and marked succession rule should generate paths containing forbidden patterns which could not be eliminated in the right way. For example, when p = ε......? A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 3 / 37

74 Cross-bifix-free patterns Generalization In order to generalize our method we have to consider cross-bifix-free Grand Dyck words. Two distinct bifix-free Grand Dyck words δ, δ are said to be cross-bifix-free if and only if no prefix of δ is also a suffix of δ and vice-versa. A cross-bifix-free set is a set of words where any two words are cross-bifix-free. A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

75 Generalization Generalization Given a set P = {p, p 2,, p m } of cross-bifix-free Grand Dyck words, none included in any other, such that each p l having j l as the number of its s, l m, then the growth of the set F [P], according to the number of ones, can be described by the following jumping and marked succession rule: (0) (k) (k + )(k) ()(0 2 )(0 ) k 0 (0) j (0 2 ) (k) j (k)(k ) ()(0 2 )(0 ) k (0) j2 (0 2 ) (k) j2 (k)(k ) ()(0 2 )(0 ) k. (0) jm (0 2 ) (k) jm (k)(k ) ()(0 2 )(0 ) k A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

76 Generalization Generalization By using the previous notation, we have: Z(x, ) = + 2xZ(x, ) + 2xN(x, ) + (x j + + x jm )S(x, ) + 2(x j + + x jm )M(x, ), S(x, ) = 2xS(x, ) + 2xM(x, ) + (x j + + x jm )Z(x, ) + 2(x j + + x jm )N(x, ), N(x, y) = xyz(x, )+ ω N h(ω)+ i= x n(ω)+ y i + h(ω) ω M i= xn(ω)+j y i + + h(ω) ω M i= xn(ω)+jm y i, M(x, y) = xys(x, )+ ω M h(ω)+ i= x n(ω)+ y i + h(ω) ω N i= xn(ω)+j y i + + h(ω) ω N i= xn(ω)+jm y i. A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

77 Generalization Generalization We obtain the generating function F j,...,j m (x) for the words ω F [P] according to the number of ones: F j,,j m (x) = where y 0 (x) x j x jm ( x j x jm )( + x j + + x jm 2xy 0 (x)), y 0 (x) = + x j + + x jm (x j + + x jm + ) 2 4x. 2x A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

78 Further developments Further developments. Study other forbidden patterns p 2. Expand the alphabet {0, } 3. Find a unified approach for pattern avoidance construction and enumeration A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

79 Further developments Further developments. Study other forbidden patterns p 2. Expand the alphabet {0, } 3. Find a unified approach for pattern avoidance construction and enumeration A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

80 Further developments Further developments. Study other forbidden patterns p 2. Expand the alphabet {0, } 3. Find a unified approach for pattern avoidance construction and enumeration A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

81 Thanks for your attention A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37

A generating function for bit strings with no Grand Dyck pattern matching

A generating function for bit strings with no Grand Dyck pattern matching PU. M. A. Vol. 25 (205), No., pp. 30 44 A generating function for bit strings with no Grand Dyck pattern matching Antonio Bernini Dipartimento di Matematica e Informatica U. Dini Università degli Studi

More information

LEVEL GENERATING TREES AND PROPER RIORDAN ARRAYS

LEVEL GENERATING TREES AND PROPER RIORDAN ARRAYS Applicable Analysis and Discrete Mathematics, (008), 69 9 Available electronically at http://pefmathetfbgacyu LEVEL GENERATING TREES AND PROPER RIORDAN ARRAYS D Baccherini, D Merlini, R Sprugnoli We introduce

More information

Some statistics on permutations avoiding generalized patterns

Some statistics on permutations avoiding generalized patterns PUMA Vol 8 (007), No 4, pp 7 Some statistics on permutations avoiding generalized patterns Antonio Bernini Università di Firenze, Dipartimento di Sistemi e Informatica, viale Morgagni 65, 504 Firenze,

More information

A two dimensional non-overlapping code over a q-ary alphabet

A two dimensional non-overlapping code over a q-ary alphabet A two dimensional non-overlapping code over a q-ary alphabet Antonio Bernini Dipartimento di Matematica e Informatica, Università di Firenze Convegno GNCS 2018 - Montecatini Terme, 14 16 Febbraio 2018

More information

ECO-generation for some restricted classes of compositions

ECO-generation for some restricted classes of compositions ECO-generation for some restricted classes of compositions Jean-Luc Baril and Phan-Thuan Do 1 LE2I UMR-CNRS 5158, Université de Bourgogne BP 47 870, 21078 DIJON-Cedex France e-mail: barjl@u-bourgognefr

