DNA Watson-Crick complementarity in computer science

Size: px
Start display at page:

Download "DNA Watson-Crick complementarity in computer science"

Transcription

1 DNA Watson-Crick computer science Shnosuke Seki (Supervisor) Dr. Lila Kari Department Computer Science, University Western Ontario Ph.D. thesis defense public lecture August 9, 2010

2 Outle 1 2 Pseudo-primitivity 3 4 An Extended Fe and Wilf s Theorem 5 Extended Lyndon-Schützenberger equation 6

3 Path to the understandg DNA processg 1953 Watson and Crick discovered the DNA double helix. discoveries fundamental processg mechanisms livg organisms like DNA replication Adleman s first experiment molecular computg (DNA computg) 2003 Completion Human Genome Project 8/9/2010 one small step to the understandg DNA encodg

4 Encodg to DNA In molecular computg, DNA strands are ten employed as media for processg, storage, and transmission. DNA strand design Good DNA strands for molecular computg

5 Encodg to DNA In molecular computg, DNA strands are ten employed as media for processg, storage, and transmission. DNA strand design Good DNA strands for molecular computg Knowledge computer science codg theory theory etc.

6 Encodg to DNA In molecular computg, DNA strands are ten employed as media for processg, storage, and transmission. DNA strand design Good DNA strands for molecular computg Knowledge computer science codg theory theory etc. + Particularities DNA 4-letters Watson-Crick

7 Criteria DNA strand design Criteria DNA strand design [Sager & Stefanovic 2006] 1 no strand forms any undesired tra-molecular structure 2 no strand hybridizes with a strand any undesirable manner 3 no strand hybridizes with the WK-complement a strand any undesirable manner

8 Criteria DNA strand design Criteria DNA strand design [Sager & Stefanovic 2006] 1 no strand forms any undesired tra-molecular structure 2 no strand hybridizes with a strand any undesirable manner 3 no strand hybridizes with the WK-complement a strand any undesirable manner

9 DNA double helix & Watson-Crick Watson strand 5 A C T G 3 3 T G A C 5 Crick strand Due to Watson-Crick (WK) : A T, C G, Anti-parallelism, Two WK-complementary DNA sgle strands with opposite orientation can form a DNA double helix.

10 DNA replication DNA replication works the followg way: Watson strand Crick strand

11 DNA replication DNA replication works the followg way: Watson strand Crick strand

12 DNA replication DNA replication works the followg way: Watson strand Crick strand Watson strand Crick strand

13 DNA replication DNA replication works the followg way: Watson strand Crick strand Watson strand Crick strand N.B., the figure above lacks various important features DNA replication such as replication fork, Okazaki fragment, leadg and laggg strands, and DNA ligase. Observation Two WK-complementary strands are equivalent w.r.t. the they encode.

14 A mathematical model the equivalence and its generalization I Defition A mappg θ : Σ Σ is called an antimorphic volution if 1 for any x, y Σ, θ(xy) = θ(y)θ(x) (antimorphism), 2 θ θ is the identity (volutive). Watson-Crick (WK-) volution The antimorphic volution τ defed as τ(a) = T, τ(t) = A, τ(c) = G, τ(g) = C models WK-, and hence, called WK-volution. For stance, τ(actg) = τ(g)τ(act) = = τ(g)τ(t)τ(c)τ(a) = CAGT.

15 A mathematical model the equivalence and its generalization II Formalization the equivalence For any word u, consider u and its WK-complement τ(u) equivalent. Idea for generalization How about regardg u and θ(u) equivalent for any word u and any antimorphic volution θ?

16 Combatorics with affity for DNA computg Ultimate Goal Establish a system with notions and theorems combatorics on which can handle a word and its complement a uniform manner. The ma contribution this thesis We will generalize the classical notions power, repetition, and even primitivity this thesis. Example ACTGCAGTCAGT can be considered repetitive because it can be written as ACTGτ(ACTG) 2.

17 Importance applications Recall the above-mentioned criteria for DNA strand design. Criteria DNA strand design [Sager & Stefanovic 2006] 1 no strand forms any undesired tra-molecular structure 2 no strand hybridizes with a strand any undesirable manner 3 no strand hybridizes with the WK-complement a strand any undesirable manner

18 Importance applications Recall the above-mentioned criteria for DNA strand design. Criteria DNA strand design [Sager & Stefanovic 2006] 1 no strand forms any undesired tra-molecular structure 2 no strand hybridizes with a strand any undesirable manner 3 no strand hybridizes with the WK-complement a strand any undesirable manner Our results this thesis aim at providg uniform treatment 2nd and 3rd criteria.

19 Primitivity A word w Σ + is called a power u if w u +. Defition A word w Σ + is primitive if w = u k implies k = 1. The (unique) primitive word u Σ + with w u + is called the primitive root w, denoted by ρ(w). Example ACGT is primitive, while ACGTACGT is not; ρ(acgtacgt) = ACGT.

20 θ-primitivity We call a word the set u{u, θ(u)} a θ-power u. Defition We say that a word w Σ + is θ-primitive if for any u Σ +, w {u, θ(u)} k implies k = 1. Example For the WK-volution τ, ACGT is not τ-primitive because GT = τ(ac), and hence, ACGT = ACτ(AC).

21 Defition θ-primitive root Problem Can we defe the θ-primitive root a word w as the unique θ-primitive word t such that w t{t, θ(t)}? The answer is YES. The existence such t is trivial. Its uniqueness will be a corollary extended Fe and Wilf s theorem.

22 A relationship between primitivity and θ-primitivity primitive θ-primitive Proposition For any antimorphic volution θ, a θ-primitive word is primitive. Example ACGT is primitive but not τ-primitive for the WK-volution τ.

23 Defect I A well-known example defect On (x, y)-coordate, the condition y = x decreases the degree freedom by 1 (x is a free variable, and y becomes a bound variable).

24 Defect II For given and a system equations on them, if the system forces some the volved to be powers same word, then the system is said to possess the defect. Example uv = vu implies ρ(u) = ρ(v) (defect on u, v). Example ([Chfrut & Karhumäki 1997]) If a word u{u, v} and a word v{u, v} share a prefix length u + v, then ρ(u) = ρ(v).

25 problem Does a given system word equations force two u, v volved to be {t, θ(t)} for some word t? Theorem ([Czeizler, Kari, & Seki 2010]) ρ(u) = ρ(v) implies that u, v t{t, θ(t)} for some word t, and hence, has a weak defect on u and v.

