• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 380
  • 52
  • 47
  • 20
  • 12
  • 9
  • 6
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 766
  • 310
  • 260
  • 204
  • 184
  • 172
  • 75
  • 70
  • 61
  • 61
  • 53
  • 52
  • 51
  • 50
  • 48
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
331

On the Combinatorics of Certain Garside Semigroups

Cornwell, Christopher R. 06 July 2006 (has links) (PDF)
In his dissertation, F.A. Garside provided a solution to the word and conjugacy problems in the braid group on n-strands, using a particular element that he called the fundamental word. Others have since defined fundamental words in the generalized setting of Artin groups, and even more recently in Garside groups. We consider the problem of finding the number of representations of a power of the fundamental word in these settings. In the process, we find a Pascal-like identity that is satisfied in a certain class of Garside groups.
332

Tight Bounds on 3-Neighbor Bootstrap Percolation

Romer, Abel 31 August 2022 (has links)
Consider infecting a subset $A_0 \subseteq V(G)$ of the vertices of a graph $G$. Let an uninfected vertex $v \in V(G)$ become infected if $|N_G(v) \cap A_0| \geq r$, for some integer $r$. Define $A_t = A_{t-1} \cup \{v \in V(G) : |N_G(v) \cap A_{t-1}| \geq r \},$ and say that the set $A_0$ is \emph{lethal} under $r$-neighbor percolation if there exists a $t$ such that $A_t = V(G)$. For a graph $G$, let $m(G,r)$ be the size of the smallest lethal set in $G$ under $r$-neighbor percolation. The problem of determining $m(G,r)$ has been extensively studied for grids $G$ of various dimensions. We define $$m(a_1, \dots, a_d, r) = m\left (\prod_{i=1}^d [a_i], r\right )$$ for ease of notation. Famously, a lower bound of $m(a_1, \dots, a_d, d) \geq \frac{\sum_{j=1}^d \prod_{i \neq j} a_i}{d}$ is given by a beautiful argument regarding the high-dimensional ``surface area" of $G = [a_1] \times \dots \times [a_d]$. While exact values of $m(G,r)$ are known in some specific cases, general results are difficult to come by. In this thesis, we introduce a novel technique for viewing $3$-neighbor lethal sets on three-dimensional grids in terms of lethal sets in two dimensions. We also provide a strategy for recursively building up large lethal sets from existing small constructions. Using these techniques, we determine the exact size of all lethal sets under 3-neighbor percolation in three-dimensional grids $[a_1] \times [a_2] \times [a_3]$, for $a_1,a_2,a_3 \geq 11$. The problem of determining $m(n,n,3)$ is discussed by Benevides, Bermond, Lesfari and Nisse in \cite{benevides:2021}. The authors determine the exact value of $m(n,n,3)$ for even $n$, and show that, for odd $n$, $$\ceil*{\frac{n^2+2n}{3}} \leq m(n,n,3) \leq \ceil*{\frac{n^2+2n}{3}} + 1.$$ We prove that $m(n,n,3) = \ceil*{\frac{n^2+2n}{3}}$ if and only if $n = 2^k-1$, for some $k >0$. Finally, we provide a construction to prove that for $a_1,a_2,a_3 \geq 12$, bounds on the minimum lethal set on the the torus $G = C_{a_1} \square C_{a_2} \square C_{a_3}$ are given by $$2 \le m(G,3) - \frac{a_1a_2 + a_2a_3 + a_3a_1 -2(a_1+a_2+a_3)}{3} \le 3.$$ / Graduate
333

Points and Lines in the Plane

Smith, Justin Wesley 06 December 2010 (has links)
No description available.
334

On comparability of random permutations

Hammett, Adam Joseph 08 March 2007 (has links)
No description available.
335

A Cognition-Based Analysis of Undergraduate Students' Reasoning about the Enumeration of Permutations

Antonides, Joseph E. 01 September 2022 (has links)
No description available.
336

A combinatorial approach to scientific exploration of gene expression data: An integrative method using Formal Concept Analysis for the comparative analysis of microarray data

Potter, Dustin Paul 14 October 2005 (has links)
Functional genetics is the study of the genes present in a genome of an organism, the complex interplay of all genes and their environment being the primary focus of study. The motivation for such studies is the premise that gene expression patterns in a cell are characteristic of its current state. The availability of the entire genome for many organisms now allows scientists unparalleled opportunities to characterize, classify, and manipulate genes or gene networks involved in metabolism, cellular differentiation, development, and disease. System-wide studies of biological systems have been made possible by the advent of high-throughput and large-scale tools such as microarrays which are capable of measuring the mRNA levels of all genes in a genome. Tools and methods for the integration, visualization, and modeling of the large-scale data obtained in typical systems biology experiments are indispensable. Our work focuses on a method that integrates gene expression values obtained from microarray experiments with biological functional information related to the genes measured in order to make global comparisons of multiple experiments. In our method, the integrated data is represented as a lattice and, using appropriate measures, a reference experiment can be compared to samples from a database of similar experiments, and a ranking of similarity is returned. In this work, support for the validity of our method is demonstrated both theoretically and empirically: a mathematical description of the lattice structure with respect to the integrated information is developed and the method is applied to data sets of both simulated and reported microarray experiments. A fast algorithm for constructing the lattice representation is also developed. / Ph. D.
337

