Unary Pattern Avoidance in Partial Words Dense with Holes
|
|
- Winifred Terry
- 6 years ago
- Views:
Transcription
1 Unary Pattern Avoidance in Partial Words Dense with Holes F Blanchet-Sadri 1 Kevin Black 2 Andrew Zemke 3 1 University of North Carolina at Greensboro 2 Harvey Mudd College 3 Rochester Institute of Technology LATA 2011 This material is based upon work supported by the National Science Foundation under Grant No DMS The Department of Defense is also gratefully acknowledged
2 Outline 1 Avoidable patterns in words 2 Avoidable patterns in partial words 3 Hole sparsity 4 Non-trivial minimum hole sparsity for unary patterns 5 Minimum hole sparsity for unary patterns 6 Classification of all unary patterns with respect to hole sparsity
3 1 Avoidable patterns in words A pattern is a word over an alphabet of variables, which are denoted by α, β, γ, etc The Thue-Morse word w meets α 2 (or α 2 occurs in w): abbabaabbaababbabaababbaabbabaab But w avoids α 3 (we say that α 3 is 2-avoidable or is avoidable over the 2-letter alphabet)
4 Deciding the avoidability of a pattern Bean et al and Zimin proved that it is decidable whether a pattern p is avoidable; in fact, if p is over m variables, then p is avoidable if and only if w m avoids p, where w m is recursively defined by w 1 = 1 and w m = w m 1 mw m 1, m > 1 For example, w 2 = 121 does not avoid αβα but avoids ααβα, implying that αβα is unavoidable but ααβα is avoidable However, the complexity of deciding avoidability has remained open D R Bean, A Ehrenfeucht and G McNulty, Avoidable patterns in strings of symbols, Pacific Journal of Mathematics 85 (1979) A I Zimin, Blocking sets of terms, Mathematics of the USSR-Sbornik 47 (1984)
5 Computing the avoidability index of a pattern The problem Is it decidable, given a pattern p and an integer k, whether p is k-avoidable (or avoidable over a k-letter alphabet)? has also remained open An alternative is the problem of classifying all the patterns over a fixed number of variables m, that is, to find the smallest k such that p is k-avoidable, called the avoidability index of p, where p is such pattern For m = 1: α is unavoidable; α 2 is 2-unavoidable but 3-avoidable; α n, n 3, is 2-avoidable
6 2 Avoidable patterns in partial words A partial word is a sequence of symbols over a finite alphabet that may have some undefined positions, called holes and denoted by s, that match every letter of the alphabet (we also say that is compatible with each letter of the alphabet) a bca b is a partial word with two holes over {a, b, c} A full word is a partial word without holes aabcabb is a full word over {a, b, c} How dense with holes can a partial word defined over a fixed alphabet be, while still avoiding a given pattern?
7 2 Avoidable patterns in partial words A partial word is a sequence of symbols over a finite alphabet that may have some undefined positions, called holes and denoted by s, that match every letter of the alphabet (we also say that is compatible with each letter of the alphabet) a bca b is a partial word with two holes over {a, b, c} A full word is a partial word without holes aabcabb is a full word over {a, b, c} How dense with holes can a partial word defined over a fixed alphabet be, while still avoiding a given pattern?
8 Compatibility and containment Let u, v be partial words over A of equal length u and v are compatible, u v, if u(i) = v(i) whenever u(i), v(i) A a b a a b a b a a a a a u is contained in v, u v, if u(i) = v(i) whenever u(i) A a b a a b a a b a a a a a
9 Occurrence of a pattern in a partial word The pattern p = α 0 α n 1, where each α i is a variable, occurs in a partial word w, or w meets p, if there is a factor u 0 u n 1 in w, where u i, u j are non-empty and compatible whenever α i = α j ; otherwise, w avoids p or w is p-free An occurrence u 0 u n 1 of p is non-trivial if u i for all i = 0,, n 1 Otherwise, the occurrence is called trivial We call w non-trivially p-free if w contains no non-trivial occurrences of p αββα occurs in ab b a bba, while babbbaaab avoids αββα (the underlined occurrence of αββα is trivial)
10 Pattern (un)avoidability A pattern p is k-avoidable if there are infinitely many partial words over A with h holes, for any integer h > 0, that avoid p, where A is any alphabet of size k Note that if there is a partial word over A with infinitely many holes that avoids p, then p is obviously k-avoidable If, for some integer h 0, p occurs in every long enough partial word over A with h holes, then p is k-unavoidable A pattern p which is k-avoidable for some k is simply called avoidable, and a pattern which is k-unavoidable for every k is called unavoidable The avoidability index of p is the smallest integer k such that p is k-avoidable, or is if p is unavoidable
11 Division and equivalence of patterns If a pattern p occurs in a pattern q, then p divides q, denoted by p q αα αβα but αα αβαβ When both p q and q p hold, p and q are equivalent αα and ββ are equivalent
12 Classification of all binary patterns with respect to non-trivial partial word avoidability With respect to non-trivial avoidability in partial words, the avoidability index of a binary pattern is the same as in the full word case, that is, binary patterns fall into three categories: 1 The binary patterns ε, α, αβ, αβα, and their complements, are unavoidable (or have avoidability index ) 2 The binary patterns αα, ααβ, ααβα, ααββ, αβαβ, αββα, ααβαα, ααβαβ, their reverses, and complements, have avoidability index 3 3 All other binary patterns, and in particular all binary patterns of length six or more, have avoidability index 2 F Blanchet-Sadri, R Mercaş, S Simmons and E Weissenstein, Avoidable binary patterns in partial words, Acta Informatica 48 (2011) 25 41
