2,401 research outputs found
Finite Automata for the Sub- and Superword Closure of CFLs: Descriptional and Computational Complexity
We answer two open questions by (Gruber, Holzer, Kutrib, 2009) on the
state-complexity of representing sub- or superword closures of context-free
grammars (CFGs): (1) We prove a (tight) upper bound of on
the size of nondeterministic finite automata (NFAs) representing the subword
closure of a CFG of size . (2) We present a family of CFGs for which the
minimal deterministic finite automata representing their subword closure
matches the upper-bound of following from (1).
Furthermore, we prove that the inequivalence problem for NFAs representing sub-
or superword-closed languages is only NP-complete as opposed to PSPACE-complete
for general NFAs. Finally, we extend our results into an approximation method
to attack inequivalence problems for CFGs
Algebraic and Computer-based Methods in the Undirected Degree/diameter Problem - a Brief Survey
This paper discusses the most popular algebraic techniques and computational methods that have been used to construct large graphs with given degree and diameter
From rubber bands to rational maps: A research report
This research report outlines work, partially joint with Jeremy Kahn and
Kevin Pilgrim, which gives parallel theories of elastic graphs and conformal
surfaces with boundary. One one hand, this lets us tell when one rubber band
network is looser than another, and on the other hand tell when one conformal
surface embeds in another.
We apply this to give a new characterization of hyperbolic critically finite
rational maps among branched self-coverings of the sphere, by a positive
criterion: a branched covering is equivalent to a hyperbolic rational map if
and only if there is an elastic graph with a particular "self-embedding"
property. This complements the earlier negative criterion of W. Thurston.Comment: 52 pages, numerous figures. v2: New example
Attainable bounds for algebraic connectivity and maximally-connected regular graphs
We derive attainable upper bounds on the algebraic connectivity (spectral
gap) of a regular graph in terms of its diameter and girth. This bound agrees
with the well-known Alon-Boppana-Friedman bound for graphs of even diameter,
but is an improvement for graphs of odd diameter. For the girth bound, we show
that only Moore graphs can attain it, and these only exist for very few
possible girths. For diameter bound, we use a combination of stochastic
algorithms and exhaustive search to find graphs which attain it. For 3-regular
graphs, we find attainable graphs for all diameters up to and including
(the case of is open). These graphs are extremely rare and also
have high girth; for example we found exactly 45 distinct cubic graphs on 44
vertices attaining the upper bound when ; all have girth 8 (out of a total
of about cubic graphs on 44 vertices, including 266362 having girth
8). We also exhibit families of -regular graphs attaining upper bounds with
and , and with Several conjectures are proposed
Axiomatic Construction of Hierarchical Clustering in Asymmetric Networks
This paper considers networks where relationships between nodes are
represented by directed dissimilarities. The goal is to study methods for the
determination of hierarchical clusters, i.e., a family of nested partitions
indexed by a connectivity parameter, induced by the given dissimilarity
structures. Our construction of hierarchical clustering methods is based on
defining admissible methods to be those methods that abide by the axioms of
value - nodes in a network with two nodes are clustered together at the maximum
of the two dissimilarities between them - and transformation - when
dissimilarities are reduced, the network may become more clustered but not
less. Several admissible methods are constructed and two particular methods,
termed reciprocal and nonreciprocal clustering, are shown to provide upper and
lower bounds in the space of admissible methods. Alternative clustering
methodologies and axioms are further considered. Allowing the outcome of
hierarchical clustering to be asymmetric, so that it matches the asymmetry of
the original data, leads to the inception of quasi-clustering methods. The
existence of a unique quasi-clustering method is shown. Allowing clustering in
a two-node network to proceed at the minimum of the two dissimilarities
generates an alternative axiomatic construction. There is a unique clustering
method in this case too. The paper also develops algorithms for the computation
of hierarchical clusters using matrix powers on a min-max dioid algebra and
studies the stability of the methods proposed. We proved that most of the
methods introduced in this paper are such that similar networks yield similar
hierarchical clustering results. Algorithms are exemplified through their
application to networks describing internal migration within states of the
United States (U.S.) and the interrelation between sectors of the U.S. economy.Comment: This is a largely extended version of the previous conference
submission under the same title. The current version contains the material in
the previous version (published in ICASSP 2013) as well as material presented
at the Asilomar Conference on Signal, Systems, and Computers 2013, GlobalSIP
2013, and ICML 2014. Also, unpublished material is included in the current
versio
- …