Combinatorics an Upper-Level Introductory Course in Enumeration, Graph Theory, and Design Theory

Total Page:16

File Type:pdf, Size:1020Kb

Combinatorics an Upper-Level Introductory Course in Enumeration, Graph Theory, and Design Theory Combinatorics an upper-level introductory course in enumeration, graph theory, and design theory by Joy Morris University of Lethbridge Version 2.0 of July 2021 This book is offered under the Creative Commons license. (Attribution-NonCommercial-ShareAlike 2.0) Please send comments and corrections to: [email protected] © 2014–2021 by Joy Morris. Some rights reserved. You are free to copy this book, to distribute it, to display it, and to make derivative works, under the following conditions: (1) Attribution. You must give the original author credit. (2) Noncommercial. You may not use this work for commercial purposes. (3) Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under a license identical to this one. — For any reuse or distribution, you must make clear to others the license terms of this work. Any of these conditions can be waived if you get permission from the copyright holder. Your fair use and other rights are in no way affected by the above. — This is a human-readable summary of the full license, whichis available on-line at http://creativecommons.org/licenses/by-nc-sa/2.0/legalcode Contents Chapter 1. What is Combinatorics? 1 §1.1. Enumeration ................................................................. 1 §1.2. Graph Theory -------------------------------------------------------- 2 §1.3. Ramsey Theory .............................................................. 3 §1.4. Design Theory -------------------------------------------------------- 4 §1.5. Coding Theory ............................................................... 4 Part I. Enumeration Chapter 2. Basic Counting Techniques 9 §2.1. The product rule ............................................................. 9 §2.2. The sum rule -------------------------------------------------------- 12 §2.3. Putting them together .......................................................14 §2.4. Summing up --------------------------------------------------------- 17 Chapter 3. Permutations, Combinations, and the Binomial Theorem 19 §3.1. Permutations ................................................................19 §3.2. Combinations -------------------------------------------------------- 22 §3.3. The Binomial Theorem ......................................................26 Chapter 4. Bijections and Combinatorial Proofs 29 §4.1. Counting via bijections ......................................................29 §4.2. Combinatorial proofs ------------------------------------------------- 31 §4.3. The Arithmetic Triangle (Pascal’s Triangle) ..................................37 Chapter 5. Counting with Repetitions 39 §5.1. Unlimited repetition .........................................................39 §5.2. Sorting a set that contains repetition ----------------------------------- 42 Chapter 6. Induction and Recursion 47 §6.1. Recursively-defined sequences ................................................47 §6.2. Basic induction ------------------------------------------------------ 49 §6.3. More advanced induction ....................................................52 Chapter 7. Generating Functions 59 §7.1. What is a generating function? ..............................................59 §7.2. The Generalised Binomial Theorem ------------------------------------- 60 §7.3. Using generating functions to count things ...................................62 i ii Chapter 8. Generating Functions and Recursion 67 §8.1. Partial fractions .............................................................67 §8.2. Factoring polynomials ------------------------------------------------ 69 §8.3. Using generating functions to solve recursively-defined sequences .............71 Chapter 9. Some Important Recursively-Defined Sequences 79 §9.1. Derangements ...............................................................79 §9.2. Catalan numbers ----------------------------------------------------- 80 §9.3. Bell numbers and exponential generating functions ...........................83 Chapter 10. Other Basic Counting Techniques 89 §10.1. The Pigeonhole Principle ....................................................89 §10.2. Inclusion-Exclusion --------------------------------------------------- 94 Part II. Graph Theory Chapter 11. Basics of Graph Theory 103 §11.1. Background ................................................................103 §11.2. Basic definitions, terminology, and notation ----------------------------- 104 §11.3. Subgraphs, complete graphs, and the Handshaking Lemma ..................107 §11.4. Isomorphism of graphs ----------------------------------------------- 110 §11.5. Random graphs ............................................................115 Chapter 12. Moving through graphs 119 §12.1. Directed graphs ............................................................119 §12.2. Walks and connectedness --------------------------------------------- 120 §12.3. Paths and cycles ...........................................................123 §12.4. Trees -------------------------------------------------------------- 125 §12.5. Automorphisms of graphs ...................................................128 Chapter 13. Euler and Hamilton 133 §13.1. Euler tours and trails .......................................................133 §13.2. Hamilton paths and cycles -------------------------------------------- 137 Chapter 14. Graph Colouring 143 §14.1. Edge colouring .............................................................143 §14.2. Ramsey Theory ----------------------------------------------------- 149 §14.3. Vertex colouring ............................................................154 