A Combinatorial Proof of the Positivity of the Lusztig q-Analogue of Weight Multiplicity for Rank 2 Lie Algebras

Gillespie, Jason Michael 09 December 2003 (has links)
We prove the positivity of Lusztig's q-analogue of weight multiplicity in a purely combinatorial way for rank 2 Lie algebras. Each summand in the polynomial can be interpreted as a linear combination of positive roots. We prove that all negative coefficients are cancelled in the polynomial. Further, the analysis of the root systems allows us to state formulae for every coefficient in Lusztig's q-analogue for rank 2 Lie algebras. / Ph. D.
338

Indexing Large Permutations in Hardware

Odom, Jacob Henry 07 June 2019 (has links)
Generating unbiased permutations at run time has traditionally been accomplished through application specific optimized combinational logic and has been limited to very small permutations. For generating unbiased permutations of any larger size, variations of the memory dependent Fisher-Yates algorithm are known to be an optimal solution in software and have been relied on as a hardware solution even to this day. However, in hardware, this thesis proves Fisher-Yates to be a suboptimal solution. This thesis will show variations of Fisher-Yates to be suboptimal by proposing an alternate method that does not rely on memory and outperforms Fisher-Yates based permutation generators, while still able to scale to very large sized permutations. This thesis also proves that this proposed method is unbiased and requires a minimal input. Lastly, this thesis demonstrates a means to scale the proposed method to any sized permutations and also to produce optimal partial permutations. / Master of Science / In computing, some applications need the ability to shuffle or rearrange items based on run time information during their normal operations. A similar task is a partial shuffle where only an information dependent selection of the total items is returned in a shuffled order. Initially, there may be the assumption that these are trivial tasks. However, the applications that rely on this ability are typically related to security which requires repeatable, unbiased operations. These requirements quickly turn seemingly simple tasks to complex. Worse, often they are done incorrectly and only appear to meet these requirements, which has disastrous implications for security. A current and dominating method to shuffle items that meets these requirements was developed over fifty years ago and is based on an even older algorithm refer to as Fisher-Yates, after its original authors. Fisher-Yates based methods shuffle items in memory, which is seen as advantageous in software but only serves as a disadvantage in hardware since memory access is significantly slower than other operations. Additionally, when performing a partial shuffle, Fisher-Yates methods require the same resources as when performing a complete shuffle. This is due to the fact that, with Fisher-Yates methods, each element in a shuffle is dependent on all of the other elements. Alternate methods to meet these requirements are known but are only able to shuffle a very small number of items before they become too slow for practical use. To combat the disadvantages current methods of shuffling possess, this thesis proposes an alternate approach to performing shuffles. This alternate approach meets the previously stated requirements while outperforming current methods. This alternate approach is also able to be extended to shuffling any number of items while maintaining a useable level of performance. Further, unlike current popular shuffling methods, the proposed method has no inter-item dependency and thus offers great advantages over current popular methods with partial shuffles.
339

Multiparameter BCn-Kostka-Foulkes Polynomials

Goodberry, Benjamin Nathaniel 19 June 2018 (has links)
The Kostka-Foulkes polynomials describe the change of basis between Schur polynomials and Hall-Littlewood polynomials. In this paper, we extend this idea to the family of BCn Macdonald spherical functions, with multiparameter Kostka-Foulkes polynomials acting as the change of basis from the BC_n spherical functions to the type Cn Schur polynomials. We develop a Kato-Lusztig formula that describes the multiparameter BCn-Kostka-Foulkes polynomials. / Master of Science / The work done in [11] gives a formula to calculate Kostka-Foulkes polynomials that convert between two other forms of polynomials. However, this only applies in specific instances. In this paper, we generalize those ideas to allow for more parameters, and find that a similar formula still holds.
340

Monomial ideals with a prescribed Waldschmidt constant

Kohne, Craig January 2024 (has links)
Let I be a monomial ideal in R=K[x_1,x_2,..,x_n], a polynomial ring over a field K. The Waldschmidt constant of I is an asymptotic invariant of I. The Waldschmidt constant manifests in many ways in commutative algebra and algebraic geometry, and is related to open problems such as the ideal containment problem and Nagata's conjecture. For a monomial ideal, the computation of its Waldschmidt constant reduces to solving a linear optimization problem. This thesis shows how to construct a monomial ideal with Waldschmidt constant equal to any rational number greater than or equal to 1. The family of monomial ideals investigated are intersections of powers of prime monomial ideals (in Chapter 3) and square-free principal Borel ideals (in Chapter 4). / Thesis / Doctor of Philosophy (PhD) / Let I be a monomial ideal in R=K[x_1,x_2,..,x_n], a polynomial ring over a field K. The Waldschmidt constant of I is an asymptotic invariant of I. The Waldschmidt constant manifests in many ways in commutative algebra and algebraic geometry, and is related to open problems such as the ideal containment problem and Nagata's conjecture. For a monomial ideal, the computation of its Waldschmidt constant reduces to solving a linear optimization problem. This thesis shows how to construct a monomial ideal with Waldschmidt constant equal to any rational number greater than or equal to 1. The family of monomial ideals investigated are intersections of powers of prime monomial ideals (in Chapter 3) and square-free principal Borel ideals (in Chapter 4).

Page generated in 0.0501 seconds