permutations that avoid given patterns are among the most classical objects in combinatorics and have strong connections to many fields of mathematics, computer science and biology. In this paper we study the scaling ...
详细信息
permutations that avoid given patterns are among the most classical objects in combinatorics and have strong connections to many fields of mathematics, computer science and biology. In this paper we study the scaling limits of a random permutation avoiding a pattern of length 3 and their relations to Brownian excursion. Exploring this connection to Brownian excursion allows us to strengthen the recent results of Madras and Pehlivan [25] and Miner and Pak [29] as well as to understand many of the interesting phenomena that had previously gone unexplained. (c) 2016 Wiley Periodicals, Inc. Random Struct. Alg., 50, 394-419, 2017
pattern-avoiding permutations are permutations where none of the subsequences matches the relative order of a given pattern. pattern-avoiding permutations are related to practical and abstract mathematical problems an...
详细信息
pattern-avoiding permutations are permutations where none of the subsequences matches the relative order of a given pattern. pattern-avoiding permutations are related to practical and abstract mathematical problems and can provide simple representations for such problems. For example, some floorplans, which are used for optimizing very-large-scale integration (VLSI) circuit design, can be encoded into pattern-avoiding permutations. The generation of pattern-avoiding permutations is an important topic in efficient VLSI design and mathematical analysis of patten-avoidingpermutations. In this paper, we present an algorithm for generating pattern-avoiding permutations, and extend this algorithm beyond classical patterns to generalized patterns with more restrictions. Our approach is based on the data structure pi DDs, which can represent a permutation set compactly and has useful set operations. We demonstrate the efficiency of our algorithm by computational experiments.
In Bloom and Saracino (2009) [2] we proved that a natural bijection Gamma : S(n)(321) -> S(n)(132) that Robertson defined by an iterative process in Robertson (2004) [8] preserves the numbers of fixed points and ex...
详细信息
In Bloom and Saracino (2009) [2] we proved that a natural bijection Gamma : S(n)(321) -> S(n)(132) that Robertson defined by an iterative process in Robertson (2004) [8] preserves the numbers of fixed points and excedances in each sigma is an element of S(n)(321). The proof depended on first showing that Gamma(sigma(-1)) = (Gamma(sigma))(-1) for all sigma is an element of S(n)(321). Here we give a noniterative definition of Gamma that frees the result about fixed points and excedances from its dependence on the result about inverses, while also greatly simplifying and elucidating the result about inverses. We also establish a simple connection between Gamma and an analogous bijection phi* : S(n)(213) -> S(n)(321) introduced in Backelin et al. (2007) [1] and studied in Bousquet-Melou and Steingrimsson (2005) [3]. (C) 2010 Elsevier Inc. All rights reserved.
We define a new combinatorial statistic, maximal-inversion, on a permutation. We remark that the number M(n, k) of permutations in S-n with k maximal-inversions is the signless Stirling number c(n, n-k) of the first k...
详细信息
We define a new combinatorial statistic, maximal-inversion, on a permutation. We remark that the number M(n, k) of permutations in S-n with k maximal-inversions is the signless Stirling number c(n, n-k) of the first kind. A permutation pi in S-n is uniquely determined by its maximal-inversion set MI(pi). We prove it by making an algorithm for retrieving the permutation from its maximal-inversion set. Also, we remark on how the algorithm can be used directly to determine whether a given set is the maximal-inversion set of a permutation. As an application of the algorithm, we characterize the maximal-inversion set for pattern-avoiding permutations. Then we give some enumerative results concerning permutations with forbidden patterns. (C) 2008 Elsevier B.V. All rights reserved.
We study the feasible region for consecutive patterns of pattern-avoiding permutations. More precisely, given a family C of permutationsavoiding a fixed set of patterns, we consider the limit of proportions of consec...
