scholarly journals Synchronizing random automata

2010 ◽  
Vol Vol. 12 no. 4 ◽  
Author(s):  
Evgeny Skvortsov ◽  
Yulia Zaks

special issue dedicated to the second edition of the conference AutoMathA: from Mathematics to Applications International audience Conjecture that any synchronizing automaton with n states has a reset word of length (n - 1)(2) was made by. Cerny in 1964. Notwithstanding the numerous attempts made by various researchers this conjecture hasn't been definitively proven yet. In this paper we study a random automaton that is sampled uniformly at random from the set of all automata with n states and m(n) letters. We show that for m(n) > 18 ln n any random automaton is synchronizing with high probability. For m(n) > n(beta), beta > 1/2 we also show that any random automaton with high probability satisfies the. Cerny conjecture.

2020 ◽  
Vol Special issue on... ◽  
Author(s):  
Benjamin Molineaux ◽  
Bettelou Los ◽  
Martti Mäkinen

International audience The advent of ever-larger and more diverse historical corpora for different historical periods and linguistic varieties has led to the impossibility of obtaining simple, direct-and yet balancedrepresentations of the core patterns in the data. In order to draw insights from heterogeneous and complex materials of this type, historical linguists have begun to reach for a growing number of data visualisation techniques, from the statistical, to the cartographical, the network-based and beyond. An exploration of the state of this art was the objective of a workshop at the 2018 International Conference on English Historical Linguistics, from whence most of the materials of this Special Issue are drawn. This brief introductory paper outlines the background and relevance of this line of methodological research and presents a summary of the individual papers that make up the collection.


2011 ◽  
Vol Vol. 13 no. 4 ◽  
Author(s):  
Peter Pal Pach ◽  
Csaba Szabo

special issue in honor of Laci Babai's 60th birthday: Combinatorics, Groups, Algorithms, and Complexity International audience For a polynomial f(x) is an element of Z(2)[x] it is natural to consider the near-ring code generated by the polynomials f circle x, f circle x(2) ,..., f circle x(k) as a vectorspace. It is a 19 year old conjecture of Gunter Pilz that for the polynomial f (x) - x(n) broken vertical bar x(n-1) broken vertical bar ... broken vertical bar x the minimal distance of this code is n. The conjecture is equivalent to the following purely number theoretical problem. Let (m) under bar = \1, 2 ,..., m\ and A subset of N be an arbitrary finite subset of N. Show that the number of products that occur odd many times in (n) under bar. A is at least n. Pilz also formulated the conjecture for the special case when A = (k) under bar. We show that for A = (k) under bar the conjecture holds and that the minimal distance of the code is at least n/(log n)(0.223). While proving the case A = (k) under bar we use different number theoretical methods depending on the size of k (respect to n). Furthermore, we apply several estimates on the distribution of primes.


2011 ◽  
Vol Vol. 13 no. 4 ◽  
Author(s):  
Gabor Horvath ◽  
Csaba Szabo

special issue in honor of Laci Babai's 60th birthday: Combinatorics, Groups, Algorithms, and Complexity International audience We prove that the extended equivalence problem is solvable in polynomial time for finite nilpotent groups, and coNP-complete, otherwise. We prove that the extended equation solvability problem is solvable in polynomial time for finite nilpotent groups, and NP-complete, otherwise.


2011 ◽  
Vol Vol. 13 no. 4 ◽  
Author(s):  
Thomas P. Hayes

special issue in honor of Laci Babai's 60th birthday: Combinatorics, Groups, Algorithms, and Complexity International audience For every positive integer k, we construct an explicit family of functions f : \0, 1\(n) -\textgreater \0, 1\ which has (k + 1) - party communication complexity O(k) under every partition of the input bits into k + 1 parts of equal size, and k-party communication complexity Omega (n/k(4)2(k)) under every partition of the input bits into k parts. This improves an earlier hierarchy theorem due to V. Grolmusz. Our construction relies on known explicit constructions for a famous open problem of K. Zarankiewicz, namely, to find the maximum number of edges in a graph on n vertices that does not contain K-s,K-t as a subgraph.