26 Ma contributions to weak defect We vestigate the weak defect problem contexts 1 (extended) Fe and Wilf s theorem; 2 (extended) Lyndon-Schützenberger equation.

27 Ma contributions to weak defect We vestigate the weak defect problem contexts 1 (extended) Fe and Wilf s theorem; 2 (extended) Lyndon-Schützenberger equation.

28 What is the Fe and Wilf s theorem? u + v gcd( u, v ) u u v v v v v Theorem ([Fe & Wilf 1965]) If a power u and a power v share a prefix length u + v gcd( u, v ), then ρ(u) = ρ(v).

29 An extended Fe and Wilf s theorem α u? u or θ(u) u or θ(u) β v v or θ(v) v or θ(v) v or θ(v) v or θ(v) Problem How long prefix do α u{u, θ(u)} and β v{v, θ(v)} have to share to imply that u, v t{t, θ(t)} for some word t?

30 lcm( u, v ) u u or θ(u) u or θ(u) v v or θ(v) 1 [Czeizler, Kari, & Seki 2010] v or θ(v) If a θ-power u and a θ-power v share a prefix length lcm( u, v ), then u, v t{t, θ(t)} for some word t. Defition θ-primitive root [Czeizler, Kari, & Seki 2010] We can defe the θ-primitive root u, denoted by ρ θ (u), as a unique θ-primitive word t such that u t{t, θ(t)}.

31 2 [Czeizler, Kari, & Seki 2010] Let u, v Σ + with u v. If a θ-power u and a θ-power v share a prefix length 2 u + v gcd( u, v ), then u, v t{t, θ(t)} for some word t.

32 For two positive tegers p, q N (p q), let { lcm(p, q) if q 2 gcd(p, q) b(p, q) = 2p + q gcd(p, q) if q 3 gcd(p, q). extended Fe and Wilf s theorem If a θ-power u and a θ-power v share a prefix length b( u, v ), then u, v t{t, θ(t)} for some word t.

33 Optimality bounds for The bound for FW theorem is strong optimal [Constantescu & Ilie 2005] a sense: for any positive tegers p, q, one can construct u, v such that 1 u = p, v = q, ρ(u) ρ(v), 2 a power u and a power v share a prefix length u + v gcd( u, v ) 1. Problem Is b(p, q) strongly optimal? A partial (trivial?) positive answer b(p, q) is optimal for any p, q with p q = gcd(p, q). Negative answer [Kari & Seki 2010] b(p, q) is not strongly optimal.

34 A new bound for For p, q with p > q 2 gcd(p, q), let gcd(p, q) b (p, q) = b(p, q). 2 an improved [Kari & Seki 2010] Let u, v with u > v 2 gcd( u, v ). If a θ-power u and a θ-power v share a prefix length b ( u, v ), then u, v t{t, θ(t)} for some word t.

35 Optimality the new bound A partial positive answer For any p, q with p > q = 2 gcd(p, q), b (p, q) is optimal. iff condition for b (p, q) to be optimal for (p, q) Let u, v with u > v 3 gcd( u, v ), ρ θ (u) ρ θ (v), and gcd( u, v ) = 1. A θ-power u and a θ-power v share a prefix length b ( u, v ) 1 iff either 1 u = (ab(ba) i b) m ab and v = ab(ba) i b, or 2 u = [a(ba) i (ab) i+1 a] m a(ba) i ab and v = a(ba) i (ab) i+1 a for some m 1, i 0, and a, b Σ s.t. a = θ(a) and b = θ(b). Consequently, b (p, q) is NOT strongly optimal (e.g., it is not optimal for (9, 5)).

36 Optimality the new bound A partial positive answer For any p, q with p > q = 2 gcd(p, q), b (p, q) is optimal. iff condition for b (p, q) to be optimal for (p, q) Let u, v with u > v 3 gcd( u, v ), ρ θ (u) ρ θ (v), and gcd( u, v ) = 1. A θ-power u and a θ-power v share a prefix length b ( u, v ) 1 iff either 1 u = (ab(ba) i b) m ab and v = ab(ba) i b, or 2 u = [a(ba) i (ab) i+1 a] m a(ba) i ab and v = a(ba) i (ab) i+1 a for some m 1, i 0, and a, b Σ s.t. a = θ(a) and b = θ(b). Consequently, b (p, q) is NOT strongly optimal (e.g., it is not optimal for (9, 5)).

37 Ma contributions to weak defect We vestigate the weak defect problem contexts 1 (extended) Fe and Wilf s theorem; 2 (extended) Lyndon-Schützenberger equation.

38 Lyndon-Schützenberger equation Lyndon-Schützenberger equation [Lyndon & Schützenberger 1962] For u, v, w Σ and non-negative tegers l, n, m 0, an equation the form u l = v n w m is called the Lyndon-Schützenberger equation. Solution [Lyndon & Schützenberger 1962, Lothaire 1983, Harju & Nowotka 2004] For l, n, m 2, the equation u l = v n w m implies u, v, w t + for some word t.

39 An extended Lyndon Schützenberger equation Let us extend the LS-equation as: u 1 u l = v 1 v n w 1 w m, where u 1,..., u l {u, θ(u)}, v 1,..., v n {v, θ(v)}, and w 1,..., w m {w, θ(w)}. Problem Fd conditions on l, n, m under which the exls equation (l, n, m) possesses the weak defect, i.e., implies u, v, w {t, θ(t)} + for some word t.

40 exls equations without the weak defect In [Czeizler, Czeizler, Kari, & Seki 2009], we provided examples to verify the followg. Proposition ([Czeizler, Czeizler, Kari, & Seki 2009]) If one l, n, m is 2, then exls equations (l, n, m) does NOT possess the weak defect. As a result, all l, n, m must be at least 3 for exls equations (l, n, m) to possess the weak defect.

41 exls equations with weak defect I Proposition ([Czeizler, Czeizler, Kari, & Seki 2009]) s ( 6, 3, 3) possess the weak defect. u 1 u 2 u 3 u i u l v 1 v 2 v 3 v n w 1 w m Symmetry enables us to assume that v 1 v n w 1 w m. Sce l 6, this means v 1 v n 1 2 u 1 u l u 1 u 2 u 3. Thus, u 1 u l and v 1 v n share a prefix length at least max(3 u, 3 v ) 2 max( u, v ) + m( u, v ).