Chapter 15. Planar graphs 161 §15.1. Planar graphs ..............................................................161 §15.2. Euler’s Formula ----------------------------------------------------- 167 §15.3. Map colouring ..............................................................171 iii Part III. Design Theory Chapter 16. Latin squares 179 §16.1. Latin squares and Sudokus .................................................179 §16.2. Mutually orthogonal Latin squares (MOLS) ---------------------------- 181 §16.3. Systems of distinct representatives ..........................................186 Chapter 17. Designs 193 §17.1. Balanced Incomplete Block Designs (BIBD) .................................193 §17.2. Constructing designs, and existence of designs - - - - - - - - - - - - - - - - - - - - - - - - - - 197 §17.3. Fisher’s Inequality ..........................................................201 Chapter 18. More designs 205 §18.1. Steiner and Kirkman triple systems .........................................205 §18.2. t-designs ----------------------------------------------------------- 210 §18.3. Affine planes ...............................................................213 §18.4. Projective planes ---------------------------------------------------- 219 Chapter 19. Designs and Codes 221 §19.1. Introduction ................................................................221 §19.2. Error-correcting codes ----------------------------------------------- 222 §19.3. Using the generator matrix for encoding ....................................225 §19.4. Using the parity-check matrix for decoding ----------------------------- 227 §19.5. Codes from designs .........................................................232 Appendix A. Complex Numbers 235 Appendix B. Biographical Briefs 241 B.1. List of Entries ...............................................................242 B.2. Biographies ---------------------------------------------------------- 244 iv Appendix C. Solutions to selected exercises 305 Solutions for Chapter 2 ......................................................305 Solutions for Chapter 3 ----------------------------------------------- 306 Solutions for Chapter 4 ......................................................307 Solutions for Chapter 5 ----------------------------------------------- 309 Solutions for Chapter 6 ......................................................310 Solutions for Chapter 7 ----------------------------------------------- 311 Solutions for Chapter 8 ......................................................313 Solutions for Chapter 9 ----------------------------------------------- 317 Solutions for Chapter 10 .....................................................318 Solutions for Chapter 11 ---------------------------------------------- 319 Solutions for Chapter 12 .....................................................321 Solutions for Chapter 13 ---------------------------------------------- 323 Solutions for Chapter 14 .....................................................324 Solutions for Chapter 15 ---------------------------------------------- 327 Solutions for Chapter 16 .....................................................329 Solutions for Chapter 17 ---------------------------------------------- 330 Solutions for Chapter 18 .....................................................332 Solutions for Chapter 19 ---------------------------------------------- 337 Appendix D. List of Notation 341 Index 343 Chapter 1 What is Combinatorics? Combinatorics is a subfield of “discrete mathematics,” so we should begin by asking what discrete mathematics means. The differences are to some extent a matter of opinion, and various mathematicians might classify specific topics differently. “Discrete” should not be confused with “discreet,” which is a much more commonly-used word. They share the same Latin root, “discretio,” which
Recommended publications
  • Modern Coding Theory: the Statistical Mechanics and Computer Science Point of View
    Modern Coding Theory: The Statistical Mechanics and Computer Science Point of View Andrea Montanari1 and R¨udiger Urbanke2 ∗ 1Stanford University, [email protected], 2EPFL, ruediger.urbanke@epfl.ch February 12, 2007 Abstract These are the notes for a set of lectures delivered by the two authors at the Les Houches Summer School on ‘Complex Systems’ in July 2006. They provide an introduction to the basic concepts in modern (probabilistic) coding theory, highlighting connections with statistical mechanics. We also stress common concepts with other disciplines dealing with similar problems that can be generically referred to as ‘large graphical models’. While most of the lectures are devoted to the classical channel coding problem over simple memoryless channels, we present a discussion of more complex channel models. We conclude with an overview of the main open challenges in the field. 1 Introduction and Outline The last few years have witnessed an impressive convergence of interests between disciplines which are a priori well separated: coding and information theory, statistical inference, statistical mechanics (in particular, mean field disordered systems), as well as theoretical computer science. The underlying reason for this convergence is the importance of probabilistic models and/or probabilistic techniques in each of these domains. This has long been obvious in information theory [53], statistical mechanics [10], and statistical inference [45]. In the last few years it has also become apparent in coding theory and theoretical computer science. In the first case, the invention of Turbo codes [7] and the re-invention arXiv:0704.2857v1 [cs.IT] 22 Apr 2007 of Low-Density Parity-Check (LDPC) codes [30, 28] has motivated the use of random constructions for coding information in robust/compact ways [50].
