Grand Dyck consecutive patterns avoiding binary words
|
|
- Suzan Carroll
- 6 years ago
- Views:
Transcription
1 Grand Dyck consecutive patterns avoiding binary words A.Bernini S.Bilotta E.Pergola R.Pinzani UNIVERSITA DEGLI STUDI DI FIRENZE Dipartimento di Matematica e Informatica Permutation Patterns 203 A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 / 37
2 Table of contents Outline Definitions and notations 2 A general approach 3 Main Result 4 Enumeration 5 Generalization 6 Further developments A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 2 / 37
3 Definitions and notations Binary words avoiding a pattern p Let F {0, } be the class of binary words ω such that ω 0 ω for any ω F, ω 0 and ω are the number of zeroes and ones in ω, respectively. We are interested in studying the subclass F [p] F of binary words excluding a given pattern p = p 0... p h {0, } h, i.e. the words ω F [p] that do not admit a sequence of consecutive indices i, i +,..., i + h such that ω i ω i+... ω i+h = p 0 p... p h. R. Sedgewick & P. Flajolet (996): An Introduction to the Analysis of Algorithms. Addison-Wesley, Reading, MA. A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 3 / 37
4 Example Definitions and notations p = 0 0 ω = A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 4 / 37
5 Grand Dyck words Definitions and notations Let us denote by G j the set of 2j-length Grand Dyck words. It is well known that a Grand Dyck word δ is a binary string such that δ 0 = δ. In this work, we consider the so called bifix-free Grand Dyck words, i.e. a Grand Dyck word δ is said to be bifix-free if and only if no prefix of δ is a suffix of δ. Let us denote by Gj b the set of 2j-length bifix-free Grand Dyck words and we study the class F [p] with p Gj b, for any fixed j. A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 5 / 37
6 A general approach A general approach Let F {0, } be the class of binary words ω such that ω 0 ω for any ω F. For example, in order to generate the language F [p] an ad hoc grammar (depending on the forbidden pattern p) should be defined. Consequently, for each pattern p a different generating function enumerating the words in F [p] must to be computed. Our aim is to determine a constructive algorithm proposing a more unified approach. The algorithm bases on a succession rule which allows us to obtain a generating function for the enumeration of each classes F [p], according to the number of ones. Such enumeration does not depend on the shape of the forbidden pattern p. A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 6 / 37
7 Succession rules A general approach A succession rule Ω is a system constituted by an axiom (a), with a N, and a set of productions of the form: (k) (e (k))(e 2 (k))... (e k (k)), k N, e i : N N. A production constructs, for any given label (k), its successors (e (k)), (e 2 (k)),..., (e k (k)). Compact notation: { (a) (k) (e (k))(e 2 (k))... (e k (k)) F. R. K. Chung, R. L. Graham, V. E. Hoggatt & M. Kleimann (978): The number of Baxter permutations. Journal of Combinatorial Theory, Series A 24, pp A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 7 / 37
8 Generating trees A general approach The rule Ω can be represented by means of a generating tree, that is a rooted tree whose vertices are the labels of Ω; where (a) is the label of the root and each node labelled (k) has k sons labelled (e (k)), (e 2 (k)),..., (e k (k)), respectively. As usual, the root lies at level 0, and a node lies at level n if its parent lies at level n. A succession rule describes the growth of a class of combinatorial objects if there exists a bijection between the object of size n and the nodes at level n in the generating tree, then a given object can be coded by the sequence of labels met from the root of the generating tree to the object itself. A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 8 / 37
9 Jumping succession rules A general approach A jumping succession rule is a set of productions acting on the objects of a class and producing sons at different levels. Compact notation: (a) (k) (k) (e (k))(e 2 (k))... (e k (k)), j (d (k))(d 2 (k))... (d k (k)). L. Ferrari, E. Pergola, R. Pinzani & S. Rinaldi (2003): Jumping succession rules and their generating functions. Discrete Mathematics 27, pp A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 9 / 37
10 A general approach Jumping and marked succession rules A jumping and marked succession rule is a jumping succession rule where marked labels are considered together with usual ones. In this way a generating tree can support negative values if we consider a node labelled (k) as opposed to a node labelled (k) lying on the same level. Compact notation: (a) (k) (k) (e (k))(e 2 (k))... (e k (k)), j (d (k))(d 2 (k))... (d k (k)). A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 0 / 37
11 A general approach Jumping and marked succession rules Compact notation: (a) (k) (k) (e (k))(e 2 (k))... (e k (k)), j (d (k))(d 2 (k))... (d k (k)). describes also the behavior for (k): { (k) (e (k))(e 2 (k))... (e k (k)), (k) j (d (k))(d 2 (k))... (d k (k)). having (k) = (k). A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 / 37
12 Example (0) (k) (k) A general approach (k + )(k) ()(0)(0) 2 (k + )(k) ()(0)(0) level 0 (0) () (0) (0) 2 (2) () (0) (0) () (0) (0) () (0) (0) () (0) (0) (k) = (k) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 2 / 37
13 Example (0) (k) (k) A general approach (k + )(k) ()(0)(0) 2 (k + )(k) ()(0)(0) level 0 (0) Cardinality () (0) (0) 3 2 (2) () (0) (0) () (0) (0) () (0) (0) () (0) (0) 7 (k) = (k) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 2 / 37
14 Theorem Main Result Theorem The generating tree of the paths in F [p], where p Gj b, according to the number of rise steps, is isomorphic to the tree having its root labelled (0) and recursively defined by the succession rule: (k) (k + )(k)... ()(0 2 )(0 ) k 0 (0) j (0 2 ) (k) j (k)(k )... ()(0 2 )(0 ) k A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 3 / 37
15 Method Main Result Each node at level n and labelled with (k), k 0, represents a path on the discrete plane having n rise steps and ending at the ordinate k. (0) () (0 ) 2 (0) (2) () (0 2 ) (0 ) () (0 2 ) (0 ) () (0 2 ) (0 ) (0 ) 2 A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 4 / 37
