Discrete Mathematics and Theoretical Computer Science最新文献

筛选
英文 中文
Bears with Hats and Independence Polynomials 带帽熊和独立多项式
4区 数学
Discrete Mathematics and Theoretical Computer Science Pub Date : 2023-10-16 DOI: 10.46298/dmtcs.10802
Blažej, Václav, Dvořák, Pavel, Opler, Michal
{"title":"Bears with Hats and Independence Polynomials","authors":"Blažej, Václav, Dvořák, Pavel, Opler, Michal","doi":"10.46298/dmtcs.10802","DOIUrl":"https://doi.org/10.46298/dmtcs.10802","url":null,"abstract":"Consider the following hat guessing game. A bear sits on each vertex of a graph $G$, and a demon puts on each bear a hat colored by one of $h$ colors. Each bear sees only the hat colors of his neighbors. Based on this information only, each bear has to guess $g$ colors and he guesses correctly if his hat color is included in his guesses. The bears win if at least one bear guesses correctly for any hat arrangement. We introduce a new parameter - fractional hat chromatic number $hat{mu}$, arising from the hat guessing game. The parameter $hat{mu}$ is related to the hat chromatic number which has been studied before. We present a surprising connection between the hat guessing game and the independence polynomial of graphs. This connection allows us to compute the fractional hat chromatic number of chordal graphs in polynomial time, to bound fractional hat chromatic number by a function of maximum degree of $G$, and to compute the exact value of $hat{mu}$ of cliques, paths, and cycles.","PeriodicalId":55175,"journal":{"name":"Discrete Mathematics and Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136077521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Pseudoperiodic Words and a Question of Shevelev 伪周期词与舍夫列夫问题
4区 数学
Discrete Mathematics and Theoretical Computer Science Pub Date : 2023-10-16 DOI: 10.46298/dmtcs.9919
Joseph Meleshko, Pascal Ochem, Jeffrey Shallit, Sonja Linghui Shan
{"title":"Pseudoperiodic Words and a Question of Shevelev","authors":"Joseph Meleshko, Pascal Ochem, Jeffrey Shallit, Sonja Linghui Shan","doi":"10.46298/dmtcs.9919","DOIUrl":"https://doi.org/10.46298/dmtcs.9919","url":null,"abstract":"We generalize the familiar notion of periodicity in sequences to a new kind of pseudoperiodicity, and we prove some basic results about it. We revisit the results of a 2012 paper of Shevelev and reprove his results in a simpler and more unified manner, and provide a complete answer to one of his previously unresolved questions. We consider finding words with specific pseudoperiod and having the smallest possible critical exponent. Finally, we consider the problem of determining whether a finite word is pseudoperiodic of a given size, and show that it is NP-complete.","PeriodicalId":55175,"journal":{"name":"Discrete Mathematics and Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136114171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dissecting power of intersection of two context-free languages 两种上下文无关语言交集的剖析能力
4区 数学
Discrete Mathematics and Theoretical Computer Science Pub Date : 2023-10-02 DOI: 10.46298/dmtcs.9063
Josef Rukavicka
{"title":"Dissecting power of intersection of two context-free languages","authors":"Josef Rukavicka","doi":"10.46298/dmtcs.9063","DOIUrl":"https://doi.org/10.46298/dmtcs.9063","url":null,"abstract":"We say that a language $L$ is emph{constantly growing} if there is a constant $c$ such that for every word $uin L$ there is a word $vin L$ with $vert uvert<vert vvertleq c+vert uvert$. We say that a language $L$ is emph{geometrically growing} if there is a constant $c$ such that for every word $uin L$ there is a word $vin L$ with $vert uvert<vert vvertleq cvert uvert$. Given two infinite languages $L_1,L_2$, we say that $L_1$ emph{dissects} $L_2$ if $vert L_2setminus L_1vert=infty$ and $vert L_1cap L_2vert=infty$. In 2013, it was shown that for every constantly growing language $L$ there is a regular language $R$ such that $R$ dissects $L$. In the current article we show how to dissect a geometrically growing language by a homomorphic image of intersection of two context-free languages. Consider three alphabets $Gamma$, $Sigma$, and $Theta$ such that $vert Sigmavert=1$ and $vert Thetavert=4$. We prove that there are context-free languages $M_1,M_2subseteq Theta^*$, an erasing alphabetical homomorphism $pi:Theta^*rightarrow Sigma^*$, and a nonerasing alphabetical homomorphism $varphi : Gamma^*rightarrow Sigma^*$ such that: If $Lsubseteq Gamma^*$ is a geometrically growing language then there is a regular language $Rsubseteq Theta^*$ such that $varphi^{-1}left(pileft(Rcap M_1cap M_2right)right)$ dissects the language $L$.","PeriodicalId":55175,"journal":{"name":"Discrete Mathematics and Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135830074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The number of distinct adjacent pairs in geometrically distributed words: a probabilistic and combinatorial analysis 几何分布词中不同相邻对的数目:一种概率和组合分析
4区 数学
Discrete Mathematics and Theoretical Computer Science Pub Date : 2023-10-02 DOI: 10.46298/dmtcs.9293