13 Classification of all binary patterns with respect to partial word avoidability For partial words, binary patterns fall into four categories: 1 The binary patterns ε, α, αα, ααβ, ααβα, ααβαα, αβ, αβα, and their complements, are unavoidable (or have avoidability index ) 2 The binary patterns ααβαβ, ααββ, αβαβ and αβαβα, their reverses, and complements, have avoidability index 3 3 The binary pattern αββα has avoidability index 3 or 4 4 All other binary patterns, and in particular all binary patterns of length six or more, have avoidability index 2 F Blanchet-Sadri, R Mercaş, S Simmons and E Weissenstein, Avoidable binary patterns in partial words, Acta Informatica 48 (2011) 25 41
14 3 Hole sparsity Results for pattern avoidance in partial words have thus far been obtained by hole insertions in selected positions of words For example, ϕ ω (a) avoids αβαβα, where ϕ is the Thue-Morse morphism such that ϕ(a) = ab and ϕ(b) = ba There are infinitely many non-overlapping occurrences of ϕ 7 (a) starting at an even position in ϕ ω (a) and for each such occurrence, put a hole at position 47: abbabaabbaababbabaababbaabbabaabbaababbaabb abaa abbabaabbaababbabaababbaabbabaababbaba abbaababbaabbabaabbaababbabaababbaabbabaab The resulting partial word, which non-trivially avoids αβαβα, has more than 120 letters between any two consecutive holes F Blanchet-Sadri, R Mercaş, S Simmons and E Weissenstein, Avoidable binary patterns in partial words, Acta Informatica 48 (2011) 25 41
15 A measure of the frequency of holes in a partial word The hole sparsity of a partial word w is the smallest positive integer λ such that every factor of w of length λ contains at least one hole In this case, we call w λ-sparse ab b ac bc a is 3-sparse For a fixed pattern p and fixed alphabet A of size k, we want to determine the smallest λ so that an infinite λ-sparse word over A avoids p
16 (Non-trivial) minimum hole sparsity The non-trivial minimum hole sparsity for a pattern p over an alphabet of size k, χ k (p), is the smallest positive integer λ such that there exists an infinite λ-sparse word w over a k-letter alphabet that avoids all non-trivial occurrences of p If no such integer exists, then χ k (p) = The minimum hole sparsity for a pattern p over an alphabet of size k, χ k (p), is the smallest positive integer λ such that there exists an infinite λ-sparse word w over a k-letter alphabet that avoids all occurrences of p (including trivial occurrences) If no such integer exists, then χ k (p) =
17 A technical lemma For patterns p, q and integer k > 0, the following hold: 1 χ k (p) 2; 2 If k < k, then χ k (p) χ k (p); 3 If p q, then χ k (p) χ k (q); 4 If p is k-unavoidable, then χ k (p) = Statements 1 4 hold for the χ k function as well Proof We prove the lemma for the χ k function Statement 4 is trivial, while for Statement 1, we point out that if an infinite word is 1-sparse, then it consists only of holes, and therefore meets every pattern For Statement 2, if k < k, then a λ-sparse word avoiding p over the k-letter alphabet will also avoid p over the k -letter alphabet We prove Statement 3 similarly by noting that if p q then a word that avoids p also avoids q
18 Adaptation of the backtracking algorithm Algorithm 1 backtrack( w, p, λ, A ): Given as input partial word w, pattern p, sparsity λ, and alphabet A of size k, the algorithm outputs, if p is k-avoidable over λ-sparse partial words, the list of partial words over A with prefix w and hole sparsity λ or smaller that avoid p; otherwise, the algorithm never terminates 1: if w meets p then 2: return 3: run backtrack( w, p, λ, A ) 4: if among the last λ 1 symbols of w there is at least one then 5: for all a A do 6: run backtrack( wa, p, λ, A ) 7: print w 8: return J Cassaigne, Motifs évitables et régularités dans les mots, PhD Thesis, Université Paris VI (1994)
19 4 Non-trivial minimum hole sparsity for unary patterns We will fill the table with the values of χ k (α n ), k, n 1 k \ α n α α 2 α 3 α 4 α
20 k \ α n α α 2 α 3 α 4 α α is unavoidable over a k-letter alphabet
21 k \ α n α α 2 α 3 α 4 α α n is unavoidable over the unary alphabet
22 k \ α n α α 2 α 3 α 4 α Thue showed that α 2 is 2-unavoidable For all k 1, χ k (α 2 ) > 3 This is due to the fact that a b, a b c, ab are compatible with the non-trivial squares, (ab) 2, (acb) 2 and (ba) 2
23 k \ α n α α 2 α 3 α 4 α Thue showed that α 2 is 2-unavoidable For all k 1, χ k (α 2 ) > 3 This is due to the fact that a b, a b c, ab are compatible with the non-trivial squares, (ab) 2, (acb) 2 and (ba) 2
24 Lemma For all k 4, χ k (α 2 ) = 4 k \ α n α α 2 α 3 α 4 α
25 Proof (sketch) Let A = {a, b, c, d} and ρ : A A be defined by ρ(a) = ad, ρ(b) = bc, ρ(c) = ab, ρ(d) = ba, and σ : A A by σ(a) = dca, σ(b) = bca, σ(c) = dba, σ(d) = bda We show that the 4-sparse word σ(ρ ω (a)) avoids non-trivial squares First, we show that ρ ω (a) is square-free Second, we assume, to the contrary, that σ(ρ ω (a)) contains a non-trivial square uv Furthermore, every fourth symbol of σ(ρ ω (a)) is an a Third, we show that u 4, and u is divisible by 4 It follows that u v implies u = v, hence, we may refer to uv as u 2
