Algebraic Objects of Mbfs and Recursive Computation of the Dedekind Number

Total Page:16

File Type:pdf, Size:1020Kb

Algebraic Objects of Mbfs and Recursive Computation of the Dedekind Number Computer Science and Information Technology 5(4): 140-147, 2017 http://www.hrpub.org DOI: 10.13189/csit.2017.050404 Algebraic Objects of MBFs and Recursive Computation of the Dedekind Number Tkachenco V.G.1,*, Sinyavsky O.V.2 1Institute of Radio, Television, Electronics, Odessa National Academy of Telecommunications, Ukraine 2Department of Fundamental Sciences, Odessa Military Academy, Ukraine Copyright©2017 by authors, all rights reserved. Authors agree that this article remains permanently open access under the terms of the Creative Commons Attribution License 4.0 International License Abstract In this article the whole set of n-1 rank 2 . Results Monotone Boolean Functions (MBFs) is divided into equivalence classes. It shows how the Dedekind number D(n) Let’s consider the process of recursion of an n-rank MBF can be calculated by using this partition. Five formulas were from an n-1 rank MBF. found to calculate this number as well as the algebraic Let’s map P:( fnij()()− 1, f n −→ 1) fn() of all the n-1 properties of MBF blocks. rank MBF pairs on an n-rank MBF as follows: f n= fn −∨11 x f n −. Let fn−1 be the left or Keywords Monotone Boolean Functions, Free k()()() i nj i () Distributive Lattice, Dedekind Number, Algebraic upper part of fnk () , and the rest of fnj ()−1 – its right or Structures lower part. Let's call a binary notation of a function of its value on all ordered sets of variables. The binary bits will be numbered from right to left from 0 to 21n − , where n is a rank of MBF. Let’s select unity in bit j of the MBF binary notation. Let's 1 .Introduction call subordinated all the MBF’s unities in bits ij> where In 1897 R. Dedekind found ψ(4) number of elements for a the MBF stops being monotone if any of the bits changes in 0. free distributive lattice with four generators, which he Define the dependent units for a given unit in the j-bit. This is published in his article [1]. In algebra parlance the Dedekind the unit itself in the j-bit, as well as the units in the bits ij≤ number D(n) = ψ(n) + 2 is the number of the Monotone that need to be zeroed out when the unit is zeroed in the j-bit Boolean functions (MBFs) dependent on n number of x1, ... , in order for the MBF to remain monotonic. xn variables. D(0) – D(4) were found by Dedekind. D(5) was Example 1. The binary notation of 3-rank MBF is 1111 calculated by Church [2] in 1940, D(6) - by Ward [3] in 1946, 1111, where the bits of this representation are numbered D(7) - by Church [4] in 1965 and D(8) – by Wiedemann [5] from right to left from 0 to 7. Unity from bit 0 is in 1991. The inequivalent MBFs were conducted until the self-dependent and all other unities are subordinated. There seventh rank in [6]. As it turned out, this problem is quite no subordinates for unity from bit 7 but all of them are difficult and not manageable under the traditional method of dependent. Unities in bits 0, 2, 4 and 6 are dependent for generating functions. There is no a simple closed formula for unity from bit 6, and unity in bit 7 is subordinated. Unities in finding the Dedekind number [7]. bits 0 and 4 are dependent for unity from bit 4, and unities However, the recursive method to find the Dedekind from bits 6 and 7 are subordinates. number D(n) by dividing all the elements of the free The binary notation of fnk () consists of two equal parts: distributive lattice of n-1 rank MBFs into equivalence classes 2n−1 which represents the left part (where x = 1) and the is not reported. In some cases, this method reduces the search n of MBFs due to it easier to consider the only n-1 MBFs right part (where xn = 0). Each part represents an n-1 rank (which are significantly less in number) instead of MBF, at that fnij()()−≥11 f n − . This is the considering all n-1 rank MBFs. The aim of this paper is to develop a new method of “greater-than-or-equal-to” for all the elements of the free recursive calculation of the Dedekind number D(n) based on distributive lattice of the n-1 rank MBF. the n-1 MBFs equivalence classes partition and to study the If the upper part of fni ()−1 