Guy Louchard, Werner Schachinger, Mark Daniel Ward
{"title":"The number of distinct adjacent pairs in geometrically distributed words: a probabilistic and combinatorial analysis","authors":"Guy Louchard, Werner Schachinger, Mark Daniel Ward","doi":"10.46298/dmtcs.9293","DOIUrl":"https://doi.org/10.46298/dmtcs.9293","url":null,"abstract":"The analysis of strings of $n$ random variables with geometric distribution has recently attracted renewed interest: Archibald et al. consider the number of distinct adjacent pairs in geometrically distributed words. They obtain the asymptotic ($nrightarrowinfty$) mean of this number in the cases of different and identical pairs. In this paper we are interested in all asymptotic moments in the identical case, in the asymptotic variance in the different case and in the asymptotic distribution in both cases. We use two approaches: the first one, the probabilistic approach, leads to variances in both cases and to some conjectures on all moments in the identical case and on the distribution in both cases. The second approach, the combinatorial one, relies on multivariate pattern matching techniques, yielding exact formulas for first and second moments. We use such tools as Mellin transforms, Analytic Combinatorics, Markov Chains.","PeriodicalId":55175,"journal":{"name":"Discrete Mathematics and Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135830082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Homomorphically Full Oriented Graphs 同态全向图
4区 数学
Discrete Mathematics and Theoretical Computer Science Pub Date : 2023-10-02 DOI: 10.46298/dmtcs.9957
Thomas Bellitto, Christopher Duffy, Gary MacGillivray
{"title":"Homomorphically Full Oriented Graphs","authors":"Thomas Bellitto, Christopher Duffy, Gary MacGillivray","doi":"10.46298/dmtcs.9957","DOIUrl":"https://doi.org/10.46298/dmtcs.9957","url":null,"abstract":"Homomorphically full graphs are those for which every homomorphic image is isomorphic to a subgraph. We extend the definition of homomorphically full to oriented graphs in two different ways. For the first of these, we show that homomorphically full oriented graphs arise as quasi-transitive orientations of homomorphically full graphs. This in turn yields an efficient recognition and construction algorithms for these homomorphically full oriented graphs. For the second one, we show that the related recognition problem is GI-hard, and that the problem of deciding if a graph admits a homomorphically full orientation is NP-complete. In doing so we show the problem of deciding if two given oriented cliques are isomorphic is GI-complete.","PeriodicalId":55175,"journal":{"name":"Discrete Mathematics and Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135830238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gossiping with interference in radio ring networks 用无线电环网干扰八卦
4区 数学
Discrete Mathematics and Theoretical Computer Science Pub Date : 2023-10-02 DOI: 10.46298/dmtcs.9399
Jean-Claude Bermond, Takako Kodate, Joseph Yu
{"title":"Gossiping with interference in radio ring networks","authors":"Jean-Claude Bermond, Takako Kodate, Joseph Yu","doi":"10.46298/dmtcs.9399","DOIUrl":"https://doi.org/10.46298/dmtcs.9399","url":null,"abstract":"In this paper, we study the problem of gossiping with interference constraint in radio ring networks. Gossiping (or total exchange information) is a protocol where each node in the network has a message and is expected to distribute its own message to every other node in the network. The gossiping problem consists in finding the minimum running time (makespan) of a gossiping protocol and algorithms that attain this makespan. We focus on the case where the transmission network is a ring network. We consider synchronous protocols where it takes one unit of time (step) to transmit a unit-length message. During one step, a node receives at most one message only through one of its two neighbors. We also suppose that, during one step, a node cannot be both a sender and a receiver (half duplex model). Moreover communication is subject to interference constraints. We use a primary node interference model where, if a node receives a message from one of its neighbors, its other neighbor cannot send at the same time. With these assumptions we completely solve the problem for ring networks. We first show lower bounds and then give gossiping algorithms which meet these lower bounds and so are optimal. The number of rounds depends on the congruences of n modulo 12.","PeriodicalId":55175,"journal":{"name":"Discrete Mathematics and Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135790109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Embedding phylogenetic trees in networks of low treewidth 在低树宽网络中嵌入系统发育树
4区 数学
Discrete Mathematics and Theoretical Computer Science Pub Date : 2023-10-02 DOI: 10.46298/dmtcs.10116
Leo van Iersel, Mark Jones, Mathias Weller