42 exls equations with weak defect II Pro The common prefix between u 1 u l and v 1 v n is long enough to apply to obta u, v {t, θ(t)} for some θ-primitive word t. Hence, w 1 w m {t, θ(t)}. Usg the lcm-variant, we can conclude w {t, θ(t)}. The same pro technique works for exls equations (5, 5, 5) or (5, 4, 7). Proposition ([Czeizler, Czeizler, Kari, & Seki 2009]) s (5, 5, 5) and (5, 4, 7) possess the weak defect.

43 with l = 4, 5 The followg stronger statement requires results combatorics on. Theorem ([Czeizler, Czeizler, Kari, & Seki 2009]) s ( 5, 3, 3) possess the weak defect. More useful results combatorics on have been obtaed [Kari, Masson, & Seki 2009] to address some cases left open [Czeizler, Czeizler, Kari, & Seki 2009]. Theorem [Kari, Masson, & Seki 2009] s ( 4, 3, 3) possess the weak defect.

44 Summary on the exls equation l n m weak defect how to prove YES YES [Czeizler, Czeizler, Kari, & Seki YES combatorial arguments YES [Czeizler, Czeizler, Kari, & Seki YES combatorial arguments [Kari, Masson, & Seki 2009] OPEN? 2 NO examples 2 NO [Czeizler, Czeizler, Kari, & Seki 2 NO

45 Open problems I Open problems about the 1 Fd an optimal bound for (p, q) for which b (p, q) is not optimal. 2 Extend the problem settg further as: how long prefix do a θ-power u 1, that u 2,..., that u n have to share to imply that u 1, u 2,..., u n t{t, θ(t)} for some word t?

46 Open problems II Open problems about the exls equation 1 Solve exls equations u 1 u 2 u 3 = v 1 v n w 1 w m with n, m 3. 2 Fd a condition under which exls equations with l = 2 are solved positively. 3 Extend the exls equation further as u 1 u l = v 11 v 1n1 v 21 v 2n2 v k1 v knk, where k 2, l, n 1,..., n k 1, u 1,..., u l {u, θ(t)}, and v i1,..., v i {v i, θ(v i )}.

47 Open problems III Other open problems 1 ExFW theorem and positive answers to exls equations are part weak defect theorem. Investigate and establish the weak defect theorem.

48 Information my publication I The followg is a list my publications related to the topics troduced this talk. The list all my publications is available on my website: 1 E. Czeizler, E. Czeizler, L. Kari, and. An extension the Lyndon Schützenberger result to pseudoperiodic. In Proc. DLT 2009, LN 5583, Sprger (2009) E. Czeizler, L. Kari, and. On a special class primitive. Theoretical Computer Science 411(3) (2010)

49 Information my publication II 3 L. Kari, B. Masson, and. Properties pseudo-primitive and their applications. Submitted. 4 L. Kari and. An improved bound for an extension Fe and Wilf theorem. Fundamenta Informaticae 101(3) (2010)

50 I [Chfrut & Karhumäki 1997] C. Chfrut and J. Karhumäki. Combatorics. In G. Rozenberg and A. Salomaa (eds.), Handbook Formal Languages, vol.1, pp Sprger-Verlag, [Constantescu & Ilie 2005] S. Constantescu and L. Ilie. Generalized Fe and Wilf s theorem for arbitrary number periods. Theoretical Computer Science 339(1) (2005)

51 II [Czeizler, Czeizler, Kari, & Seki 2009] E. Czeizler, E. Czeizler, L. Kari, and. An extension the Lyndon Schützenberger result to pseudoperiodic. In Proc. DLT 2009, LN 5583, Sprger (2009) [Czeizler, Kari, & Seki 2010] E. Czeizler, L. Kari, and S. Seki. On a special class primitive. Theoretical Computer Science 411(3) (2010) [Fe & Wilf 1965] N. J. Fe and H. S. Wilf. Uniqueness theorem for periodic functions. Proc. American Mathematical Society 16 (1965)

52 III [Harju & Nowotka 2004] T. Harju and D. Nowotka. The equation x i = y j z k a free semigroup. Semigroup Forum 68 (2004) [Kari, Masson, & Seki 2009] L. Kari, B. Masson, and S. Seki. Properties pseudo-primitive and their applications. Submitted. [Kari & Seki 2010] L. Kari and. An improved bound for an extension Fe and Wilf theorem. Fundamenta Informaticae 101(3) (2010)

53 IV [Lothaire 1983] M. Lothaire. Combatorics on Words. Encyclopedia Mathematics and its Applications, 17, Addison-Wesley Publishg Co., [Lyndon & Schützenberger 1962] R. C. Lyndon and M. P. Schützenberger. The equation a M = b N c P a free group. Michigan Mathematical Journal, 9: , [Sager & Stefanovic 2006] J. Sager and D. Stefanovic. Designg nucleotide sequences for computation: A survey constrats. In Proc. DNA 11, LN 3892, Sprger, 2006.

54 Thank you for your kd attention.

RELATIVE WATSON-CRICK PRIMITIVITY OF WORDS

RELATIVE WATSON-CRICK PRIMITIVITY OF WORDS For submission to the Journal of Automata, Languages and Combinatorics Created on December 1, 2017 RELATIVE WATSON-CRICK PRIMITIVITY OF WORDS Lila Kari (A) Manasi S. Kulkarni (B) Kalpana Mahalingam (B)

More information

Theoretical Computer Science

Theoretical Computer Science Theoretical Computer Science 411 (2010) 617 630 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs On a special class of primitive words

More information

arxiv: v1 [cs.dm] 16 Jan 2018

arxiv: v1 [cs.dm] 16 Jan 2018 Embedding a θ-invariant code into a complete one Jean Néraud, Carla Selmi Laboratoire d Informatique, de Traitemement de l Information et des Systèmes (LITIS), Université de Rouen Normandie, UFR Sciences

More information

Involution Palindrome DNA Languages

Involution Palindrome DNA Languages Involution Palindrome DNA Languages Chen-Ming Fan 1, Jen-Tse Wang 2 and C. C. Huang 3,4 1 Department of Information Management, National Chin-Yi University of Technology, Taichung, Taiwan 411. fan@ncut.edu.tw

More information

Generating DNA Code Words Using Forbidding and Enforcing Systems

Generating DNA Code Words Using Forbidding and Enforcing Systems Generating DNA Code Words Using Forbidding and Enforcing Systems Daniela Genova 1 and Kalpana Mahalingam 2 1 Department of Mathematics and Statistics University of North Florida Jacksonville, FL 32224,