is replaced with algebraic properties of the MBF blocks. fnij()()−∨11 f n −, the upper part of the binary notation Computer Science and Information Technology 5(4): 140-147, 2017 141 mapped onto another function, i.e. we will get another does not change, because fnij( −≥11) f( n −) . − It is known that conjunction s absorbs conjunction t if all equivalence class. Therefore, the second function fnj ( 1) is its variables are part of conjunction t. Let's say that MBF f always one and the same for all pairs of functions within each absorbs MBF g, if each conjunction g is absorbed by one of equivalence class. The lemma is proved. conjunction f. It is equivalent for the binary notation that Another equivalence class definition can be given based fg≥ , i.e. one function is more than the other. It follows on this lemma and the definition of mapping P: − − from this inequality that f= fg ∨ , and gfg= ∧ . Definition. Function pairs fni ( 1) and fnj ( 1) are Let’s designate monotone a pair of functions, where from the same equivalence class if they form one and the same disjunction fn−∨11 f n − and the second fnij( −≥11) f( n −) . Indeed, the concatenation of binary ij( ) ( ) notations for such pairs is the binary notation of an n-rank function fnj ( −1) does not change. MBF by the definition of monotonicity. Lemma 2. Let’s consider the equivalence class, to which For example, this pair of functions: disjunction functions pair fn( −1) and fn( −1) belongs. Then there is a single fn( −∨11) f( n −) and fn( −1) is always monotone, i.e. i j ij j pair of monotone functions: disjunction the upper part of the MBF is disjunction of fnij( −∨11) f( n −) and fnj ( −1) for any pair of fnij( −∨11) f( n −) . fn−−1, f n 1 within each equivalence class. Assume that all the set of pairs of an n −1 rank MBF are ( ij( ) ( )) divide into equivalence classes. The two pairs fit the same Proof. Let’s consider mapping P, fni( −∨11) x nj f( n −) , equivalence class, if P maps them onto the same n-rank when x = 1 and when x = 0 MBF. n n = Example 2. Let’s take a pair of 4-rank functions – When xn 1 fi (4) =∨∨ xx23 xx 24 xx 34 and fj (4) =∨∨ xx12 xx 13 xx 14, fn( −∨−=−∨−=−∨−1) x f( n 111111) fn( ) f( n) fn( ) f( n ) inji jij. along with another one pair – When xn = 0 xn = 1 fr (4) = xx23 ∨ xx 24 ∨∨∨∨ xx 34 xx 12 xx 13 xx 14 fni( −1) x nj ∨ fn( −= 1) fn i( − 10) ∨ fnj( −= 1) fn j( − 1) and fs (4) =∨∨ xx12 xx 13 xx 14 . These two pairs of functions are mapped by P onto function It follows that fk( n) = fn i( −∨11) x nj f( n −) represents f(5) =∨∨∨ xx12 xx 13 xx 14 xxx 235 ∨ xxx 245 ∨ xxx 345. I.e. a concatenation of two binary functions: fnij( −∨11) f( n −) is the first and fnj ( −1) is the second. Pf( i, f j) = Pf( rs ,5 f) = f( ) . The pair is monotone because −∨ −≥ −. Let’s consider the factor set of function pairs against fnij( 111) fn( ) fn j( ) mapping P and show what form each equivalence class of the Further, taking into account lemma 1, that disjunction factor set takes. fnij( −∨11) f( n −) is constant and the second function It is true that: fnj ( −1) is always one and the same for all pairs of Lemma 1. For any pair of ( fnij( −−1,) f( n 1)) functions, it follows that there can only be the only one disjunction fnij( −∨11) f( n −) and the second function monotone pair within a certain equivalence class. The lemma fnj ( −1) are constant within the whole equivalence class. Proof. is proved. Example 3. Let f(54) = f1( ) xf 52 ∨ ( 4) . If fk( n) = fn i( −11) x nj ∨ f( n −=) f1(4) = xx 23 ∨ xx 24 ∨∨∨∨ xx 34 xx 12 xx 13 xx 14 and =fni( −1) x nj ∨ f( n − 11)( x n ∨=) f2(4) =∨∨ xx 12 xx 13 xx 14, the pair will be monotone, and if =fni( −∨111) x nj fn( −∨) x nj fn( −=) f1(4) =∨∨ xx 23 xx 24 xx 34 and f2(4) =∨∨ xx 12 xx 13 xx 14, =( fni( −∨−∨−11) fn j( )) x nj fn( 1) the pair will be nonmonotone. Here the monotony is broken by the following setups: is correct for any pair of fni ( −1) and fnj ( −1) from the same class. Table 1. Nonmonotonicity f(54) = f1( ) xf 52 ∨ ( 4) It follows that the disjunction of any pair x5 x4 x3 x2 x1 f1 f2 f1x5 f1x5 ∨ f2 fnij( −∨11) f( n −) of one equivalence class is constant for 1 0 0 1 1 0 1 0 1 the entire equivalence class. Otherwise fnk ( ) would be 1 0 1 0 1 0 1 0 1 different and have another equivalence class.