More information

Well-Ordered Sets, Ordinals and Cardinals Ali Nesin 1 July 2001

Well-Ordered Sets, Ordinals and Cardinals Ali Nesin 1 July 2001 Well-Ordered Sets, Ordinals and Cardinals Ali Nesin 1 July 2001 Definitions. A set together with a binary relation < is called a partially ordered set (poset in short) if x (x < x) x y z ((x < y y < z)

More information

Sequences that satisfy a(n a(n)) = 0

Sequences that satisfy a(n a(n)) = 0 Sequences that satisfy a(n a(n)) = 0 Nate Kube Frank Ruskey October 13, 2005 Abstract We explore the properties of some sequences for which a(n a(n)) = 0. Under the natural restriction that a(n) < n the

More information

Notes on the Catalan problem

Notes on the Catalan problem Notes on the Catalan problem Daniele Paolo Scarpazza Politecnico di Milano March 16th, 2004 Daniele Paolo Scarpazza Notes on the Catalan problem [1] An overview of Catalan problems

More information

ON MULTI-AVOIDANCE OF RIGHT ANGLED NUMBERED POLYOMINO PATTERNS

ON MULTI-AVOIDANCE OF RIGHT ANGLED NUMBERED POLYOMINO PATTERNS INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 4 (2004), #A21 ON MULTI-AVOIDANCE OF RIGHT ANGLED NUMBERED POLYOMINO PATTERNS Sergey Kitaev Department of Mathematics, University of Kentucky,

More information

Pattern Popularity in 132-Avoiding Permutations

Pattern Popularity in 132-Avoiding Permutations Pattern Popularity in 132-Avoiding Permutations The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Rudolph,

More information

Transducers for bidirectional decoding of prefix codes

Transducers for bidirectional decoding of prefix codes Transducers for bidirectional decoding of prefix codes Laura Giambruno a,1, Sabrina Mantaci a,1 a Dipartimento di Matematica ed Applicazioni - Università di Palermo - Italy Abstract We construct a transducer

More information

Transducers for bidirectional decoding of codes with a finite deciphering delay

Transducers for bidirectional decoding of codes with a finite deciphering delay Transducers for bidirectional decoding of codes with a finite deciphering delay L. Giambruno 1, S. Mantaci 2, J. Néraud 3 and C. Selmi 3 GREYC - Université de Caen Basse-Normandie Dipartimento di Matematica

More information

Paths, Permutations and Trees. Enumerating Permutations Avoiding Three Babson - Steingrímsson Patterns

Paths, Permutations and Trees. Enumerating Permutations Avoiding Three Babson - Steingrímsson Patterns Paths, Permutations and Trees Center for Combinatorics Nankai University Tianjin, February 5-7, 004 Enumerating Permutations Avoiding Three Babson - Steingrímsson Patterns Antonio Bernini, Elisa Pergola

More information

Languages. Languages. An Example Grammar. Grammars. Suppose we have an alphabet V. Then we can write:

Languages. Languages. An Example Grammar. Grammars. Suppose we have an alphabet V. Then we can write: Languages A language is a set (usually infinite) of strings, also known as sentences Each string consists of a sequence of symbols taken from some alphabet An alphabet, V, is a finite set of symbols, e.g.

More information

CVO103: Programming Languages. Lecture 2 Inductive Definitions (2)

CVO103: Programming Languages. Lecture 2 Inductive Definitions (2) CVO103: Programming Languages Lecture 2 Inductive Definitions (2) Hakjoo Oh 2018 Spring Hakjoo Oh CVO103 2018 Spring, Lecture 2 March 13, 2018 1 / 20 Contents More examples of inductive definitions natural

More information

Propositional and Predicate Logic - IV

Propositional and Predicate Logic - IV Propositional and Predicate Logic - IV Petr Gregor KTIML MFF UK ZS 2015/2016 Petr Gregor (KTIML MFF UK) Propositional and Predicate Logic - IV ZS 2015/2016 1 / 19 Tableau method (from the previous lecture)

More information

Theory of Computation

Theory of Computation Thomas Zeugmann Hokkaido University Laboratory for Algorithmics http://www-alg.ist.hokudai.ac.jp/ thomas/toc/ Lecture 12: Turing Machines Turing Machines I After having dealt with partial recursive functions,

More information

Theory of Computation

Theory of Computation Theory of Computation (Feodor F. Dragan) Department of Computer Science Kent State University Spring, 2018 Theory of Computation, Feodor F. Dragan, Kent State University 1 Before we go into details, what

More information

Binomial Coefficient Identities/Complements

Binomial Coefficient Identities/Complements Binomial Coefficient Identities/Complements CSE21 Fall 2017, Day 4 Oct 6, 2017 https://sites.google.com/a/eng.ucsd.edu/cse21-fall-2017-miles-jones/ permutation P(n,r) = n(n-1) (n-2) (n-r+1) = Terminology