More information

On the Equation x k = z k 1 in a Free Semigroup

On the Equation x k = z k 1 in a Free Semigroup On the Equation x k = z k 1 in a Free Semigroup Tero Harju Dirk Nowotka Turku Centre for Computer Science, TUCS, Department of Mathematics, University of Turku 1 zk 2 2 zk n n TUCS Turku Centre for Computer

More information

Factors of words under an involution

Factors of words under an involution Journal o Mathematics and Inormatics Vol 1, 013-14, 5-59 ISSN: 349-063 (P), 349-0640 (online) Published on 8 May 014 wwwresearchmathsciorg Journal o Factors o words under an involution C Annal Deva Priya

More information

Twin-roots of words and their properties

Twin-roots of words and their properties Twin-roots of words and their properties Lila Kari a, Kalpana Mahalingam a, and Shinnosuke Seki a, a Department of Computer Science, University of Western Ontario, London, Ontario, Canada, N6A 5B7 Tel:

More information

International Journal of Scientific & Engineering Research Volume 8, Issue 8, August-2017 ISSN

International Journal of Scientific & Engineering Research Volume 8, Issue 8, August-2017 ISSN 1280 A Note on Involution Pseudoknot-bordered Words Cheng-Chih Huang 1, Abstract This paper continues the exploration of properties concerning involution pseudoknot- (un)bordered words for a morphic involution

More information

Theoretical Computer Science

Theoretical Computer Science Theoretical Computer Science 410 (2009) 2393 2400 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Twin-roots of words and their properties

More information

INSTITUT FÜR INFORMATIK

INSTITUT FÜR INFORMATIK INSTITUT FÜR INFORMATIK Generalised Lyndon-Schützenberger Equations Florin Manea, Mike Müller, Dirk Nowotka, Shinnosuke Seki Bericht Nr. 1403 March 20, 2014 ISSN 2192-6247 CHRISTIAN-ALBRECHTS-UNIVERSITÄT

More information

The commutation with ternary sets of words

The commutation with ternary sets of words The commutation with ternary sets of words Juhani Karhumäki Michel Latteux Ion Petre Turku Centre for Computer Science TUCS Technical Reports No 589, March 2004 The commutation with ternary sets of words

More information

Coding Properties of DNA Languages

Coding Properties of DNA Languages Coding Properties of DNA Languages Salah Hussini 1, Lila Kari 2, and Stavros Konstantinidis 1 1 Department of Mathematics and Computing Science, Saint Mary s University, Halifax, Nova Scotia, B3H 3C3,

More information

Watson-Crick bordered words and their syntactic monoid

Watson-Crick bordered words and their syntactic monoid Watson-Crick bordered words and their syntactic monoid Lila Kari and Kalpana Mahalingam University of Western Ontario, Department of Computer Science, London, ON, Canada N6A 5B7 lila, kalpana@csd.uwo.ca

More information

Language Recognition Power of Watson-Crick Automata

Language Recognition Power of Watson-Crick Automata 01 Third International Conference on Netorking and Computing Language Recognition Poer of Watson-Crick Automata - Multiheads and Sensing - Kunio Aizaa and Masayuki Aoyama Dept. of Mathematics and Computer

More information

De Bruijn Sequences Revisited

De Bruijn Sequences Revisited De Bruijn Sequences Revisited Lila Kari Zhi Xu The University of Western Ontario, London, Ontario, Canada N6A 5B7 lila@csd.uwo.ca zxu@google.com Abstract A (non-circular) de Bruijn sequence w of order

More information

Invertible insertion and deletion operations

Invertible insertion and deletion operations Invertible insertion and deletion operations Lila Kari Academy of Finland and Department of Mathematics 1 University of Turku 20500 Turku Finland Abstract The paper investigates the way in which the property

More information

About Duval Extensions

About Duval Extensions About Duval Extensions Tero Harju Dirk Nowotka Turku Centre for Computer Science, TUCS Department of Mathematics, University of Turku June 2003 Abstract A word v = wu is a (nontrivial) Duval extension

More information

5 3 Sensing Watson-Crick Finite Automata

5 3 Sensing Watson-Crick Finite Automata Benedek Nagy Department of Computer Science, Faculty of Informatics, University of Debrecen, Hungary 1 Introduction DNA computers provide new paradigms of computing (Păun et al., 1998). They appeared at

More information

Primitive partial words

Primitive partial words Discrete Applied Mathematics 148 (2005) 195 213 www.elsevier.com/locate/dam Primitive partial words F. Blanchet-Sadri 1 Department of Mathematical Sciences, University of North Carolina, P.O. Box 26170,

More information

Equations on Partial Words

Equations on Partial Words Equations on Partial Words F. Blanchet-Sadri 1 D. Dakota Blair 2 Rebeca V. Lewis 3 October 2, 2007 Abstract It is well known that some of the most basic properties of words, like the commutativity (xy

More information

5 3 Watson-Crick Automata with Several Runs

5 3 Watson-Crick Automata with Several Runs 5 3 Watson-Crick Automata with Several Runs Peter Leupold Department of Mathematics, Faculty of Science Kyoto Sangyo University, Japan Joint work with Benedek Nagy (Debrecen) Presentation at NCMA 2009

More information

Iterated Hairpin Completions of Non-crossing Words

Iterated Hairpin Completions of Non-crossing Words Iterated Hairpin Completions of Non-crossing Words Lila Kari 1, Steffen Kopecki 1,2, and Shinnosuke Seki 3 1 Department of Computer Science University of Western Ontario, London lila@csd.uwo.ca 2 Institute

More information

The Equation a M = b N c P in a Free Semigroup

The Equation a M = b N c P in a Free Semigroup The Equation a M = b N c P in a Free Semigroup Tero Harju Dirk Nowotka Turku Centre for Computer Science, TUCS, Department of Mathematics, University of Turku TUCS Turku Centre for Computer Science TUCS

More information

Periodicity in Rectangular Arrays

Periodicity in Rectangular Arrays Periodicity in Rectangular Arrays arxiv:1602.06915v2 [cs.dm] 1 Jul 2016 Guilhem Gamard LIRMM CNRS, Univ. Montpellier UMR 5506, CC 477 161 rue Ada 34095 Montpellier Cedex 5 France guilhem.gamard@lirmm.fr