    [Show full text]
  • Geoscience and a Lunar Base
    " t N_iSA Conference Pubhcatmn 3070 " i J Geoscience and a Lunar Base A Comprehensive Plan for Lunar Explora, tion unclas HI/VI 02907_4 at ,unar | !' / | .... ._-.;} / [ | -- --_,,,_-_ |,, |, • • |,_nrrr|l , .l -- - -- - ....... = F _: .......... s_ dd]T_- ! JL --_ - - _ '- "_r: °-__.......... / _r NASA Conference Publication 3070 Geoscience and a Lunar Base A Comprehensive Plan for Lunar Exploration Edited by G. Jeffrey Taylor Institute of Meteoritics University of New Mexico Albuquerque, New Mexico Paul D. Spudis U.S. Geological Survey Branch of Astrogeology Flagstaff, Arizona Proceedings of a workshop sponsored by the National Aeronautics and Space Administration, Washington, D.C., and held at the Lunar and Planetary Institute Houston, Texas August 25-26, 1988 IW_A National Aeronautics and Space Administration Office of Management Scientific and Technical Information Division 1990 PREFACE This report was produced at the request of Dr. Michael B. Duke, Director of the Solar System Exploration Division of the NASA Johnson Space Center. At a meeting of the Lunar and Planetary Sample Team (LAPST), Dr. Duke (at the time also Science Director of the Office of Exploration, NASA Headquarters) suggested that future lunar geoscience activities had not been planned systematically and that geoscience goals for the lunar base program were not articulated well. LAPST is a panel that advises NASA on lunar sample allocations and also serves as an advocate for lunar science within the planetary science community. LAPST took it upon itself to organize some formal geoscience planning for a lunar base by creating a document that outlines the types of missions and activities that are needed to understand the Moon and its geologic history.
    [Show full text]
  • Research Statement
    D. A. Williams II June 2021 Research Statement I am an algebraist with expertise in the areas of representation theory of Lie superalgebras, associative superalgebras, and algebraic objects related to mathematical physics. As a post- doctoral fellow, I have extended my research to include topics in enumerative and algebraic combinatorics. My research is collaborative, and I welcome collaboration in familiar areas and in newer undertakings. The referenced open problems here, their subproblems, and other ideas in mind are suitable for undergraduate projects and theses, doctoral proposals, or scholarly contributions to academic journals. In what follows, I provide a technical description of the motivation and history of my work in Lie superalgebras and super representation theory. This is then followed by a description of the work I am currently supervising and mentoring, in combinatorics, as I serve as the Postdoctoral Research Advisor for the Mathematical Sciences Research Institute's Undergraduate Program 2021. 1 Super Representation Theory 1.1 History 1.1.1 Superalgebras In 1941, Whitehead dened a product on the graded homotopy groups of a pointed topological space, the rst non-trivial example of a Lie superalgebra. Whitehead's work in algebraic topol- ogy [Whi41] was known to mathematicians who dened new graded geo-algebraic structures, such as -graded algebras, or superalgebras to physicists, and their modules. A Lie superalge- Z2 bra would come to be a -graded vector space, even (respectively, odd) elements g = g0 ⊕ g1 Z2 found in (respectively, ), with a parity-respecting bilinear multiplication termed the Lie g0 g1 superbracket inducing1 a symmetric intertwining map of -modules.
