40 research outputs found
The growth rate over trees of any family of set defined by a monadic second order formula is semi-computable
Monadic second order logic can be used to express many classical notions of
sets of vertices of a graph as for instance: dominating sets, induced
matchings, perfect codes, independent sets or irredundant sets. Bounds on the
number of sets of any such family of sets are interesting from a combinatorial
point of view and have algorithmic applications. Many such bounds on different
families of sets over different classes of graphs are already provided in the
literature. In particular, Rote recently showed that the number of minimal
dominating sets in trees of order is at most and that
this bound is asymptotically sharp up to a multiplicative constant. We build on
his work to show that what he did for minimal dominating sets can be done for
any family of sets definable by a monadic second order formula.
We first show that, for any monadic second order formula over graphs that
characterizes a given kind of subset of its vertices, the maximal number of
such sets in a tree can be expressed as the \textit{growth rate of a bilinear
system}. This mostly relies on well known links between monadic second order
logic over trees and tree automata and basic tree automata manipulations. Then
we show that this "growth rate" of a bilinear system can be approximated from
above.We then use our implementation of this result to provide bounds on the
number of independent dominating sets, total perfect dominating sets, induced
matchings, maximal induced matchings, minimal perfect dominating sets, perfect
codes and maximal irredundant sets on trees. We also solve a question from D.
Y. Kang et al. regarding -matchings and improve a bound from G\'orska and
Skupie\'n on the number of maximal matchings on trees. Remark that this
approach is easily generalizable to graphs of bounded tree width or clique
width (or any similar class of graphs where tree automata are meaningful)
Avoidability of long -abelian repetitions
We study the avoidability of long -abelian-squares and -abelian-cubes
on binary and ternary alphabets. For , these are M\"akel\"a's questions.
We show that one cannot avoid abelian-cubes of abelian period at least in
infinite binary words, and therefore answering negatively one question from
M\"akel\"a. Then we show that one can avoid -abelian-squares of period at
least in infinite binary words and -abelian-squares of period at least 2
in infinite ternary words. Finally we study the minimum number of distinct
-abelian-squares that must appear in an infinite binary word
Every Binary Pattern of Length Greater Than 14 Is Abelian-2-Avoidable
We show that every binary pattern of length greater than 14 is abelian-2-avoidable. The best known upper bound on the length of abelian-2-unavoidable binary pattern was 118, and the best known lower bound is 7.
We designed an algorithm to decide, under some reasonable assumptions, if a morphic word avoids a pattern in the abelian sense. This algorithm is then used to show that some binary patterns are abelian-2-avoidable. We finally use this list of abelian-2-avoidable pattern to show our result. We also discuss the avoidability of binary patterns on 3 and 4 letters
Lower-bounds on the growth of power-free languages over large alphabets
We study the growth rate of some power-free languages. For any integer
and real , we let be the growth rate of the number
of -free words of a given length over the alphabet .
Shur studied the asymptotic behavior of for as
goes to infinity. He suggested a conjecture regarding the asymptotic
behavior of as goes to infinity when . He
showed that for the asymptotic upper-bound holds of his
conjecture holds.
We show that the asymptotic lower-bound of his conjecture holds. This implies
that the conjecture is true for
Finding lower bounds on the growth and entropy of subshifts over countable groups
We give a lower bound on the growth of a subshift based on a simple condition
on the set of forbidden patterns defining that subshift. Aubrun et Al. showed a
similar result based on the Lov\'asz Local Lemma for subshift over any
countable group and Bernshteyn extended their approach to deduce, amongst other
things, some lower bound on the exponential growth of the subshift. However,
our result has a simpler proof, is easier to use for applications, and provides
better bounds on the applications from their articles (although it is not clear
that our result is stronger in general).
In the particular case of subshift over a similar but weaker
condition given by Miller was known to imply nonemptiness of the associated
shift. Pavlov used the same approach to provide a condition that implied
exponential growth. We provide a version of our result for this particular
setting and it is provably strictly stronger than the result of Pavlov and the
result of Miller (and, in practice, leads to considerable improvement in the
applications).
We also apply our two results to a few different problems including strongly
aperiodic subshifts, nonrepetitive subshifts, and Kolmogorov complexity of
subshifts.Comment: 17 page
Another approach to non-repetitive colorings of graphs of bounded degree
We propose a new proof technique that aims to be applied to the same problems
as the Lov\'asz Local Lemma or the entropy-compression method. We present this
approach in the context of non-repetitive colorings and we use it to improve
upper-bounds relating different non-repetitive numbers to the maximal degree of
a graph. It seems that there should be other interesting applications to the
presented approach.
In terms of upper-bound our approach seems to be as strong as
entropy-compression, but the proofs are more elementary and shorter. The
application we provide in this paper are upper bounds for graphs of maximal
degree at most : a minor improvement on the upper-bound of the
non-repetitive number, a upper-bound on the weak total
non-repetitive number and a
upper-bound on the total non-repetitive number of graphs. This last result
implies the same upper-bound for the non-repetitive index of graphs, which
improves the best known bound
Ann wins the nonrepetitive game over four letters and the erase-repetition game over six letters
We consider two games between two players Ann and Ben who build a word
together by adding alternatively a letter at the end of the shared word. In the
nonrepetitive game, Ben wins the game if he can create a square of length at
least , and Ann wins if she can build an arbitrarily long word before that.
In the erase-repetition game, whenever a square occurs the second part of the
square is erased and the goal of Ann is still to build an arbitrarily large
word (Ben simply wants to limit the size of the word in this game).
Grytczuk, Kozik, and Micek showed that Ann has a winning strategy for the
nonrepetitive game if the alphabet is of size at least and for the
erase-repetition game is the alphabet is of size at least . In this article,
we lower these bounds to respectively and . The bound obtain by Grytczuk
et al. relied on the so-called entropy compression and the previous bound by
Pegden relied on some particular version of the Lov\'asz Local Lemma. We
recently introduced a counting argument that can be applied to the same set of
problems as entropy compression or the Lov\'asz Local Lemma and we use our
method here.
For these two games, we know that Ben has a winning strategy when the
alphabet is of size at most 3, so our result for the nonrepetitive game is
optimal, but we are not able to close the gap for the erase-repetition game.Comment: arXiv admin note: text overlap with arXiv:2104.0996
How far away must forced letters be so that squares are still avoidable?
We describe a new non-constructive technique to show that squares are
avoidable by an infinite word even if we force some letters from the alphabet
to appear at certain occurrences. We show that as long as forced positions are
at distance at least 19 (resp. 3, resp. 2) from each other then we can avoid
squares over 3 letters (resp. 4 letters, resp. 6 or more letters). We can also
deduce exponential lower bounds on the number of solutions. For our main
Theorem to be applicable, we need to check the existence of some languages and
we explain how to verify that they exist with a computer. We hope that this
technique could be applied to other avoidability questions where the good
approach seems to be non-constructive (e.g., the Thue-list coloring number of
the infinite path)