Recommended publications
  • Integer Sequences
    UHX6PF65ITVK Book > Integer sequences Integer sequences Filesize: 5.04 MB Reviews A very wonderful book with lucid and perfect answers. It is probably the most incredible book i have study. Its been designed in an exceptionally simple way and is particularly just after i finished reading through this publication by which in fact transformed me, alter the way in my opinion. (Macey Schneider) DISCLAIMER | DMCA 4VUBA9SJ1UP6 PDF > Integer sequences INTEGER SEQUENCES Reference Series Books LLC Dez 2011, 2011. Taschenbuch. Book Condition: Neu. 247x192x7 mm. This item is printed on demand - Print on Demand Neuware - Source: Wikipedia. Pages: 141. Chapters: Prime number, Factorial, Binomial coeicient, Perfect number, Carmichael number, Integer sequence, Mersenne prime, Bernoulli number, Euler numbers, Fermat number, Square-free integer, Amicable number, Stirling number, Partition, Lah number, Super-Poulet number, Arithmetic progression, Derangement, Composite number, On-Line Encyclopedia of Integer Sequences, Catalan number, Pell number, Power of two, Sylvester's sequence, Regular number, Polite number, Ménage problem, Greedy algorithm for Egyptian fractions, Practical number, Bell number, Dedekind number, Hofstadter sequence, Beatty sequence, Hyperperfect number, Elliptic divisibility sequence, Powerful number, Znám's problem, Eulerian number, Singly and doubly even, Highly composite number, Strict weak ordering, Calkin Wilf tree, Lucas sequence, Padovan sequence, Triangular number, Squared triangular number, Figurate number, Cube, Square triangular
    [Show full text]
  • Solving Weighted Voting Game Design Problems Optimally: Representations, Synthesis, and Enumeration
    Solving Weighted Voting Game Design Problems Optimally: Representations, Synthesis, and Enumeration Bart de Keijzer∗ Tomas B. Klosy Yingqian Zhangz Abstract We study the power index voting game design problem for weighted voting games: the problem of finding a weighted voting game in which the power of the players is as close as possible to a certain target distri- bution. Our goal is to find algorithms that solve this problem exactly. Thereto, we consider various subclasses of simple games, and their asso- ciated representation methods. We survey algorithms and impossibility results for the synthesis problem, i.e., converting a representation of a simple game into another representation. We contribute to the synthesis problem by showing that it is impossible to compute in polynomial time the list of ceiling coalitions (also known as shift-maximal losing coalitions) of a game from its list of roof coalitions (also known as shift-minimal winning coalitions), and vice versa. Then, we proceed by studying the problem of enumerating the set of weighted voting games. We present first a naive algorithm for this, running in doubly exponential time. Using our knowledge of the synthesis problem, we then improve on this naive algorithm, and we obtain an enumeration algorithm that runs in quadratic exponential time (that is, 2 O(2n · p(n)) for a polynomial p). Moreover, we show that this algorithm runs in output-polynomial time, making it the best possible enumeration algorithm up to a polynomial factor. Finally, we propose an exact anytime algorithm for the power index voting game design problem that runs in exponential time.