More information

LINEAR COMPARTMENTAL MODELS: INPUT-OUTPUT EQUATIONS AND OPERATIONS THAT PRESERVE IDENTIFIABILITY. 1. Introduction

LINEAR COMPARTMENTAL MODELS: INPUT-OUTPUT EQUATIONS AND OPERATIONS THAT PRESERVE IDENTIFIABILITY. 1. Introduction LINEAR COMPARTMENTAL MODELS: INPUT-OUTPUT EQUATIONS AND OPERATIONS THAT PRESERVE IDENTIFIABILITY ELIZABETH GROSS, HEATHER HARRINGTON, NICOLETTE MESHKAT, AND ANNE SHIU Abstract. This work focuses on the

More information

Bordered Conjugates of Words over Large Alphabets

Bordered Conjugates of Words over Large Alphabets Bordered Conjugates of Words over Large Alphabets Tero Harju University of Turku harju@utu.fi Dirk Nowotka Universität Stuttgart nowotka@fmi.uni-stuttgart.de Submitted: Oct 23, 2008; Accepted: Nov 14,

More information

Unbordered Factors and Lyndon Words

Unbordered Factors and Lyndon Words Unbordered Factors and Lyndon Words J.-P. Duval Univ. of Rouen France T. Harju Univ. of Turku Finland September 2006 D. Nowotka Univ. of Stuttgart Germany Abstract A primitive word w is a Lyndon word if

More information

Regularity of Iterative Hairpin Completions of Crossing (2, 2)-Words

Regularity of Iterative Hairpin Completions of Crossing (2, 2)-Words International Journal of Foundations of Computer Science Vol. 27, No. 3 (2016) 375 389 c World Scientific Publishing Company DOI: 10.1142/S0129054116400153 Regularity of Iterative Hairpin Completions of

More information

Languages and monoids with disjunctive identity

Languages and monoids with disjunctive identity Languages and monoids with disjunctive identity Lila Kari and Gabriel Thierrin Department of Mathematics, University of Western Ontario London, Ontario, N6A 5B7 Canada Abstract We show that the syntactic

More information

On Shyr-Yu Theorem 1

On Shyr-Yu Theorem 1 On Shyr-Yu Theorem 1 Pál DÖMÖSI Faculty of Informatics, Debrecen University Debrecen, Egyetem tér 1., H-4032, Hungary e-mail: domosi@inf.unideb.hu and Géza HORVÁTH Institute of Informatics, Debrecen University

More information

Subwords in reverse-complement order - Extended abstract

Subwords in reverse-complement order - Extended abstract Subwords in reverse-complement order - Extended abstract Péter L. Erdős A. Rényi Institute of Mathematics Hungarian Academy of Sciences, Budapest, P.O. Box 127, H-164 Hungary elp@renyi.hu Péter Ligeti

More information

Complexity of Reachability, Mortality and Freeness Problems for Matrix Semigroups

Complexity of Reachability, Mortality and Freeness Problems for Matrix Semigroups Complexity of Reachability, Mortality and Freeness Problems for Matrix Semigroups Paul C. Bell Department of Computer Science Loughborough University P.Bell@lboro.ac.uk Co-authors for todays topics: V.

More information

Aperiodic languages and generalizations

Aperiodic languages and generalizations Aperiodic languages and generalizations Lila Kari and Gabriel Thierrin Department of Mathematics University of Western Ontario London, Ontario, N6A 5B7 Canada June 18, 2010 Abstract For every integer k

More information

Results on Transforming NFA into DFCA

Results on Transforming NFA into DFCA Fundamenta Informaticae XX (2005) 1 11 1 IOS Press Results on Transforming NFA into DFCA Cezar CÂMPEANU Department of Computer Science and Information Technology, University of Prince Edward Island, Charlottetown,

More information

Restricted ambiguity of erasing morphisms

Restricted ambiguity of erasing morphisms Loughborough University Institutional Repository Restricted ambiguity of erasing morphisms This item was submitted to Loughborough University's Institutional Repository by the/an author. Citation: REIDENBACH,

More information

Deciding Whether a Regular Language is Generated by a Splicing System

Deciding Whether a Regular Language is Generated by a Splicing System Deciding Whether a Regular Language is Generated by a Splicing System Lila Kari Steffen Kopecki Department of Computer Science The University of Western Ontario Middlesex College, London ON N6A 5B7 Canada

More information

Theory of Computation 1 Sets and Regular Expressions

Theory of Computation 1 Sets and Regular Expressions Theory of Computation 1 Sets and Regular Expressions Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Theory of Computation

More information

A Fine and Wilf s theorem for pseudoperiods and Justin s formula for generalized pseudostandard words

A Fine and Wilf s theorem for pseudoperiods and Justin s formula for generalized pseudostandard words A Fine and Wilf s theorem for pseudoperiods and Justin s formula for generalized pseudostandard words A. Blondin Massé 1,2, G. Paquin 2 and L. Vuillon 2 1 Laboratoire de Combinatoire et d Informatique

More information

Insertion and Deletion of Words: Determinism and Reversibility

Insertion and Deletion of Words: Determinism and Reversibility Insertion and Deletion of Words: Determinism and Reversibility Lila Kari Academy of Finland and Department of Mathematics University of Turku 20500 Turku Finland Abstract. The paper addresses two problems

More information

DENSITY OF CRITICAL FACTORIZATIONS

DENSITY OF CRITICAL FACTORIZATIONS DENSITY OF CRITICAL FACTORIZATIONS TERO HARJU AND DIRK NOWOTKA Abstract. We investigate the density of critical factorizations of infinte sequences of words. The density of critical factorizations of a

More information

Transducer Descriptions of DNA Code Properties and Undecidability of Antimorphic Problems

Transducer Descriptions of DNA Code Properties and Undecidability of Antimorphic Problems Transducer Descriptions of DNA Code Properties and Undecidability of Antimorphic Problems Lila Kari 1, Stavros Konstantinidis 2, and Steffen Kopecki 1,2 1 The University of Western Ontario, London, Ontario,

More information

Running head: Watson-Crick Quantum Finite Automata. Title: Watson-Crick Quantum Finite Automata. Authors: Kingshuk Chatterjee 1, Kumar Sankar Ray 2

Running head: Watson-Crick Quantum Finite Automata. Title: Watson-Crick Quantum Finite Automata. Authors: Kingshuk Chatterjee 1, Kumar Sankar Ray 2 Running head: Watson-Crick Quantum Finite Automata Title: Watson-Crick Quantum Finite Automata Authors: Kingshuk Chatterjee 1, Kumar Sankar Ray Affiliations: 1, Electronics and Communication Sciences Unit,

More information

Conjugacy on partial words. By: Francine Blanchet-Sadri and D.K. Luhmann

Conjugacy on partial words. By: Francine Blanchet-Sadri and D.K. Luhmann Conjugacy on partial words By: Francine Blanchet-Sadri and D.K. Luhmann F. Blanchet-Sadri and D.K. Luhmann, "Conjugacy on Partial Words." Theoretical Computer Science, Vol. 289, No. 1, 2002, pp 297-312.