26 Proof (continued) Finally, we look at the position of the first hole in u If u(3) =, then u starts with one of the images of σ, and since u is divisible by 4, it follows that for some x we have u 2 = σ(xx), which is a contradiction with the fact that ρ ω (a) is square-free If u(0) = (resp, u(1) = ), we consider the square u[1 u )u (resp, u[2 u )ua ), which leads to a contradiction as above If u(2) = and u starts with c, say, then u 2 = ca u zca u z, where u = u and z {b, d} In this case, suppose u 2 is preceded by d In order to avoid a contradiction similar to the previous cases, we assume z = b Since the preimage of dca under σ is a, and, in ρ ω (a), a is always followed by b or d, it follows that the first letter of u is b However, by similar reasoning the first letter in u is d, a contradiction since the latter d corresponds to the b in the first copy of u
27 Lemma The equality χ 3 (α 2 ) = 7 holds k \ α n α α 2 α 3 α 4 α
28 Proof (sketch) Let A = {a, b, c, d}, B = {a, b, c}, ρ : A A be defined by ρ(a) = ad, ρ(b) = bc, ρ(c) = ab, ρ(d) = ba, and π : A B by π(a) = abcbac b acbabc, π(b) = bacabc a bcabac, π(c) = abcacb, and π(d) = bacbca For the sake of contradiction, we suppose that Π = π(ρ ω (a)) contains a non-trivial square uv where u v Every length two factor of ρ ω (a) has an image under π of length at least 23 Moreover, all squares of length at most 24 are contained in the image of a factor of length three of ρ ω (a): aba, abc, adb, bab, bad, bca, cab, cad, dba and dbc Their images under π being square-free, uv > 25 Looking at all 54 length nine factors of Π obtained from the above ten factors, we get that no two are compatible Hence, all compatible factors of Π of length nine or greater must be equal Since u = v > 12, we must have u = v Contradictions follow based on the position of the first hole in u
29 Lemma The equality χ 2 (α 3 ) = 3 holds k \ α n α α 2 α 3 α 4 α
30 Proof (sketch) Let A = {a, b, c}, B = {a, b}, δ : A A be defined by δ(a) = ab, δ(b) = bc and δ(c) = ab, and υ : A B by υ(a) = aa, υ(b) = ab and υ(c) = bb Replacing each c in δ with a yields the Thue-Morse morphism It is well-known that the Thue-Morse word avoids α 3 and αβαβα Thus, δ ω (a) also avoids these patterns Suppose towards a contradiction, that there exists a non-trivial cube u 1 u 2 u 3 in υ(δ ω (a)), where u 1, u 2, u 3 u We first look at the possible starting letters of u 1, u 2 and u 3 in order to show that u 0 mod 3, and u = u 1 = u 2 = u 3 Contradictions follow based on the position of the first hole in u
31 Lemma For all k, n 3, χ k (α n ) = 2 k \ α n α α 2 α 3 α 4 α
32 Proof (sketch) Let A = {a, b, c}, ϕ : A A be defined by ϕ(a) = a b a c, ϕ(b) = a b, ϕ(c) = a c, and ϕ( ) = Suppose towards a contradiction that ϕ ω (a) has a non-trivial third power u 1 u 2 u 3 with u 1, u 2, u 3 u Consider u is even, in which case u = u 1 = u 2 = u 3, a appears in ϕ ω (a) exactly once every four symbols, and each u i contains an a Thus, u 0 mod 4 Assume without loss of generality that u 3 begins with an a Break u 3 into factors s = a b and t = a c The cubes in ϕ ω (a) correspond to cubes in ϕ ω (s), where ϕ : {s, t} {s, t} is given by ϕ (s) = sts and ϕ (t) = stt We reach the desired contradiction using a result of Richomme and Wlazinski which implies that ϕ avoids cubes if and only if ϕ (ssttststtsttsstsststsstt) is cube-free G Richomme and F Wlazinski, Some results on k-power-free morphisms, Theoretical Computer Science 273 (2002)
33 Lemma For all n 4, χ 2 (α n ) = 2 k \ α n α α 2 α 3 α 4 α
34 Proof (sketch) Let A = {a, b} and define µ : A A by µ(a) = a b, µ(b) = a a, and µ( ) = For the sake of contradiction, assume that µ ω (a) has a non-trivial 4th power u 1 u 2 u 3 u 4 such that u 1, u 2, u 3, u 4 u u is even: Since the holes align, u = u 1 = u 2 = u 3 = u 4 Assume without loss of generality that u 4 begins with a letter Break u 4 into factors s = a and t = b The 4th powers in µ ω (a) correspond to 4th powers in µ ω (s), where µ : {s, t} {s, t} is given by µ (s) = st and µ (t) = ss We then show that µ ω (s) is 4th power free, a contradiction u is odd: Note that u 1 u 3 implies u 1 = u 3 and u 2 u 4 implies u 2 = u 4, and a b occurs at least every 8 symbols Since u 4 8, there is at least one b in u 4 Assume without loss of generality that b occurs in u 1 Then, there is a corresponding b in u 3, and between the two b s there are 2 u 1 symbols We then reach a contradiction
35 5 Minimum hole sparsity for unary patterns We will fill the table with the values of χ k (αn ), k, n 1 k \ α n α α 2 α 3 α 4 α 5 α 6 α
36 k \ α n α α 2 α 3 α 4 α 5 α 6 α
37 k \ α n α α 2 α 3 α 4 α 5 α 6 α factors of the form a or a appear in all infinite partial words having holes
38 Looking at trivial cubes, any 2-sparse word meets the pattern α 3, since any letter a is preceded and followed by a hole Thus, for all k 1, we have the lower bound χ k (α3 ) 3 For k 3, we show that the bound is tight Lemma For all k 3, χ k (α3 ) = 3 k \ α n α α 2 α 3 α 4 α 5 α 6 α
39 Proof (sketch) Let A = {a, b} and B = {a, b, c}, and define the morphisms ξ : A A by ξ(a) = ab and ξ(b) = ba, and τ : B B by τ(a) = ab and τ(b) = ac We can show that τ(ξ ω (a)) avoids cubes τ(ξ ω (a)) = τ(abbabaabbaababbabaababbaabbaba ) = ab ac ac ab ac ab ab ac ac ab
40 Lemma The equality χ 2 (α3 ) = 7 holds k \ α n α α 2 α 3 α 4 α 5 α 6 α Let A = {a, b}, ξ : A A the Thue-Morse morphism defined by ξ(a) = ab and ξ(b) = ba, and define ζ : A A by ζ(a) = babaab abbaba and ζ(b) = baabba The word ζ(ξ ω (a)) avoids cubes