More information

This lecture covers Chapter 5 of HMU: Context-free Grammars

This lecture covers Chapter 5 of HMU: Context-free Grammars This lecture covers Chapter 5 of HMU: Context-free rammars (Context-free) rammars (Leftmost and Rightmost) Derivations Parse Trees An quivalence between Derivations and Parse Trees Ambiguity in rammars

More information

Algebraic aspects of some Riordan arrays related to binary words avoiding a pattern

Algebraic aspects of some Riordan arrays related to binary words avoiding a pattern Algebraic aspects of some Riordan arrays related to binary words avoiding a pattern D. Merlini and R. Sprugnoli Dipartimento di Sistemi e Informatica viale Morgagni 65, 5034, Firenze, Italia merlini@dsi.unifi.it,

More information

Decreasing Subsequences in Permutations and Wilf Equivalence for Involutions

Decreasing Subsequences in Permutations and Wilf Equivalence for Involutions Journal of Algebraic Combinatorics, 22, 383 409, 2005 c 2005 Springer Science + Business Media, Inc. Manufactured in The Netherlands. Decreasing Subsequences in Permutations and Wilf Equivalence for Involutions

More information

Exact Generation of Minimal Acyclic Deterministic Finite Automata

Exact Generation of Minimal Acyclic Deterministic Finite Automata Exact Generation of Minimal Acyclic Deterministic Finite Automata Marco Almeida Nelma Moreira Rogério Reis LIACC, Faculdade de Ciências, Universidade do Porto Departamento de Ciência de Computadores Rua

More information

On the Sequence A and Its Combinatorial Interpretations

On the Sequence A and Its Combinatorial Interpretations 1 2 47 6 2 11 Journal of Integer Sequences, Vol. 9 (2006), Article 06..1 On the Sequence A079500 and Its Combinatorial Interpretations A. Frosini and S. Rinaldi Università di Siena Dipartimento di Scienze

More information

VAUGHT S THEOREM: THE FINITE SPECTRUM OF COMPLETE THEORIES IN ℵ 0. Contents

VAUGHT S THEOREM: THE FINITE SPECTRUM OF COMPLETE THEORIES IN ℵ 0. Contents VAUGHT S THEOREM: THE FINITE SPECTRUM OF COMPLETE THEORIES IN ℵ 0 BENJAMIN LEDEAUX Abstract. This expository paper introduces model theory with a focus on countable models of complete theories. Vaught

More information

Matrix compositions. Emanuele Munarini. Dipartimento di Matematica Politecnico di Milano

Matrix compositions. Emanuele Munarini. Dipartimento di Matematica Politecnico di Milano Matrix compositions Emanuele Munarini Dipartimento di Matematica Politecnico di Milano emanuelemunarini@polimiit Joint work with Maddalena Poneti and Simone Rinaldi FPSAC 26 San Diego Motivation: L-convex

More information

Production matrices. Received 24 June 2003; accepted 17 May 2004 Available online 15 September 2004

Production matrices. Received 24 June 2003; accepted 17 May 2004 Available online 15 September 2004 Advances in Applied Mathematics 34 2005) 101 122 wwwelseviercom/locate/yaama Production matrices Emeric Deutsch a,, Luca Ferrari b,1, Simone Rinaldi b,1 a Polytechnic University, Six Metrotech Center,

More information

Algebras with finite descriptions

Algebras with finite descriptions Algebras with finite descriptions André Nies The University of Auckland July 19, 2005 Part 1: FA-presentability A countable structure in a finite signature is finite-automaton presentable (or automatic)

More information

Parsing. Context-Free Grammars (CFG) Laura Kallmeyer. Winter 2017/18. Heinrich-Heine-Universität Düsseldorf 1 / 26

Parsing. Context-Free Grammars (CFG) Laura Kallmeyer. Winter 2017/18. Heinrich-Heine-Universität Düsseldorf 1 / 26 Parsing Context-Free Grammars (CFG) Laura Kallmeyer Heinrich-Heine-Universität Düsseldorf Winter 2017/18 1 / 26 Table of contents 1 Context-Free Grammars 2 Simplifying CFGs Removing useless symbols Eliminating

More information

Syntactical analysis. Syntactical analysis. Syntactical analysis. Syntactical analysis

Syntactical analysis. Syntactical analysis. Syntactical analysis. Syntactical analysis Context-free grammars Derivations Parse Trees Left-recursive grammars Top-down parsing non-recursive predictive parsers construction of parse tables Bottom-up parsing shift/reduce parsers LR parsers GLR

More information

Ordered trees and the inorder traversal

Ordered trees and the inorder traversal Discrete Mathematics 306 (006) 173 1741 www.elsevier.com/locate/disc Ordered trees and the inorder traversal A. Sapounakis, I. Tasoulas, P. Tsikouras Department of Informatics, University of Piraeus, 18534