More information

Universal Algebra for Logics

Universal Algebra for Logics Universal Algebra for Logics Joanna GRYGIEL University of Czestochowa Poland j.grygiel@ajd.czest.pl 2005 These notes form Lecture Notes of a short course which I will give at 1st School on Universal Logic

More information

On the robustness of primitive words

On the robustness of primitive words Discrete Applied Mathematics 117 (2002) 239 252 On the robustness of primitive words Gheorghe Paun a, Nicolae Santean b, Gabriel Thierrin b;, Sheng Yu b a Institute of Mathematics of the Romanian Academy,

More information

Fine and Wilf s Periodicity on Partial Words and Consequences

Fine and Wilf s Periodicity on Partial Words and Consequences Fine and Wilf s Periodicity on Partial Words and Consequences F. Blanchet-Sadri 1, Kevin Corcoran 2, and Jenell Nyberg 3 1 Department of Computer Science, University of North Carolina, P.O. Box 26170,

More information

Substitutions, Trajectories and Noisy Channels

Substitutions, Trajectories and Noisy Channels Substitutions, Trajectories and Noisy Channels Lila Kari 1, Stavros Konstantinidis 2, and Petr Sosík 1,3, 1 Department of Computer Science, The University of Western Ontario, London, ON, Canada, N6A 5B7

More information

Some Operations Preserving Primitivity of Words

Some Operations Preserving Primitivity of Words Some Operations Preserving Primitivity of Words Jürgen Dassow Fakultät für Informatik, Otto-von-Guericke-Universität Magdeburg PSF 4120; D-39016 Magdeburg; Germany Gema M. Martín, Francisco J. Vico Departamento

More information

Finding Pseudo-repetitions

Finding Pseudo-repetitions Finding Pseudo-repetitions Paweł Gawrychowski 1, Florin Manea 2, Robert Mercaş 3, Dirk Nowotka 2, and Cătălin Tiseanu 4 1 Max-Planck-Institut für Informatik, Saarbrücken, Germany, gawry@cs.uni.wroc.pl

More information

A Formal Language Model of DNA Polymerase Enzymatic Activity

A Formal Language Model of DNA Polymerase Enzymatic Activity Fundamenta Informaticae 138 (2015) 179 192 179 DOI 10.3233/FI-2015-1205 IOS Press A Formal Language Model of DNA Polymerase Enzymatic Activity Srujan Kumar Enaganti, Lila Kari, Steffen Kopecki Department

More information

On P Systems with Active Membranes

On P Systems with Active Membranes On P Systems with Active Membranes Andrei Păun Department of Computer Science, University of Western Ontario London, Ontario, Canada N6A 5B7 E-mail: apaun@csd.uwo.ca Abstract. The paper deals with the

More information

DNA Codes and Their Properties

DNA Codes and Their Properties DNA Codes and Their Properties Lila Kari and Kalpana Mahalingam University of Western Ontario, Department of Computer Science, London, ON N6A5B7 {lila, kalpana}@csd.uwo.ca Abstract. One of the main research

More information

Deciding Whether a Regular Language is Generated by a Splicing System

Deciding Whether a Regular Language is Generated by a Splicing System Deciding Whether a Regular Language is Generated by a Splicing System Lila Kari Steffen Kopecki Department of Computer Science The University of Western Ontario London ON N6A 5B7 Canada {lila,steffen}@csd.uwo.ca

More information

The number of runs in Sturmian words

The number of runs in Sturmian words The number of runs in Sturmian words Paweł Baturo 1, Marcin Piatkowski 1, and Wojciech Rytter 2,1 1 Department of Mathematics and Computer Science, Copernicus University 2 Institute of Informatics, Warsaw

More information

SYNTACTIC SEMIGROUP PROBLEM FOR THE SEMIGROUP REDUCTS OF AFFINE NEAR-SEMIRINGS OVER BRANDT SEMIGROUPS

SYNTACTIC SEMIGROUP PROBLEM FOR THE SEMIGROUP REDUCTS OF AFFINE NEAR-SEMIRINGS OVER BRANDT SEMIGROUPS SYNTACTIC SEMIGROUP PROBLEM FOR THE SEMIGROUP REDUCTS OF AFFINE NEAR-SEMIRINGS OVER BRANDT SEMIGROUPS JITENDER KUMAR AND K. V. KRISHNA Abstract. The syntactic semigroup problem is to decide whether a given

More information

Insertion operations: closure properties

Insertion operations: closure properties Insertion operations: closure properties Lila Kari Academy of Finland and Mathematics Department 1 Turku University 20 500 Turku, Finland 1 Introduction The basic notions used for specifying languages

More information

Properties of Fibonacci languages

Properties of Fibonacci languages Discrete Mathematics 224 (2000) 215 223 www.elsevier.com/locate/disc Properties of Fibonacci languages S.S Yu a;, Yu-Kuang Zhao b a Department of Applied Mathematics, National Chung-Hsing University, Taichung,

More information

Solving Subset Sum Problems by Time-free Spiking Neural P Systems

Solving Subset Sum Problems by Time-free Spiking Neural P Systems Appl. Math. Inf. Sci. 8, No. 1, 327-332 (2014) 327 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/080140 Solving Subset Sum Problems by Time-free Spiking

More information

Electronics and Communication Sciences Unit, Indian Statistical Institute, Kolkata-108

Electronics and Communication Sciences Unit, Indian Statistical Institute, Kolkata-108 Running head: Reversible Watson-Crick Automata Title: Reversible Watson-Crick Automata Authors: Kingshuk Chatterjee 1, Kumar Sankar Ray(corresponding author) 2 Affiliations: 1,2 Electronics and Communication

More information

Research Statement. MUHAMMAD INAM 1 of 5

Research Statement. MUHAMMAD INAM 1 of 5 MUHAMMAD INAM 1 of 5 Research Statement Preliminaries My primary research interests are in geometric inverse semigroup theory and its connections with other fields of mathematics. A semigroup M is called