    [Show full text]
  • Qiao Et Al., Sosigenes Pit Crater Age 1/51
    Qiao et al., Sosigenes pit crater age 1 2 The role of substrate characteristics in producing anomalously young crater 3 retention ages in volcanic deposits on the Moon: Morphology, topography, 4 sub-resolution roughness and mode of emplacement of the Sosigenes Lunar 5 Irregular Mare Patch (IMP) 6 7 Le QIAO1,2,*, James W. HEAD2, Long XIAO1, Lionel WILSON3, and Josef D. 8 DUFEK4 9 1Planetary Science Institute, School of Earth Sciences, China University of 10 Geosciences, Wuhan 430074, China. 11 2Department of Earth, Environmental and Planetary Sciences, Brown University, 12 Providence, RI 02912, USA. 13 3Lancaster Environment Centre, Lancaster University, Lancaster LA1 4YQ, UK. 14 4School of Earth and Atmospheric Sciences, Georgia Institute of Technology, Atlanta, 15 Georgia 30332, USA. 16 *Corresponding author E-mail: [email protected] 17 18 19 20 Key words: Lunar/Moon, Sosigenes, irregular mare patches, mare volcanism, 21 magmatic foam, lava lake, dike emplacement 22 23 24 25 1/51 Qiao et al., Sosigenes pit crater age 26 Abstract: Lunar Irregular Mare Patches (IMPs) are comprised of dozens of small, 27 distinctive and enigmatic lunar mare features. Characterized by their irregular shapes, 28 well-preserved state of relief, apparent optical immaturity and few superposed impact 29 craters, IMPs are interpreted to have been formed or modified geologically very 30 recently (<~100 Ma; Braden et al. 2014). However, their apparent relatively recent 31 formation/modification dates and emplacement mechanisms are debated. We focus in 32 detail on one of the major IMPs, Sosigenes, located in western Mare Tranquillitatis, 33 and dated by Braden et al.
    [Show full text]
  • Nieuw Archief Voor Wiskunde
    Nieuw Archief voor Wiskunde Boekbespreking Kevin Broughan Equivalents of the Riemann Hypothesis Volume 1: Arithmetic Equivalents Cambridge University Press, 2017 xx + 325 p., prijs £ 99.99 ISBN 9781107197046 Kevin Broughan Equivalents of the Riemann Hypothesis Volume 2: Analytic Equivalents Cambridge University Press, 2017 xix + 491 p., prijs £ 120.00 ISBN 9781107197121 Reviewed by Pieter Moree These two volumes give a survey of conjectures equivalent to the ber theorem says that r()x asymptotically behaves as xx/log . That Riemann Hypothesis (RH). The first volume deals largely with state- is a much weaker statement and is equivalent with there being no ments of an arithmetic nature, while the second part considers zeta zeros on the line v = 1. That there are no zeros with v > 1 is more analytic equivalents. a consequence of the prime product identity for g()s . The Riemann zeta function, is defined by It would go too far here to discuss all chapters and I will limit 3 myself to some chapters that are either close to my mathematical 1 (1) g()s = / s , expertise or those discussing some of the most famous RH equiv- n = 1 n alences. Most of the criteria have their own chapter devoted to with si=+v t a complex number having real part v > 1 . It is easily them, Chapter 10 has various criteria that are discussed more brief- seen to converge for such s. By analytic continuation the Riemann ly. A nice example is Redheffer’s criterion. It states that RH holds zeta function can be uniquely defined for all s ! 1.
