5,317 research outputs found

    Avoidability index for binary patterns with reversal

    Get PDF
    For every pattern pp over the alphabet {x,y,xR,yR}\{x,y,x^R,y^R\}, we specify the least kk such that pp is kk-avoidable.Comment: 15 pages, 1 figur

    Ten Conferences WORDS: Open Problems and Conjectures

    Full text link
    In connection to the development of the field of Combinatorics on Words, we present a list of open problems and conjectures that were stated during the ten last meetings WORDS. We wish to continually update the present document by adding informations concerning advances in problems solving

    How many double squares can a string contain?

    Full text link
    Counting the types of squares rather than their occurrences, we consider the problem of bounding the number of distinct squares in a string. Fraenkel and Simpson showed in 1998 that a string of length n contains at most 2n distinct squares. Ilie presented in 2007 an asymptotic upper bound of 2n - Theta(log n). We show that a string of length n contains at most 5n/3 distinct squares. This new upper bound is obtained by investigating the combinatorial structure of double squares and showing that a string of length n contains at most 2n/3 double squares. In addition, the established structural properties provide a novel proof of Fraenkel and Simpson's result.Comment: 29 pages, 20 figure

    Event integration Patterns in Bende (Bantu, F12)

    Get PDF

    Linear-Time Algorithms for Finding Tucker Submatrices and Lekkerkerker-Boland Subgraphs

    Full text link
    Lekkerkerker and Boland characterized the minimal forbidden induced subgraphs for the class of interval graphs. We give a linear-time algorithm to find one in any graph that is not an interval graph. Tucker characterized the minimal forbidden submatrices of binary matrices that do not have the consecutive-ones property. We give a linear-time algorithm to find one in any binary matrix that does not have the consecutive-ones property.Comment: A preliminary version of this work appeared in WG13: 39th International Workshop on Graph-Theoretic Concepts in Computer Scienc

    Lightweight LCP Construction for Very Large Collections of Strings

    Full text link
    The longest common prefix array is a very advantageous data structure that, combined with the suffix array and the Burrows-Wheeler transform, allows to efficiently compute some combinatorial properties of a string useful in several applications, especially in biological contexts. Nowadays, the input data for many problems are big collections of strings, for instance the data coming from "next-generation" DNA sequencing (NGS) technologies. In this paper we present the first lightweight algorithm (called extLCP) for the simultaneous computation of the longest common prefix array and the Burrows-Wheeler transform of a very large collection of strings having any length. The computation is realized by performing disk data accesses only via sequential scans, and the total disk space usage never needs more than twice the output size, excluding the disk space required for the input. Moreover, extLCP allows to compute also the suffix array of the strings of the collection, without any other further data structure is needed. Finally, we test our algorithm on real data and compare our results with another tool capable to work in external memory on large collections of strings.Comment: This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/ The final version of this manuscript is in press in Journal of Discrete Algorithm

    The Non-Archimedean Theory of Discrete Systems

    Full text link
    In the paper, we study behavior of discrete dynamical systems (automata) w.r.t. transitivity; that is, speaking loosely, we consider how diverse may be behavior of the system w.r.t. variety of word transformations performed by the system: We call a system completely transitive if, given arbitrary pair a,ba,b of finite words that have equal lengths, the system A\mathfrak A, while evolution during (discrete) time, at a certain moment transforms aa into bb. To every system A\mathfrak A, we put into a correspondence a family FA\mathcal F_{\mathfrak A} of continuous maps of a suitable non-Archimedean metric space and show that the system is completely transitive if and only if the family FA\mathcal F_{\mathfrak A} is ergodic w.r.t. the Haar measure; then we find easy-to-verify conditions the system must satisfy to be completely transitive. The theory can be applied to analyze behavior of straight-line computer programs (in particular, pseudo-random number generators that are used in cryptography and simulations) since basic CPU instructions (both numerical and logical) can be considered as continuous maps of a (non-Archimedean) metric space Z2\mathbb Z_2 of 2-adic integers.Comment: The extended version of the talk given at MACIS-201

    The geometry of non-unit Pisot substitutions

    Get PDF
    Let σ\sigma be a non-unit Pisot substitution and let α\alpha be the associated Pisot number. It is known that one can associate certain fractal tiles, so-called \emph{Rauzy fractals}, with σ\sigma. In our setting, these fractals are subsets of a certain open subring of the ad\`ele ring AQ(α)\mathbb{A}_{\mathbb{Q}(\alpha)}. We present several approaches on how to define Rauzy fractals and discuss the relations between them. In particular, we consider Rauzy fractals as the natural geometric objects of certain numeration systems, define them in terms of the one-dimensional realization of σ\sigma and its dual (in the spirit of Arnoux and Ito), and view them as the dual of multi-component model sets for particular cut and project schemes. We also define stepped surfaces suited for non-unit Pisot substitutions. We provide basic topological and geometric properties of Rauzy fractals associated with non-unit Pisot substitutions, prove some tiling results for them, and provide relations to subshifts defined in terms of the periodic points of σ\sigma, to adic transformations, and a domain exchange. We illustrate our results by examples on two and three letter substitutions.Comment: 29 page

    Pisot conjecture and Rauzy fractals

    Full text link
    We provide a proof of Pisot conjecture, a classification problem in Ergodic Theory on recurrent sequences generated by irreducible Pisot substitutions.Comment: revise

    Invariance: a Theoretical Approach for Coding Sets of Words Modulo Literal (Anti)Morphisms

    Full text link
    Let AA be a finite or countable alphabet and let θ\theta be literal (anti)morphism onto AA^* (by definition, such a correspondence is determinated by a permutation of the alphabet). This paper deals with sets which are invariant under θ\theta (θ\theta-invariant for short).We establish an extension of the famous defect theorem. Moreover, we prove that for the so-called thin θ\theta-invariant codes, maximality and completeness are two equivalent notions. We prove that a similar property holds in the framework of some special families of θ\theta-invariant codes such as prefix (bifix) codes, codes with a finite deciphering delay, uniformly synchronized codes and circular codes. For a special class of involutive antimorphisms, we prove that any regular θ\theta-invariant code may be embedded into a complete one.Comment: To appear in Acts of WORDS 201
    corecore