More information

On closures of lexicographic star-free languages. E. Ochmański and K. Stawikowska

On closures of lexicographic star-free languages. E. Ochmański and K. Stawikowska On closures of lexicographic star-free languages E. Ochmański and K. Stawikowska Preprint No 7/2005 Version 1, posted on April 19, 2005 On closures of lexicographic star-free languages Edward Ochma ski

More information

Duplication in DNA Sequences

Duplication in DNA Sequences Duplication in DNA Sequences Masami Ito 1, Lila Kari 2, Zachary Kincaid 2, and Shinnosuke Seki 2 1 Department of Mathematics, Faculty of Science, Kyoto Sangyo University, Kyoto, Japan, 603-8555 ito@ksuvx0.kyoto-su.ac.jp

More information

State Complexity of Neighbourhoods and Approximate Pattern Matching

State Complexity of Neighbourhoods and Approximate Pattern Matching State Complexity of Neighbourhoods and Approximate Pattern Matching Timothy Ng, David Rappaport, and Kai Salomaa School of Computing, Queen s University, Kingston, Ontario K7L 3N6, Canada {ng, daver, ksalomaa}@cs.queensu.ca

More information

Address: Electronics and Communication Sciences Unit, Indian Statistical Institute, Kolkata-108.

Address: Electronics and Communication Sciences Unit, Indian Statistical Institute, Kolkata-108. Running head: Multi-head Watson-Crick automata Title: Multi-head Watson-Crick automata Authors: Kingshuk Chatterjee 1, Kumar Sankar Ray(corresponding author) Affiliations: 1 Electronics and Communication

More information

Optimal Superprimitivity Testing for Strings

Optimal Superprimitivity Testing for Strings Optimal Superprimitivity Testing for Strings Alberto Apostolico Martin Farach Costas S. Iliopoulos Fibonacci Report 90.7 August 1990 - Revised: March 1991 Abstract A string w covers another string z if

More information

Reconstruction from subwords

Reconstruction from subwords 6 th International Conference on Applied Informatics Eger, Hungary, January 27 31, 2004. Reconstruction from subwords Péter Ligetia, Péter Sziklaib a Department of Computer Science, Eötvös Loránd University

More information

On the coinductive nature of centralizers

On the coinductive nature of centralizers On the coinductive nature of centralizers Charles Grellois INRIA & University of Bologna Séminaire du LIFO Jan 16, 2017 Charles Grellois (INRIA & Bologna) On the coinductive nature of centralizers Jan

More information

On the dual post correspondence problem

On the dual post correspondence problem Loughborough University Institutional Repository On the dual post correspondence problem This item was submitted to Loughborough University's Institutional Repository by the/an author. Citation: DAY, J.D.,

More information

DESCRIPTIONAL COMPLEXITY OF NFA OF DIFFERENT AMBIGUITY

DESCRIPTIONAL COMPLEXITY OF NFA OF DIFFERENT AMBIGUITY International Journal of Foundations of Computer Science Vol. 16, No. 5 (2005) 975 984 c World Scientific Publishing Company DESCRIPTIONAL COMPLEXITY OF NFA OF DIFFERENT AMBIGUITY HING LEUNG Department

More information

Decision Problems Concerning. Prime Words and Languages of the

Decision Problems Concerning. Prime Words and Languages of the Decision Problems Concerning Prime Words and Languages of the PCP Marjo Lipponen Turku Centre for Computer Science TUCS Technical Report No 27 June 1996 ISBN 951-650-783-2 ISSN 1239-1891 Abstract This

More information

Note Watson Crick D0L systems with regular triggers

Note Watson Crick D0L systems with regular triggers Theoretical Computer Science 259 (2001) 689 698 www.elsevier.com/locate/tcs Note Watson Crick D0L systems with regular triggers Juha Honkala a; ;1, Arto Salomaa b a Department of Mathematics, University

More information

arxiv:math/ v1 [math.co] 11 Oct 2002

arxiv:math/ v1 [math.co] 11 Oct 2002 COUNTING THE OCCURRENCES OF GENERALIZED PATTERNS IN WORDS GENERATED BY A MORPHISM arxiv:math/0210170v1 [math.co] 11 Oct 2002 Sergey Kitaev and Toufik Mansour 1 Matematik, Chalmers tekniska högskola och

More information

Inner Product Spaces

Inner Product Spaces Inner Product Spaces Introduction Recall in the lecture on vector spaces that geometric vectors (i.e. vectors in two and three-dimensional Cartesian space have the properties of addition, subtraction,

More information

A PASCAL-LIKE BOUND FOR THE NUMBER OF NECKLACES WITH FIXED DENSITY

A PASCAL-LIKE BOUND FOR THE NUMBER OF NECKLACES WITH FIXED DENSITY A PASCAL-LIKE BOUND FOR THE NUMBER OF NECKLACES WITH FIXED DENSITY I. HECKENBERGER AND J. SAWADA Abstract. A bound resembling Pascal s identity is presented for binary necklaces with fixed density using

More information

A Characterisation of NL/poly via Nondeterministic Finite Automata.

A Characterisation of NL/poly via Nondeterministic Finite Automata. A Characterisation of NL/poly via Nondeterministic Finite Automata. Rob Myers and Henning Urbat Institut für Theoretische Informatik TU Braunschweig, Germany April 3, 23 Abstract For each language L 2

More information

Watson-Crick ω-automata. Elena Petre. Turku Centre for Computer Science. TUCS Technical Reports

Watson-Crick ω-automata. Elena Petre. Turku Centre for Computer Science. TUCS Technical Reports Watson-Crick ω-automata Elena Petre Turku Centre for Computer Science TUCS Technical Reports No 475, December 2002 Watson-Crick ω-automata Elena Petre Department of Mathematics, University of Turku and

More information

ON HIGHLY PALINDROMIC WORDS

ON HIGHLY PALINDROMIC WORDS ON HIGHLY PALINDROMIC WORDS Abstract. We study some properties of palindromic (scattered) subwords of binary words. In view of the classical problem on subwords, we show that the set of palindromic subwords

More information

Fuzzy Answer Set semantics for Residuated Logic programs

Fuzzy Answer Set semantics for Residuated Logic programs semantics for Logic Nicolás Madrid & Universidad de Málaga September 23, 2009 Aims of this paper We are studying the introduction of two kinds of negations into residuated : Default negation: This negation

