We study the number of all possible alignments of N sequences, N greater than or equal to 2, for two distinct alignment concepts proposed in the literature-standard alignments and effective alignments (consistent equi...
详细信息
We study the number of all possible alignments of N sequences, N greater than or equal to 2, for two distinct alignment concepts proposed in the literature-standard alignments and effective alignments (consistent equivalence relations). Recursion formulae are developed to calculate these numbers. For standard alignments and for effective alignment of just two sequences, an explicit formula is also presented. The number of all effective alignments of a given site space is shown to be related to Stirling numbers of second kind. (C) 1998 Elsevier Science Ltd. All rights reserved.
Given a set xi = {H-1, H-2,...} of connected non-acyclic graphs, a xi-free graph is one which does not contain any member of as copy. Define the excess of a graph as the difference between its number of edges and its ...
详细信息
Given a set xi = {H-1, H-2,...} of connected non-acyclic graphs, a xi-free graph is one which does not contain any member of as copy. Define the excess of a graph as the difference between its number of edges and its number of vertices. Let (W) over cap (k,xi) be the exponential generating function (EGF for brief) of connected xi-free graphs of excess equal to k (k greater than or equal to 1). For each fixed, a fundamental differential recurrence satisfied by the EGFs (W) over cap (k,xi) is derived. We give methods on how to solve this nonlinear recurrence for the first few values of k by means of graph surgery. We also show that for any finite collection xi of non-acyclic graphs, the EGFs (W) over cap (k,xi) are always rational functions of the generating function, T, of Cayley's rooted (non-planar) labelled trees. From this, we prove that almost all connected graphs with n nodes and n + k edges are xi-free, whenever k = o(n(1/3)) and \xi\ < infinity by means of Wright's inequalities and saddle point method. Limiting distributions are derived for sparse connected xi-free components that are present when a random graph on n nodes has approximately n/2 edges. In particular, the probability distribution that it consists of trees, unicyclic components,...,(q + 1)-cyclic components all xi-free is derived. Similar results are also obtained for multigraphs, which are graphs where self-loops and multiple-edges are allowed. (C) 2003 Elsevier B.V. All rights reserved.
The graph approach of circular codes recently developed (Fimmel et al., 2016) allows here a detailed study of diletter circular codes over finite alphabets. A new class of circular codes is identified, strong comma-fr...
详细信息
The graph approach of circular codes recently developed (Fimmel et al., 2016) allows here a detailed study of diletter circular codes over finite alphabets. A new class of circular codes is identified, strong comma-free codes. New theorems are proved with the diletter circular codes of maximal length in relation to (i) a characterisation of their graphs as acyclic tournaments;(ii) their explicit description;and (iii) the non-existence of other maximal diletter circular codes. The maximal lengths of paths in the graphs of the comma-free and strong comma-free codes are determined. Furthermore, for the first time, diletter circular codes are enumerated over finite alphabets. Biological consequences of dinucleotide circular codes are analysed with respect to their embedding in the trinucleotide circular code X identified in genes and to the periodicity modulo 2 observed in introns. An evolutionary hypothesis of circular codes is also proposed according to their combinatorial properties.
We introduce a class of two-player games on posers with a rank function, in which each move of the winning strategy is unique, This allows one to enumerate the kernel positions by rank. The main example is a simple ga...
详细信息
We introduce a class of two-player games on posers with a rank function, in which each move of the winning strategy is unique, This allows one to enumerate the kernel positions by rank. The main example is a simple game on words in which the number of kernel positions of rank n is a signed factorial multiple of the nth Bernoulli number of the second kind. Generalizations to the degenerate Bernoulli numbers and to negative integer Substitutions into the Bernoulli polynomials are developed. Using an appropriate scoring system for each function with an appropriate Newton expansion we construct a game in which the expected gain of a player equals the definite integral of the function on the interval vertical bar 0. 1 vertical bar. (c) 2008 Elsevier Inc. All rights reserved.
Cographs have always been a research target in areas such as coloring, graph decomposition, and spectral theory. In this work, we present an algorithm to generate all unlabeled cographs with n vertices, based on the g...
详细信息
Cographs have always been a research target in areas such as coloring, graph decomposition, and spectral theory. In this work, we present an algorithm to generate all unlabeled cographs with n vertices, based on the generation of cotrees. The delay of our algorithm (time spent between two consecutive outputs) is O(n). The time needed to generate the first output is also O(n), which gives an overall O(n M-n) time complexity, where M-n is the number of unlabeled cographs with n vertices. The algorithm avoids the generation of duplicates (isomorphic outputs) and produces, as a by-product, a linear ordering of unlabeled cographs with n vertices. (C) 2018 Elsevier B.V. All rights reserved.
We present a bijection between non-crossing partitions of the set [2n + 1] into n + 1 blocks such that no block contains two consecutive integers, and the set of sequences {si}(1)(n) such that 1less than or equal tos(...