16 Method Main Result Each node at level n and labelled with (k), k 0, represents a path on the discrete plane having n rise steps and ending at the ordinate k. ε () (02) (0) (2) () (0 2 ) () (0 (0) 2 ) (0 ) () (02) (0) (02) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 4 / 37
17 Method Main Result Each node at level n and labelled with (k), k 0, represents a path on the discrete plane having n rise steps and ending at the ordinate k. ε () (0 2 ) (0 ) (2) () (02) (0 ) () (02) (0) () (02) (0) (0 2 ) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 4 / 37
18 Method Main Result Each node at level n and labelled with (k), k 0, represents a path on the discrete plane having n rise steps and ending at the ordinate k. ε () (02) (0) (2) () (0 2 ) () (0 (0) 2 ) (0 ) () (02) (0) (02) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 4 / 37
19 The constructive algorithm: First step ( k) ( k + ) ( k) ( ) ( 0 ) ( 0 ) 2 A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 5 / 37
20 The constructive algorithm: First step ( k) ( k + ) ( k) () ( 02) ( 0) k (k) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 5 / 37
21 The constructive algorithm: First step ( k) (k +) (k) () ( 02) ( 0) k k+ ( k) ( k+) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 5 / 37
22 The constructive algorithm: First step ( k) ( k + ) (k) () ( 0 ) ( ) 2 0 k k+ k ( k) (k+) (k) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 5 / 37
23 The constructive algorithm: First step ( k) ( k + ) ( k)... () ( 02) ( 0 ) k k+ k... ( k) (k+) (k) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 5 / 37
24 The constructive algorithm: First step ( k) ( k + ) ( k) () ( 0 ) ( ) 2 0 k k+ k ( k) (k+) (k) () A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 5 / 37
25 The constructive algorithm: First step ( k) ( k + ) ( k) () (0 2 ) (0 ) k k+ k ( k) (k+) (k) () (0 2) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 5 / 37
26 The constructive algorithm: First step ( k) ( k + ) ( k) ( ) ( ) 0 2 (0 ) k k+ k? (k ) ( k +) ( k) () (02) (0 ) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 5 / 37
27 The constructive algorithm: First step ( k) ( k + ) ( k) () ( 0 ) ( ) 2 0 k k+ k? ( k) (k+) (k) () (0 2) (0) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 5 / 37
28 The constructive algorithm: a marked forbidden pattern We define a marked forbidden pattern p as a pattern p Gj b whose steps cannot be split, that is, they must always be contained all together in that defined sequence. We say that a point is strictly contained in a given marked forbidden pattern p if it is in p and it is different from both its initial point and its last point. We denote a marked forbidden pattern p by drawing its minimal bounding rectangle B. B A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 6 / 37
29 . Main Result The constructive algorithm: First step (0) j (0 ) 2 A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 7 / 37
30 The constructive algorithm: First step (0) j (0 ) 2 j (0) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 7 / 37
31 The constructive algorithm: First step (0) j (0 2 ) j (0) (0 2 ) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 7 / 37
32 The constructive algorithm: First step (0) j (02) j (0) (0 2 ) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 7 / 37
33 The constructive algorithm: First step ( ) j k ( k) ( k-) () (02) (0 ) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 8 / 37
34 The constructive algorithm: First step ( k) j ( k) ( k-) () (02) (0 ) k j ( k) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 8 / 37
35 The constructive algorithm: First step ( k) j ( k) ( k-) () (02) (0 ) k j k (k) ( k) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 8 / 37
36 The constructive algorithm: First step ( k) j ( k) ( k-) () (02) (0 ) k j k k- (k) (k) ( k-) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 8 / 37
37 The constructive algorithm: First step j ( k ) ( k) ( k-)... () (0 ) 2 (0 ) k j k k-... (k) (k) (k-) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 8 / 37
38 The constructive algorithm: First step j ( k ) ( k) ( k-) () (0 ) 2 (0 ) k j k k- (k) (k) (k-) () A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 8 / 37
39 The constructive algorithm: First step j ( k ) ( k) ( k-) () (0 2 ) (0 ) k j k k- (k) (k) (k-) () (02) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 8 / 37
40 The constructive algorithm: First step ( k) j ( k) ( k-) () (02) (0 ) k j k k-? (k) (k) (k-) () (0 2) (0) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 8 / 37
41 The constructive algorithm: First step ( k) j ( k) ( k-) () (02) (0 ) k j k k-? (k) ( k) (k-) () (0 2) (0) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 8 / 37
42 Problem Main Result Lattice paths which end on the x-axis by a rise step are never obtained. j = 2 p = A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 9 / 37
43 Main Result The constructive algorithm: Second step First action in order to obtain the label (0 ) ω = ω = k () (k) j = 2 ω = () ω = vϕ, being ϕ the rightmost suffix in ω beginning from the x-axis with a rise step where each marked forbidden pattern (if ϕ contains at least one of them) has its initial point with positive ordinate. A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
44 The constructive algorithm: Second step First action in order to obtain the label (0 ) ϕ ω = ω = (k) k j = 2 ω = () ϕ () ω = vϕ, being ϕ the rightmost suffix in ω beginning from the x-axis with a rise step where each marked forbidden pattern (if ϕ contains at least one of them) has its initial point with positive ordinate. A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
45 The constructive algorithm: Second step - case ϕ does not contain any marked forbidden pattern vϕ ϕ A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 2 / 37
46 The constructive algorithm: Second step - case ϕ does not contain any marked forbidden pattern vϕ ϕ A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 2 / 37
47 The constructive algorithm: Second step - case ϕ does not contain any marked forbidden pattern vϕ ϕ vϕ c x x (0 ) ϕ c A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 2 / 37
48 The constructive algorithm: Second step - case 2 ϕ contains at least one marked forbidden pattern Find z the leftmost point in ϕ having highest ordinate and not strictly contained in a marked forbidden pattern. Apply the cut and paste operation. A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