41 Lemma The equality χ 2 (α3 ) = 7 holds k \ α n α α 2 α 3 α 4 α 5 α 6 α Let A = {a, b}, ξ : A A the Thue-Morse morphism defined by ξ(a) = ab and ξ(b) = ba, and define ζ : A A by ζ(a) = babaab abbaba and ζ(b) = baabba The word ζ(ξ ω (a)) avoids cubes
42 Lemma The equality χ 2 (α4 ) = 3 holds k \ α n α α 2 α 3 α 4 α 5 α 6 α Let A = {a, b}, ξ : A A the Thue-Morse morphism defined by ξ(a) = ab and ξ(b) = ba, and define κ : A A by κ(a) = ab ab ba ba and κ(b) = ab ab ab ba ba The word κ(ξ ω (a)) avoids 4th powers
43 Lemma The equality χ 2 (α4 ) = 3 holds k \ α n α α 2 α 3 α 4 α 5 α 6 α Let A = {a, b}, ξ : A A the Thue-Morse morphism defined by ξ(a) = ab and ξ(b) = ba, and define κ : A A by κ(a) = ab ab ba ba and κ(b) = ab ab ab ba ba The word κ(ξ ω (a)) avoids 4th powers
44 Lemma For all k 3, χ k (α4 ) = 2 k \ α n α α 2 α 3 α 4 α 5 α 6 α
45 Proof (sketch) Let A = {a, b} and define µ : A A as µ(a) = a b, µ(b) = a a, and µ( ) = We showed earlier that µ ω (a) is free of non-trivial 4th powers a b a a a b a b a b a a a b a a Let B = {a, b, c} and define µ : B B as µ (a) = a b, µ (b) = a c, µ (c) = a b, and µ ( ) = Note that µ ω (a) is simply a copy of µ ω (a) in which some a s have been replaced with c s a b a c a b a b a b a c a b a c Since a non-trivial 4th power in µ ω (a) implies the presence of a non-trivial 4th power in µ ω (a), which is impossible, we have that µ ω (a) is non-trivially 4th power free It is easy to check that µ ω (a) avoids trivial 4th powers as well, since no two consecutive letters of µ ω (a) are the same
46 Lemma The equality χ 2 (α5 ) = 3 holds k \ α n α α 2 α 3 α 4 α 5 α 6 α Proof The upper bound χ 2 (α5 ) 3 comes from the equality χ 2 (α4 ) = 3 along with the technical lemma, while the backtracking algorithm provides the lower bound χ 2 (α5 ) 3
47 Lemma For all n 6 and k 2, χ k (αn ) = 2, and for all n 5 and k 3, χ k (αn ) = 2 k \ α n α α 2 α 3 α 4 α 5 α 6 α For the first statement, the Thue-Morse word with a hole inserted between every two letters is 6th power free a b b a b a a b b a a b a b b a
48 Lemma For all n 6 and k 2, χ k (αn ) = 2, and for all n 5 and k 3, χ k (αn ) = 2 k \ α n α α 2 α 3 α 4 α 5 α 6 α For the first statement, the Thue-Morse word with a hole inserted between every two letters is 6th power free a b b a b a a b b a a b a b b a
49 6 Classification of all unary patterns with respect to hole sparsity Theorem The values of χ k (α n ) and χ k (αn ) for all k, n 1 are as follows: k \ α n α α 2 α 3 α 4 α α 2 α 3 α 4 α 5 α
50 Acknowledgement We thank Robert Mercaş for very valuable help in the writing of this paper
51 wwwuncgedu/cmp/research/patterns
Abelian Pattern Avoidance in Partial Words
Abelian Pattern Avoidance in Partial Words F. Blanchet-Sadri 1 Benjamin De Winkle 2 Sean Simmons 3 July 22, 2013 Abstract Pattern avoidance is an important topic in combinatorics on words which dates back
More informationA generalization of Thue freeness for partial words. By: Francine Blanchet-Sadri, Robert Mercaş, and Geoffrey Scott
A generalization of Thue freeness for partial words By: Francine Blanchet-Sadri, Robert Mercaş, and Geoffrey Scott F. Blanchet-Sadri, R. Mercas and G. Scott, A Generalization of Thue Freeness for Partial
More informationA generalization of Thue freeness for partial words
A generalization of Thue freeness for partial words F. Blanchet-Sadri 1 Robert Mercaş 2 Geoffrey Scott 3 September 22, 2008 Abstract This paper approaches the combinatorial problem of Thue freeness for
More informationAvoiding Large Squares in Partial Words
Avoiding Large Squares in Partial Words F Blanchet-Sadri 1 Ilkyoo Choi 2 Robert Mercaş 3 April 5, 2011 Abstract Well-known results on the avoidance of large squares in (full) words include: (1) Fraenkel
More informationarxiv: v1 [cs.dm] 14 Oct 2016
Avoidability of circular formulas Guilhem Gamard a, Pascal Ochem a,b, Gwenaël Richomme a,c, Patrice Séébold a,c arxiv:1610.039v1 [cs.dm] 1 Oct 2016 Abstract a LIRMM, Université de Montpellier and CNRS,
More informationTheoretical Computer Science
Theoretical Computer Science 412 (2011) 3752 3758 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: wwwelseviercom/locate/tcs Avoiding large squares in partial words
More informationDoubled patterns are 3-avoidable
Doubled patterns are 3-avoidable arxiv:1510.01753v1 [cs.dm] 6 Oct 2015 Pascal Ochem LIRMM, Université de Montpellier, CNRS Montpellier, France ochem@lirmm.fr August 31, 2018 Abstract In combinatorics on
More informationAvoiding Abelian Squares in Partial Words
Avoiding Abelian Squares in Partial Words F. Blanchet-Sadri 1 Jane I. Kim 2 Robert Mercaş 3 William Severa 4 Sean Simmons 5 Dimin Xu 6 August 10, 2011 Abstract Erdös raised the question whether there exist
More informationHow Many Holes Can an Unbordered Partial Word Contain?
How Many Holes Can an Unbordered Partial Word Contain? F. Blanchet-Sadri 1, Emily Allen, Cameron Byrum 3, and Robert Mercaş 4 1 University of North Carolina, Department of Computer Science, P.O. Box 6170,
More informationAvoidability of formulas with two variables
Avoidability of formulas with two variables arxiv:1606.03955v2 [cs.dm] 13 Oct 2016 Pascal Ochem and Matthieu Rosenfeld October 14, 2016 Abstract In combinatorics on words, a word w over an alphabet Σ is
More informationOn avoidability of formulas with reversal
arxiv:1703.10522v1 [math.co] 30 Mar 2017 On avoidability of formulas with reversal James Currie, Lucas Mol, and Narad ampersad Abstract While a characterization of unavoidable formulas (without reversal)
More information1991 Mathematics Subject Classification. 68Q70, 68R15.