    [Show full text]
  • Introduction to Computational Social Choice
    1 Introduction to Computational Social Choice Felix Brandta, Vincent Conitzerb, Ulle Endrissc, J´er^omeLangd, and Ariel D. Procacciae 1.1 Computational Social Choice at a Glance Social choice theory is the field of scientific inquiry that studies the aggregation of individual preferences towards a collective choice. For example, social choice theorists|who hail from a range of different disciplines, including mathematics, economics, and political science|are interested in the design and theoretical evalu- ation of voting rules. Questions of social choice have stimulated intellectual thought for centuries. Over time the topic has fascinated many a great mind, from the Mar- quis de Condorcet and Pierre-Simon de Laplace, through Charles Dodgson (better known as Lewis Carroll, the author of Alice in Wonderland), to Nobel Laureates such as Kenneth Arrow, Amartya Sen, and Lloyd Shapley. Computational social choice (COMSOC), by comparison, is a very young field that formed only in the early 2000s. There were, however, a few precursors. For instance, David Gale and Lloyd Shapley's algorithm for finding stable matchings between two groups of people with preferences over each other, dating back to 1962, truly had a computational flavor. And in the late 1980s, a series of papers by John Bartholdi, Craig Tovey, and Michael Trick showed that, on the one hand, computational complexity, as studied in theoretical computer science, can serve as a barrier against strategic manipulation in elections, but on the other hand, it can also prevent the efficient use of some voting rules altogether. Around the same time, a research group around Bernard Monjardet and Olivier Hudry also started to study the computational complexity of preference aggregation procedures.
    [Show full text]
  • Combinatorial Proof of an Abel-Type Identity∗
    Combinatorial Proof of an Abel-type Identity∗ P. Mark Kayll Department of Mathematical Sciences, University of Montana Missoula MT 59812-0864, USA [email protected] David Perkins Department of Mathematics and Computer Science Houghton College, Houghton NY 14744, USA [email protected] Identity (1) below resulted from our investigation in [21] of chip-firing games on complete graphs Kn, for n ≥ 1; see, e.g., [2] for antecedents. The left side expresses the sum of the probabilities of a game experiencing firing sequences of each possible length ℓ = 0, 1,...,n. This note gives a combinatorial proof that these probabilities sum to unity. We first manipulate n n − 1 n ℓℓ−1(n + 1 − ℓ)n−1−ℓ + = 1 (1) n + 1 µℓ¶ n(n + 1)n−1 Xℓ=1 into a form amenable to combinatorial proof. Multiplying by n(n+1)n and n n+1 using the relation ℓ = ℓ (n + 1 − ℓ)/(n + 1), we transform (1) to the equivalent form ¡ ¢ ¡ ¢ n n + 1 ℓℓ−2(n + 1 − ℓ)n−1−ℓℓ(n + 1 − ℓ) = 2n(n + 1)n−1. (2) µ ℓ ¶ Xℓ=1 To see that (2) holds, first observe that the right side enumerates the pairs (T,~e ), where T is a spanning tree of Kn+1 for which one edge e (of 2000 MSC: Primary 05A19; Secondary 05C30, 60C05. ∗Preprint to appear in J. Combin. Math. Combin. Comput. 1 its n edges) has been distinguished and oriented (in one of two possible directions). The left side also enumerates these pairs. Given (T,~e ), notice that deleting the oriented edge ~e from T leaves behind a spanning forest of Kn+1 with two components L, R (that we may consider ordered from left to right).