49 The constructive algorithm: Second step - case 2 ϕ contains at least one marked forbidden pattern Find z the leftmost point in ϕ having highest ordinate and not strictly contained in a marked forbidden pattern. Apply the cut and paste operation. A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
50 The constructive algorithm: Second step - case 2 ϕ contains at least one marked forbidden pattern A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
51 The constructive algorithm: Second step - case 2 ϕ contains at least one marked forbidden pattern z A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
52 The constructive algorithm: Second step - case 2 ϕ contains at least one marked forbidden pattern z A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
53 The constructive algorithm: Second step - case 2 ϕ contains at least one marked forbidden pattern z z A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
54 The constructive algorithm: Second step - case 2 ϕ contains at least one marked forbidden pattern z z z A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
55 The constructive algorithm: Second step - case 2 ϕ contains at least one marked forbidden pattern z z z A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
56 The constructive algorithm: Second step - case 2 ϕ contains at least one marked forbidden pattern z z z z A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
57 The constructive algorithm: Second step - case 2 Cut and paste z A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
58 The constructive algorithm: Second step - case 2 Cut and paste z A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
59 The constructive algorithm: Second step - case 2 Cut and paste z A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
60 The constructive algorithm: Second step - case 2 Cut and paste (0 ) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
61 The constructive algorithm: Second step - case 2 Reverse of cut and paste (0 ) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
62 The constructive algorithm: Second step - case 2 Reverse of cut and paste m A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
63 The constructive algorithm: Second step - case 2 Reverse of cut and paste m A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
64 The constructive algorithm: Second step - case 2 Reverse of cut and paste m A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
65 The constructive algorithm: Second step - case 2 Reverse of cut and paste m A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
66 The constructive algorithm: Second step - case 2 Reverse of cut and paste A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
67 Example of the complete algorithm (3) (2) () (02 ) (0 ) (2) () (2) (0 2 ) (0 ) A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
68 Proof: idea Main Result The described algorithm is a construction for the set F [p] according to the number of rise steps. This means that all the paths in F with n rise steps are obtained. Moreover, for each obtained path ψ in F \F [p], having C forbidden patterns, with n rise steps and (k) as last label of the associated code, a path ψ in F \F [p] having C forbidden patterns, with n rise steps, and (k) as last label of the associated code is also generated having the same shape as ψ but such that the last forbidden pattern is marked if it is not in ψ and vice-versa. ()(0)()(2)() ()(0)()() (0)()(2)() (0)()() A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
69 Enumeration Enumeration Let Z be the set of paths whose instances are coded by a sequence of labels in the generating tree ending by a non-marked zero, S be the set of paths whose instances are coded by a sequence of labels ending by a marked zero, N be the set of paths whose instances are coded by a sequence of labels ending by a non-marked k and M be the set of paths whose instances are coded by a sequence of labels ending by a marked k. Then F [p] = (Z\S) (N\M). Z(x, ) = ω Z xn(ω) y 0 = + 2xZ(x, ) + 2xN(x, ) + x j S(x, ) + 2x j M(x, ), S(x, ) = ω S xn(ω) y 0 = 2xS(x, ) + 2xM(x, ) + x j Z(x, ) + 2x j N(x, ), N(x, y) = ω N xn(ω) y h(ω) = xyz(x, ) + h(ω)+ ω N i= x n(ω)+ y i + h(ω) ω M i= xn(ω)+j y i, M(x, y) = ω M xn(ω) y h(ω) = xys(x, ) + h(ω)+ ω M i= x n(ω)+ y i + h(ω) ω N i= xn(ω)+j y i. A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
70 Enumeration Enumeration We obtain the generating function F j (x), j >, for the words ω F [p] according to the number of ones: where F j (x) = y 0 (x) x j ( x j )( + x j 2xy 0 (x)), y 0 (x) = x j + (x j + ) 2 4x. 2x A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
71 Enumeration Enumeration Let us remark that the generating function F j (x) depends only on the number of ones in the forbidden pattern. So, bifix-free Grand Dyck words represent an invariant class for the enumeration of the words which avoid anyone of such a shape path. This means that all the sets in F with n ones avoiding a forbidden pattern p G b j have the same cardinality, independently on the shape of p. Example For any pattern p in G4 b, the first numbers of the sequence enumerating the binary words in F [p], according to the number of ones, are:, 3, 0, 35, 25, 454, 67, 62, 2326, being the associated generating function. F 4 (x) = x 4 x 8 + 2x 4 + 4x 2x( x 3 ) x 8 + 2x 4 + 4x A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
72 Enumeration Why bifix-free forbidden patterns? The method works only for bifix-free forbidden patterns: if p is not bifix-free, then the jumping and marked succession rule should generate paths containing forbidden patterns which could not be eliminated in the right way. For example, when p = ε A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 3 / 37
73 Enumeration Why bifix-free forbidden patterns? The method works only for bifix-free forbidden patterns: if p is not bifix-free, then the jumping and marked succession rule should generate paths containing forbidden patterns which could not be eliminated in the right way. For example, when p = ε......? A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP203 3 / 37