Theoretical Informatics and Applications Informatique Théorique et Applications Will be set by the publisher 5-ABELIAN CUBES ARE AVOIDABLE ON BINARY ALPHABETS Robert Mercas 1 and Aleksi Saarela 2 Abstract.
More informationBOUNDS ON ZIMIN WORD AVOIDANCE
BOUNDS ON ZIMIN WORD AVOIDANCE JOSHUA COOPER* AND DANNY RORABAUGH* Abstract. How long can a word be that avoids the unavoidable? Word W encounters word V provided there is a homomorphism φ defined by mapping
More informationUnavoidable patterns in words
Unavoidable patterns in words Benny Sudakov ETH, Zurich joint with D.Conlon and J. Fox Ramsey numbers Definition: The Ramsey number r k (n) is the minimum N such that every 2-coloring of the k-tuples of
More informationA Note on the Number of Squares in a Partial Word with One Hole
A Note on the Number of Squares in a Partial Word with One Hole F. Blanchet-Sadri 1 Robert Mercaş 2 July 23, 2008 Abstract A well known result of Fraenkel and Simpson states that the number of distinct
More informationBordered Conjugates of Words over Large Alphabets
Bordered Conjugates of Words over Large Alphabets Tero Harju University of Turku harju@utu.fi Dirk Nowotka Universität Stuttgart nowotka@fmi.uni-stuttgart.de Submitted: Oct 23, 2008; Accepted: Nov 14,
More informationAvoidability of formulas with two variables
Avoidability of formulas with two variables Pascal Ochem and Matthieu Rosenfeld Submitted: October, 2017; Accepted: XX; Published: XX Mathematics Subject Classifications: 68R15 Abstract In combinatorics
More informationPascal Ochem 1 and Elise Vaslet Introduction REPETITION THRESHOLDS FOR SUBDIVIDED GRAPHS AND TREES
Theoretical Informatics and Applications Informatique Théorique et Applications Will be set by the publisher REPETITION THRESHOLDS FOR SUBDIVIDED GRAPHS AND TREES Pascal Ochem 1 and Elise Vaslet 2 Abstract.
More informationAbout Duval Extensions
About Duval Extensions Tero Harju Dirk Nowotka Turku Centre for Computer Science, TUCS Department of Mathematics, University of Turku June 2003 Abstract A word v = wu is a (nontrivial) Duval extension
More informationFinite repetition threshold for large alphabets
Finite repetition threshold for large alphabets Golnaz Badkobeh a, Maxime Crochemore a,b and Michael Rao c a King s College London, UK b Université Paris-Est, France c CNRS, Lyon, France January 25, 2014
More informationAvoidability of Formulas with Two Variables
Avoidability of Formulas with Two Variables Pascal Ochem, Matthieu Rosenfeld To cite this version: Pascal Ochem, Matthieu Rosenfeld. Avoidability of Formulas with Two Variables. DLT: Developments in Language
More informationNotes for Comp 497 (454) Week 10
Notes for Comp 497 (454) Week 10 Today we look at the last two chapters in Part II. Cohen presents some results concerning the two categories of language we have seen so far: Regular languages (RL). Context-free
More informationSquare-free words with square-free self-shuffles
Square-free words with square-free self-shuffles James D. Currie & Kalle Saari Department of Mathematics and Statistics University of Winnipeg 515 Portage Avenue Winnipeg, MB R3B 2E9, Canada j.currie@uwinnipeg.ca,
More informationABELIAN COMPLEXITY OF FIXED POINT OF MORPHISM
ABELIAN COMPLEXITY OF FIXED POINT OF MORPHISM 0 012, 1 02, 2 1 F. Blanchet-Sadri 1 Department of Computer Science, University of North Carolina P.O. Box 26170, Greensboro, NC 27402 6170, USA blanchet@uncg.edu
More informationPeriodicity Algorithms and a Conjecture on Overlaps in Partial Words
Periodicity Algorithms and a Conjecture on Overlaps in Partial Words F. Blanchet-Sadri 1 Robert Mercaş 2 Abraham Rashin 3 Elara Willett 4 February 8, 2012 Abstract We propose an algorithm that given as
More informationAperiodic languages p. 1/34. Aperiodic languages. Verimag, Grenoble
Aperiodic languages p. 1/34 Aperiodic languages Dejan Ničković Verimag, Grenoble Aperiodic languages p. 2/34 Table of Contents Introduction Aperiodic Sets Star-Free Regular Sets Schützenberger s theorem
More informationA ternary square-free sequence avoiding factors equivalent to abcacba
A ternary square-free sequence avoiding factors equivalent to abcacba James Currie Department of Mathematics & Statistics University of Winnipeg Winnipeg, MB Canada R3B 2E9 j.currie@uwinnipeg.ca Submitted:
More informationCounting Bordered Partial Words by Critical Positions
Counting Bordered Partial Words by Critical Positions Emily Allen 1 F. Blanchet-Sadri 2 Cameron Byrum 3 Mihai Cucuringu 4 Robert Mercaş 5 June 8, 2011 This paper is dedicated to Professor Pál Dömösi on
More informationFABER Formal Languages, Automata. Lecture 2. Mälardalen University
CD5560 FABER Formal Languages, Automata and Models of Computation Lecture 2 Mälardalen University 2010 1 Content Languages, g Alphabets and Strings Strings & String Operations Languages & Language Operations
More information1 Alphabets and Languages
1 Alphabets and Languages Look at handout 1 (inference rules for sets) and use the rules on some examples like {a} {{a}} {a} {a, b}, {a} {{a}}, {a} {{a}}, {a} {a, b}, a {{a}}, a {a, b}, a {{a}}, a {a,
More informationHW6 Solutions. Micha l Dereziński. March 20, 2015
HW6 Solutions Micha l Dereziński March 20, 2015 1 Exercise 5.5 (a) The PDA accepts odd-length strings whose middle symbol is a and whose other letters are as and bs. Its diagram is below. b, Z 0 /XZ 0
More informationSORTING SUFFIXES OF TWO-PATTERN STRINGS.