More information

On the satisfiability problem for a 4-level quantified syllogistic and some applications to modal logic

On the satisfiability problem for a 4-level quantified syllogistic and some applications to modal logic On the satisfiability problem for a 4-level quantified syllogistic and some applications to modal logic Domenico Cantone and Marianna Nicolosi Asmundo Dipartimento di Matematica e Informatica Università

More information

Short Introduction to Admissible Recursion Theory

Short Introduction to Admissible Recursion Theory Short Introduction to Admissible Recursion Theory Rachael Alvir November 2016 1 Axioms of KP and Admissible Sets An admissible set is a transitive set A satisfying the axioms of Kripke-Platek Set Theory

More information

Classes of Polish spaces under effective Borel isomorphism

Classes of Polish spaces under effective Borel isomorphism Classes of Polish spaces under effective Borel isomorphism Vassilis Gregoriades TU Darmstadt October 203, Vienna The motivation It is essential for the development of effective descriptive set theory to

More information

1 The decision problem for First order logic

1 The decision problem for First order logic Math 260A Mathematical Logic Scribe Notes UCSD Winter Quarter 2012 Instructor: Sam Buss Notes by: James Aisenberg April 27th 1 The decision problem for First order logic Fix a finite language L. Define

More information

Computing the Frequency of Partial Orders

Computing the Frequency of Partial Orders Computing the Frequency of Partial Orders M.R.C. van Dongen (dongen@cs.ucc.ie) Centre for Efficiency Orientated Languages, University College Cork Abstract. In this paper we study four algorithms for computing

More information

Set Theory and the Foundation of Mathematics. June 19, 2018

Set Theory and the Foundation of Mathematics. June 19, 2018 1 Set Theory and the Foundation of Mathematics June 19, 2018 Basics Numbers 2 We have: Relations (subsets on their domain) Ordered pairs: The ordered pair x, y is the set {{x, y}, {x}}. Cartesian products

More information

The complexity of recursive constraint satisfaction problems.

The complexity of recursive constraint satisfaction problems. The complexity of recursive constraint satisfaction problems. Victor W. Marek Department of Computer Science University of Kentucky Lexington, KY 40506, USA marek@cs.uky.edu Jeffrey B. Remmel Department

More information

NFA and regex. the Boolean algebra of languages. regular expressions. Informatics 1 School of Informatics, University of Edinburgh

NFA and regex. the Boolean algebra of languages. regular expressions. Informatics 1 School of Informatics, University of Edinburgh NFA and regex cl the Boolean algebra of languages regular expressions Informatics The intersection of two regular languages is regular L = even numbers L = odd numbers L = mod L = mod Informatics The intersection

More information

Hierarchy among Automata on Linear Orderings

Hierarchy among Automata on Linear Orderings Hierarchy among Automata on Linear Orderings Véronique Bruyère Institut d Informatique Université de Mons-Hainaut Olivier Carton LIAFA Université Paris 7 Abstract In a preceding paper, automata and rational

More information

The Phagocyte Lattice of Dyck Words

The Phagocyte Lattice of Dyck Words DOI 10.1007/s11083-006-9034-0 The Phagocyte Lattice of Dyck Words J. L. Baril J. M. Pallo Received: 26 September 2005 / Accepted: 25 May 2006 Springer Science + Business Media B.V. 2006 Abstract We introduce

More information

Decidability (What, stuff is unsolvable?)

Decidability (What, stuff is unsolvable?) University of Georgia Fall 2014 Outline Decidability Decidable Problems for Regular Languages Decidable Problems for Context Free Languages The Halting Problem Countable and Uncountable Sets Diagonalization

More information

Words restricted by patterns with at most 2 distinct letters

Words restricted by patterns with at most 2 distinct letters Words restricted by patterns with at most 2 distinct letters Alexander Burstein Department of Mathematics Iowa State University Ames, IA 50011-2064 USA burstein@math.iastate.edu Toufik Mansour LaBRI, Université

More information

Reverse mathematics and the equivalence of definitions for well and better quasi-orders

Reverse mathematics and the equivalence of definitions for well and better quasi-orders Reverse mathematics and the equivalence of definitions for well and better quasi-orders Peter Cholak Department of Mathematics, University of Notre Dame, USA Alberto Marcone Dipartimento di Matematica

More information

4.8 Huffman Codes. These lecture slides are supplied by Mathijs de Weerd

4.8 Huffman Codes. These lecture slides are supplied by Mathijs de Weerd 4.8 Huffman Codes These lecture slides are supplied by Mathijs de Weerd Data Compression Q. Given a text that uses 32 symbols (26 different letters, space, and some punctuation characters), how can we

More information

Part II. Logic and Set Theory. Year

Part II. Logic and Set Theory. Year Part II Year 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2018 60 Paper 4, Section II 16G State and prove the ǫ-recursion Theorem. [You may assume the Principle of ǫ- Induction.]