74 Cross-bifix-free patterns Generalization In order to generalize our method we have to consider cross-bifix-free Grand Dyck words. Two distinct bifix-free Grand Dyck words δ, δ are said to be cross-bifix-free if and only if no prefix of δ is also a suffix of δ and vice-versa. A cross-bifix-free set is a set of words where any two words are cross-bifix-free. A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
75 Generalization Generalization Given a set P = {p, p 2,, p m } of cross-bifix-free Grand Dyck words, none included in any other, such that each p l having j l as the number of its s, l m, then the growth of the set F [P], according to the number of ones, can be described by the following jumping and marked succession rule: (0) (k) (k + )(k) ()(0 2 )(0 ) k 0 (0) j (0 2 ) (k) j (k)(k ) ()(0 2 )(0 ) k (0) j2 (0 2 ) (k) j2 (k)(k ) ()(0 2 )(0 ) k. (0) jm (0 2 ) (k) jm (k)(k ) ()(0 2 )(0 ) k A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
76 Generalization Generalization By using the previous notation, we have: Z(x, ) = + 2xZ(x, ) + 2xN(x, ) + (x j + + x jm )S(x, ) + 2(x j + + x jm )M(x, ), S(x, ) = 2xS(x, ) + 2xM(x, ) + (x j + + x jm )Z(x, ) + 2(x j + + x jm )N(x, ), N(x, y) = xyz(x, )+ ω N h(ω)+ i= x n(ω)+ y i + h(ω) ω M i= xn(ω)+j y i + + h(ω) ω M i= xn(ω)+jm y i, M(x, y) = xys(x, )+ ω M h(ω)+ i= x n(ω)+ y i + h(ω) ω N i= xn(ω)+j y i + + h(ω) ω N i= xn(ω)+jm y i. A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
77 Generalization Generalization We obtain the generating function F j,...,j m (x) for the words ω F [P] according to the number of ones: F j,,j m (x) = where y 0 (x) x j x jm ( x j x jm )( + x j + + x jm 2xy 0 (x)), y 0 (x) = + x j + + x jm (x j + + x jm + ) 2 4x. 2x A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
78 Further developments Further developments. Study other forbidden patterns p 2. Expand the alphabet {0, } 3. Find a unified approach for pattern avoidance construction and enumeration A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
79 Further developments Further developments. Study other forbidden patterns p 2. Expand the alphabet {0, } 3. Find a unified approach for pattern avoidance construction and enumeration A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
80 Further developments Further developments. Study other forbidden patterns p 2. Expand the alphabet {0, } 3. Find a unified approach for pattern avoidance construction and enumeration A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
81 Thanks for your attention A.Bernini S.Bilotta E.Pergola R.Pinzani (DiMaI) Grand Dyck patterns avoiding binary words PP / 37
A generating function for bit strings with no Grand Dyck pattern matching
PU. M. A. Vol. 25 (205), No., pp. 30 44 A generating function for bit strings with no Grand Dyck pattern matching Antonio Bernini Dipartimento di Matematica e Informatica U. Dini Università degli Studi
More informationLEVEL GENERATING TREES AND PROPER RIORDAN ARRAYS
Applicable Analysis and Discrete Mathematics, (008), 69 9 Available electronically at http://pefmathetfbgacyu LEVEL GENERATING TREES AND PROPER RIORDAN ARRAYS D Baccherini, D Merlini, R Sprugnoli We introduce
More informationSome statistics on permutations avoiding generalized patterns
PUMA Vol 8 (007), No 4, pp 7 Some statistics on permutations avoiding generalized patterns Antonio Bernini Università di Firenze, Dipartimento di Sistemi e Informatica, viale Morgagni 65, 504 Firenze,
More informationA two dimensional non-overlapping code over a q-ary alphabet
A two dimensional non-overlapping code over a q-ary alphabet Antonio Bernini Dipartimento di Matematica e Informatica, Università di Firenze Convegno GNCS 2018 - Montecatini Terme, 14 16 Febbraio 2018
More informationECO-generation for some restricted classes of compositions
ECO-generation for some restricted classes of compositions Jean-Luc Baril and Phan-Thuan Do 1 LE2I UMR-CNRS 5158, Université de Bourgogne BP 47 870, 21078 DIJON-Cedex France e-mail: barjl@u-bourgognefr
More informationWell-Ordered Sets, Ordinals and Cardinals Ali Nesin 1 July 2001
Well-Ordered Sets, Ordinals and Cardinals Ali Nesin 1 July 2001 Definitions. A set together with a binary relation < is called a partially ordered set (poset in short) if x (x < x) x y z ((x < y y < z)
More informationSequences that satisfy a(n a(n)) = 0
Sequences that satisfy a(n a(n)) = 0 Nate Kube Frank Ruskey October 13, 2005 Abstract We explore the properties of some sequences for which a(n a(n)) = 0. Under the natural restriction that a(n) < n the
More informationNotes on the Catalan problem
Notes on the Catalan problem Daniele Paolo Scarpazza Politecnico di Milano March 16th, 2004 Daniele Paolo Scarpazza Notes on the Catalan problem [1] An overview of Catalan problems
More informationON MULTI-AVOIDANCE OF RIGHT ANGLED NUMBERED POLYOMINO PATTERNS
INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 4 (2004), #A21 ON MULTI-AVOIDANCE OF RIGHT ANGLED NUMBERED POLYOMINO PATTERNS Sergey Kitaev Department of Mathematics, University of Kentucky,
More informationPattern Popularity in 132-Avoiding Permutations
Pattern Popularity in 132-Avoiding Permutations The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Rudolph,
More informationTransducers for bidirectional decoding of prefix codes
Transducers for bidirectional decoding of prefix codes Laura Giambruno a,1, Sabrina Mantaci a,1 a Dipartimento di Matematica ed Applicazioni - Università di Palermo - Italy Abstract We construct a transducer
More informationTransducers for bidirectional decoding of codes with a finite deciphering delay
Transducers for bidirectional decoding of codes with a finite deciphering delay L. Giambruno 1, S. Mantaci 2, J. Néraud 3 and C. Selmi 3 GREYC - Université de Caen Basse-Normandie Dipartimento di Matematica
More informationPaths, Permutations and Trees. Enumerating Permutations Avoiding Three Babson - Steingrímsson Patterns
Paths, Permutations and Trees Center for Combinatorics Nankai University Tianjin, February 5-7, 004 Enumerating Permutations Avoiding Three Babson - Steingrímsson Patterns Antonio Bernini, Elisa Pergola
More informationLanguages. Languages. An Example Grammar. Grammars. Suppose we have an alphabet V. Then we can write:
Languages A language is a set (usually infinite) of strings, also known as sentences Each string consists of a sequence of symbols taken from some alphabet An alphabet, V, is a finite set of symbols, e.g.