International Journal of Foundations of Computer Science c World Scientific Publishing Company SORTING SUFFIXES OF TWO-PATTERN STRINGS. FRANTISEK FRANEK and WILLIAM F. SMYTH Algorithms Research Group,
More informationarxiv: v2 [math.co] 24 Oct 2012
On minimal factorizations of words as products of palindromes A. Frid, S. Puzynina, L. Zamboni June 23, 2018 Abstract arxiv:1210.6179v2 [math.co] 24 Oct 2012 Given a finite word u, we define its palindromic
More informationSorting suffixes of two-pattern strings
Sorting suffixes of two-pattern strings Frantisek Franek W. F. Smyth Algorithms Research Group Department of Computing & Software McMaster University Hamilton, Ontario Canada L8S 4L7 April 19, 2004 Abstract
More informationAvoidable Formulas in Combinatorics on Words
University of California Los Angeles Avoidable Formulas in Combinatorics on Words A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Mathematics
More informationSome Variations on a Theme of Irina Mel nichuk Concerning the Avoidability of Patterns in Strings of Symbols
Some Variations on a Theme of Irina Mel nichuk Concerning the Avoidability of Patterns in Strings of Symbols George F. McNulty Department of Mathematics University of South Carolina Columbia, SC 908, U.S.A.
More informationA Universal Turing Machine
A Universal Turing Machine A limitation of Turing Machines: Turing Machines are hardwired they execute only one program Real Computers are re-programmable Solution: Universal Turing Machine Attributes:
More informationSemigroup presentations via boundaries in Cayley graphs 1
Semigroup presentations via boundaries in Cayley graphs 1 Robert Gray University of Leeds BMC, Newcastle 2006 1 (Research conducted while I was a research student at the University of St Andrews, under
More informationFine and Wilf s Periodicity on Partial Words and Consequences
Fine and Wilf s Periodicity on Partial Words and Consequences F. Blanchet-Sadri 1, Kevin Corcoran 2, and Jenell Nyberg 3 1 Department of Computer Science, University of North Carolina, P.O. Box 26170,
More informationWords generated by cellular automata
Words generated by cellular automata Eric Rowland University of Waterloo (soon to be LaCIM) November 25, 2011 Eric Rowland (Waterloo) Words generated by cellular automata November 25, 2011 1 / 38 Outline
More informationSolution. S ABc Ab c Bc Ac b A ABa Ba Aa a B Bbc bc.
Section 12.4 Context-Free Language Topics Algorithm. Remove Λ-productions from grammars for langauges without Λ. 1. Find nonterminals that derive Λ. 2. For each production A w construct all productions
More informationWords with the Smallest Number of Closed Factors
Words with the Smallest Number of Closed Factors Gabriele Fici Zsuzsanna Lipták Abstract A word is closed if it contains a factor that occurs both as a prefix and as a suffix but does not have internal
More informationSolution to CS375 Homework Assignment 11 (40 points) Due date: 4/26/2017
Solution to CS375 Homework Assignment 11 (40 points) Due date: 4/26/2017 1. Find a Greibach normal form for the following given grammar. (10 points) S bab A BAa a B bb Ʌ Solution: (1) Since S does not
More informationJérémie Chalopin 1 and Pascal Ochem 2. Introduction DEJEAN S CONJECTURE AND LETTER FREQUENCY
Theoretical Informatics and Applications Informatique Théorique et Applications Will be set by the publisher DEJEAN S CONJECTURE AND LETTER FREQUENCY Jérémie Chalopin 1 and Pascal Ochem 2 Abstract. We
More informationGrade 11/12 Math Circles Fall Nov. 12 Recurrences, Part 3
1 Faculty of Mathematics Waterloo, Ontario Centre for Education in Mathematics and Computing Grade 11/12 Math Circles Fall 2014 - Nov. 12 Recurrences, Part 3 Definition of an L-system An L-system or Lindenmayer
More informationFinite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018
Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018 Lecture 14 Ana Bove May 14th 2018 Recap: Context-free Grammars Simplification of grammars: Elimination of ǫ-productions; Elimination of
More informationTheory of Computation
Fall 2002 (YEN) Theory of Computation Midterm Exam. Name:... I.D.#:... 1. (30 pts) True or false (mark O for true ; X for false ). (Score=Max{0, Right- 1 2 Wrong}.) (1) X... If L 1 is regular and L 2 L
More informationOverlapping tile automata:
Overlapping tile automata: towards a language theory of overlapping structures David Janin LaBRI, Université de Bordeaux Computer Science in Russia, Ekaterinburg, june 2013 1. From strings to overlapping
More information1. Prove that for every positive integer n there exists an n-digit number divisible by 5 n all of whose digits are odd.
32 nd United States of America Mathematical Olympiad Proposed Solutions May, 23 Remark: The general philosophy of this marking scheme follows that of IMO 22. This scheme encourages complete solutions.
More informationON THE STAR-HEIGHT OF SUBWORD COUNTING LANGUAGES AND THEIR RELATIONSHIP TO REES ZERO-MATRIX SEMIGROUPS
ON THE STAR-HEIGHT OF SUBWORD COUNTING LANGUAGES AND THEIR RELATIONSHIP TO REES ZERO-MATRIX SEMIGROUPS TOM BOURNE AND NIK RUŠKUC Abstract. Given a word w over a finite alphabet, we consider, in three special
More informationFiniteness conditions and index in semigroup theory
Finiteness conditions and index in semigroup theory Robert Gray University of Leeds Leeds, January 2007 Robert Gray (University of Leeds) 1 / 39 Outline 1 Motivation and background Finiteness conditions
More informationInsertion operations: closure properties
Insertion operations: closure properties Lila Kari Academy of Finland and Mathematics Department 1 Turku University 20 500 Turku, Finland 1 Introduction The basic notions used for specifying languages
More informationPower of controlled insertion and deletion
Power of controlled insertion and deletion Lila Kari Academy of Finland and Department of Mathematics 1 University of Turku 20500 Turku Finland Abstract The paper investigates classes of languages obtained
More informationSome improvements of the S-adic conjecture
Some improvements of the S-adic conjecture Julien Leroy Université de Picardie Jules Verne, Laboratoire Amiénois de Mathématiques Fondamentales et Appliquées, CNRS-UMR 6140, 33 rue Saint Leu, 80039 Amiens
More informationWhat Is a Language? Grammars, Languages, and Machines. Strings: the Building Blocks of Languages
Do Homework 2. What Is a Language? Grammars, Languages, and Machines L Language Grammar Accepts Machine Strings: the Building Blocks of Languages An alphabet is a finite set of symbols: English alphabet:
More informationMAS114: Exercises. October 26, 2018
MAS114: Exercises October 26, 2018 Note that the challenge problems are intended to be difficult! Doing any of them is an achievement. Please hand them in on a separate piece of paper if you attempt them.