2008 ◽  
Vol Vol. 10 no. 1 (Combinatorics) ◽  
Author(s):  
Bernard Ycart ◽  
Joel Ratsaby

Combinatorics International audience For any class of binary functions on [n]={1, ..., n} a classical result by Sauer states a sufficient condition for its VC-dimension to be at least d: its cardinality should be at least O(nd-1). A necessary condition is that its cardinality be at least 2d (which is O(1) with respect to n). How does the size of a 'typical' class of VC-dimension d compare to these two extreme thresholds ? To answer this, we consider classes generated randomly by two methods, repeated biased coin flips on the n-dimensional hypercube or uniform sampling over the space of all possible classes of cardinality k on [n]. As it turns out, the typical behavior of such classes is much more similar to the necessary condition; the cardinality k need only be larger than a threshold of 2d for its VC-dimension to be at least d with high probability. If its expected size is greater than a threshold of O(&log;n) (which is still significantly smaller than the sufficient size of O(nd-1)) then it shatters every set of size d with high probability. The behavior in the neighborhood of these thresholds is described by the asymptotic probability distribution of the VC-dimension and of the largest d such that all sets of size d are shattered.


2010 ◽  
Vol Vol. 12 no. 4 ◽  
Author(s):  
Alberto Bertoni ◽  
Roberto Radicioni

special issue dedicated to the second edition of the conference AutoMathA: from Mathematics to Applications International audience In this work, we focus our attention to algorithmic solutions for problems where the instances are presented as straight-line programs on a given algebra. In our exposition, we try to survey general results by presenting some meaningful examples; moreover, where possible, we outline the proofs in order to give an insight of the methods and the techniques. We recall some recent results for the problem PosSLP, consisting of deciding if the integer defined by a straight-line program on the ring Z is greater than zero; we discuss some implications in the areas of numerical analysis and strategic games. Furthermore, we propose some methods for reducing Compressed Word Problem from an algebra to another; reductions from trace monoids to the semiring of nonnegative integers are exhibited and polynomial time algorithms for compressed equivalence in monoids related to Dyck reductions are shown. Finally, we consider inclusion problems for context-free languages, proving how in some cases efficient algorithms for these problems benefit from the ability to work with compressed data.


2010 ◽  
Vol Vol. 12 no. 4 ◽  
Author(s):  
Juhani Karhumaki ◽  
Aleksi Saarela

special issue dedicated to the second edition of the conference AutoMathA: from Mathematics to Applications International audience We give an instance of a class of morphisms for which it is easy to prove that their equality set is regular, but its emptiness is still undecidable. The class is that of bounded delay 2 morphisms.


2012 ◽  
Vol Vol. 14 no. 2 (Combinatorics) ◽  
Author(s):  
Robert H. Sloan ◽  
Despina Stasi ◽  
György Turán

Combinatorics International audience We consider the property that in a random definite Horn formula of size-3 clauses over n variables, where every such clause is included with probability p, there is a pair of variables for which forward chaining produces all other variables. We show that with high probability the property does not hold for p <= 1/(11n ln n), and does hold for p >= (5 1n ln n)/(n ln n).


2017 ◽  
Vol 15 (3) ◽  
Author(s):  
Ihsan Zainal Mokthar

I am pleased to present to you this Planning Malaysia Journal Volume 15 Issue 3 for your reading pleasure. Since our migration to online version of the Journal, we have successfullyelevated the Journal to higher level. The Journal readership has increased, reaching wider and international audience. The Journal is also gaining recognition from local and foreign scholars. Article submissions have increased three-fold and this year alone we are publishing 5 issues of the Journal, which is unprecedented. This issue also reflects the wider acceptance of the Journal. It includes articles not only from local scholars, but also from foreign scholars. We hoped that the inclusion of articles from foreign scholars would benefits local readers with knowledge of cases and experiences related to urban planning from other countries as well.I would like to thank the Journal Editorial Board and Secretariat for their untiring efforts in the publication of the Journal and also in successfully uplifting the Journal to higher level.Thank you.


Author(s):  
Mikhail V. Berlinkov ◽  
Cyril Nicaud

In this paper we address the question of synchronizing random automata in the critical settings of almost-group automata. Group automata are automata where all letters act as permutations on the set of states, and they are not synchronizing (unless they have one state). In almost-group automata, one of the letters acts as a permutation on [Formula: see text] states, and the others as permutations. We prove that this small change is enough for automata to become synchronizing with high probability. More precisely, we establish that the probability that a strongly-connected almost-group automaton is not synchronizing is [Formula: see text], for a [Formula: see text]-letter alphabet. We also present an efficient algorithm that decides whether a strongly-connected almost-group automaton is synchronizing. For a natural model of computation, we establish a [Formula: see text] worst-case lower bound for this problem ([Formula: see text] for the average case), which is almost matched by our algorithm.


Sign in / Sign up

Export Citation Format

Share Document