More information

E D I C T The internal extent formula for compacted tries

E D I C T The internal extent formula for compacted tries E D C T The internal extent formula for compacted tries Paolo Boldi Sebastiano Vigna Università degli Studi di Milano, taly Abstract t is well known [Knu97, pages 399 4] that in a binary tree the external

More information

A shrinking lemma for random forbidding context languages

A shrinking lemma for random forbidding context languages Theoretical Computer Science 237 (2000) 149 158 www.elsevier.com/locate/tcs A shrinking lemma for random forbidding context languages Andries van der Walt a, Sigrid Ewert b; a Department of Mathematics,

More information

Introduction to Binary Convolutional Codes [1]

Introduction to Binary Convolutional Codes [1] Introduction to Binary Convolutional Codes [1] Yunghsiang S. Han Graduate Institute of Communication Engineering, National Taipei University Taiwan E-mail: yshan@mail.ntpu.edu.tw Y. S. Han Introduction

More information

This lecture covers Chapter 6 of HMU: Pushdown Automata

This lecture covers Chapter 6 of HMU: Pushdown Automata This lecture covers Chapter 6 of HMU: ushdown Automata ushdown Automata (DA) Language accepted by a DA Equivalence of CFs and the languages accepted by DAs Deterministic DAs Additional Reading: Chapter

More information

Fall, 2017 CIS 262. Automata, Computability and Complexity Jean Gallier Solutions of the Practice Final Exam

Fall, 2017 CIS 262. Automata, Computability and Complexity Jean Gallier Solutions of the Practice Final Exam Fall, 2017 CIS 262 Automata, Computability and Complexity Jean Gallier Solutions of the Practice Final Exam December 6, 2017 Problem 1 (10 pts). Let Σ be an alphabet. (1) What is an ambiguous context-free

More information

LaCIM seminar, UQÀM. March 15, 2013

LaCIM seminar, UQÀM. March 15, 2013 (Valparaiso University) LaCIM seminar, UQÀM Montréal, Québec March 15, 2013 Conventions and Definitions s are written in one-line notation. e.g. S 3 = {123, 132, 213, 231, 312, 321} Conventions and Definitions

More information

On a refinement of Wilf-equivalence for permutations

On a refinement of Wilf-equivalence for permutations On a refinement of Wilf-equivalence for permutations Sherry H. F. Yan Department of Mathematics Zhejiang Normal University Jinhua 321004, P.R. China huifangyan@hotmail.com Yaqiu Zhang Department of Mathematics

More information

CFGs and PDAs are Equivalent. We provide algorithms to convert a CFG to a PDA and vice versa.

CFGs and PDAs are Equivalent. We provide algorithms to convert a CFG to a PDA and vice versa. CFGs and PDAs are Equivalent We provide algorithms to convert a CFG to a PDA and vice versa. CFGs and PDAs are Equivalent We now prove that a language is generated by some CFG if and only if it is accepted

More information

Convex Domino Towers

Convex Domino Towers 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 20 (2017, Article 17.3.1 Convex Domino Towers Tricia Muldoon Brown Department of Mathematics Armstrong State University 11935 Abercorn Street Savannah,

More information

ENUMERATING PERMUTATIONS AVOIDING A PAIR OF BABSON-STEINGRíMSSON PATTERNS

ENUMERATING PERMUTATIONS AVOIDING A PAIR OF BABSON-STEINGRíMSSON PATTERNS ENUMERATING PERMUTATIONS AVOIDING A PAIR OF BABSON-STEINGRíMSSON PATTERNS ANDERS CLAESSON AND TOUFIK MANSOUR Abstract. Babson and Steingrímsson introduced generalized permutation patterns that allow the

More information

Parikh s Theorem and Descriptional Complexity

Parikh s Theorem and Descriptional Complexity Parikh s Theorem and Descriptional Complexity Giovanna J. Lavado and Giovanni Pighizzini Dipartimento di Informatica e Comunicazione Università degli Studi di Milano SOFSEM 2012 Špindlerův Mlýn, Czech

More information

USA Mathematical Talent Search Round 1 Solutions Year 27 Academic Year

USA Mathematical Talent Search Round 1 Solutions Year 27 Academic Year 1/1/27. Fill in the spaces of the grid to the right with positive integers so that in each 2 2 square with top left number a, top right number b, bottom left number c, and bottom right number d, either

More information

Herbrand Theorem, Equality, and Compactness

Herbrand Theorem, Equality, and Compactness CSC 438F/2404F Notes (S. Cook and T. Pitassi) Fall, 2014 Herbrand Theorem, Equality, and Compactness The Herbrand Theorem We now consider a complete method for proving the unsatisfiability of sets of first-order