    [Show full text]
  • Arxiv:1209.4623V1 [Cs.DS] 20 Sep 2012 Who Defined Them in [Ded97]
    COUNTING INEQUIVALENT MONOTONE BOOLEAN FUNCTIONS TAMON STEPHEN AND TIMOTHY YUSUN Abstract. Monotone Boolean functions (MBFs) are Boolean functions f : f0; 1gn ! f0; 1g satisfying the monotonicity condition x ≤ y ) f(x) ≤ f(y) for any x; y 2 f0; 1gn. The number of MBFs in n variables is known as the nth Dedekind number. It is a longstanding compu- tational challenge to determine these numbers exactly { these values are only known for n at most 8. Two monotone Boolean functions are inequivalent if one can be obtained from the other by renaming the vari- ables. The number of inequivalent MBFs in n variables was known only for up to n = 6. In this paper we propose a strategy to count inequiva- lent MBF's by breaking the calculation into parts based on the profiles of these functions. As a result we are able to compute the number of inequivalent MBFs in 7 variables. The number obtained is 490013148. 1. Introduction A Boolean function on n variables (BF) is a function f : f0; 1gn ! f0; 1g. A monotone Boolean function (MBF) additionally satisfies the condition n x ≤ y ) f(x) ≤ f(y), for any x; y 2 f0; 1g . We write x ≤ y if xi ≤ yi for all i = 1; 2; : : : ; n, and x < y if x ≤ y and xi < yi for some i. A BF is monotone if and only if it can be written as a combination of conjunctions and disjunctions only. Since each input state in f0; 1gn has two possible output states, there are a total of 22n Boolean functions on n variables.
    [Show full text]
  • The Generation of Hyper-Power Sets
    Jean Dezert1, Florentin Smarandache2 1ONERA, 29 Av. de la Division Leclerc 92320, Chatillon, France 2Department of Mathematics University of New Mexico Gallup, NM 8730, U.S.A. The generation of hyper-power sets Published in: Florentin Smarandache & Jean Dezert (Editors) Advances and Applications of DSmT for Information Fusion (Collected works), Vol. I American Research Press, Rehoboth, 2004 ISBN: 1-931233-82-9 Chapter II, pp. 37 - 48 Abstract: The development of DSmT is based on the notion of Dedekind’s lattice, called also hyper-power set in the DSmT framework, on which is defined the general basic belief assignments to be combined. In this chapter, we explain the structure of the hyper-power set, give some examples of hyper-power sets and show how they can be generated from isotone Boolean functions. We also show the interest to work with the hyper-power set rather than the power set of the refined frame of discernment in terms of complexity. 2.1 Introduction ne of the cornerstones of the DSmT is the notion of Dedekind’s lattice, coined as hyper-power set Oby the authors in literature, which will be defined in next section. The starting point is to consider Θ = θ , . , θ as a set of n elements which cannot be precisely defined and separated so that no { 1 n} refinement of Θ in a new larger set Θref of disjoint elementary hypotheses is possible. This corresponds to the free DSm model. This model is justified by the fact that in some fusion problems (mainly those manipulating vague or continuous concepts), the refinement of the frame is just impossible to obtain; nevertheless the fusion still applies when working on Dedekind’s lattice and based on the DSm rule of This chapter is based on a paper [6] presented during the International Conference on Information Fusion, Fusion 2003, Cairns, Australia, in July 2003 and is reproduced here with permission of the International Society of Information Fusion.
    [Show full text]
  • Download PDF # Integer Sequences
    4DHTUDDXIK44 ^ eBook ^ Integer sequences Integer sequences Filesize: 8.43 MB Reviews Extensive information for ebook lovers. It typically is not going to expense too much. I discovered this book from my i and dad recommended this pdf to learn. (Prof. Gerardo Grimes III) DISCLAIMER | DMCA DS4ABSV1JQ8G > Kindle » Integer sequences INTEGER SEQUENCES Reference Series Books LLC Dez 2011, 2011. Taschenbuch. Book Condition: Neu. 247x192x7 mm. This item is printed on demand - Print on Demand Neuware - Source: Wikipedia. Pages: 141. Chapters: Prime number, Factorial, Binomial coeicient, Perfect number, Carmichael number, Integer sequence, Mersenne prime, Bernoulli number, Euler numbers, Fermat number, Square-free integer, Amicable number, Stirling number, Partition, Lah number, Super-Poulet number, Arithmetic progression, Derangement, Composite number, On-Line Encyclopedia of Integer