详细信息
We present a bijection between non-crossing partitions of the set [2n + 1] into n + 1 blocks such that no block contains two consecutive integers, and the set of sequences {si}(1)(n) such that 1less than or equal tos(i)less than or equal toi, and if s(i) = j, then s(i-r)less than or equal toj - r for 1less than or equal torless than or equal toj - 1. (C) 2004 Elsevier B.V. All rights reserved.
A graph is said to be graded if its vertices are divided into levels numbered by integers, so that the endpoints Of any edge lie on consecutive levels. Discrete modular lattices and rooted trees are among the typical ...
详细信息
A graph is said to be graded if its vertices are divided into levels numbered by integers, so that the endpoints Of any edge lie on consecutive levels. Discrete modular lattices and rooted trees are among the typical examples. The following three types of problems are of interest to us: (1) path counting in graded graphs, and related combinatorial identities;(2) bijective proofs of these identities;(3) design and analysis of algorithms establishing corresponding bijections. This article is devoted to (1);its sequel [7] is concerned with the problems (2)-(3). A simplified treatment of some of these results can be found in [8]. In this article, R.P. Stanley's [26,27] linear-algebraic approach to (1) is extended to cover a wide range of graded graphs. The main idea is to consider pairs of graded graphs with a common set of vertices and common rank function. Such graphs am said to be dual if the associated linear operators satisfy a certain commutation relation (e.g., the ''Heisenberg'' one). The algebraic consequences of these relations are then interpreted as combinatorial identities. (This idea is also implicit in [27].) [7] contains applications to various examples of graded graphs, including the Young, Fibonacci, Young-Fibonacci and Pascal lattices, the graph of shifted shapes, the r-nary trees, the Schensted graph, the lattice of finite binary trees, etc. Many enumerative identities (both known and unknown) are obtained. Abstract of [7]. These identities can also be derived in a purely combinatorial way by generalizing the Robinson-Schensted correspondence to the class of graphs under consideration (cf. [5]). The same tools can be applied to permutation enumeration, including involution counting and rook polynomials for Ferrers boards. The bijective correspondences mentioned above are naturally constructed by Schensted-type algorithms. A general approach to these constructions is given. As particular cases we rederive the classical algorithm of Robinson, Schensted
We consider packing axis-aligned rectangles r1,..,r(n) in the unit square [0,1](2) such that a vertex of each rectangle n is a given point pi (i.e., r(i) is anchored at p(i)). We explore the combinatorial structure of...
详细信息
We consider packing axis-aligned rectangles r1,..,r(n) in the unit square [0,1](2) such that a vertex of each rectangle n is a given point pi (i.e., r(i) is anchored at p(i)). We explore the combinatorial structure of all locally maximal configurations. When the given points are the lower-left corners of the rectangles, the number of maximal packings is shown to be at most 2(n)C(n), where C-n is the nth Catalan number. The number of maximal packings remains exponential in n when the points may be arbitrary corners of the rectangles. Both upper bounds are complemented with exponential lower bounds. Finally, we define the graph of all lower-left anchored maximal rectangle packings, where the edges correspond to elementary operations between two packings, which leads to an output sensitive algorithm for computing these packings. (C) 2016 Elsevier B.V. All rights reserved.
In this paper we consider doubly symmetric Dyck words, i.e. Dyck words which are fixed by two symmetry operations alpha and beta introduced in [1]. We study combinatorial properties of doubly symmetric Dyck words, lea...
详细信息
In this paper we consider doubly symmetric Dyck words, i.e. Dyck words which are fixed by two symmetry operations alpha and beta introduced in [1]. We study combinatorial properties of doubly symmetric Dyck words, leading to the definition of two recursive algorithms to build these words. As a consequence we have a representation of doubly symmetric Dyck words as vectors of integers, called track vectors. Finally, we show some bijections between a subfamily of doubly symmetric Dyck words and a subfamily of integer partitions. The computation of the sequence f(n) of doubly symmetric Dyck words of semi-length n shows surprising properties giving rise to some conjectures. (C) 2021 Elsevier B.V. All rights reserved.
Zeilberger (1996) [12] proved the Refined Alternating Sign Matrix Theorem, which gives a product formula, first conjectured by Mills, Robbins and Rumsey (1983) [9], for the number of alternating sign matrices with giv...
详细信息
Zeilberger (1996) [12] proved the Refined Alternating Sign Matrix Theorem, which gives a product formula, first conjectured by Mills, Robbins and Rumsey (1983) [9], for the number of alternating sign matrices with given top row. Stroganov (2006) [10] proved an explicit formula for the number of alternating sign matrices with given top and bottom rows. Fischer and Romik (2009) [7] considered a different kind of "doubly-refined enumeration" where one counts alternating sign matrices with given top two rows, and obtained partial results on this enumeration. In this paper we continue the study of the doubly-refined enumeration with respect to the top two rows, and use Stroganov's formula to prove an explicit formula for these doubly-refined enumeration numbers. (C) 2009 Elsevier Inc. All rights reserved.
暂无评论