More information

A BIJECTION BETWEEN WELL-LABELLED POSITIVE PATHS AND MATCHINGS

A BIJECTION BETWEEN WELL-LABELLED POSITIVE PATHS AND MATCHINGS Séminaire Lotharingien de Combinatoire 63 (0), Article B63e A BJECTON BETWEEN WELL-LABELLED POSTVE PATHS AND MATCHNGS OLVER BERNARD, BERTRAND DUPLANTER, AND PHLPPE NADEAU Abstract. A well-labelled positive

More information

SOME TRANSFINITE INDUCTION DEDUCTIONS

SOME TRANSFINITE INDUCTION DEDUCTIONS SOME TRANSFINITE INDUCTION DEDUCTIONS SYLVIA DURIAN Abstract. This paper develops the ordinal numbers and transfinite induction, then demonstrates some interesting applications of transfinite induction.

More information

ω-stable Theories: Introduction

ω-stable Theories: Introduction ω-stable Theories: Introduction 1 ω - Stable/Totally Transcendental Theories Throughout let T be a complete theory in a countable language L having infinite models. For an L-structure M and A M let Sn

More information

Pattern avoidance in partial permutations

Pattern avoidance in partial permutations Pattern avoidance in partial permutations Anders Claesson Department of Computer and Information Sciences, University of Strathclyde, Glasgow, G1 1XH, UK anders.claesson@cis.strath.ac.uk Vít Jelínek Fakultät

More information

Theory of Computation

Theory of Computation Thomas Zeugmann Hokkaido University Laboratory for Algorithmics http://www-alg.ist.hokudai.ac.jp/ thomas/toc/ Lecture 1: Introducing Formal Languages Motivation I This course is about the study of a fascinating

More information

Applications of Regular Algebra to Language Theory Problems. Roland Backhouse February 2001

Applications of Regular Algebra to Language Theory Problems. Roland Backhouse February 2001 1 Applications of Regular Algebra to Language Theory Problems Roland Backhouse February 2001 Introduction 2 Examples: Path-finding problems. Membership problem for context-free languages. Error repair.

More information

Convex Domino Towers

Convex Domino Towers Convex Domino Towers Tricia Muldoon Brown Department of Mathematics Armstrong State University 11935 Abercorn Street Savannah, GA 31419 USA patricia.brown@armstrong.edu Abstract We study convex domino

More information

Decoding and Inference with Syntactic Translation Models

Decoding and Inference with Syntactic Translation Models Decoding and Inference with Syntactic Translation Models March 5, 2013 CFGs S NP VP VP NP V V NP NP CFGs S NP VP S VP NP V V NP NP CFGs S NP VP S VP NP V NP VP V NP NP CFGs S NP VP S VP NP V NP VP V NP

More information

A basis for the non-crossing partition lattice top homology

A basis for the non-crossing partition lattice top homology J Algebr Comb (2006) 23: 231 242 DOI 10.1007/s10801-006-7395-5 A basis for the non-crossing partition lattice top homology Eliana Zoque Received: July 31, 2003 / Revised: September 14, 2005 / Accepted:

More information

Centrosymmetric words avoiding 3-letter permutation patterns

Centrosymmetric words avoiding 3-letter permutation patterns Centrosymmetric words avoiding 3-letter permutation patterns Luca S. Ferrari Dipartimento di Matematica, Università di Bologna Piazza di Porta San Donato, 5-406 Bologna, Italy luca.ferrari0@unibo.it Mathematics

More information

Characterizing First Order Logic

Characterizing First Order Logic Characterizing First Order Logic Jared Holshouser, Originally by Lindstrom September 16, 2014 We are following the presentation of Chang and Keisler. 1 A Brief Review of First Order Logic Definition 1.

More information

Motzkin Paths with Vertical Edges

Motzkin Paths with Vertical Edges Motzkin Paths with Vertical Edges Veronika Irvine and Frank Ruskey University of Victoria, Canada March 13, 2014 Abstract This paper considers finite lattice paths formed from the set of step vectors {,,,,

More information

Chapter 4: Context-Free Grammars

Chapter 4: Context-Free Grammars Chapter 4: Context-Free Grammars 4.1 Basics of Context-Free Grammars Definition A context-free grammars, or CFG, G is specified by a quadruple (N, Σ, P, S), where N is the nonterminal or variable alphabet;

More information

Enumerating Binary Strings

Enumerating Binary Strings International Mathematical Forum, Vol. 7, 2012, no. 38, 1865-1876 Enumerating Binary Strings without r-runs of Ones M. A. Nyblom School of Mathematics and Geospatial Science RMIT University Melbourne,

More information

Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs

Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs Nathan Lindzey, Ross M. McConnell Colorado State University, Fort Collins CO 80521, USA Abstract. Tucker characterized

More information

On the Concept of Enumerability Of Infinite Sets Charlie Obimbo Dept. of Computing and Information Science University of Guelph

On the Concept of Enumerability Of Infinite Sets Charlie Obimbo Dept. of Computing and Information Science University of Guelph On the Concept of Enumerability Of Infinite Sets Charlie Obimbo Dept. of Computing and Information Science University of Guelph ABSTRACT This paper discusses the concept of enumerability of infinite sets.