{"title":"Embedding phylogenetic trees in networks of low treewidth","authors":"Leo van Iersel, Mark Jones, Mathias Weller","doi":"10.46298/dmtcs.10116","DOIUrl":"https://doi.org/10.46298/dmtcs.10116","url":null,"abstract":"Given a rooted, binary phylogenetic network and a rooted, binary phylogenetic tree, can the tree be embedded into the network? This problem, called textsc{Tree Containment}, arises when validating networks constructed by phylogenetic inference methods.We present the first algorithm for (rooted) textsc{Tree Containment} using the treewidth $t$ of the input network $N$ as parameter, showing that the problem can be solved in $2^{O(t^2)}cdot|N|$ time and space.","PeriodicalId":55175,"journal":{"name":"Discrete Mathematics and Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135830080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Antisquares and Critical Exponents 反平方和临界指数
4区 数学
Discrete Mathematics and Theoretical Computer Science Pub Date : 2023-09-06 DOI: 10.46298/dmtcs.10063
Aseem Baranwal, James Currie, Lucas Mol, Pascal Ochem, Narad Rampersad, Jeffrey Shallit
{"title":"Antisquares and Critical Exponents","authors":"Aseem Baranwal, James Currie, Lucas Mol, Pascal Ochem, Narad Rampersad, Jeffrey Shallit","doi":"10.46298/dmtcs.10063","DOIUrl":"https://doi.org/10.46298/dmtcs.10063","url":null,"abstract":"The (bitwise) complement $overline{x}$ of a binary word $x$ is obtained by changing each $0$ in $x$ to $1$ and vice versa. An $textit{antisquare}$ is a nonempty word of the form $x, overline{x}$. In this paper, we study infinite binary words that do not contain arbitrarily large antisquares. For example, we show that the repetition threshold for the language of infinite binary words containing exactly two distinct antisquares is $(5+sqrt{5})/2$. We also study repetition thresholds for related classes, where \"two\" in the previous sentence is replaced by a larger number. We say a binary word is $textit{good}$ if the only antisquares it contains are $01$ and $10$. We characterize the minimal antisquares, that is, those words that are antisquares but all proper factors are good. We determine the growth rate of the number of good words of length $n$ and determine the repetition threshold between polynomial and exponential growth for the number of good words.","PeriodicalId":55175,"journal":{"name":"Discrete Mathematics and Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135150579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gallai's Path Decomposition for 2-degenerate Graphs 2-退化图的Gallai路径分解
4区 数学
Discrete Mathematics and Theoretical Computer Science Pub Date : 2023-05-30 DOI: 10.46298/dmtcs.10313
Nevil Anto, Manu Basavaraju
{"title":"Gallai's Path Decomposition for 2-degenerate Graphs","authors":"Nevil Anto, Manu Basavaraju","doi":"10.46298/dmtcs.10313","DOIUrl":"https://doi.org/10.46298/dmtcs.10313","url":null,"abstract":"Gallai's path decomposition conjecture states that if $G$ is a connected graph on $n$ vertices, then the edges of $G$ can be decomposed into at most $lceil frac{n }{2} rceil$ paths. A graph is said to be an odd semi-clique if it can be obtained from a clique on $2k+1$ vertices by deleting at most $k-1$ edges. Bonamy and Perrett asked if the edges of every connected graph $G$ on $n$ vertices can be decomposed into at most $lfloor frac{n}{2} rfloor$ paths unless $G$ is an odd semi-clique. A graph $G$ is said to be 2-degenerate if every subgraph of $G$ has a vertex of degree at most $2$. In this paper, we prove that the edges of any connected 2-degenerate graph $G$ on $n$ vertices can be decomposed into at most $lfloor frac{n }{2} rfloor$ paths unless $G$ is a triangle.","PeriodicalId":55175,"journal":{"name":"Discrete Mathematics and Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135692860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A note on limits of sequences of binary trees 二叉树序列极限的注释
4区 数学
Discrete Mathematics and Theoretical Computer Science Pub Date : 2023-05-30 DOI: 10.46298/dmtcs.10968
Rudolf Grübel
{"title":"A note on limits of sequences of binary trees","authors":"Rudolf Grübel","doi":"10.46298/dmtcs.10968","DOIUrl":"https://doi.org/10.46298/dmtcs.10968","url":null,"abstract":"We discuss a notion of convergence for binary trees that is based on subtree sizes. In analogy to recent developments in the theory of graphs, posets and permutations we investigate some general aspects of the topology, such as a characterization of the set of possible limits and its structure as a metric space. For random trees the subtree size topology arises in the context of algorithms for searching and sorting when applied to random input, resulting in a sequence of nested trees. For these we obtain a structural result based on a local version of exchangeability. This in turn leads to a central limit theorem, with possibly mixed asymptotic normality.","PeriodicalId":55175,"journal":{"name":"Discrete Mathematics and Theoretical Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135692592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信