More information

FINE AND WILF WORDS FOR ANY PERIODS II. R. Tijdeman and L.Q. Zamboni

FINE AND WILF WORDS FOR ANY PERIODS II. R. Tijdeman and L.Q. Zamboni FINE AND WILF WORDS FOR ANY PERIODS II R. Tijdeman and L.Q. Zamboni Abstract. Given positive integers n, and p 1,..., p r, we define a fast word combinatorial algorithm for constructing a word w = w 1

More information

FINE AND WILF WORDS FOR ANY PERIODS II. R. Tijdeman and L. Zamboni

FINE AND WILF WORDS FOR ANY PERIODS II. R. Tijdeman and L. Zamboni FINE AND WILF WORDS FOR ANY PERIODS II R. Tijdeman and L. Zamboni Abstract. In 2003 the authors introduced a fast algorithm to determine the word w = w 1...w n of maximal length n, and with a maximal number

More information

Some decision problems on integer matrices

Some decision problems on integer matrices Some decision problems on integer matrices Christian Choffrut L.I.A.F.A, Université Paris VII, Tour 55-56, 1 er étage, 2 pl. Jussieu 75 251 Paris Cedex France Christian.Choffrut@liafa.jussieu.fr Juhani

More information

arxiv: v1 [math.co] 9 Jun 2015

arxiv: v1 [math.co] 9 Jun 2015 On Maximal Chains of Systems of Word Equations Juhani Karhumäki and Aleksi Saarela Department of Mathematics and Statistics University of Turku, 20014 Turku, Finland arxiv:1506.02913v1 [math.co] 9 Jun

More information

On Rice s theorem. Hans Hüttel. October 2001

On Rice s theorem. Hans Hüttel. October 2001 On Rice s theorem Hans Hüttel October 2001 We have seen that there exist languages that are Turing-acceptable but not Turing-decidable. An important example of such a language was the language of the Halting

More information

The Computational Power of Extended Watson-Crick L Systems

The Computational Power of Extended Watson-Crick L Systems The Computational Power of Extended Watson-Crick L Systems by David Sears A thesis submitted to the School of Computing in conformity with the requirements for the degree of Master of Science Queen s University

More information

Partial Words and the Critical Factorization Theorem Revisited

Partial Words and the Critical Factorization Theorem Revisited Partial Words and the Critical Factorization Theorem Revisited F. Blanchet-Sadri and Nathan D. Wetzler Department of Mathematical Sciences University of North Carolina P.O. Box 26170 Greensboro, NC 27402

More information

Weakly unambiguous morphisms

Weakly unambiguous morphisms Loughborough University Institutional Repository Weakly unambiguous morphisms This item was submitted to Loughborough University's Institutional Repository by the/an author. Citation: FREYDENBERGER, D.D.,

More information

Supplementary Examples for

Supplementary Examples for Supplementary Examples for Infinite Interval Exchange Transformations from Shifts ([LN15]) Luis-Miguel Lopez Philippe Narbel Version 1.0, April, 2016 Contents A The Shifted Intervals Preservation (Lemma

More information

Course on Inverse Problems

Course on Inverse Problems Stanford University School of Earth Sciences Course on Inverse Problems Albert Tarantola Third Lesson: Probability (Elementary Notions) Let u and v be two Cartesian parameters (then, volumetric probabilities

More information

On Chomsky Hierarchy of Palindromic Languages

On Chomsky Hierarchy of Palindromic Languages Acta Cybernetica 22 (2016) 703 713. On Chomsky Hierarchy of Palindromic Languages Pál Dömösi, Szilárd Fazekas, and Masami Ito Abstract The characterization of the structure of palindromic regular and palindromic

More information

State Complexity of Two Combined Operations: Catenation-Union and Catenation-Intersection

State Complexity of Two Combined Operations: Catenation-Union and Catenation-Intersection International Journal of Foundations of Computer Science c World Scientific Publishing Company State Complexity of Two Combined Operations: Catenation-Union and Catenation-Intersection Bo Cui, Yuan Gao,

More information

Combinatorial Interpretations of a Generalization of the Genocchi Numbers

Combinatorial Interpretations of a Generalization of the Genocchi Numbers 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 7 (2004), Article 04.3.6 Combinatorial Interpretations of a Generalization of the Genocchi Numbers Michael Domaratzki Jodrey School of Computer Science

More information

Power of controlled insertion and deletion

Power of controlled insertion and deletion Power of controlled insertion and deletion Lila Kari Academy of Finland and Department of Mathematics 1 University of Turku 20500 Turku Finland Abstract The paper investigates classes of languages obtained

More information

PERIODS OF FACTORS OF THE FIBONACCI WORD

PERIODS OF FACTORS OF THE FIBONACCI WORD PERIODS OF FACTORS OF THE FIBONACCI WORD KALLE SAARI Abstract. We show that if w is a factor of the infinite Fibonacci word, then the least period of w is a Fibonacci number. 1. Introduction The Fibonacci

More information

Lecture notes 1: ECEN 489

Lecture notes 1: ECEN 489 Lecture notes : ECEN 489 Power Management Circuits and Systems Department of Electrical & Computer Engeerg Texas A&M University Jose Silva-Martez January 207 Copyright Texas A&M University. All rights

More information

DNA computing, sticker systems, and universality

DNA computing, sticker systems, and universality Acta Informatica 35, 401 420 1998 c Springer-erlag 1998 DNA computing, sticker systems, and universality Lila Kari 1, Gheorghe Păun 2, Grzegorz Rozenberg 3, Arto Salomaa 4, Sheng Yu 1 1 Department of Computer

More information

Splitting sets and weakly Matlis domains

Splitting sets and weakly Matlis domains Commutative Algebra and Applications, 1 8 de Gruyter 2009 Splitting sets and weakly Matlis domains D. D. Anderson and Muhammad Zafrullah Abstract. An integral domain D is weakly Matlis if the intersection

More information

Deletion operations: closure properties

Deletion operations: closure properties Deletion operations: closure properties Lila Kari Academy of Finland and Department of Mathematics 1 University of Turku 20500 Turku Finland June 3, 2010 KEY WORDS: right/left quotient, sequential deletion,

More information

Number of occurrences of powers in strings

Number of occurrences of powers in strings Author manuscript, published in "International Journal of Foundations of Computer Science 21, 4 (2010) 535--547" DOI : 10.1142/S0129054110007416 Number of occurrences of powers in strings Maxime Crochemore

More information