More informationCVO103: Programming Languages. Lecture 2 Inductive Definitions (2)
CVO103: Programming Languages Lecture 2 Inductive Definitions (2) Hakjoo Oh 2018 Spring Hakjoo Oh CVO103 2018 Spring, Lecture 2 March 13, 2018 1 / 20 Contents More examples of inductive definitions natural
More informationPropositional and Predicate Logic - IV
Propositional and Predicate Logic - IV Petr Gregor KTIML MFF UK ZS 2015/2016 Petr Gregor (KTIML MFF UK) Propositional and Predicate Logic - IV ZS 2015/2016 1 / 19 Tableau method (from the previous lecture)
More informationTheory of Computation
Thomas Zeugmann Hokkaido University Laboratory for Algorithmics http://www-alg.ist.hokudai.ac.jp/ thomas/toc/ Lecture 12: Turing Machines Turing Machines I After having dealt with partial recursive functions,
More informationTheory of Computation
Theory of Computation (Feodor F. Dragan) Department of Computer Science Kent State University Spring, 2018 Theory of Computation, Feodor F. Dragan, Kent State University 1 Before we go into details, what
More informationBinomial Coefficient Identities/Complements
Binomial Coefficient Identities/Complements CSE21 Fall 2017, Day 4 Oct 6, 2017 https://sites.google.com/a/eng.ucsd.edu/cse21-fall-2017-miles-jones/ permutation P(n,r) = n(n-1) (n-2) (n-r+1) = Terminology
More informationThis lecture covers Chapter 5 of HMU: Context-free Grammars
This lecture covers Chapter 5 of HMU: Context-free rammars (Context-free) rammars (Leftmost and Rightmost) Derivations Parse Trees An quivalence between Derivations and Parse Trees Ambiguity in rammars
More informationAlgebraic aspects of some Riordan arrays related to binary words avoiding a pattern
Algebraic aspects of some Riordan arrays related to binary words avoiding a pattern D. Merlini and R. Sprugnoli Dipartimento di Sistemi e Informatica viale Morgagni 65, 5034, Firenze, Italia merlini@dsi.unifi.it,
More informationDecreasing Subsequences in Permutations and Wilf Equivalence for Involutions
Journal of Algebraic Combinatorics, 22, 383 409, 2005 c 2005 Springer Science + Business Media, Inc. Manufactured in The Netherlands. Decreasing Subsequences in Permutations and Wilf Equivalence for Involutions
More informationExact Generation of Minimal Acyclic Deterministic Finite Automata
Exact Generation of Minimal Acyclic Deterministic Finite Automata Marco Almeida Nelma Moreira Rogério Reis LIACC, Faculdade de Ciências, Universidade do Porto Departamento de Ciência de Computadores Rua
More informationOn the Sequence A and Its Combinatorial Interpretations
1 2 47 6 2 11 Journal of Integer Sequences, Vol. 9 (2006), Article 06..1 On the Sequence A079500 and Its Combinatorial Interpretations A. Frosini and S. Rinaldi Università di Siena Dipartimento di Scienze
More informationVAUGHT S THEOREM: THE FINITE SPECTRUM OF COMPLETE THEORIES IN ℵ 0. Contents
VAUGHT S THEOREM: THE FINITE SPECTRUM OF COMPLETE THEORIES IN ℵ 0 BENJAMIN LEDEAUX Abstract. This expository paper introduces model theory with a focus on countable models of complete theories. Vaught
More informationMatrix compositions. Emanuele Munarini. Dipartimento di Matematica Politecnico di Milano
Matrix compositions Emanuele Munarini Dipartimento di Matematica Politecnico di Milano emanuelemunarini@polimiit Joint work with Maddalena Poneti and Simone Rinaldi FPSAC 26 San Diego Motivation: L-convex
More informationProduction matrices. Received 24 June 2003; accepted 17 May 2004 Available online 15 September 2004
Advances in Applied Mathematics 34 2005) 101 122 wwwelseviercom/locate/yaama Production matrices Emeric Deutsch a,, Luca Ferrari b,1, Simone Rinaldi b,1 a Polytechnic University, Six Metrotech Center,
More informationAlgebras with finite descriptions
Algebras with finite descriptions André Nies The University of Auckland July 19, 2005 Part 1: FA-presentability A countable structure in a finite signature is finite-automaton presentable (or automatic)
More informationParsing. Context-Free Grammars (CFG) Laura Kallmeyer. Winter 2017/18. Heinrich-Heine-Universität Düsseldorf 1 / 26
Parsing Context-Free Grammars (CFG) Laura Kallmeyer Heinrich-Heine-Universität Düsseldorf Winter 2017/18 1 / 26 Table of contents 1 Context-Free Grammars 2 Simplifying CFGs Removing useless symbols Eliminating
More informationSyntactical analysis. Syntactical analysis. Syntactical analysis. Syntactical analysis
Context-free grammars Derivations Parse Trees Left-recursive grammars Top-down parsing non-recursive predictive parsers construction of parse tables Bottom-up parsing shift/reduce parsers LR parsers GLR
More informationOrdered trees and the inorder traversal
Discrete Mathematics 306 (006) 173 1741 www.elsevier.com/locate/disc Ordered trees and the inorder traversal A. Sapounakis, I. Tasoulas, P. Tsikouras Department of Informatics, University of Piraeus, 18534
More informationOn the satisfiability problem for a 4-level quantified syllogistic and some applications to modal logic
On the satisfiability problem for a 4-level quantified syllogistic and some applications to modal logic Domenico Cantone and Marianna Nicolosi Asmundo Dipartimento di Matematica e Informatica Università
More informationShort Introduction to Admissible Recursion Theory
Short Introduction to Admissible Recursion Theory Rachael Alvir November 2016 1 Axioms of KP and Admissible Sets An admissible set is a transitive set A satisfying the axioms of Kripke-Platek Set Theory
More informationClasses of Polish spaces under effective Borel isomorphism
Classes of Polish spaces under effective Borel isomorphism Vassilis Gregoriades TU Darmstadt October 203, Vienna The motivation It is essential for the development of effective descriptive set theory to
More information1 The decision problem for First order logic
Math 260A Mathematical Logic Scribe Notes UCSD Winter Quarter 2012 Instructor: Sam Buss Notes by: James Aisenberg April 27th 1 The decision problem for First order logic Fix a finite language L. Define
More informationComputing the Frequency of Partial Orders
Computing the Frequency of Partial Orders M.R.C. van Dongen (dongen@cs.ucc.ie) Centre for Efficiency Orientated Languages, University College Cork Abstract. In this paper we study four algorithms for computing
More informationSet Theory and the Foundation of Mathematics. June 19, 2018
1 Set Theory and the Foundation of Mathematics June 19, 2018 Basics Numbers 2 We have: Relations (subsets on their domain) Ordered pairs: The ordered pair x, y is the set {{x, y}, {x}}. Cartesian products
More informationThe complexity of recursive constraint satisfaction problems.
