Seminars in November 2014

  • Hana Kim, Enumeration of symmetric hex trees and the related polynomials

    Enumeration of symmetric hex trees and the related polynomials
    Hana Kim
    NIMS
    2014/11/25 Tuesday 4:30PM-5:30PM
    Room 1409
    A hex tree is an ordered tree of which each vertex has updegree 0, 1, or 2, and an edge from a vertex of updegree 1 is either left, median, or right. In this talk, we introduce an enumeration problem of symmetric hex trees and describe a bijection between symmetric hex trees and a certain class of supertrees. Some algebraic properties of the polynomials arising in this procedure also will be discussed.
    Tags:
  • Bryan Wilkinson, Generalized Davenport-Schinzel Sequences: Regaining Linearity

    Generalized Davenport-Schinzel Sequences: Regaining Linearity
    Bryan Wilkinson
    Aarhus University, Danmark
    2014/11/18 Tuesday 4PM-5PM
    Room 1409
    We prove the linearity (of the lengths) of some generalized Davenport-Schinzel sequences. Standard Davenport-Schinzel sequences of order 2 (avoiding abab) are linear, while those of order 3 (avoiding ababa) and higher can be superlinear. Our goal is to determine what pattern(s), in addition to ababa, must be forbidden to regain linearity. This work is motivated by an intriguing open problem: does the lower envelope of any set of degree 3 polynomials have linear complexity?
  • (CS Colloquium) Jeong Han Kim, How to Find Counterfeit Coins? An Algorithmic Version

    FYI (CS Colloquium)

    How to Find Counterfeit Coins?
    An Algorithmic Version
    2014/11/17 Monday 4PM – 5:30PM
    E3-1 CS Bldg. Room 1501
    In this talk, we consider a well-known combinatorial search problem. Suppose that there are n identical looking coins and some of them are counterfeit. The weights of all authentic coins are the same and known a
    priori. The weights of counterfeit coins vary but different from the weight of an authentic coin. Without loss of generality, we may assume the weight of authentic coins is 0. The problem is to find all counterfeit coins by weighing (queries) sets of coins on a spring scale. Finding the optimal number of queries is difficult even when there are only 2 counterfeit coins. We introduce a polynomial time randomized algorithm to find all counterfeit coins when the number of them is known to be at most m \geq 2 and the weight w(c) of each counterfeit coin c satisfies \alpha \leq |w(c)| \leq \beta for fixed constants \alpha, \beta>0. The query complexity of the algorithm is O(\frac{m \log n }{\log m}), which is optimal up to a constant factor. The algorithm uses, in part, random walks. The algorithm may be generalized to find all edges of a hidden weighted graph using a similar type of queries. This graph finding algorithm has various applications including DNA sequencing.
    Tags:
  • JiYoon Jung, The topology of restricted partition posets

    The topology of restricted partition posets
    2014/11/04 Tuesday 4PM-5PM
    Room 1409
    For each composition \vec{c} we show that the order complex of the poset of pointed set partitions \Pi_{\vec{c}}^{\bullet} is a wedge of spheres of the same dimension with the multiplicity given by the number of permutations with descent composition \vec{c}. Furthermore, the action of the symmetric group on the top homology is isomorphic to the Specht module S^B where B is a border strip associated to the composition. We also study the filter of pointed set partitions generated by a knapsack integer partition and show the analogous results on homotopy type and action on the top homology.
    Tags:

Monthly Archives