详细信息
We study the feasible region for consecutive patterns of pattern-avoiding permutations. More precisely, given a family C of permutationsavoiding a fixed set of patterns, we consider the limit of proportions of consecutive patterns on large permutations of C. These limits form a region, which we call the consecutive patterns feasible region for C. We determine the dimension of the consecutive patterns feasible region for all families C closed either for the direct sum or the skew sum. These families include for instance the ones avoiding a single pattern and all substitution-closed classes. We further show that these regions are always convex and we conjecture that they are always polytopes. We prove this conjecture when C is the family of t-avoidingpermutations, with either t of size three or t a monotone pattern. Furthermore, in these cases we give a full description of the vertices of these polytopes via cycle polytopes. Along the way, we discuss connections of this work with the problem of packing patterns in pattern-avoiding permutations and to the study of local limits for pattern-avoiding permutations.(c) 2022 The Author(s). Published by Elsevier B.V. This is an open access article under the CC BY license (http://***/licenses/by/4.0/).
We consider a random permutation drawn from the set of 321-avoidingpermutations of length n and show that the number of occurrences of another pattern sigma has a limit distribution, after scaling by n(m + l) where m...
详细信息
We consider a random permutation drawn from the set of 321-avoidingpermutations of length n and show that the number of occurrences of another pattern sigma has a limit distribution, after scaling by n(m + l) where m is the length of sigma and l is the number of blocks in it. The limit is not normal, and can be expressed as a functional of a Brownian excursion.
We study the longest increasing subsequence problem for random permutationsavoiding the pattern 312 and another pattern tau under the uniform probability distribution. We determine the exact and asymptotic formulas f...
详细信息
We study the longest increasing subsequence problem for random permutationsavoiding the pattern 312 and another pattern tau under the uniform probability distribution. We determine the exact and asymptotic formulas for the average length of the longest increasing subsequences for such permutation classes specifically when the pattern tau is monotone increasing or decreasing, or any pattern of length four. (C) 2020 Elsevier Inc. All rights reserved.
In [K. Chaudhuri, K. Chen, R. Mihaescu, S. Rao, On the tandem duplication-random loss model of genome rearrangement, in: SODA, 2006, pp. 564-570]. Chaudhuri, Chen, Mihaescu and Rao study algorithmic properties of the ...
详细信息
In [K. Chaudhuri, K. Chen, R. Mihaescu, S. Rao, On the tandem duplication-random loss model of genome rearrangement, in: SODA, 2006, pp. 564-570]. Chaudhuri, Chen, Mihaescu and Rao study algorithmic properties of the tandem duplication - random loss model of genome rearrangement, well-known in evolutionary biology. In their model, the cost of one step of duplication-loss of width k is alpha(k) for alpha = 1 or alpha >= 2. In this paper, we study a variant of this model, where the cost of one step of width k is 1 if k <= K and infinity if k > K, for any value of the parameter K is an element of N boolean OR {infinity}. We first show that permutations obtained after p steps of width K define classes of pattern-avoiding permutations. We also compute the numbers Of duplication-loss steps of width K necessary and sufficient to obtain any permutation of S(n) in the worst case and on average. In this second part, we may also consider the case K = K(n), a function of the size n of the permutation oil which the duplication-loss operations are performed. (C) 2008 Elsevier B.V. All rights reserved.
In 1985, Simion and Schmidt gave a constructive bijection phi from the set of all length (n - 1) binary strings having no two consecutive 1s to the set of all length n permutationsavoiding all patterns in {123,132,21...
详细信息
In 1985, Simion and Schmidt gave a constructive bijection phi from the set of all length (n - 1) binary strings having no two consecutive 1s to the set of all length n permutationsavoiding all patterns in {123,132,213}. In this paper, we generalize p to an injective function from {0,1}(n-1) to the set S. of all length n permutations and derive from it four bijections phi : P -> Q where P subset of{0,1}(n-1) and Q subset of S-n. The domains are sets of restricted binary strings and the codomains are sets of pattern-avoiding permutations. As a particular case we retrieve the original Simion-Schmidt bijection. We also show that the bijections obtained are actually combinatorial isomorphisms, i.e. closeness-preserving bijections. Three of them have known Gray codes and generating algorithms for their domains and we present similar results for each corresponding codomain, under the appropriate combinatorial isomorphism.
We give some new Wilf equivalences for signed patterns which allow the complete classification of signed patterns of lengths three and four. The problem is considered for pattern avoidance by general as well as involu...
详细信息
We give some new Wilf equivalences for signed patterns which allow the complete classification of signed patterns of lengths three and four. The problem is considered for pattern avoidance by general as well as involutive signed permutations. (C) 2007 Elsevier B.V. All rights reserved.
暂无评论