    [Show full text]
  • The Modal Logic of Potential Infinity, with an Application to Free Choice
    The Modal Logic of Potential Infinity, With an Application to Free Choice Sequences Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of The Ohio State University By Ethan Brauer, B.A. ∼6 6 Graduate Program in Philosophy The Ohio State University 2020 Dissertation Committee: Professor Stewart Shapiro, Co-adviser Professor Neil Tennant, Co-adviser Professor Chris Miller Professor Chris Pincock c Ethan Brauer, 2020 Abstract This dissertation is a study of potential infinity in mathematics and its contrast with actual infinity. Roughly, an actual infinity is a completed infinite totality. By contrast, a collection is potentially infinite when it is possible to expand it beyond any finite limit, despite not being a completed, actual infinite totality. The concept of potential infinity thus involves a notion of possibility. On this basis, recent progress has been made in giving an account of potential infinity using the resources of modal logic. Part I of this dissertation studies what the right modal logic is for reasoning about potential infinity. I begin Part I by rehearsing an argument|which is due to Linnebo and which I partially endorse|that the right modal logic is S4.2. Under this assumption, Linnebo has shown that a natural translation of non-modal first-order logic into modal first- order logic is sound and faithful. I argue that for the philosophical purposes at stake, the modal logic in question should be free and extend Linnebo's result to this setting. I then identify a limitation to the argument for S4.2 being the right modal logic for potential infinity.
    [Show full text]
  • Special Catalogue Milestones of Lunar Mapping and Photography Four Centuries of Selenography on the Occasion of the 50Th Anniversary of Apollo 11 Moon Landing
    Special Catalogue Milestones of Lunar Mapping and Photography Four Centuries of Selenography On the occasion of the 50th anniversary of Apollo 11 moon landing Please note: A specific item in this catalogue may be sold or is on hold if the provided link to our online inventory (by clicking on the blue-highlighted author name) doesn't work! Milestones of Science Books phone +49 (0) 177 – 2 41 0006 www.milestone-books.de [email protected] Member of ILAB and VDA Catalogue 07-2019 Copyright © 2019 Milestones of Science Books. All rights reserved Page 2 of 71 Authors in Chronological Order Author Year No. Author Year No. BIRT, William 1869 7 SCHEINER, Christoph 1614 72 PROCTOR, Richard 1873 66 WILKINS, John 1640 87 NASMYTH, James 1874 58, 59, 60, 61 SCHYRLEUS DE RHEITA, Anton 1645 77 NEISON, Edmund 1876 62, 63 HEVELIUS, Johannes 1647 29 LOHRMANN, Wilhelm 1878 42, 43, 44 RICCIOLI, Giambattista 1651 67 SCHMIDT, Johann 1878 75 GALILEI, Galileo 1653 22 WEINEK, Ladislaus 1885 84 KIRCHER, Athanasius 1660 31 PRINZ, Wilhelm 1894 65 CHERUBIN D'ORLEANS, Capuchin 1671 8 ELGER, Thomas Gwyn 1895 15 EIMMART, Georg Christoph 1696 14 FAUTH, Philipp 1895 17 KEILL, John 1718 30 KRIEGER, Johann 1898 33 BIANCHINI, Francesco 1728 6 LOEWY, Maurice 1899 39, 40 DOPPELMAYR, Johann Gabriel 1730 11 FRANZ, Julius Heinrich 1901 21 MAUPERTUIS, Pierre Louis 1741 50 PICKERING, William 1904 64 WOLFF, Christian von 1747 88 FAUTH, Philipp 1907 18 CLAIRAUT, Alexis-Claude 1765 9 GOODACRE, Walter 1910 23 MAYER, Johann Tobias 1770 51 KRIEGER, Johann 1912 34 SAVOY, Gaspare 1770 71 LE MORVAN, Charles 1914 37 EULER, Leonhard 1772 16 WEGENER, Alfred 1921 83 MAYER, Johann Tobias 1775 52 GOODACRE, Walter 1931 24 SCHRÖTER, Johann Hieronymus 1791 76 FAUTH, Philipp 1932 19 GRUITHUISEN, Franz von Paula 1825 25 WILKINS, Hugh Percy 1937 86 LOHRMANN, Wilhelm Gotthelf 1824 41 USSR ACADEMY 1959 1 BEER, Wilhelm 1834 4 ARTHUR, David 1960 3 BEER, Wilhelm 1837 5 HACKMAN, Robert 1960 27 MÄDLER, Johann Heinrich 1837 49 KUIPER Gerard P.