More informationHierarchy among Automata on Linear Orderings
Hierarchy among Automata on Linear Orderings Véronique Bruyère Institut d Informatique Université de Mons-Hainaut Olivier Carton LIAFA Université Paris 7 Abstract In a preceding paper, automata and rational
More information(b) If G=({S}, {a}, {S SS}, S) find the language generated by G. [8+8] 2. Convert the following grammar to Greibach Normal Form G = ({A1, A2, A3},
Code No: 07A50501 R07 Set No. 2 III B.Tech I Semester Examinations,MAY 2011 FORMAL LANGUAGES AND AUTOMATA THEORY Computer Science And Engineering Time: 3 hours Max Marks: 80 Answer any FIVE Questions All
More informationarxiv: v1 [math.fa] 14 Jul 2018
Construction of Regular Non-Atomic arxiv:180705437v1 [mathfa] 14 Jul 2018 Strictly-Positive Measures in Second-Countable Locally Compact Non-Atomic Hausdorff Spaces Abstract Jason Bentley Department of
More informationCMSC 330: Organization of Programming Languages. Theory of Regular Expressions Finite Automata
: Organization of Programming Languages Theory of Regular Expressions Finite Automata Previous Course Review {s s defined} means the set of string s such that s is chosen or defined as given s A means
More informationarxiv: v1 [math.co] 22 Jan 2013
A Coloring Problem for Sturmian and Episturmian Words Aldo de Luca 1, Elena V. Pribavkina 2, and Luca Q. Zamboni 3 arxiv:1301.5263v1 [math.co] 22 Jan 2013 1 Dipartimento di Matematica Università di Napoli
More informationCS375: Logic and Theory of Computing
CS375: Logic and Theory of Computing Fuhua (Frank) Cheng Department of Computer Science University of Kentucky 1 Table of Contents: Week 1: Preliminaries (set algebra, relations, functions) (read Chapters
More informationPartial Words and the Critical Factorization Theorem Revisited
Partial Words and the Critical Factorization Theorem Revisited F. Blanchet-Sadri and Nathan D. Wetzler Department of Mathematical Sciences University of North Carolina P.O. Box 26170 Greensboro, NC 27402
More informationClosure Properties of Regular Languages
Closure Properties of Regular Languages Lecture 13 Section 4.1 Robb T. Koether Hampden-Sydney College Wed, Sep 21, 2016 Robb T. Koether (Hampden-Sydney College) Closure Properties of Regular Languages
More informationOne-relation languages and ω-code generators
One-relation languages and ω-code generators Tran Vinh Duc, Igor Litovsky I3S Université de Nice - Sophia Antipolis France Journées Montoises d Informatique Théorique AMIENS, 2010 Infinite words Let A
More informationTuring s thesis: (1930) Any computation carried out by mechanical means can be performed by a Turing Machine
Turing s thesis: (1930) Any computation carried out by mechanical means can be performed by a Turing Machine There is no known model of computation more powerful than Turing Machines Definition of Algorithm:
More informationRestricted square property and infinite partial words
Vesa Halava Tero Harju Tomi Kärki Patrice Séébold Restricted square property and infinite partial words TUCS Technical Report No 930, February 2009 Restricted square property and infinite partial words
More informationSet Theory. CSE 215, Foundations of Computer Science Stony Brook University
Set Theory CSE 215, Foundations of Computer Science Stony Brook University http://www.cs.stonybrook.edu/~cse215 Set theory Abstract set theory is one of the foundations of mathematical thought Most mathematical
More informationPatterns in Words Related to DNA Rearrangements
University of South Florida Scholar Commons Graduate Theses and Dissertations Graduate School June 2017 Patterns in Words Related to DNA Rearrangements Lukas Nabergall University of South Florida, lnabergall@mail.usf.edu
More information10. The GNFA method is used to show that
CSE 355 Midterm Examination 27 February 27 Last Name Sample ASU ID First Name(s) Ima Exam # Sample Regrading of Midterms If you believe that your grade has not been recorded correctly, return the entire
More informationNotes for Comp 497 (Comp 454) Week 10 4/5/05
Notes for Comp 497 (Comp 454) Week 10 4/5/05 Today look at the last two chapters in Part II. Cohen presents some results concerning context-free languages (CFL) and regular languages (RL) also some decidability
More informationMathematical Background
Chapter 1 Mathematical Background When we analyze various algorithms in terms of the time and the space it takes them to run, we often need to work with math. That is why we ask you to take MA 2250 Math
More informationRegularity-preserving letter selections
Regularity-preserving letter selections Armando B. Matos LIACC, Universidade do Porto Rua do Campo Alegre 823, 4150 Porto, Portugal 1 Introduction and definitions Seiferas and McNaughton gave in [SM76]
More informationSpecial Factors and Suffix and Factor Automata
Special Factors and Suffix and Factor Automata LIAFA, Paris 5 November 2010 Finite Words Let Σ be a finite alphabet, e.g. Σ = {a, n, b, c}. A word over Σ is finite concatenation of symbols of Σ, that is,
More informationDENSITY OF CRITICAL FACTORIZATIONS
DENSITY OF CRITICAL FACTORIZATIONS TERO HARJU AND DIRK NOWOTKA Abstract. We investigate the density of critical factorizations of infinte sequences of words. The density of critical factorizations of a
More informationAutomata on linear orderings
Automata on linear orderings Véronique Bruyère Institut d Informatique Université de Mons-Hainaut Olivier Carton LIAFA Université Paris 7 September 25, 2006 Abstract We consider words indexed by linear
More informationThe Symmetric Groups
Chapter 7 The Symmetric Groups 7. Introduction In the investigation of finite groups the symmetric groups play an important role. Often we are able to achieve a better understanding of a group if we can
More informationReduced [tau]_n-factorizations in Z and [tau]_nfactorizations
University of Iowa Iowa Research Online Theses and Dissertations Summer 2013 Reduced [tau]_n-factorizations in Z and [tau]_nfactorizations in N Alina Anca Florescu University of Iowa Copyright 2013 Alina
More informationTheory of Computation 4 Non-Deterministic Finite Automata
Theory of Computation 4 Non-Deterministic Finite Automata Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Theory of Computation
More informationOpen Problems in Automata Theory: An Idiosyncratic View
Open Problems in Automata Theory: An Idiosyncratic View Jeffrey Shallit School of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1 Canada shallit@cs.uwaterloo.ca http://www.cs.uwaterloo.ca/~shallit
More informationSolutions I.N. Herstein- Second Edition
Solutions I.N. Herstein- Second Edition Sadiah Zahoor Please email me if any corrections at sadiahzahoor@cantab.net. R is a ring in all problems. Problem 0.1. If a, b, c, d R, evaluate (a + b)(c + d).