The complexity of recursive constraint satisfaction problems. Victor W. Marek Department of Computer Science University of Kentucky Lexington, KY 40506, USA marek@cs.uky.edu Jeffrey B. Remmel Department
More informationNFA and regex. the Boolean algebra of languages. regular expressions. Informatics 1 School of Informatics, University of Edinburgh
NFA and regex cl the Boolean algebra of languages regular expressions Informatics The intersection of two regular languages is regular L = even numbers L = odd numbers L = mod L = mod Informatics The intersection
More informationHierarchy among Automata on Linear Orderings
Hierarchy among Automata on Linear Orderings Véronique Bruyère Institut d Informatique Université de Mons-Hainaut Olivier Carton LIAFA Université Paris 7 Abstract In a preceding paper, automata and rational
More informationThe Phagocyte Lattice of Dyck Words
DOI 10.1007/s11083-006-9034-0 The Phagocyte Lattice of Dyck Words J. L. Baril J. M. Pallo Received: 26 September 2005 / Accepted: 25 May 2006 Springer Science + Business Media B.V. 2006 Abstract We introduce
More informationDecidability (What, stuff is unsolvable?)
University of Georgia Fall 2014 Outline Decidability Decidable Problems for Regular Languages Decidable Problems for Context Free Languages The Halting Problem Countable and Uncountable Sets Diagonalization
More informationWords restricted by patterns with at most 2 distinct letters
Words restricted by patterns with at most 2 distinct letters Alexander Burstein Department of Mathematics Iowa State University Ames, IA 50011-2064 USA burstein@math.iastate.edu Toufik Mansour LaBRI, Université
More informationReverse mathematics and the equivalence of definitions for well and better quasi-orders
Reverse mathematics and the equivalence of definitions for well and better quasi-orders Peter Cholak Department of Mathematics, University of Notre Dame, USA Alberto Marcone Dipartimento di Matematica
More information4.8 Huffman Codes. These lecture slides are supplied by Mathijs de Weerd
4.8 Huffman Codes These lecture slides are supplied by Mathijs de Weerd Data Compression Q. Given a text that uses 32 symbols (26 different letters, space, and some punctuation characters), how can we
More informationPart II. Logic and Set Theory. Year
Part II Year 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2018 60 Paper 4, Section II 16G State and prove the ǫ-recursion Theorem. [You may assume the Principle of ǫ- Induction.]
More informationE D I C T The internal extent formula for compacted tries
E D C T The internal extent formula for compacted tries Paolo Boldi Sebastiano Vigna Università degli Studi di Milano, taly Abstract t is well known [Knu97, pages 399 4] that in a binary tree the external
More informationA shrinking lemma for random forbidding context languages
Theoretical Computer Science 237 (2000) 149 158 www.elsevier.com/locate/tcs A shrinking lemma for random forbidding context languages Andries van der Walt a, Sigrid Ewert b; a Department of Mathematics,
More informationIntroduction to Binary Convolutional Codes [1]
Introduction to Binary Convolutional Codes [1] Yunghsiang S. Han Graduate Institute of Communication Engineering, National Taipei University Taiwan E-mail: yshan@mail.ntpu.edu.tw Y. S. Han Introduction
More informationThis lecture covers Chapter 6 of HMU: Pushdown Automata
This lecture covers Chapter 6 of HMU: ushdown Automata ushdown Automata (DA) Language accepted by a DA Equivalence of CFs and the languages accepted by DAs Deterministic DAs Additional Reading: Chapter
More informationFall, 2017 CIS 262. Automata, Computability and Complexity Jean Gallier Solutions of the Practice Final Exam
Fall, 2017 CIS 262 Automata, Computability and Complexity Jean Gallier Solutions of the Practice Final Exam December 6, 2017 Problem 1 (10 pts). Let Σ be an alphabet. (1) What is an ambiguous context-free
More informationLaCIM seminar, UQÀM. March 15, 2013
(Valparaiso University) LaCIM seminar, UQÀM Montréal, Québec March 15, 2013 Conventions and Definitions s are written in one-line notation. e.g. S 3 = {123, 132, 213, 231, 312, 321} Conventions and Definitions
More informationOn a refinement of Wilf-equivalence for permutations
On a refinement of Wilf-equivalence for permutations Sherry H. F. Yan Department of Mathematics Zhejiang Normal University Jinhua 321004, P.R. China huifangyan@hotmail.com Yaqiu Zhang Department of Mathematics
More informationCFGs and PDAs are Equivalent. We provide algorithms to convert a CFG to a PDA and vice versa.
CFGs and PDAs are Equivalent We provide algorithms to convert a CFG to a PDA and vice versa. CFGs and PDAs are Equivalent We now prove that a language is generated by some CFG if and only if it is accepted
More informationConvex Domino Towers
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 20 (2017, Article 17.3.1 Convex Domino Towers Tricia Muldoon Brown Department of Mathematics Armstrong State University 11935 Abercorn Street Savannah,
More informationENUMERATING PERMUTATIONS AVOIDING A PAIR OF BABSON-STEINGRíMSSON PATTERNS
ENUMERATING PERMUTATIONS AVOIDING A PAIR OF BABSON-STEINGRíMSSON PATTERNS ANDERS CLAESSON AND TOUFIK MANSOUR Abstract. Babson and Steingrímsson introduced generalized permutation patterns that allow the
More informationParikh s Theorem and Descriptional Complexity
Parikh s Theorem and Descriptional Complexity Giovanna J. Lavado and Giovanni Pighizzini Dipartimento di Informatica e Comunicazione Università degli Studi di Milano SOFSEM 2012 Špindlerův Mlýn, Czech
More informationUSA Mathematical Talent Search Round 1 Solutions Year 27 Academic Year
1/1/27. Fill in the spaces of the grid to the right with positive integers so that in each 2 2 square with top left number a, top right number b, bottom left number c, and bottom right number d, either
More informationHerbrand Theorem, Equality, and Compactness
CSC 438F/2404F Notes (S. Cook and T. Pitassi) Fall, 2014 Herbrand Theorem, Equality, and Compactness The Herbrand Theorem We now consider a complete method for proving the unsatisfiability of sets of first-order
More informationA BIJECTION BETWEEN WELL-LABELLED POSITIVE PATHS AND MATCHINGS
Séminaire Lotharingien de Combinatoire 63 (0), Article B63e A BJECTON BETWEEN WELL-LABELLED POSTVE PATHS AND MATCHNGS OLVER BERNARD, BERTRAND DUPLANTER, AND PHLPPE NADEAU Abstract. A well-labelled positive
More informationSOME TRANSFINITE INDUCTION DEDUCTIONS
SOME TRANSFINITE INDUCTION DEDUCTIONS SYLVIA DURIAN Abstract. This paper develops the ordinal numbers and transfinite induction, then demonstrates some interesting applications of transfinite induction.