Sequences, Catalan number, Pell number, Power of two, Sylvester's sequence, Regular number, Polite number, Ménage problem, Greedy algorithm for Egyptian fractions, Practical number, Bell number, Dedekind number, Hofstadter sequence, Beatty sequence, Hyperperfect number, Elliptic divisibility sequence, Powerful number, Znám's problem, Eulerian number, Singly and doubly even, Highly composite number, Strict weak ordering, Calkin Wilf tree, Lucas sequence, Padovan sequence, Triangular number, Squared triangular number, Figurate number, Cube, Square triangular number, Multiplicative partition, Perrin number, Smooth number, Ulam number, Primorial, Lambek Moser theorem,
    [Show full text]
  • Dedekind Numbers and Related Sequences
    DEDEKIND NUMBERS AND RELATED SEQUENCES by Timothy James Yusun B.Sc. (Hons.), Ateneo de Manila University, 2008 a Thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in the Department of Mathematics Faculty of Science c Timothy James Yusun 2011 SIMON FRASER UNIVERSITY Fall 2011 All rights reserved. However, in accordance with the Copyright Act of Canada, this work may be reproduced without authorization under the conditions for Fair Dealing. Therefore, limited reproduction of this work for the purposes of private study, research, criticism, review and news reporting is likely to be in accordance with the law, particularly if cited appropriately. APPROVAL Name: Timothy James Yusun Degree: Master of Science Title of Thesis: Dedekind Numbers and Related Sequences Examining Committee: Dr. Abraham Punnen, Chair Professor Dr. Tamon Stephen, Senior Supervisor Assistant Professor Dr. Zhaosong Lu, Supervisor Assistant Professor Dr. Michael Monagan, External Examiner Professor, Department of Mathematics Simon Fraser University Date Approved: December 6, 2011 ii Partial Copyright Licence Abstract This thesis considers Dedekind numbers, where the nth Dedekind number D(n) is defined as the number of monotone Boolean functions (MBFs) on n variables, and R(n), which counts non-equivalent MBFs. The values of D(n) and R(n) are known for up to n = 8 and n = 6, respectively; in this thesis we propose a strategy to compute R(7) by considering profile vectors of monotone Boolean functions. The profile of an MBF is a vector that encodes the number of minimal terms it has with 1;2;:::;n elements. The computation is accomplished by first generating all profile vectors of 7-variable MBFs, and then counting the functions that satisfy each one by building up from scratch and taking disjunctions one by one.
    [Show full text]
  • Towards a Philosophy of Real Mathematics
    TOWARDS A PHILOSOPHY OF REAL MATHEMATICS In this ambitious study, David Corfield attacks the widely held view that it is the nature of mathematical knowledge which has shaped the way in which mathematics is treated philosophically, and claims that contingent factors have brought us to the present thematically limited discipline. Illustrating his discussion with a wealth of examples, he sets out a variety of new ways to think philosophically about mathe- matics, ranging from an exploration of whether computers producing mathematical proofs or conjectures are doing real mathematics, to the use of analogy, the prospects for a Bayesian confirmation theory, the notion of a mathematical research programme, and the ways in which new concepts are justified. His highly original book challenges both philosophers and mathematicians to develop the broadest and richest philosophical resources for work in their disciplines, and points clearly to the ways in which this can be done. david corfield holds a Junior Lectureship in Philosophy of Science at the University of Oxford. He is co-editor (with Jon Williamson) of Foundations of Bayesianism (2001), and he has pub- lished articles in journals including Studies in History and Philosophy of Science and Philosophia Mathematica. TOWARDS A PHILOSOPHY OF REAL MATHEMATICS DAVID CORFIELD The Pitt Building, Trumpington Street, Cambridge, United Kingdom The Edinburgh Building, Cambridge CB2 2RU, UK 40 West 20th Street, New York, NY 10011-4211, USA 477 Williamstown Road, Port Melbourne, VIC 3207, Australia Ruiz de Alarcón 13, 28014 Madrid, Spain Dock House, The Waterfront, Cape Town 8001, South Africa http://www.cambridge.org © David Corfield 2004 First published in printed format 2003 ISBN 0-511-04270-1 eBook (netLibrary) ISBN 0-521-81722-6 hardback From the east to western Ind, No jewel is like Rosalind.