More informationPERIODS OF FACTORS OF THE FIBONACCI WORD
PERIODS OF FACTORS OF THE FIBONACCI WORD KALLE SAARI Abstract. We show that if w is a factor of the infinite Fibonacci word, then the least period of w is a Fibonacci number. 1. Introduction The Fibonacci
More informationChomsky Normal Form and TURING MACHINES. TUESDAY Feb 4
Chomsky Normal Form and TURING MACHINES TUESDAY Feb 4 CHOMSKY NORMAL FORM A context-free grammar is in Chomsky normal form if every rule is of the form: A BC A a S ε B and C aren t start variables a is
More informationON THE LEAST NUMBER OF PALINDROMES IN AN INFINITE WORD
ON THE LEAST NUMBER OF PALINDROMES IN AN INFINITE WORD GABRIELE FICI AND LUCA Q. ZAMBONI ABSTRACT. We investigate the least number of palindromic factors in an infinite word. We first consider general
More informationCombinatorics on Finite Words and Data Structures
Combinatorics on Finite Words and Data Structures Dipartimento di Informatica ed Applicazioni Università di Salerno (Italy) Laboratoire I3S - Université de Nice-Sophia Antipolis 13 March 2009 Combinatorics
More informationDeciding Representability of Sets of Words of Equal Length
Deciding Representability of Sets of Words of Equal Length F. Blanchet-Sadri 1 Sean Simmons 2 November 24, 2012 Abstract Partial words are sequences over a finite alphabet that may have holes that match,
More informationUnambiguous Morphic Images of Strings
Unambiguous Morphic Images of Strings Daniel Reidenbach, University of Kaiserslautern A joint work with: Dominik D. Freydenberger, University of Kaiserslautern Johannes C. Schneider, University of Kaiserslautern
More informationA New Shuffle Convolution for Multiple Zeta Values
January 19, 2004 A New Shuffle Convolution for Multiple Zeta Values Ae Ja Yee 1 yee@math.psu.edu The Pennsylvania State University, Department of Mathematics, University Park, PA 16802 1 Introduction As
More informationDynamic Programming. Shuang Zhao. Microsoft Research Asia September 5, Dynamic Programming. Shuang Zhao. Outline. Introduction.
Microsoft Research Asia September 5, 2005 1 2 3 4 Section I What is? Definition is a technique for efficiently recurrence computing by storing partial results. In this slides, I will NOT use too many formal
More information32 nd United States of America Mathematical Olympiad Recommended Marking Scheme May 1, 2003
32 nd United States of America Mathematical Olympiad Recommended Marking Scheme May 1, 23 Remark: The general philosophy of this marking scheme follows that of IMO 22. This scheme encourages complete solutions.
More informationSimple groups and the classification of finite groups
Simple groups and the classification of finite groups 1 Finite groups of small order How can we describe all finite groups? Before we address this question, let s write down a list of all the finite groups
More informationInvertible insertion and deletion operations
Invertible insertion and deletion operations Lila Kari Academy of Finland and Department of Mathematics 1 University of Turku 20500 Turku Finland Abstract The paper investigates the way in which the property
More informationOn the Unavoidability of k-abelian Squares in Pure Morphic Words
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 16 (2013), Article 13.2.9 On the Unavoidability of k-abelian Squares in Pure Morphic Words Mari Huova and Juhani Karhumäki 1 Department of Mathematics
More informationVAUGHT S THEOREM: THE FINITE SPECTRUM OF COMPLETE THEORIES IN ℵ 0. Contents
VAUGHT S THEOREM: THE FINITE SPECTRUM OF COMPLETE THEORIES IN ℵ 0 BENJAMIN LEDEAUX Abstract. This expository paper introduces model theory with a focus on countable models of complete theories. Vaught
More informationAutomata: a short introduction
ILIAS, University of Luxembourg Discrete Mathematics II May 2012 What is a computer? Real computers are complicated; We abstract up to an essential model of computation; We begin with the simplest possible
More informationMorphisms and Morphic Words
Morphisms and Morphic Words Jeffrey Shallit School of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1 Canada shallit@graceland.uwaterloo.ca http://www.cs.uwaterloo.ca/~shallit 1 / 58
More informationPatrick Bishop, Clément Guérin, Mary Leskovec, Vishal Mummareddy, and Tim Reid. August 13, Mason Experimental Geometry Lab
SPECIAL WORDS IN FREE GROUPS Patrick Bishop, Clément Guérin, Mary Leskovec, Vishal Mummareddy, and Tim Reid Mason Experimental Geometry Lab August 13, 2015 CONTENTS I INTRODUCTION Notation Words and Free
More informationTheoretical Computer Science. Completing a combinatorial proof of the rigidity of Sturmian words generated by morphisms
Theoretical Computer Science 428 (2012) 92 97 Contents lists available at SciVerse ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Note Completing a combinatorial
More informationDecision Problems with TM s. Lecture 31: Halting Problem. Universe of discourse. Semi-decidable. Look at following sets: CSCI 81 Spring, 2012
Decision Problems with TM s Look at following sets: Lecture 31: Halting Problem CSCI 81 Spring, 2012 Kim Bruce A TM = { M,w M is a TM and w L(M)} H TM = { M,w M is a TM which halts on input w} TOTAL TM
More information