More informationω-stable Theories: Introduction
ω-stable Theories: Introduction 1 ω - Stable/Totally Transcendental Theories Throughout let T be a complete theory in a countable language L having infinite models. For an L-structure M and A M let Sn
More informationPattern avoidance in partial permutations
Pattern avoidance in partial permutations Anders Claesson Department of Computer and Information Sciences, University of Strathclyde, Glasgow, G1 1XH, UK anders.claesson@cis.strath.ac.uk Vít Jelínek Fakultät
More informationTheory of Computation
Thomas Zeugmann Hokkaido University Laboratory for Algorithmics http://www-alg.ist.hokudai.ac.jp/ thomas/toc/ Lecture 1: Introducing Formal Languages Motivation I This course is about the study of a fascinating
More informationApplications of Regular Algebra to Language Theory Problems. Roland Backhouse February 2001
1 Applications of Regular Algebra to Language Theory Problems Roland Backhouse February 2001 Introduction 2 Examples: Path-finding problems. Membership problem for context-free languages. Error repair.
More informationConvex Domino Towers
Convex Domino Towers Tricia Muldoon Brown Department of Mathematics Armstrong State University 11935 Abercorn Street Savannah, GA 31419 USA patricia.brown@armstrong.edu Abstract We study convex domino
More informationDecoding and Inference with Syntactic Translation Models
Decoding and Inference with Syntactic Translation Models March 5, 2013 CFGs S NP VP VP NP V V NP NP CFGs S NP VP S VP NP V V NP NP CFGs S NP VP S VP NP V NP VP V NP NP CFGs S NP VP S VP NP V NP VP V NP
More informationA basis for the non-crossing partition lattice top homology
J Algebr Comb (2006) 23: 231 242 DOI 10.1007/s10801-006-7395-5 A basis for the non-crossing partition lattice top homology Eliana Zoque Received: July 31, 2003 / Revised: September 14, 2005 / Accepted:
More informationCentrosymmetric words avoiding 3-letter permutation patterns
Centrosymmetric words avoiding 3-letter permutation patterns Luca S. Ferrari Dipartimento di Matematica, Università di Bologna Piazza di Porta San Donato, 5-406 Bologna, Italy luca.ferrari0@unibo.it Mathematics
More informationCharacterizing First Order Logic
Characterizing First Order Logic Jared Holshouser, Originally by Lindstrom September 16, 2014 We are following the presentation of Chang and Keisler. 1 A Brief Review of First Order Logic Definition 1.
More informationMotzkin Paths with Vertical Edges
Motzkin Paths with Vertical Edges Veronika Irvine and Frank Ruskey University of Victoria, Canada March 13, 2014 Abstract This paper considers finite lattice paths formed from the set of step vectors {,,,,
More informationChapter 4: Context-Free Grammars
Chapter 4: Context-Free Grammars 4.1 Basics of Context-Free Grammars Definition A context-free grammars, or CFG, G is specified by a quadruple (N, Σ, P, S), where N is the nonterminal or variable alphabet;
More informationEnumerating Binary Strings
International Mathematical Forum, Vol. 7, 2012, no. 38, 1865-1876 Enumerating Binary Strings without r-runs of Ones M. A. Nyblom School of Mathematics and Geospatial Science RMIT University Melbourne,
More informationLinear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs
Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs Nathan Lindzey, Ross M. McConnell Colorado State University, Fort Collins CO 80521, USA Abstract. Tucker characterized
More informationOn the Concept of Enumerability Of Infinite Sets Charlie Obimbo Dept. of Computing and Information Science University of Guelph
On the Concept of Enumerability Of Infinite Sets Charlie Obimbo Dept. of Computing and Information Science University of Guelph ABSTRACT This paper discusses the concept of enumerability of infinite sets.
More information3.10. TREE DOMAINS AND GORN TREES Tree Domains and Gorn Trees
3.10. TREE DOMAINS AND GORN TREES 211 3.10 Tree Domains and Gorn Trees Derivation trees play a very important role in parsing theory and in the proof of a strong version of the pumping lemma for the context-free
More informationAbstracting real-valued parameters in parameterised boolean equation systems
Department of Mathematics and Computer Science Formal System Analysis Research Group Abstracting real-valued parameters in parameterised boolean equation systems Master Thesis M. Laveaux Supervisor: dr.