    [Show full text]
  • Set Theory in Computer Science a Gentle Introduction to Mathematical Modeling
    Set Theory in Computer Science A Gentle Introduction to Mathematical Modeling Jose´ Meseguer University of Illinois at Urbana-Champaign Urbana, IL 61801, USA c Jose´ Meseguer, 2008–2010; all rights reserved. August 23, 2010 2 Contents 1 Motivation 7 2 Set Theory as an Axiomatic Theory 11 3 The Empty Set, Extensionality, and Separation 15 3.1 The Empty Set . 15 3.2 Extensionality . 15 3.3 The Failed Attempt of Comprehension . 16 3.4 Separation . 17 4 Pairing, Unions, Powersets, and Infinity 19 4.1 Pairing . 19 4.2 Unions . 21 4.3 Powersets . 24 4.4 Infinity . 26 5 Case Study: A Computable Model of Hereditarily Finite Sets 29 5.1 HF-Sets in Maude . 30 5.2 Terms, Equations, and Term Rewriting . 33 5.3 Confluence, Termination, and Sufficient Completeness . 36 5.4 A Computable Model of HF-Sets . 39 5.5 HF-Sets as a Universe for Finitary Mathematics . 42 5.6 HF-Sets with Atoms . 47 6 Relations, Functions, and Function Sets 51 6.1 Relations and Functions . 51 6.2 Formula, Assignment, and Lambda Notations . 52 6.3 Images . 54 6.4 Composing Relations and Functions . 56 6.5 Abstract Products and Disjoint Unions . 60 6.6 Relating Function Sets . 62 7 Simple and Primitive Recursion, and the Peano Axioms 65 7.1 Simple Recursion . 65 7.2 Primitive Recursion . 67 7.3 The Peano Axioms . 69 8 Binary Relations on a Set 71 8.1 Directed and Undirected Graphs . 71 8.2 Transition Systems and Automata . 73 8.3 Relation Homomorphisms and Isomorphisms .
    [Show full text]
  • The Number of Star Operations on Numerical Semigroups and on Related Integral Domains
    THE NUMBER OF STAR OPERATIONS ON NUMERICAL SEMIGROUPS AND ON RELATED INTEGRAL DOMAINS DARIO SPIRITO Abstract. We study the cardinality of the set Star(S) of star op- erations of a numerical semigroup S; in particular, we study ways to estimate Star(S) and to bound the number of nonsymmetric numerical semigroups such that jStar(S)j ≤ n. We also study this problem in the setting of analytically irreducible, residually ratio- nal rings whose integral closure is a fixed discrete valuation ring. 1. Introduction A star operation on an integral domain D is a particular closure op- eration on the set of fractional ideals of D; this notion was defined to generalize the divisorial closure [13, 5] and has been further general- ized to the notion of semistar operation [16]. Star operations have also been defined on cancellative semigroups in order to obtain semigroup- theoretic analogues of some ring-theoretic (multiplicative) definitions [11]. A classical result characterizes the Noetherian domains D in which every ideal is divisorial or, equivalently, which Noetherian domains ad- mit only one star operation: this happens if and only if D is Gorenstein of dimension one [2]. Recently, this result has been a starting point of a deeper investigation on the cardinality of the set Star(D) of the star op- erations on D, obtaining a precise counting for h-local Pr¨uferdomains [7] (and, more generally, an algorithm to calculate their number for semilocal Pr¨uferdomains [25]), some pseudo-valuation domains [17, 24] and some Noetherian one-dimensional domains [8, 9, 23]. In particu- lar, for Noetherian domains, a rich source of examples are numerical semigroup rings, that is, rings in the form K[[S]] := K[[Xs j s 2 S]], where K is a field and S is a numerical semigroup.
    [Show full text]
  • Marston D. E. Conder · Antoine Deza Asia Ivić
    Springer Proceedings in Mathematics & Statistics Marston D. E. Conder · Antoine Deza Asia Ivić Weiss Editors Discrete Geometry and Symmetry Dedicated to Károly Bezdek and Egon Schulte on the Occasion of Their 60th Birthdays Springer Proceedings in Mathematics & Statistics Volume 234 [email protected] Springer Proceedings in Mathematics & Statistics This book series features volumes composed of selected contributions from workshops and conferences in all areas of current research in mathematics and statistics, including operation research and optimization. In addition to an overall evaluation of the interest, scientific quality, and timeliness of each proposal at the hands of the publisher, individual contributions are all refereed to the high quality standards of leading journals in the field. Thus, this series provides the research community with well-edited, authoritative reports on developments in the most exciting areas of mathematical and statistical research today. More information about this series at http://www.springer.com/series/10533 [email protected] Marston D. E. Conder • Antoine Deza Asia Ivić Weiss Editors Discrete Geometry and Symmetry Dedicated to Károly Bezdek and Egon Schulte on the Occasion of Their 60th Birthdays 123 [email protected] Editors Marston D. E. Conder Asia Ivić Weiss Department of Mathematics Department of Mathematics University of Auckland and Statistics Auckland York University New Zealand Toronto, ON Canada Antoine Deza Department of Computing and Software McMaster University Hamilton, ON Canada ISSN 2194-1009 ISSN 2194-1017 (electronic) Springer Proceedings in Mathematics & Statistics ISBN 978-3-319-78433-5 ISBN 978-3-319-78434-2 (eBook) https://doi.org/10.1007/978-3-319-78434-2 Library of Congress Control Number: 2018939138 Mathematics Subject Classification (2010): 05B40, 05B45, 52A10, 52A21, 52A35, 52B10, 52B11, 52B15, 52C15, 52C17, 52C20, 52C35, 52C45, 90C05, 90C27 © Springer International Publishing AG, part of Springer Nature 2018 This work is subject to copyright.