    [Show full text]
  • The Security and Management of Computer Network Database In
    The Security and Management of Computer Network Database in Coal Quality Detection Jianhua SHI1, a, Jinhong SUN2 1Guizhou Agency of Quality Supervision and Inspection of Coal Product,Liupanshui city 553001,China [email protected] Keywords: Computer Network Database; Database Security; Coal Quality Detection Abstract. This paper research the results of quality management information system at home and abroad, through the analysis of the domestic coal enterprises coal quality management links and management information system development present situation and existing problems, combining with related theory and system development method of management information system, and according to the coal mining enterprises of computer network security and management, analysis and design of database, and the implementation steps and the implementation of the coal quality management information system of the problem are given their own countermeasure and the suggestion, try to solve demand for management information system of coal enterprise management level, thus improve the coal quality management level and economic benefit of coal enterprise. Introduction With the improvement of China's coal mining mechanization degree and the increase of mining depth, coal quality is on the decline as a whole. At the same time, the user of coal product utilization way more and more widely, use more and more diversified, more and higher to the requirement of coal quality. In coal quality issue, therefore, countless contradictions increasingly acute, the gap of
    [Show full text]
  • Session 9: Pigeon Hole Principle and Ramsey Theory - Handout
    Session 9: Pigeon Hole Principle and Ramsey Theory - Handout “Suppose aliens invade the earth and threaten to obliterate it in a year’s time unless human beings can find the Ramsey number for red five and blue five. We could marshal the world’s best minds and fastest computers, and within a year we could probably calculate the value. If the aliens demanded the Ramsey number for red six and blue six, however, we would have no choice but to launch a preemptive attack.” image: Frank P. Ramsey (1903-1926) quote: Paul Erd¨os (1913-1996) The following dots are in general position (i.e. no three lie on a straight line). 1) If it exists, find a convex quadrilateral in this cluster of dots. 2) If it exists, find a convex pentagon in this cluster of dots. 3) If it exists, find a convex hexagon in this cluster of dots. 4) If it exists, find a convex heptagon in this cluster of dots. 5) If it exists, find a convex octagon in this cluster of dots. 6) Draw 8 points in general position in such a way that the points do not contain a convex pentagon. 7) In my family there are 2 adults and 3 children. When our family arrives home how many of us must enter the house in order to ensure there is at least one adult in the house? 8) Show that among any collection of 7 natural numbers there must be two whose sum or difference is divisible by 10. 9) Suppose a party has six people.
    [Show full text]
  • Modern Coding Theory: the Statistical Mechanics and Computer Science Point of View
    Modern Coding Theory: The Statistical Mechanics and Computer Science Point of View Andrea Montanari1 and R¨udiger Urbanke2 ∗ 1Stanford University, [email protected], 2EPFL, ruediger.urbanke@epfl.ch February 12, 2007 Abstract These are the notes for a set of lectures delivered by the two authors at the Les Houches Summer School on ‘Complex Systems’ in July 2006. They provide an introduction to the basic concepts in modern (probabilistic) coding theory, highlighting connections with statistical mechanics. We also stress common concepts with other disciplines dealing with similar problems that can be generically referred to as ‘large graphical models’. While most of the lectures are devoted to the classical channel coding problem over simple memoryless channels, we present a discussion of more complex channel models. We conclude with an overview of the main open challenges in the field. 1 Introduction and Outline The last few years have witnessed an impressive convergence of interests between disciplines which are a priori well separated: coding and information theory, statistical inference, statistical mechanics (in particular, mean field disordered systems), as well as theoretical computer science. The underlying reason for this convergence is the importance of probabilistic models and/or probabilistic techniques in each of these domains. This has long been obvious in information theory [53], statistical mechanics [10], and statistical inference [45]. In the last few years it has also become apparent in coding theory and theoretical computer science. In the first case, the invention of Turbo codes [7] and the re-invention of Low-Density Parity-Check (LDPC) codes [30, 28] has motivated the use of random constructions for coding information in robust/compact ways [50].
    [Show full text]