More informationOverview of Topics. Finite Model Theory. Finite Model Theory. Connections to Database Theory. Qing Wang
Overview of Topics Finite Model Theory Part 1: Introduction 1 What is finite model theory? 2 Connections to some areas in CS Qing Wang qing.wang@anu.edu.au Database theory Complexity theory 3 Basic definitions
More informationFoundations of Informatics: a Bridging Course
Foundations of Informatics: a Bridging Course Week 3: Formal Languages and Semantics Thomas Noll Lehrstuhl für Informatik 2 RWTH Aachen University noll@cs.rwth-aachen.de http://www.b-it-center.de/wob/en/view/class211_id948.html
More informationA Tableau-Based Decision Procedure for Right Propositional Neighborhood Logic (RPNL )
A Tableau-Based Decision Procedure for Right Propositional Neighborhood Logic (RPNL ) Davide Bresolin Angelo Montanari Dipartimento di Matematica e Informatica Università degli Studi di Udine {bresolin,
More informationA tableau-based decision procedure for a branching-time interval temporal logic
A tableau-based decision procedure for a branching-time interval temporal logic Davide Bresolin Angelo Montanari Dipartimento di Matematica e Informatica Università degli Studi di Udine {bresolin, montana}@dimi.uniud.it
More informationA fast algorithm to generate necklaces with xed content
Theoretical Computer Science 301 (003) 477 489 www.elsevier.com/locate/tcs Note A fast algorithm to generate necklaces with xed content Joe Sawada 1 Department of Computer Science, University of Toronto,
More informationGenerating All Permutations by Context-Free Grammars in Chomsky Normal Form
Generating All Permutations by Context-Free Grammars in Chomsky Normal Form Peter R.J. Asveld Department of Computer Science, Twente University of Technology P.O. Box 217, 7500 AE Enschede, the Netherlands
More informationAdvanced Automata Theory 9 Automatic Structures in General
Advanced Automata Theory 9 Automatic Structures in General Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Advanced Automata
More information1 Alphabets and Languages
1 Alphabets and Languages Look at handout 1 (inference rules for sets) and use the rules on some examples like {a} {{a}} {a} {a, b}, {a} {{a}}, {a} {{a}}, {a} {a, b}, a {{a}}, a {a, b}, a {{a}}, a {a,
More informationMath 455 Some notes on Cardinality and Transfinite Induction
Math 455 Some notes on Cardinality and Transfinite Induction (David Ross, UH-Manoa Dept. of Mathematics) 1 Cardinality Recall the following notions: function, relation, one-to-one, onto, on-to-one correspondence,
More informationCS375 Midterm Exam Solution Set (Fall 2017)
CS375 Midterm Exam Solution Set (Fall 2017) Closed book & closed notes October 17, 2017 Name sample 1. (10 points) (a) Put in the following blank the number of strings of length 5 over A={a, b, c} that
More informationCompositions, Bijections, and Enumerations
Georgia Southern University Digital Commons@Georgia Southern Electronic Theses & Dissertations COGS- Jack N. Averitt College of Graduate Studies Fall 2012 Compositions, Bijections, and Enumerations Charles
More informationBOOLEAN ALGEBRA APPROXIMATIONS
BOOLEAN ALGEBRA APPROXIMATIONS KENNETH HARRIS AND ANTONIO MONTALBÁN Abstract. Knight and Stob proved that every low 4 Boolean algebra is 0 (6) -isomorphic to a computable one. Furthermore, for n = 1, 2,
More informationENUMERATION OF CONNECTED CATALAN OBJECTS BY TYPE. 1. Introduction
ENUMERATION OF CONNECTED CATALAN OBJECTS BY TYPE BRENDON RHOADES Abstract. Noncrossing set partitions, nonnesting set partitions, Dyck paths, and rooted plane trees are four classes of Catalan objects
More informationTheoretical Computer Science. State complexity of basic operations on suffix-free regular languages
Theoretical Computer Science 410 (2009) 2537 2548 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs State complexity of basic operations
More informationFinite Automata. BİL405 - Automata Theory and Formal Languages 1
Finite Automata BİL405 - Automata Theory and Formal Languages 1 Deterministic Finite Automata (DFA) A Deterministic Finite Automata (DFA) is a quintuple A = (Q,,, q 0, F) 1. Q is a finite set of states
More informationAdvanced Automata Theory 10 Transducers and Rational Relations
Advanced Automata Theory 10 Transducers and Rational Relations Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Advanced
More informationCS 121, Section 2. Week of September 16, 2013
CS 121, Section 2 Week of September 16, 2013 1 Concept Review 1.1 Overview In the past weeks, we have examined the finite automaton, a simple computational model with limited memory. We proved that DFAs,
More informationExample. Lemma. Proof Sketch. 1 let A be a formula that expresses that node t is reachable from s
Summary Summary Last Lecture Computational Logic Π 1 Γ, x : σ M : τ Γ λxm : σ τ Γ (λxm)n : τ Π 2 Γ N : τ = Π 1 [x\π 2 ] Γ M[x := N] Georg Moser Institute of Computer Science @ UIBK Winter 2012 the proof
More informationGEETANJALI INSTITUTE OF TECHNICAL STUDIES, UDAIPUR I
GEETANJALI INSTITUTE OF TECHNICAL STUDIES, UDAIPUR I Internal Examination 2017-18 B.Tech III Year VI Semester Sub: Theory of Computation (6CS3A) Time: 1 Hour 30 min. Max Marks: 40 Note: Attempt all three
More informationTHE GOLDEN MEAN SHIFT IS THE SET OF 3x + 1 ITINERARIES
THE GOLDEN MEAN SHIFT IS THE SET OF 3x + 1 ITINERARIES DAN-ADRIAN GERMAN Department of Computer Science, Indiana University, 150 S Woodlawn Ave, Bloomington, IN 47405-7104, USA E-mail: dgerman@csindianaedu
More informationTuring s thesis: (1930) Any computation carried out by mechanical means can be performed by a Turing Machine
Turing s thesis: (1930) Any computation carried out by mechanical means can be performed by a Turing Machine There is no known model of computation more powerful than Turing Machines Definition of Algorithm:
More informationCS 455/555: Mathematical preliminaries
CS 455/555: Mathematical preliminaries Stefan D. Bruda Winter 2019 SETS AND RELATIONS Sets: Operations: intersection, union, difference, Cartesian product Big, powerset (2 A ) Partition (π 2 A, π, i j
More informationScott Sentences in Uncountable Structures
Rose-Hulman Undergraduate Mathematics Journal Volume 18 Issue 1 Article 14 Scott Sentences in Uncountable Structures Brian Tyrrell Trinity College Dublin Follow this and additional works at: http://scholar.rose-hulman.edu/rhumj
More information