More information

3.10. TREE DOMAINS AND GORN TREES Tree Domains and Gorn Trees

3.10. TREE DOMAINS AND GORN TREES Tree Domains and Gorn Trees 3.10. TREE DOMAINS AND GORN TREES 211 3.10 Tree Domains and Gorn Trees Derivation trees play a very important role in parsing theory and in the proof of a strong version of the pumping lemma for the context-free

More information

Abstracting real-valued parameters in parameterised boolean equation systems

Abstracting real-valued parameters in parameterised boolean equation systems Department of Mathematics and Computer Science Formal System Analysis Research Group Abstracting real-valued parameters in parameterised boolean equation systems Master Thesis M. Laveaux Supervisor: dr.

More information

Overview of Topics. Finite Model Theory. Finite Model Theory. Connections to Database Theory. Qing Wang

Overview of Topics. Finite Model Theory. Finite Model Theory. Connections to Database Theory. Qing Wang Overview of Topics Finite Model Theory Part 1: Introduction 1 What is finite model theory? 2 Connections to some areas in CS Qing Wang qing.wang@anu.edu.au Database theory Complexity theory 3 Basic definitions

More information

Foundations of Informatics: a Bridging Course

Foundations of Informatics: a Bridging Course Foundations of Informatics: a Bridging Course Week 3: Formal Languages and Semantics Thomas Noll Lehrstuhl für Informatik 2 RWTH Aachen University noll@cs.rwth-aachen.de http://www.b-it-center.de/wob/en/view/class211_id948.html

More information

A Tableau-Based Decision Procedure for Right Propositional Neighborhood Logic (RPNL )

A Tableau-Based Decision Procedure for Right Propositional Neighborhood Logic (RPNL ) A Tableau-Based Decision Procedure for Right Propositional Neighborhood Logic (RPNL ) Davide Bresolin Angelo Montanari Dipartimento di Matematica e Informatica Università degli Studi di Udine {bresolin,

More information

A tableau-based decision procedure for a branching-time interval temporal logic

A tableau-based decision procedure for a branching-time interval temporal logic A tableau-based decision procedure for a branching-time interval temporal logic Davide Bresolin Angelo Montanari Dipartimento di Matematica e Informatica Università degli Studi di Udine {bresolin, montana}@dimi.uniud.it

More information

A fast algorithm to generate necklaces with xed content

A fast algorithm to generate necklaces with xed content Theoretical Computer Science 301 (003) 477 489 www.elsevier.com/locate/tcs Note A fast algorithm to generate necklaces with xed content Joe Sawada 1 Department of Computer Science, University of Toronto,

More information

Generating All Permutations by Context-Free Grammars in Chomsky Normal Form

Generating All Permutations by Context-Free Grammars in Chomsky Normal Form Generating All Permutations by Context-Free Grammars in Chomsky Normal Form Peter R.J. Asveld Department of Computer Science, Twente University of Technology P.O. Box 217, 7500 AE Enschede, the Netherlands

More information

Advanced Automata Theory 9 Automatic Structures in General

Advanced Automata Theory 9 Automatic Structures in General Advanced Automata Theory 9 Automatic Structures in General Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Advanced Automata

More information

1 Alphabets and Languages

1 Alphabets and Languages 1 Alphabets and Languages Look at handout 1 (inference rules for sets) and use the rules on some examples like {a} {{a}} {a} {a, b}, {a} {{a}}, {a} {{a}}, {a} {a, b}, a {{a}}, a {a, b}, a {{a}}, a {a,

More information

Math 455 Some notes on Cardinality and Transfinite Induction

Math 455 Some notes on Cardinality and Transfinite Induction Math 455 Some notes on Cardinality and Transfinite Induction (David Ross, UH-Manoa Dept. of Mathematics) 1 Cardinality Recall the following notions: function, relation, one-to-one, onto, on-to-one correspondence,

More information

CS375 Midterm Exam Solution Set (Fall 2017)

CS375 Midterm Exam Solution Set (Fall 2017) CS375 Midterm Exam Solution Set (Fall 2017) Closed book & closed notes October 17, 2017 Name sample 1. (10 points) (a) Put in the following blank the number of strings of length 5 over A={a, b, c} that