    [Show full text]
  • Our Adversary: the Circuit
    Chapter 1 Our Adversary: The Circuit Boolean (or switching) functions map each sequence of bits to a single bit 0 or 1. Bit 0 is usually interpreted as “false”, and bit 1 as “true”. The simplest of such functions are the product x y,sumx ˚ y mod 2, non-exclusive Or x _ y, negation :x D 1x. The central problem of boolean function complexity—the lower bounds problem—is: Given a boolean function, how many of these simplest operations do we need to compute the function on all input vectors? The difficulty in proving that a given boolean function has high complexity lies in the nature of our adversary: the circuit. Small circuits may work in a counterintuitive fashion, using deep, devious, and fiendishly clever ideas. How can one prove that there is no clever way to quickly compute the function? This is the main issue confronting complexity theorists. The problem lies on the border between mathematics and computer science: lower bounds are of great importance for computer science, but their proofs require techniques from combinatorics, algebra, analysis, and other branches of mathematics. 1.1 Boolean Functions We first recall some basic concepts concerning boolean functions. The name “boolean function” comes from the boolean logic invented by George Boole (1815– 1864), an English mathematician and philosopher. As this logic is now the basis of modern digital computers, Boole is regarded in hindsight as a forefather of the field of computer science. Boolean values (or bits) are numbers 0 and 1.Aboolean function f.x/ D n f.x1;:::;xn/ of n variables is a mapping f Wf0; 1g !f0; 1g.
    [Show full text]
  • Enhanced Algorithms for F-Pure Threshold Computation
    Enhanced Algorithms For F-Pure Threshold Computation by Gilad Pagi A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Mathematics) in The University of Michigan 2018 Doctoral Committee: Professor Karen E. Smith, Chair Associate Professor Bhargav B. Bhatt Professor Sergey Fomin Professor Melvin Hochster Professor Mircea I. Mustat¸˘a Associate Professor James P. Tappenden Gilad Pagi [email protected] ORCID-iD: 0000-0003-4393-6055 c Gilad Pagi 2018 To my beautiful family, thanks for the support in crossing this threshold. ii ACKNOWLEDGEMENTS This dissertation is being written under the direction of Karen Smith of University of Michigan. I would like to thank Prof. Smith for many enlightening discussions. Many thanks to Prof. Daniel Hern´andezfor his remarks on the earlier draft and to Prof. Michael Zieve, Prof. Sergey Fomin and Prof. Bhargav Bhatt for fruitful conversations. iii TABLE OF CONTENTS DEDICATION :::::::::::::::::::::::::::::::::::::::::: ii ACKNOWLEDGEMENTS :::::::::::::::::::::::::::::::::: iii LIST OF FIGURES :::::::::::::::::::::::::::::::::::::: vi ABSTRACT ::::::::::::::::::::::::::::::::::::::::::: vii CHAPTER I. Introduction, Motivation, and Results .......................1 1.1 Background and Motivation . .1 1.2 Outline . .3 II. F -Pure Threshold of Monomial Ideals .......................9 2.1 Definitions . .9 2.1.1 Newton Polygon . 11 2.1.2 Hernandez's Splitting Matrix and Splitting Polytope . 13 2.2 Simplifying Splitting Matrices . 16 2.2.1 Improvements Using The Integral Closure . 33 III. F -Pure Threshold of Polynomials and Deuring Polynomials ......... 38 3.1 F -pure Threshold of Polynomials . 38 3.2 Definition of Deuring Polynomials . 41 3.3 Basic Properties . 42 3.4 More On Deuring Polynomials . 56 3.5 Legendre Polynomials .
    [Show full text]