More information

Compositions, Bijections, and Enumerations

Compositions, Bijections, and Enumerations Georgia Southern University Digital Commons@Georgia Southern Electronic Theses & Dissertations COGS- Jack N. Averitt College of Graduate Studies Fall 2012 Compositions, Bijections, and Enumerations Charles

More information

BOOLEAN ALGEBRA APPROXIMATIONS

BOOLEAN ALGEBRA APPROXIMATIONS BOOLEAN ALGEBRA APPROXIMATIONS KENNETH HARRIS AND ANTONIO MONTALBÁN Abstract. Knight and Stob proved that every low 4 Boolean algebra is 0 (6) -isomorphic to a computable one. Furthermore, for n = 1, 2,

More information

ENUMERATION OF CONNECTED CATALAN OBJECTS BY TYPE. 1. Introduction

ENUMERATION OF CONNECTED CATALAN OBJECTS BY TYPE. 1. Introduction ENUMERATION OF CONNECTED CATALAN OBJECTS BY TYPE BRENDON RHOADES Abstract. Noncrossing set partitions, nonnesting set partitions, Dyck paths, and rooted plane trees are four classes of Catalan objects

More information

Theoretical Computer Science. State complexity of basic operations on suffix-free regular languages

Theoretical Computer Science. State complexity of basic operations on suffix-free regular languages Theoretical Computer Science 410 (2009) 2537 2548 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs State complexity of basic operations

More information

Finite Automata. BİL405 - Automata Theory and Formal Languages 1

Finite Automata. BİL405 - Automata Theory and Formal Languages 1 Finite Automata BİL405 - Automata Theory and Formal Languages 1 Deterministic Finite Automata (DFA) A Deterministic Finite Automata (DFA) is a quintuple A = (Q,,, q 0, F) 1. Q is a finite set of states

More information

Advanced Automata Theory 10 Transducers and Rational Relations

Advanced Automata Theory 10 Transducers and Rational Relations Advanced Automata Theory 10 Transducers and Rational Relations Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Advanced

More information

CS 121, Section 2. Week of September 16, 2013

CS 121, Section 2. Week of September 16, 2013 CS 121, Section 2 Week of September 16, 2013 1 Concept Review 1.1 Overview In the past weeks, we have examined the finite automaton, a simple computational model with limited memory. We proved that DFAs,

More information

Example. Lemma. Proof Sketch. 1 let A be a formula that expresses that node t is reachable from s

Example. Lemma. Proof Sketch. 1 let A be a formula that expresses that node t is reachable from s Summary Summary Last Lecture Computational Logic Π 1 Γ, x : σ M : τ Γ λxm : σ τ Γ (λxm)n : τ Π 2 Γ N : τ = Π 1 [x\π 2 ] Γ M[x := N] Georg Moser Institute of Computer Science @ UIBK Winter 2012 the proof

More information

GEETANJALI INSTITUTE OF TECHNICAL STUDIES, UDAIPUR I

GEETANJALI INSTITUTE OF TECHNICAL STUDIES, UDAIPUR I GEETANJALI INSTITUTE OF TECHNICAL STUDIES, UDAIPUR I Internal Examination 2017-18 B.Tech III Year VI Semester Sub: Theory of Computation (6CS3A) Time: 1 Hour 30 min. Max Marks: 40 Note: Attempt all three

More information

THE GOLDEN MEAN SHIFT IS THE SET OF 3x + 1 ITINERARIES

THE GOLDEN MEAN SHIFT IS THE SET OF 3x + 1 ITINERARIES THE GOLDEN MEAN SHIFT IS THE SET OF 3x + 1 ITINERARIES DAN-ADRIAN GERMAN Department of Computer Science, Indiana University, 150 S Woodlawn Ave, Bloomington, IN 47405-7104, USA E-mail: dgerman@csindianaedu

More information

Turing s thesis: (1930) Any computation carried out by mechanical means can be performed by a Turing Machine

Turing s thesis: (1930) Any computation carried out by mechanical means can be performed by a Turing Machine Turing s thesis: (1930) Any computation carried out by mechanical means can be performed by a Turing Machine There is no known model of computation more powerful than Turing Machines Definition of Algorithm:

More information

CS 455/555: Mathematical preliminaries

CS 455/555: Mathematical preliminaries CS 455/555: Mathematical preliminaries Stefan D. Bruda Winter 2019 SETS AND RELATIONS Sets: Operations: intersection, union, difference, Cartesian product Big, powerset (2 A ) Partition (π 2 A, π, i j

More information

Scott Sentences in Uncountable Structures

Scott Sentences in Uncountable Structures Rose-Hulman Undergraduate Mathematics Journal Volume 18 Issue 1 Article 14 Scott Sentences in Uncountable Structures Brian Tyrrell Trinity College Dublin Follow this and additional works at: http://scholar.rose-hulman.edu/rhumj

More information